Thursday 30 January 2014

Important Knowleged Things:

1) Never trust sites that ask you for money in exchange for
Software piracy or claim Hack Email Id in exchange for money .
All these things are Scam . Fake software named : Fake

2) There is no software DIRECT Hack Facebook
Google , Yahoo or any other important site .
All software that claim to do is scam.
They are simply designed to take your money and in the worst cases, these software are :
Trojans and keyloggers in them.
Therefore your account is hacked.

3 ) NEVER NEVER use keyloggers or Trojans that you find
freeware on the Internet. The pirates are not stupid . they compile
keyloggers and trojans with almost all software and
when you install them , you are already hacked before
trying to hack others.

4) You will never be a good hacker without knowledge of programming languages and scripting .
When you plan to use only the software ready and do not depend on them
for all this piracy then your functionality is limited to the functionality of the software.
When you are not going to use your brain , just do the right thing copy and paste , then? :
how can you think you are a good hacker?

5) If you are a good hacker , you have to become a good
programmer, writer good script , a good web developer and
an expert in excellent security .
Well all good Hacker / must have a good knowledge of the various aspects and programming languages.
to XSS (Cross Site Scripting ) , PHP, SQL injection , phishing attacks , etc. footprint ...
must be good at programming and scripting . And when you know the loop holes are different vulnerabilities and safety tips
you have become an expert in computer security.
So Never Ever Under believes that the term Hacker.
Not a hacker is a person who just hacks email id or servers , but a real
Hacker is a computer genius whose knowledge of computers more than anyone.
1) Never trust sites that ask you for money in exchange for
Software piracy or claim Hack Email Id in exchange for money .
All these things are Scam . Fake software named : Fake

2) There is no software DIRECT Hack Facebook
Google , Yahoo or any other important site .
All software that claim to do is scam.
They are simply designed to take your money and in the worst cases, these software are :
Trojans and keyloggers in them.
Therefore your account is hacked.

3 ) NEVER NEVER use keyloggers or Trojans that you find
freeware on the Internet. The pirates are not stupid . they compile
keyloggers and trojans with almost all software and
when you install them , you are already hacked before
trying to hack others.

4) You will never be a good hacker without knowledge of programming languages and scripting .
When you plan to use only the software ready and do not depend on them
for all this piracy then your functionality is limited to the functionality of the software.
When you are not going to use your brain , just do the right thing copy and paste , then? :
how can you think you are a good hacker?

5) If you are a good hacker , you have to become a good
programmer, writer good script , a good web developer and
an expert in excellent security .
Well all good Hacker / must have a good knowledge of the various aspects and programming languages.
to XSS (Cross Site Scripting ) , PHP, SQL injection , phishing attacks , etc. footprint ...
must be good at programming and scripting . And when you know the loop holes are different vulnerabilities and safety tips
you have become an expert in computer security.
So Never Ever Under believes that the term Hacker.
Not a hacker is a person who just hacks email id or servers , but a real
Hacker is a computer genius whose knowledge of computers more than anyone.

Wednesday 29 January 2014

Whatsapp Account Hacking Method


Whatsapp hack to spy on some other account:

So if all of you have noticed you cannot have your whatsapp account logged in two devices. Means session is given to only one MAC address. If the MAC (Media Access Control) address of the device seeking access changes then whatsapp asks you to again verify your account.

