Pages

Wednesday, April 25, 2012

Play famous 'Snake Game' on Youtube!





Today I'm going to tell you how to play the famous 'snake game' on Youtube.com.

All you have to do is press -

" left mouse button+left arrow+up arrow"

on the screen where video is there. Once you do this,your game starts.For better play i'll recommend you to type ''black screen'' on youtube and you'll get some videos with black screen, so that you can see the snake properly.If you get out, then refresh the page and start again! have fun!!




Tuesday, April 24, 2012

STEALING PASSWORD USING GOOGLE HACK


Google is a treasure trove full of important information, especially for the underground world. This Potential fact can also be utilized in the data for the username and password stored on a server.

If the administrator save important data not in the complete system authentication folder, then most likely be reached by the google search engine. If data is successfully steal in by the unauthorized person, then the will be in misuse.

Here, some google search syntax to crawl the password:

1. "Login: *" "password =*" filetype: xls (searching data command to the system files that are stored in Microsoft Excel)

2. allinurl: auth_user_file.txt (to find files auth_user_file.txt containing password on server).

3. filetype: xls inurl: "password.xls" (looking for username and password in ms excel format). This command can change with admin.xls)

4. intitle: login password (get link to the login page with the login words on the title and password words anywhere. If you want to the query index more pages, type allintitle)

5. intitle: "Index of" master.passwd (index the master password page)

6. index of / backup (will search the index backup file on server)

7. intitle: index.of people.lst (will find web pages that contain user list).

8. intitle: index.of passwd.bak ( will search the index backup password files)

9. intitle: "Index of" pwd.db (searching database password files).

10. intitle: "Index of .. etc" passwd (this command will index the password sequence page).

11. index.of passlist.txt (will load the page containing password list in the clear text format).

12. index.of.secret (google will bring on the page contains confidential document). This syntax also changed with government query site: gov to search for government secret files, including password data) or use syntax: index.of.private

13. filetype: xls username password email (will find spreadsheets filese containing a list of username and password).

14. "# PhpMyAdmin MySQL-Dump" filetype: txt (will index the page containing sensitive data administration that build with php)

15. inurl: ipsec.secrets-history-bugs (contains confidential data that have only by the super user). or order with inurl: ipsec.secrets "holds shared secrets"

16. inurl: ipsec.conf-intitle: manpage (useful to find files containing important data for hacking)

17. inurl: "wvdial.conf" intext: "password" (display the dialup connection that contain phone number, username and password)

18. inurl: "user.xls" intext: "password" (showing url that save username and passwords in spread sheet files)

19. filetype: ldb admin (web server will look for the store password in a database that dos not delete by googledork)

20.inurl: search / admin.php (will look for php web page for admin login). If you are lucky, you will find admin configuration page to create a new user.

21. inurl: password.log filetype:log (this keyword is to search for log files in a specific url)

22. filetype: reg HKEY_CURRENT_USER username (this keyword used to look for reg files (registyry) to the path HCU (Hkey_Current_User))

Here, some of the other syntax google that we need to look for confidential data :

"Http://username: password @ www ..." filetype: bak inurl: "htaccess | passwd | shadow | ht users"
(this command is to take the user names and passwords for backup files)

filetype:mdb inurl:”account|users|admin|administrators|passwd|password” mdb files (this command is to take the password information)

filetype:ini ws_ftp pwd (searching admin password with ws_ftp.ini file)

intitle: "Index of" pwd.db (searching the encrypted usernames and passwords)

inurl:admin inurl:backup intitle:index.of (searching directories whose names contain the words admin and backup)

“Index of/” “Parent Directory” “WS _ FTP.ini” filetype:ini WS _ FTP PWD (WS_FTP configuration files is to take FTP server access passwords)

ext:pwd inurl:(service|authors|administrators|users) “# -FrontPage-” (there is Microsoft FrontPage passwords)

filetype: sql ( "passwd values ****" |" password values ****" | "pass values ****") searching a SQL code and passwords stored in the database)

intitle:index.of trillian.ini (configuration files for the Trillian IM)

eggdrop filetype:user (user configuration files for the Eggdrop ircbot)

filetype:conf slapd.conf (configuration files for OpenLDAP)

inurl:”wvdial.conf” intext:”password” (configuration files for WV Dial)

ext:ini eudora.ini (configuration files for the Eudora mail client)

filetype: mdb inurl: users.mdb (potentially to take user account information with Microsoft Access files)

intext:”powered by Web Wiz Journal” (websites using Web Wiz Journal, which in its standard configuration allows access to the passwords file – just enter http:///journal/journal.mdb instead of the default http:///journal/)

“Powered by DUclassified” -site:duware.com "Powered by DUclassified"-site: duware.com
“Powered by DUcalendar” -site:duware.com "Powered by DUcalendar"-site: duware.com
“Powered by DUdirectory” -site:duware.com "Powered by DUdirectory"-site: duware.com
“Powered by DUclassmate” -site:duware.com "Powered by DUclassmate"-site: duware.com
“Powered by DUdownload” -site:duware.com "Powered by DUdownload"-site: duware.com
“Powered by DUpaypal” -site:duware.com "Powered by DUpaypal"-site: duware.com
“Powered by DUforum” -site:duware.com "Powered by DUforum"-site: duware.com

intitle:dupics inurl:(add.asp | default.asp |view.asp | voting.asp) -site:duware.com (websites that use DUclassified, DUcalendar, DUdirectory, DUclassmate, DUdownload, DUpaypal, DUforum or DUpics applications, by default allows us to retrieve passwords file)

To DUclassified, just visit http:///duClassified/ _private / duclassified.mdb
or http:///duClassified/ or http:///duClassified/


intext: "BiTBOARD v2.0" "BiTSHiFTERS Bulletin Board" (Bitboard2 use the website bulletin board, the default settings make it possible to retrieve the passwords files to be obtained with the ways http:///forum/admin/data _ passwd.dat
or http:///forum/forum.php) or http:///forum/forum.php)

Searching for specific documents :

filetype: xls inurl: "email.xls" (potentially to take the information contact)

“phone * * *” “address *” “e-mail” intitle:”curriculum vitae”
CVs "not for distribution" (confidential documents containing the confidential clause
buddylist.blt)

AIM contacts list AIM contacts list

intitle:index.of mystuff.xml intitle: index.of mystuff.xml

Trillian IM contacts list Trillian IM contacts list

filetype:ctt “msn” filetype: Note "msn"

MSN contacts list MSN contacts list

filetype:QDF
(QDF database files for the Quicken financial application)

intitle: index.of finances.xls (finances.xls files, potentially to take information on bank accounts, financial Summaries and credit card numbers)

intitle: "Index Of"-inurl: maillog (potentially to retrieve e-mail account)

download GOOGLE hack from  HERE

Hope you enjoy.....

Sunday, April 22, 2012

who is anonymous??

 
We know only that this thing is hacked by anonymous but 
who is anonymous that do not know 
why they want to do this thing we do not know??
 
This word by the anonymous...
We are Anonymous, and we do not forgive. 
Forgiveness requires humility, humility requires dignity.
We have neither. 
We are void of human restraints, such as self respect and common sense. 
All those who break this pact will be eliminated without hesitation.
And by elimination we will put 
their name on an icky photo and shit in each others' mouths.
Those who perform reckless actions or wish to 
harm the Anonymous will be eliminated without hesitation.
Again, elimination is our word for doing very little about it.
Failure is the basis of our existence.
Enemies of the Anonymous include anyone who can point out
how many times we contradict ourselves in a single sentence.
Our enemies are to be flaccidly made fun of,
using the same tired photoshopped stuff stolen from someone else.
Anonymous must "work" as one. 
No Anonymous knows anything. Betrayal of Anonymous is both ironic and appropriate.
Manipulation of the weak and innocent is something that 
the truly weak believe indicates power, as such we do it alot. 
Not well but, often. 
Once a victim is no longer commodious, they are to be eliminated. 
Also, the cow was slaughtered in the abattoir.
REPRODUCE. REPRODUCE. REPRODUCE.
Like cockroaches and Catholics 
we need to make sure our stupidity is at least backed by numbers.
Quantity over quality. 
Loud = Funny. 
No man-made or natural occurance can harm the Anonymous. 
Except when Mom and Dad ground us from the computer.
That's pouting time. 
Under no circumstances are Anonymous human.
We are beneath humans and mortality. 
Anonymous are not to partake in meaningless tasks....
pffft Ahhh dude I'm totally shitting ya, that's all we do.
You are legion, for we are many.
That makes it easier to defend ourselves when smart people
tell us to stop acting like idiots. 
Anonymous is everywhere at all times, we like to loiter. 
we really have nothing better to do than hang out.
Yet, singular Anonymous are not permitted to know everything. Which is good, 
because we know very little.
All have the potential to be Anonymous until 
they choose to drop a bag of fertilizer on their nutsack and grow a pair.
Those who are not Anonymous are to be eliminated....
or photoshopped into a nasty photo 
which ever one requires less standing and walking. 
Or hack a paypal account and charge PS3's, 
send massive amounts of cowardly and empty death threats or,
whatever weak ass "criminal" act we think will make us appear powerful. 
Anonymous has no weakness or flaw. 
Well, except maybe getting laid.
That ain't happening. And a whole bunch of others.
But besides crippling personality flaws, body odor, lack of humor, 
not getting laid and relying on shock value and memes to speak for us...
we have only a few more flaws and weaknesses.
Laws of Nature and Man cannot restrain the Anonymous. 
However, an IP ban, power outage or, 
a light punch to the solar plexus can drop us like a bag of bad habits. 
Anonymous is Zero. 
Feuding and argument amongst the Anonymous is both constant and unavoidable. 
Anonymous is in control at all times. 
We just choose to waste all of it. 
Anonymous has no identity. 
Those who are not Anonymous yet know our presence must be eliminated.
Again and, I can not stress this enough people,
"eliminate" means sitting on our asses all day pretending to jerk off to Goatse,
while our mothers yell at us to get jobs. 
Anonymous cannot be contained by mere restraints.
We are far too fat to fit any normal conveyance, 
handcuffs or standard size airline seats.
Anonymous are all equally stupid.
No one is more retarded then Anonymous. 
Anonymous must obey the Code.
Those who do not are to be raped with our mighty e-peens,
until supper time and homework, 
then an hour of Gameboy before bedtime. 
Anonymous worships nothing because anonymous is nothing. 
Anonymous cares for nothing, but Anonymous. Our existence is vapid,
myopic and limited. Humanity is the virus; 
Anonymous is the open wound that invites it in.
We are Anonymous,and we do not realize how little we matter.
     