How to Hack Whatsapp Account

All you need is to get access to victim phone to get the victims phone “MAC address along with the verifying massage” which is acquired to verify your device.
  • Get mac address on your android phone.
  • Finding MAC address on an Android Phones
  • On your phone’s home screen, click on menu, then go to setting.
  • Click on about phone.
  • Click on the status.
  • And then view your Wi-Fi MAC address.
  • As soon the message is received Push the MAC address as well as Verifying code to your server or mail it your ID. That banks on your convince.
  • Cheat your phone’s MAC address to the Victims address and install whatsapp and after that type the verify code.
  • And now its done. You get full access to the victim’s whatsapp ID. So now you can keep spying/watching your victim’s movements.
  • That means you and the victim is using the same ID from different devices.
  • Whatsapp hack to use it by not using your number
  • This hack works by cheating the Whatsapp Verification Servers by sending a spoofed request for an authorisation code expected for a different phone.
  • Install Whatsapp on your device. Whatsapp now opens a counter where it sends a verification message to its servers.
  • Block the message service – it can be blocked by changing the message centre number or turning the phone into Airplane mode.
Whatsapp now gives a substitute method of verification – Select verify through SMS and fill in your email address. Once you click to send the SMS press cancel to abort the call for authorisation to the Whatsapp server.
  • Now you have to do sms Spoofing.
  • Examine your outbox and copy the message details into the spoofer application and send the spoofed verification.
  • You will now receive messages expected for the spoofed number on your mobile device and you can communicate with people under the spoofed number.
Note:- This information has been shared to create awareness among people regarding the “Ways to Hack Whatsapp” so that you can protect yourself from getting hacked. In no way do we promote misusing of the information.
Now that you know How to Hack Whatsapp account, you are good to protect yours.


Whatsapp hack to spy on some other account:

So if all of you have noticed you cannot have your whatsapp account logged in two devices. Means session is given to only one MAC address. If the MAC (Media Access Control) address of the device seeking access changes then whatsapp asks you to again verify your account.

How to Hack Whatsapp Account

All you need is to get access to victim phone to get the victims phone “MAC address along with the verifying massage” which is acquired to verify your device.
  • Get mac address on your android phone.
  • Finding MAC address on an Android Phones
  • On your phone’s home screen, click on menu, then go to setting.
  • Click on about phone.
  • Click on the status.
  • And then view your Wi-Fi MAC address.
  • As soon the message is received Push the MAC address as well as Verifying code to your server or mail it your ID. That banks on your convince.
  • Cheat your phone’s MAC address to the Victims address and install whatsapp and after that type the verify code.
  • And now its done. You get full access to the victim’s whatsapp ID. So now you can keep spying/watching your victim’s movements.
  • That means you and the victim is using the same ID from different devices.
  • Whatsapp hack to use it by not using your number
  • This hack works by cheating the Whatsapp Verification Servers by sending a spoofed request for an authorisation code expected for a different phone.
  • Install Whatsapp on your device. Whatsapp now opens a counter where it sends a verification message to its servers.
  • Block the message service – it can be blocked by changing the message centre number or turning the phone into Airplane mode.
Whatsapp now gives a substitute method of verification – Select verify through SMS and fill in your email address. Once you click to send the SMS press cancel to abort the call for authorisation to the Whatsapp server.
  • Now you have to do sms Spoofing.
  • Examine your outbox and copy the message details into the spoofer application and send the spoofed verification.
  • You will now receive messages expected for the spoofed number on your mobile device and you can communicate with people under the spoofed number.
Note:- This information has been shared to create awareness among people regarding the “Ways to Hack Whatsapp” so that you can protect yourself from getting hacked. In no way do we promote misusing of the information.
Now that you know How to Hack Whatsapp account, you are good to protect yours.

Tuesday 28 January 2014

Secure Facebook Account



Take the following steps to ensure your Facebook account never gets hacked- 
1. Use HTTPS instead of HTTP in the URL when you save the bookmark of Facebook.
2. Do not use Facebook apps which says "Find your crush," "Find your next valentine" etc. 
3. Keep your Facebook chat option turned off for some time daily. 4. Keep your email address, phone number private. 
5. Always keep 4-5 trusted friends on Facebook. 
6. Never visit your Facebook profile through websites other than Facebook. They may be Phishing pages.
7. Change your Facebook password once or twice a month.
8. Always remember to Log Out off Facebook whenever you use it in Cyber or Internet Caffeys.
9. Install a trusted Anti Virus which will detect Phishing pages.
10. I recommend you to use Incognito mode while using Facebook.