URL of the site is http://pdjfyv7v3pn34w4f.onion/about.html

still we do not know who is???

CYGWIN Great VMWare


VMware is a great tool for running multiple operating systems (or multiple virtual machines) from the same Windows- or Linux-based OS, but for those who want to have the best of both Windows and Unix worlds, Cygwin might be a simpler, less expensive alternative. Cygwin is a free Unix subsystem that runs on top of Windows. Cygwin uses a single dynamic-link library (DLL) to implement this subsystem, allowing the community to develop "Cygwin-ized" Unix tools that use the DLL to run on Windows. Imagine running vi, bash, GCC, tar, sed, and other Unix favorites while still having the power of Windows. While some organizations will port these applications or variations of these applications to a native Windows OS, Cygwin makes the transition process of porting a bit easier.

For system administrators and network professionals, Cygwin is a cheaper alternative to getting some of the more important Unix utilities for system analysis (md5sum, strace, strings, and so on) onto a Windows box. Another point of favor for Cygwin is that it enables you to create simple (or complex) programs quickly. Cygwin includes a free compiler for C and C++ (and even Fortan and some other languages, if you're adventurous) and has a mostly complete Unix API. This is a great advantage for penetration testing or just developing some useful programs.

Download and Installation

The Cygwin environment and its associated tools are all freely available under the GNU General Public License. You can begin the installation process by going to http://cygwin.com/ and downloading the setup program. The setup program downloads the files it needs from a Cygwin mirror site of your choosing and installs them into a specified location by default. You can choose between Hypertext Transfer Protocol (HTTP), File Transfer Protocol (FTP), and Rsync download methods.
You will be asked a few questions, such as whether or not you want the text files generated by Cygwin applications to be in DOS or Unix format. DOS file lines end with a newline and a carriage return while Unix file lines only end with the newline; if you've seen ⁁M characters at the end of your text files, chances are they were transferred between a Unix and Windows system in binary format rather than ASCII. If you are running on a multi-user Windows box, you will also be asked if you want to install the application for your user ID alone or for everyone on the system.
The Cygwin installer will also ask you which tools you want to install by presenting you with a screen like the one shown in Figure.
 Cygwin setup

You can use the Prev, Curr, and Exp options to have the installer automatically install older, current, or experimental versions of the software. Be careful: if you go through the list and choose to install certain applications and then click one of these buttons, your other selections will get wiped out.
Use the View button to cycle between different lists of the available packages. Full view is probably the easiest to work with and is shown in Figure.
Cygwin setup full view
Full view displays all available packages alphabetically. Click a field in the New column in order to select an option for the package. The options will be to install, reinstall, keep, or remove a package. If you also wish to have the source code available, check the Src? field.


Tip:-
If you omit a package and wish to install it at a later time, rerun the Cygwin setup program; it will update currently installed packages and let you select new ones to install.After you select the desired packages and their options, Cygwin retrieves and installs them. This can take some time depending on the speed of your Internet connection and the number of packages you choose. The Cygwin environment is ready for business once this stage completes.

Implementation

Double-click the Cygwin icon. You'll see a screen similar to the following:

The cygwin.bat script runs from a DOS command prompt, sets up the Cygwin environment, and starts a bash shell in Windows. Cygwin does its best to set up intelligent Unix-like environment variables based on your Windows environment.
Depending on the packages you installed, you can now run Unix utilities with ease. If you're a Unix user, you've undoubtedly wished that Windows had a ps command so that you could see the currently running Windows processes from the command line without bothering with Task Manager. If you use the –aW flag, you can see Windows processes as well as any Cygwin processes that are running. The following view shows Windows processes, accessed by running the Cygwin command (ps –aW | less):
PID  PPID  PGID     WINPID  TTY  UID    STIME COMMAND
3193213     0     0 4291774083    ?    0   Dec 31 C:\WINDOWS\SYSTEM\KERNEL32.DLL
  63753     0     0 4294903543    ?    0    Dec 31
C:\WINDOWS\SYSTEM\MSGSRV32.EXE
  60569     0     0 4294906727    ?    0    Dec 31
C:\WINDOWS\SYSTEM\MPREXE.EXE
  77349     0     0 4294889947    ?    0    Dec 31
C:\WINDOWS\SYSTEM\RPCSS.EXE
 196093     0     0 4294771203    ?    0    Dec 31
C:\WINDOWS\SYSTEM\mmtask.tsk
 191237     0     0 4294776059    ?    0   Dec 31 C:\WINDOWS\EXPLORER.EXE
 237709     0     0 4294729587    ?    0   Dec 31 C:\WINDOWS\TASKMON.EXE
 230713     0     0 4294736583    ?    0    Dec 31
C:\WINDOWS\SYSTEM\SYSTRAY.EXE
 217533     0     0 4294749763    ?    0    Dec 31
C:\PROGRAM FILES\DIRECTCD\DIRECTCD.EXE
 

Tip:-
Cygwin assumes the .exe extension whenever you run a program. Typing foo on the command line will execute the "foo" binary, if it exists, or the "foo.exe" if it is within your current path variable.

Directory Structure and File Permissions

Cygwin mounts the system's local drives under the /cygdrive directory. This permits the normal Unix file system hierarchy to coexist with Windows. The cygdrive mount point includes hard-drive partitions, floppy drives, CD drives, and USB drives. Here is the example output of the df command, which reports disk usage for the file system's mount points:
Tech@Inside ~
$ df
Filesystem           1K-blocks      Used Available Use% Mounted on
C:\cygwin\bin         15358108   7873952   7484156  52% /usr/bin
C:\cygwin\lib         15358108   7873952   7484156  52% /usr/lib
C:\cygwin             15358108   7873952   7484156  52% /
c:                    15358108   7873952   7484156  52% /cygdrive/c
d:                    36033760  25047516  10986244  70% /cygdrive/d
e:                    20482872   9193980  11288892  45% /cygdrive/e
f:                     2149896   2149896         0 100% /cygdrive/f
 
By default, Cygwin installs into the C:\cygwin\ directory, although you can change this upon the first install. Cygwin makes this directory the root mount point. It then mounts C:\cygwin\bin on /usr/bin and C:\cygwin\lib on /usr/lib. The /usr/bin, /bin, and /usr/local/bin directories are added to the Cygwin path, but not your Windows path. The directories in your Windows path are imported into your Cygwin path so that you have the same access.
Tech@Inside ~
$ echo $PATH
/usr/local/bin:/usr/bin:/bin:/usr/X11R6/bin:/cygdrive/c/WINDOWS/
system32:/cygdrive/c/WINDOWS:/cygdrive/c/WINDOWS/System32/Wbem:.:
/cygdrive/c/Program Files/Common Files/GTK/2.0/bin:/bin

Cygwin also uses sensible file permissions for the "Unix" files, although it can't mirror the granularity of Windows Access Control Lists. Thus, files and directories have user and group ownership that you would expect to see. In fact, the chmod and chown commands work quite well on the NTFS file system. Let's run an ls –al command on some Windows files to find the answer.

Tech@Inside /cygdrive/c/cygwin
$ ls -al
total 9
drwxrwx---+ 10 Tech           Users      0 Aug  9 11:57 .
drwxrwxr-x+ 14 Administrators SYSTEM     0 Sep 19 18:01 ..
drwxrwx---+  3 Tech           Users      0 Sep 12 09:07 bin
-rwxr-x---+  1 Tech           Users     57 Mar 14  2005 cygwin.bat
-rwxr-x---+  1 Tech           Users   7022 Sep 12 09:07 cygwin.ico
drwxrwx---+ 22 Tech           Users      0 Sep 21 15:22 etc
drwxrwxrwx+  3 Tech           None       0 Sep 19 17:27 home
drwxrwx---+ 38 Tech           Users      0 Sep 12 09:07 lib
drwx------+  3 Tech           None       0 Aug  9 11:57 srv
drwxrwxrwt+  2 Tech           Users      0 Sep 21 15:23 tmp
drwxrwx---+ 20 Tech           Users      0 Sep 12 09:07 usr
drwxrwx---+  9 Tech           Users      0 Sep 21 15:22 var

Cygwin maps user and group ownership from the /etc/passwd and /etc/group files, which in turn are based on information pulled from the Windows host or domain. These files are created when Cygwin is first installed, but are not automatically updated when Windows users are deleted, modified, or added. In order to regenerate the /etc/passwd and /etc/group files, use the mkpasswd and mkgroup commands. Most of the time, it's best to work with Cygwin when it is associated with the local accounts on the Windows system; use the –l option to create the files based on local accounts rather than domain accounts (which can take a while to query).