Take the following steps to ensure your Facebook account never gets hacked- 
1. Use HTTPS instead of HTTP in the URL when you save the bookmark of Facebook.
2. Do not use Facebook apps which says "Find your crush," "Find your next valentine" etc. 
3. Keep your Facebook chat option turned off for some time daily. 4. Keep your email address, phone number private. 
5. Always keep 4-5 trusted friends on Facebook. 
6. Never visit your Facebook profile through websites other than Facebook. They may be Phishing pages.
7. Change your Facebook password once or twice a month.
8. Always remember to Log Out off Facebook whenever you use it in Cyber or Internet Caffeys.
9. Install a trusted Anti Virus which will detect Phishing pages.
10. I recommend you to use Incognito mode while using Facebook.

Monday 27 January 2014

Wireshark Purposes

►Wireshark -has been around for ages and is extremely popular. Wireshark allows the pentester to put a network interface into a promiscuous mode and therefore see all traffic. This tool has many features such as being able to capture data from live network connection or read from a file that saved already-captured packets. Wireshark is able to read data from a wide variety of networks, from Ethernet, IEEE 802.11, PPP, and even loopback. Like most tools in our 2013 Concise Courses Security List the captured network data can be monitored and managed via a GUI – which also allows for plug-ins to be inserted and used. Wireshark can also capture VoIP packets (like Cain & Able ) and raw USB traffic can also be captured.:
►Wireshark -has been around for ages and is extremely popular. Wireshark allows the pentester to put a network interface into a promiscuous mode and therefore see all traffic. This tool has many features such as being able to capture data from live network connection or read from a file that saved already-captured packets. Wireshark is able to read data from a wide variety of networks, from Ethernet, IEEE 802.11, PPP, and even loopback. Like most tools in our 2013 Concise Courses Security List the captured network data can be monitored and managed via a GUI – which also allows for plug-ins to be inserted and used. Wireshark can also capture VoIP packets (like Cain & Able ) and raw USB traffic can also be captured.:

Metasploit,Nessus and Nmap Detail



►Metasploit -The Metasploit Project is a security project which delivers information about security vulnerabilities and helps penetration testing and Intrusion detection. The open source project – known as the Metasploit Framework, is used by security professionals to execute exploit code against a remote target machine – for penetration testing of course.

►Nessus -is another giant – a security tool that focuses on vulnerability scanning. There is a free and paid version – free for personal use. Started in 1998 by Renaud Deraison is has evolved into one of the world’s most popular security tools – particularly as a vulnerability scanner. The organization behind Nessus, Tenable Security, estimates that it is used by over 75,000 organizations worldwide.

Essentially Nessus scans for various types of vulnerabilities: ones that check for holes that hackers could exploit to gain control or access a computer system or network. Furthermore, Nessus scans for possible misconfiguration (e.g. open mail relay, missing security patches, etc.). The tools also scans for default passwords and common passwords which is can use execute through Hydra (an external tool) to launch a dictionary attack. Other vulnerability scans include denials of service against the TCP/IP stack.


►Nmap - is another massive giant of a security tool which has been around for forever and is probably the best known. Nmap has featured on many movies including the Matrix – just Google it and you’ll see what we mean. Written in C, C++, Python, Lua by Gordon Lyon (Fyodor) starting from 1997, Nmap (Network Mapper) is the defacto security scanner which is used to discover hosts and services on a computer network. To discover hosts on a network Nmap sends specially built packets to the target host and then analyzes the responses. The program is really sophisticated because unlike other port scanners out there, Nmap sends packets based upon network conditions by taking into account fluctuations, congestion and more.


►Metasploit -The Metasploit Project is a security project which delivers information about security vulnerabilities and helps penetration testing and Intrusion detection. The open source project – known as the Metasploit Framework, is used by security professionals to execute exploit code against a remote target machine – for penetration testing of course.

►Nessus -is another giant – a security tool that focuses on vulnerability scanning. There is a free and paid version – free for personal use. Started in 1998 by Renaud Deraison is has evolved into one of the world’s most popular security tools – particularly as a vulnerability scanner. The organization behind Nessus, Tenable Security, estimates that it is used by over 75,000 organizations worldwide.