Tech@Inside /cygdrive/c/cygwin
$ mkpasswd -l | tee /etc/passwd
SYSTEM:*:18:544:,S-1-5-18::
Administrators:*:544:544:,S-1-5-32-544::
Guest:unused_by_nt/2000/xp:501:513:Inside\Guest,S-1-5-21-1942068853
    -1930885892-63110221-501:/home/Guest:/bin/bash
IUSR_NTO-3JOKPSBH7KT:unused_by_nt/2000/xp:1000:513:Internet Guest
    Account,Inside\IUSR_NTO-3JOKPSBH7KT,S-1-5-21-1942068853-1930885
    892-63110221-1000:/home/IUSR_NTO-3JOKPSBH7KT:/bin/bash
IWAM_NTO-3JOKPSBH7KT:unused_by_nt/2000/xp:1001:513:Launch IIS
    Process Account,Inside\IWAM_NTO-3JOKPSBH7KT,S-1-5-21-1942068853
    -1930885892-63110221-1001:/home/IWAM_NTO-3JOKPSBH7KT:/bin/bash
Tech:unused_by_nt/2000/xp:500:513:Inside\Tech,S-1-5-21-19420688
    53-1930885892-63110221-500:/home/Tech:/bin/bash
root:unused_by_nt/2000/xp:1011:513:root,U-SHUTTLE\root,S-1-5-21-1942
    068853-1930885892-63110221-1011:/home/root:/bin/bash
sshd_server:unused_by_nt/2000/xp:1010:513:sshd server account,
    Inside\sshd_server,S-1-5-21-1942068853-1930885892-63110221-1010
    :/var/empty:/bin/bash
$ mkgroup -l | tee err
SYSTEM:S-1-5-18:18:
None:S-1-5-21-1942068853-1930885892-63110221-513:513:
Administrators:S-1-5-32-544:544:
Guests:S-1-5-32-546:546:
Power Users:S-1-5-32-547:547:
Remote Desktop Users:S-1-5-32-555:555:
Users:S-1-5-32-545:545:
 
If you're brave (and patient) enough to create these files from the domain, use the –d option instead of –l.

Tip:-
Unix-style user IDs are handled slightly differently in the Cygwin environment. The Windows equivalent of the root user is the system's Administrator account. Whereas the root user has UID 0, the Administrator will have a UID 500. This corresponds to the Relative Identifier (RID) of the user.

Running Applications

Ultimately, what you can do with Cygwin depends on what packages you choose to install. But let's take a look at some of the more interesting uses.
Running Windows Applications Not only can you run Unix-based applications, but you can run native Windows applications from the command line, as shown here.
Tech@Inside ~
$ ipconfig


Windows IP Configuration
Ethernet adapter VMware Network Adapter VMnet8:
   Connection-specific DNS Suffix  . :
   IP Address. . . . . . . . . . . . : 192.168.244.1
   Subnet Mask . . . . . . . . . . . : 255.255.255.0
   Default Gateway . . . . . . . . . :


Ethernet adapter VMware Network Adapter VMnet1:
   Connection-specific DNS Suffix  . :
   IP Address. . . . . . . . . . . . : 192.168.235.1
   Subnet Mask . . . . . . . . . . . : 255.255.255.0
   Default Gateway . . . . . . . . . :
 
You can do the same thing with graphical applications like Notepad or, of course, more useful programs. After all, Cygwin provides both the vi and emacs text editors!
Building Programs in Windows What else can you do? If you install gcc, gdb, make, and the binutils, you now have a Windows C/C++ development environment. Granted, it's not as fancy as Microsoft's Visual Studio, but it's free and open source! Here's an example of compiling Netcat from the Unix tarball:
Tech@Inside /usr/local/src/nc
$ gcc -s -static  -o nc netcat.c -lresolv
Info: resolving _h_errno by linking to __imp__h_errno (auto-import)
Info: resolving _optarg by linking to __imp__optarg (auto-import)
Info: resolving _optind by linking to __imp__optind (auto-import)


Tech2@Inside2 /usr/local/src/nc
$ ./nc -h
[v1.10]
connect to somewhere:    nc [-options] hostname port[s] [ports] ...
listen for inbound:      nc -l -p port [-options] [hostname] [port]
 
Cygwin provides a mostly complete API for developers used to Unix environments. For more information on developing under Cygwin, check out http://cygwin.com/cygwin-api/cygwin-api.html. There are also some gcc extensions that allow you to bypass the Cygwin emulation libraries and build native Win32 applications.

Tip:-
If you're looking for an Open Source developer environment, check out Anjuta (http://anjuta.sourceforge.net/). Anjuta relies heavily on the GNOME project. It will run under Cygwin, but only after some significant effort and the installation of several GNOME libraries.

Running Perl Scripts Even though Perl distributions are available for Windows, many of them are not free. Cygwin includes a port of the Perl engine, which enables you to run Perl scripts in a Windows environment.  You can even use the Perl CPAN utility to update packages.
Helpful Unix Tools You now have access to a myriad of useful Unix tools from within Windows, many of which can be helpful to the system administrator or network security professional for system analysis. Here are a few:
  • grep Search files for regular expressions.
  • sed Command-line stream editor; good for things like search and replace.
  • strings Extract printable ASCII strings from a binary file; good for Word documents when you don't have Office installed.
  • strace Trace system calls and signals; see what system calls and signals an application is making and receiving.
  • md5sum Perform a checksum on a file to ensure its authenticity and protect against tampering.
  • diff Compare two files for differences.
  • patch Use the output from a diff command to make file1 look like file2.
You can go to v to find other Cygwin packages available for download. You'll find popular applications like Apache, smbclient, and even CD-burning software (including the mkisofs), which lets you create ISO file images of CD-ROMs.

Friday, April 20, 2012

The Basics Of SSL: An Introduction

We've all ordered products online, and seen the little lock icon in the corner of our browser window... but very few people stop and think about exactly what that means, and what's going on behind the scenes.

SSL stands for Secure Socket Layer. This system was developed by Netscape in the mid-1990s for use with the Navigator web browser, the first to offer reliable e-commerce features. It addressed the problem that when browsing the web, anyone could spy on your communications. If some of those communications were a credit card number, or some other personal information, a criminal could do terrible things to you.

So what Netscape designed was a protocol - a way for two computers to talk with one another - that encrypted messages as they went from one computer to the other. This made it impossible for anyone except those two computers to read the message, so your secret information was safe.

The way it works is for the owner of the web server to get what's called a digital certificate from a company called a certification authority (CA). Each certificate comes with a link to the company that issued it, and eventually ends at what's called a "root" CA.

Every browser has a list of CAs that are considered "trustworthy." When you make a secure connection to a web server that has a digital certificate, your browser traces up what's called the "chain of authority" - checking each certificate to see if the CA that issued it is in the list. If the browser gets all the way back to the root CA without finding it in the list, you get a warning that this certificate is not trusted.
ssl key exchange
Public Key Exchange
 When a certificate is not trusted, you don't know for sure that the information listed in the certificate - the company name, address, phone number, etc. - is accurate. Trusted CAs verify business licenses and contact information. Other CAs may not. But even if the contact information isn't verified, the traffic between your browser and the web server is secure from eavesdroppers.

Once the browser has established that you want to trust this web site's certificate, whether because the CA is in the browser's list or you confirm your trust in the warning dialog, the two computers will exchange "keys."

A "key" is just a large number that is mathematically related to another number in a very specific way. The way these numbers are chosen is complex; explanations of the process tend to start with things like "Agree on a finite cyclic group G with a generating element g in G."

Like most cryptographic concepts, it's probably easiest to just pretend it's magic.

Each computer will create two keys. The special mathematical relationship of these keys guarantees that any data encrypted with one key can only be decrypted with the other. One of these keys is kept secret, and the second is sent to the other machine.

Once the keys are exchanged, each machine uses its own secret key and the key received from the other machine to encrypt any data it sends. When the other machine receives the data, it will decrypt the data using the two keys it has.

Because the keys will only decrypt data encrypted with the matching keys, each machine knows both that the message came from the same machine, and that it was intended for this machine. So the data is secure, and nobody can spy on it.

Make Virus Inactive by Disabling Autoplay For Pendrives

Today most of the people are using pen-drive for data portability but from pen-drive virus will effects computer very easily. Even though there is antivirus installed in our computer there is a risk of virus from pen-drive as we know that by inserting pen-drive, CD or other removable media OS runs auto-play, at that time if there is a virus in pen-drive it will be executed and spreads to our system because virus program can be written in autorun.inf file which is located on pen-drive. So in order to prevent spreading of virus from pen-drive first we need to disable the auto-play in our computer. Following is the process to disable auto-play:
go to start–>click on run
enter gpedit.msc and click on ok button
then a window opens in computer-configuration expand admin templates then click on all settings now there some files will be displayed on the right pane.


 

 double click on turn off auto-play file then a window in settings select enable option and select all drives in turn off auto-play.


ITs done....

Standard And Stylish Subscribe Box With Social Sharing Option

An another standard and stylish subscribe box with cute social sharing icons that attract your visitors and force them to subscribe to your daily post. It also has google plus,twitter and facebook sharing buttons which helps the visitors to like and share your posts and also helps to follow your blog.Very easy to install widget that can be added anywhere in the blog with add a gadget option. It looks fine when the gadget width  is 300 pixels or more. Just follow these simple steps to add this subscribe box to your blog.