Essentially Nessus scans for various types of vulnerabilities: ones that check for holes that hackers could exploit to gain control or access a computer system or network. Furthermore, Nessus scans for possible misconfiguration (e.g. open mail relay, missing security patches, etc.). The tools also scans for default passwords and common passwords which is can use execute through Hydra (an external tool) to launch a dictionary attack. Other vulnerability scans include denials of service against the TCP/IP stack.


►Nmap - is another massive giant of a security tool which has been around for forever and is probably the best known. Nmap has featured on many movies including the Matrix – just Google it and you’ll see what we mean. Written in C, C++, Python, Lua by Gordon Lyon (Fyodor) starting from 1997, Nmap (Network Mapper) is the defacto security scanner which is used to discover hosts and services on a computer network. To discover hosts on a network Nmap sends specially built packets to the target host and then analyzes the responses. The program is really sophisticated because unlike other port scanners out there, Nmap sends packets based upon network conditions by taking into account fluctuations, congestion and more.

John The Ripper Tool Uses:

John The Ripper -is a free password cracking software tool. Originally created for the UNIX operating system, it currently works on every major operating system. By far, this tool is one of the most popular password testing and breaking programs used by information security professionals. The pentesting tool combines various password crackers into one concise package which is then able to identify password hash types through its own customizable cracker algorithm.
John The Ripper -is a free password cracking software tool. Originally created for the UNIX operating system, it currently works on every major operating system. By far, this tool is one of the most popular password testing and breaking programs used by information security professionals. The pentesting tool combines various password crackers into one concise package which is then able to identify password hash types through its own customizable cracker algorithm.

Ettercap tool uses:

Ettercap - is a free and open source network security tool for man-in-the-middle attacks (MITM) on LAN. The security tool can be used to analyze computer network protocols within a security auditing context. Ettercap has four methods of functionality:
Security scanning by filtering IP-based packets, MAC-based: whereby packets are filtered based on MAC address, (this is useful for sniffing connections through a gateway). ARP-based scanning by using ARP poisoning to sniff on a switched LAN between two hosts (known as full-duplex). PublicARP-based functionality: Ettercap uses ARP poisoning to sniff on a switched LAN from a victim host to all other hosts (known as half-duplex).
Ettercap - is a free and open source network security tool for man-in-the-middle attacks (MITM) on LAN. The security tool can be used to analyze computer network protocols within a security auditing context. Ettercap has four methods of functionality:
Security scanning by filtering IP-based packets, MAC-based: whereby packets are filtered based on MAC address, (this is useful for sniffing connections through a gateway). ARP-based scanning by using ARP poisoning to sniff on a switched LAN between two hosts (known as full-duplex). PublicARP-based functionality: Ettercap uses ARP poisoning to sniff on a switched LAN from a victim host to all other hosts (known as half-duplex).

Cain & Abel Uses:

Cain & Abel - has a reputation of being a bit of a script-kiddie tool, but it is still awesome nonetheless. Cain & Abel is defined as being a password recovery tool. This tool allows a penetration tester to recover various types of passwords by sniffing the network, and cracking encrypted passwords using either a dictionary or brute-force attacks. The tool can also record VoIP conversations and has the ability to decode scrambled passwords, discover WiFi network keys and cached passwords. With the correct usage and expertise, a penetration tester can also analyze routing protocols. The security tool does not inherently exploit any software vulnerabilities or holes, rather it identifies security weaknesses in protocol’s standards.
Cain & Abel - has a reputation of being a bit of a script-kiddie tool, but it is still awesome nonetheless. Cain & Abel is defined as being a password recovery tool. This tool allows a penetration tester to recover various types of passwords by sniffing the network, and cracking encrypted passwords using either a dictionary or brute-force attacks. The tool can also record VoIP conversations and has the ability to decode scrambled passwords, discover WiFi network keys and cached passwords. With the correct usage and expertise, a penetration tester can also analyze routing protocols. The security tool does not inherently exploit any software vulnerabilities or holes, rather it identifies security weaknesses in protocol’s standards.