1, Go To Blogger - Design
2, In Page Elements choose Add a gadget
3, Choose HTML/JAVASCRIPT option

And add the following code,

<left><img src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiVi7GyKPH70Jqjkla-BS8g0UcYpblt-_Rr5y7MdDrQYx8pPQQjdqM7HGEJopH32AKnjpCAjByda7Adx2i0pwixjdhM8dpwlKv_e_60-VJgzP3uxEUtpMWeLXq4VE1ys94kPs4uFqKjhc7j/s1600/SUBSCRIBE.gif"/></left>

<style>

    .code{width: 300px; float: left;}

.code .count{color:#F17C18; font-size: 14px; font-weight: bold; font-family: Helvetica, Arial;  height: 40px; line-height: 40px; vertical-align: middle; width: 310px; padding: 0 0px 0 4px; margin:0;}

    .code .count span.bigcount{color:#F17C18; font-size: 24px; font-family: Helvetica, Arial; line-height: 39px; vertical-align: middle; margin:0px; padding:10px 0px 0px 0;}

    .code .subicons{border-bottom: 1px solid #e6e6e6; margin: 0px 0 0px 0; float: left; width: 300px; font-family: Helvetica, Arial; font-size: 12px;}
    .code .subicons a{text-decoration: none; color:#333333;}
    .code .subicons a:hover{text-decoration: underline; color:#333333;}

    .code .subicons .rssicon{border-right: 1px solid #e6e6e6; background: url(https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjx_4Y7TZ5_DEEWxgZiK8WsuDvQZ-rsK-PJrqeCAaugo7AfeoV-327vvi5c02nfqkGysHWDNwH3seJHAaFsiSh6k5rl5IS6jxIZ-fN38pdypAboQA4FEY5UKb_f1ZmXhNnp-DHPRMr9lynb/s400/rsssprite.png) no-repeat; background-position: 0px 5px; min-width: 2px; height: 48px; line-height: 57px; vertical-align: middle; float: left; padding: 0px 10px 0px 30px; margin: 0 0 0 5px;}


    .code .subicons .googleicon{border-right: 1px solid #e6e6e6; background: url(https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjx_4Y7TZ5_DEEWxgZiK8WsuDvQZ-rsK-PJrqeCAaugo7AfeoV-327vvi5c02nfqkGysHWDNwH3seJHAaFsiSh6k5rl5IS6jxIZ-fN38pdypAboQA4FEY5UKb_f1ZmXhNnp-DHPRMr9lynb/s400/rsssprite.png) no-repeat; background-position: 0px -37px; min-width: 2px; height: 48px; line-height: 57px; vertical-align: middle; float: left; padding: 0px 10px 0px 30px; margin: 0 0 0 5px;}

    .code .subicons .fbicon{border-right: 1px solid #e6e6e6; background: url(https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjx_4Y7TZ5_DEEWxgZiK8WsuDvQZ-rsK-PJrqeCAaugo7AfeoV-327vvi5c02nfqkGysHWDNwH3seJHAaFsiSh6k5rl5IS6jxIZ-fN38pdypAboQA4FEY5UKb_f1ZmXhNnp-DHPRMr9lynb/s400/rsssprite.png) no-repeat; background-position: 0px -79px; min-width: 20px; height: 48px; line-height: 57px; vertical-align: middle; float: left; padding: 0px 10px 0px 30px; margin: 0 0 0 5px;}

    .code .subicons .twittericon{background: url(https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjx_4Y7TZ5_DEEWxgZiK8WsuDvQZ-rsK-PJrqeCAaugo7AfeoV-327vvi5c02nfqkGysHWDNwH3seJHAaFsiSh6k5rl5IS6jxIZ-fN38pdypAboQA4FEY5UKb_f1ZmXhNnp-DHPRMr9lynb/s400/rsssprite.png) no-repeat; background-position: 0px -121px; min-width: 20px; height: 48px; line-height: 57px; vertical-align: middle; float: left; padding: 0px 10px 0px 30px; margin: 0 0 0 5px;}

    .code .emailsub{border-bottom: 0px solid #e6e6e6; padding: 15px 0 0px 0; float: left; width: 100%; font-family: Helvetica, Arial;}

    .code .emailsub .emailicon{background: url(https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh-gKwnh_48MEHdIaMKqj8PlAvTKgSeS3eM-2VJDS6H7CmRn3w2Pmljb28RMnsZoR5k2rsN_DvXeVQ68cja0bTtY-R0uRaLEB4aJwfsZNWOztiEMe45bGx83vDA5SV60000RPEaQLuI6Wk/s400/email.png) no-repeat 0 2px; float: left; padding: 0px 15px 0px 40px; margin: 0 0 0 5px; width: 300px;  line-height: 20px; vertical-align: middle; font-size: 14px; color: #333; }

    .code .emailsub .emailupdatesform{margin: 15px 0 5px 5px; width: 300px; float: left;}