Sunday 26 January 2014

Aircrack-ng Tool Info


Aircrack-ng -is a comprehensive set of network security tools that includes, aircrack-ng (which can cracks WEP and WPA Dictionary attacks), airdecap-ng (which can decrypts WEP or WPA encrypted capture files), airmon-ng (which places network cards into monitor mode, for example when using the Alfa Security Scanner with rtl8187), aireplay-ng (which is a packet injector), airodump-ng (which is a packet sniffer), airtun-ng (which allows for virtual tunnel interfaces), airolib-ng (which stores and manages ESSID and password lists), packetforge-ng (which can create encrypted packets for injection), airbase-ng (which incorporates techniques for attacking clients) and airdecloak-ng (which removes WEP cloaking). Other tools include airdriver-ng (to manage wireless drivers), airolib-ng (to store and manages ESSID and password lists and compute Pairwise Master Keys), airserv-ng (which allows the penetration tester to access the wireless card from other computers). Airolib-ng is similiar to easside-ng which allows the user to run tools on a remote computer, easside-ng (permits a means to communicate to an access point, without the WEP key), tkiptun-ng (for WPA/TKIP attacks) and wesside-ng (which an an automatic tool for recovering wep keys). Aircrack has a GUI interface – called Gerix Wifi Cracker

Aircrack-ng -is a comprehensive set of network security tools that includes, aircrack-ng (which can cracks WEP and WPA Dictionary attacks), airdecap-ng (which can decrypts WEP or WPA encrypted capture files), airmon-ng (which places network cards into monitor mode, for example when using the Alfa Security Scanner with rtl8187), aireplay-ng (which is a packet injector), airodump-ng (which is a packet sniffer), airtun-ng (which allows for virtual tunnel interfaces), airolib-ng (which stores and manages ESSID and password lists), packetforge-ng (which can create encrypted packets for injection), airbase-ng (which incorporates techniques for attacking clients) and airdecloak-ng (which removes WEP cloaking). Other tools include airdriver-ng (to manage wireless drivers), airolib-ng (to store and manages ESSID and password lists and compute Pairwise Master Keys), airserv-ng (which allows the penetration tester to access the wireless card from other computers). Airolib-ng is similiar to easside-ng which allows the user to run tools on a remote computer, easside-ng (permits a means to communicate to an access point, without the WEP key), tkiptun-ng (for WPA/TKIP attacks) and wesside-ng (which an an automatic tool for recovering wep keys). Aircrack has a GUI interface – called Gerix Wifi Cracker

Acunetix Tool Info

Acunetix -has a free and paid version. This hacking tool has many uses but in essence it tests and reports on SQL injection and Cross Site scripting testing. It has a state of the art crawler technology which includes a client script analyzer engine. This security tool generates detailed reports that identify security issues and vulnerabilities. The latest version, Acunetix WVS version 8, includes several security features such as a new module that tests slow HTTP Denial of Service.This is useful for penetration testers and developers both.
Acunetix -has a free and paid version. This hacking tool has many uses but in essence it tests and reports on SQL injection and Cross Site scripting testing. It has a state of the art crawler technology which includes a client script analyzer engine. This security tool generates detailed reports that identify security issues and vulnerabilities. The latest version, Acunetix WVS version 8, includes several security features such as a new module that tests slow HTTP Denial of Service.This is useful for penetration testers and developers both.

Saturday 25 January 2014

Save Laptop Battery Life

Must Share..

Follow Steps to Save Laptop Battery upto 20%:

1.Reduce Screen Brightness

2.Disable Bluetooth and Other Hardware Devices

3.Remove USBs When not in use

4.Tweak Your Power Plan

5.Low your volume or turn it off when not in use

6.Avoid Laptop Heating and Maintain Laptop Heating

7. Keep Battery Charged

8. Uninstall useless and Other non usable softwares

9.Never keep CD into CD-ROM without any use

10. Switch OFF internet when not in use
Must Share..

Follow Steps to Save Laptop Battery upto 20%:

1.Reduce Screen Brightness

2.Disable Bluetooth and Other Hardware Devices

3.Remove USBs When not in use

4.Tweak Your Power Plan

5.Low your volume or turn it off when not in use

6.Avoid Laptop Heating and Maintain Laptop Heating

7. Keep Battery Charged

8. Uninstall useless and Other non usable softwares

9.Never keep CD into CD-ROM without any use

10. Switch OFF internet when not in use

Thursday 23 January 2014

Create Multiple User Accounts With Single Gmail ID

Today I Am telling you a Gmail secret . An amazing trick.

Friends.
Do u know?
You can create multiple user accounts (IDs) on 90% websites with a single gmail id .

Atleast Every website dont allow you to create more then one account associate with same email id and you know it better..

But if you have gmail account then you can create many accounts on a websites.
Its possible because gmail account don't count dot(.) in email addresses.
thats means
anyname@gmail. com
and
any.name@gmail. com
both are same email address . Yeah if you send email to anyna.me@gmail .com then it wil go to anyname@gmail .com

that means if you already have ur account on a website with yourname@gmail .com
you can create you.rname@gmail .com

but facebook is listed in the 10% websites. it dont allow this even u use dot.
But 90% websites includin twitter will allow you to signup  so enjoy and keep share.
Today I Am telling you a Gmail secret . An amazing trick.

Friends.
Do u know?
You can create multiple user accounts (IDs) on 90% websites with a single gmail id .

Atleast Every website dont allow you to create more then one account associate with same email id and you know it better..

But if you have gmail account then you can create many accounts on a websites.
Its possible because gmail account don't count dot(.) in email addresses.
thats means
anyname@gmail. com
and
any.name@gmail. com
both are same email address . Yeah if you send email to anyna.me@gmail .com then it wil go to anyname@gmail .com

that means if you already have ur account on a website with yourname@gmail .com
you can create you.rname@gmail .com

but facebook is listed in the 10% websites. it dont allow this even u use dot.
But 90% websites includin twitter will allow you to signup  so enjoy and keep share.

Use The Trial Program Forever

Steps to use the Trial Program
Forever:-
1. Note the date and time of
the software when it first
installed
2. Once after the trial period
has expired, you must always
run the software using
(RunAsDate).
3. Do not run the software
(program) directly after trial
period. If you run the software
directly even once, this trick
may no longer work.
4. It is good and safe to inject
the date of the last day in the
trial period.
For example, if the trial period of
the software expires on jan 3 2014, always inject the date as jan
02 2014 in the RunAsDate. Please
share your opinions in the
comment below.


Steps to use the Trial Program
Forever:-
1. Note the date and time of
the software when it first
installed
2. Once after the trial period
has expired, you must always
run the software using
(RunAsDate).
3. Do not run the software
(program) directly after trial
period. If you run the software
directly even once, this trick
may no longer work.
4. It is good and safe to inject
the date of the last day in the
trial period.
For example, if the trial period of
the software expires on jan 3 2014, always inject the date as jan
02 2014 in the RunAsDate. Please
share your opinions in the
comment below.


INVENTORS OF FAMOUS PROGRAMMING LANGUAGES

★ INVENTORS OF FAMOUS PROGRAMMING LANGUAGES ★

1. Joe Armstrong — Creator of Erlang.
2. John Backus — Inventor of Fortran.
3. Alan Cooper — Developer of Visual Basic.
4. James Gosling — Developer of Oak, the precursor of Java.
5. Anders Hejlsberg — Developer of Turbo Pascal, Delphi and C#.
6. Alan Kay — Pioneering work on object-oriented programming, and originator of Smalltalk.
7. Yukihiro Matsumoto — Creator of Ruby.
8. John McCarthy — Inventor of LISP.
9. Bertrand Meyer — Inventor of Eiffel.
10. John von Neumann — Originator of the operating system concept.
11. Martin Odersky — Creator of Scala, and previously a contributor to the design of Java.
12. Dennis Ritchie — Inventor of C. Unix Operating System, Plan 9 Operating System.
13. Rochester — Inventor of first assembler (IBM 701).
14. Guido van Rossum — Creator of Python.
15. Bjourne Stroustrup — Developer of C++.
16. Ken Thompson — Inventor of B, Go Programming Language, Inferno Programming Language, and Unix Operating System co-author.
17. Larry Wall — Creator of the Perl programming language
18. Niklaus Wirth — Inventor of Pascal, Modula and Oberon.


★ INVENTORS OF FAMOUS PROGRAMMING LANGUAGES ★

1. Joe Armstrong — Creator of Erlang.
2. John Backus — Inventor of Fortran.
3. Alan Cooper — Developer of Visual Basic.
4. James Gosling — Developer of Oak, the precursor of Java.
5. Anders Hejlsberg — Developer of Turbo Pascal, Delphi and C#.
6. Alan Kay — Pioneering work on object-oriented programming, and originator of Smalltalk.
7. Yukihiro Matsumoto — Creator of Ruby.
8. John McCarthy — Inventor of LISP.
9. Bertrand Meyer — Inventor of Eiffel.
10. John von Neumann — Originator of the operating system concept.
11. Martin Odersky — Creator of Scala, and previously a contributor to the design of Java.
12. Dennis Ritchie — Inventor of C. Unix Operating System, Plan 9 Operating System.
13. Rochester — Inventor of first assembler (IBM 701).
14. Guido van Rossum — Creator of Python.
15. Bjourne Stroustrup — Developer of C++.
16. Ken Thompson — Inventor of B, Go Programming Language, Inferno Programming Language, and Unix Operating System co-author.
17. Larry Wall — Creator of the Perl programming language
18. Niklaus Wirth — Inventor of Pascal, Modula and Oberon.


Best IT Information Websites

best it information websites
1. ZDNet
2. Cnet's News.Com 
3. Information Week 
4 Wired News
5 InfoWorld.com
6 Computerworld
7 CNN Tech News
8 IT World
9 Wired Start.com
10 Slashdot
11 TechWeb
12 itmWEB
13 TechNewsWorld
14 1stHeadlines
15 New Computer News
16 IT World Canada
17 E*Prairie.com
18 BBC Tech News
19 Dr. Dobb's News
20 Linux.com
21 arstechnica

22:checkingtricks
23:securityundefined
:-)
:-)
Comment It For adding more IT sites.
best it information websites
1. ZDNet
2. Cnet's News.Com 
3. Information Week 
4 Wired News
5 InfoWorld.com
6 Computerworld
7 CNN Tech News
8 IT World
9 Wired Start.com
10 Slashdot
11 TechWeb
12 itmWEB
13 TechNewsWorld
14 1stHeadlines
15 New Computer News
16 IT World Canada
17 E*Prairie.com
18 BBC Tech News
19 Dr. Dobb's News
20 Linux.com
21 arstechnica

22:checkingtricks
23:securityundefined
:-)
:-)
Comment It For adding more IT sites.

Wednesday 22 January 2014

UseFull important Command

useful commands 

Display Connection Configuration: ipconfig /all

Display DNS Cache Info: ipconfig /displaydns

Clear DNS Cache: ipconfig /flushdns

Release All IP Address Connections: ipconfig /release

Renew All IP Address Connections: ipconfig /renew

Re-Register the DNS connections: ipconfig /registerdns

Change/Modify DHCP Class ID: ipconfig /setclassid

Network Connections: control netconnections

Network Setup Wizard: netsetup.cpl

Test Connectivity: ping whatismyip.com

Trace Route: tracert

Displays the TCP/IP protocol sessions: netstat

Display Local Route: route

Display Resolved MAC Addresses: arp

Display Name of Computer Currently on: hostname

Display DHCP Class Information: ipconfig /showclassid

NameServer Lookup: nslookup google.com
useful commands 

Display Connection Configuration: ipconfig /all

Display DNS Cache Info: ipconfig /displaydns

Clear DNS Cache: ipconfig /flushdns

Release All IP Address Connections: ipconfig /release

Renew All IP Address Connections: ipconfig /renew

Re-Register the DNS connections: ipconfig /registerdns

Change/Modify DHCP Class ID: ipconfig /setclassid

Network Connections: control netconnections

Network Setup Wizard: netsetup.cpl

Test Connectivity: ping whatismyip.com

Trace Route: tracert

Displays the TCP/IP protocol sessions: netstat

Display Local Route: route

Display Resolved MAC Addresses: arp

Display Name of Computer Currently on: hostname

Display DHCP Class Information: ipconfig /showclassid

NameServer Lookup: nslookup google.com

Tuesday 14 January 2014

Send Files Over Wifi


... ..

First of all you should have below thing:

1. A WiFi Internet Modem or You can make your laptop WiFi Hot-spot using this trick.
 2. Android phone or tablet 
 3. Obviously a computer or laptop Now just follow these steps.
Now just follow these steps.
STEP 1:
First of all connect your phone with  WiFi.

STEP 2:
Now just download WiFi File Transfer from Google Play Store.

STEP 3:
Now just run the downloaded app. Here you will see on option to start service. Just touch on that.
STEP 4:
Now this will generate an unique ftp address in this format – ftp://ip-adress:port as shown in below screenshot.
...STEP 5:
Now open My Computer  in your computer of laptop. Here just fill the the ftp address in address bar as shown in below screenshot.
WiFi File Transfer - screenshot
...STEP 6:
Now you will see that you file manager of your phone in your computer. Please note that there is no need of internet connection in this. You should have only WiFi connection in both device.

... ..

First of all you should have below thing:

1. A WiFi Internet Modem or You can make your laptop WiFi Hot-spot using this trick.
 2. Android phone or tablet 
 3. Obviously a computer or laptop Now just follow these steps.
Now just follow these steps.
STEP 1:
First of all connect your phone with  WiFi.

STEP 2:
Now just download WiFi File Transfer from Google Play Store.

STEP 3:
Now just run the downloaded app. Here you will see on option to start service. Just touch on that.
STEP 4:
Now this will generate an unique ftp address in this format – ftp://ip-adress:port as shown in below screenshot.
...STEP 5:
Now open My Computer  in your computer of laptop. Here just fill the the ftp address in address bar as shown in below screenshot.
WiFi File Transfer - screenshot
...STEP 6:
Now you will see that you file manager of your phone in your computer. Please note that there is no need of internet connection in this. You should have only WiFi connection in both device.

Monday 13 January 2014

7 MUST HAVE tools for every hacker

1. Nmap
-For network exploration

2. Nessus Remote Security Scanner
-Vulnerability scanner

3. Wireshark
-Sniffer

4. Cain and Abel
-Password recovery tool

5. Kismet
-Wireless network detector, sniffer, intrusion detection system

6. NetStumbler
-Detect WLANs

7. SuperScan
-Port scanner, pinger, resolver
1. Nmap
-For network exploration

2. Nessus Remote Security Scanner
-Vulnerability scanner

3. Wireshark
-Sniffer

4. Cain and Abel
-Password recovery tool

5. Kismet
-Wireless network detector, sniffer, intrusion detection system

6. NetStumbler
-Detect WLANs

7. SuperScan
-Port scanner, pinger, resolver

Wednesday 1 January 2014

Major Types OF Internet Errors

Types of Errors.

INTERNET ERROR CODES...!!!
Error 400 - Bad request.
Error 401 - unauthorized request.
Error 403 - forbidden.
Error 404 - Not found.
Error 500 -Internal error.
Error 501 - Not Implemented
Error 502 - Bad Gateway
Error 503 -Service unavailable.
Error 504 - Gateway Time-Out
Error 505 - HTTP Version not supported/ DNS Lookup Fail/unknown host
Error 500-599 - Server Errors.












Types of Errors.

INTERNET ERROR CODES...!!!
Error 400 - Bad request.
Error 401 - unauthorized request.
Error 403 - forbidden.
Error 404 - Not found.
Error 500 -Internal error.
Error 501 - Not Implemented
Error 502 - Bad Gateway
Error 503 -Service unavailable.
Error 504 - Gateway Time-Out
Error 505 - HTTP Version not supported/ DNS Lookup Fail/unknown host
Error 500-599 - Server Errors.












 

Security Learner's Blog

This content is DMCA Protected.Copying or reproducing of procedure is prohibited.Do Not Copy!!