    .code .emailsub .emailupdatesform input.emailupdatesinput{background: #fff !important; float: left; border: 1px solid #d2d2d2; padding: 0px 8px 0px 8px; color: #a19999; font-size: 12px; height: 25px; width: 185px; border-radius: 5px; -moz-border-radius: 5px; -webkit-border-radius: 5px;}

    .code .emailsub .emailupdatesform input.joinemailupdates{background:-moz-linear-gradient(top,#57ABFE 0%,#0080ff 100%); background:-webkit-gradient(linear,left top,left bottom,from(#57ABFE),to(#0080ff)); border: 1px solid #0080ff; text-transform: none; font:bold 12px arial; color: #fff; height: 25px; padding: 0 12px 0 12px; margin: 0 0 0 5px; border-radius: 5px; -moz-border-radius: 5px; -webkit-border-radius: 5px; cursor:pointer;}



    </style>

    <!--[if IE 9]>
    <style>
    .code .count span.bigcount{color:#F17C18; font-size: 24px; font-family: Helvetica, Arial; line-height: 34px; vertical-align: middle; }

   .code .emailsub .emailupdatesform input.joinemailupdates{background:#0080ff; border: 1px solid #0080ff; text-transform: uppercase; font:bold 12px arial; color: #fff; height: 25px; padding: 3px 12px 0 12px; margin: 0 0 0 5px; border-radius: 5px; -moz-border-radius: 5px; -webkit-border-radius: 5px; cursor:pointer;}
    </style>
    <![endif]-->

    <div class="code"><div class="count"><span class="bigcount"><a rel="nofollow"  href="http://feeds.feedburner.com/ TechInside007 "><img src="http://feeds.feedburner.com/~fc/ TechInside007 ?bg=CCCCFF&amp;fg=000000&amp;anim=1" height="26" width="88" style="border:0" alt="" /></a></span>
Receive Our Daily Updates </div>
<div class="subicons">
<div class="rssicon">&#160;<a rel="nofollow" href="http://feeds.feedburner.com/ TechInside007 " target="_blank">  RSS</a></div>

<div class="googleicon">&#160;<a href="https://plus.google.com/117765293956504917182"
  rel="author" target="_blank"> G+</a></div>

<div class="fbicon"> &#160;<a href="https://www.facebook.com/forblog809" target="_blank" rel="nofollow">FB</a></div>

<div class="twittericon">&#160;<a href="http://twitter.com/TechInside" target="_blank" rel="nofollow">Twitter</a></div></div>

    <div class="emailsub">
    <div class="emailicon"><p style=" width:270px; color:#3A3A3A; font-size: 13px; font-weight: normal; font-family: Helvetica, Arial;  padding:0; margin:0;">Receive New Updates Straight in your &#160;&#160; Inbox by submitting your Email ID below.</p></div>
    <div class="emailupdatesform">
    <form action="http://feedburner.google.com/fb/a/mailverify" method="post" target="popupwindow" onsubmit="window.open('http://feedburner.google.com/fb/a/mailverify?uri= TechInside007 ', 'popupwindow', 'scrollbars=yes,width=550,height=520');return true"><input gtbfieldid="10" class="emailupdatesinput" name="email" value="Enter your email here..." onblur="if (this.value == &#39;&#39;) {this.value = &#39;Enter your email here...&#39;;}" onfocus="if (this.value == &#39;Enter your email here...&#39;) {this.value = &#39;&#39;;}" type="text" /><input value=" TechInside007 " name="uri" type="hidden" /><input value="Submit" class="joinemailupdates" type="submit" /></form></div></div></div>


*Replace TechInside with your own twitter username.

*Replace forblog809 with your facebook username.

*Replace TechInside007 with your feedburner title.

*Replace 117765293956504917182 with your Google Plus profile id.


Save your changes and check your blog for beautiful Subscribe Box.

Free Pixel Advertising Ads Sites

Pixel Ads Submission,though this is a very old technique in SEO, it is still used by some people.So what is Pixel ad submission and how it is working? Pixel submission is type of banner advertising,where you can submit the suitable images with your site link that describes your site well. So by this your link will become do-follow link and eventually you get visitors to your sites.What are the Pixel sizes that are available? It differs for different Pixel ad sites as these sites allocate different pixels to post your website and also pixel sizes changes based on paid and free submissions.Here is the list of more popular Pixel ad submission site that are totally free except one site which charges to submit your pixel ads.


www.activebrits.com
www.chaswebs.com
www.in-inter.net
www.junkbrosnews.com
www.kilopixels.com
www.milliondollarbuzz.com
www.pixeladsense.com
www.unitedstatespixelads.com
www.milliondollarhomepage.com(Paid Submission)

Thursday, April 19, 2012

The Deep Web - The Hidden Internet




You might think that you know your way around the internet. Asked a question and most of us could have a pretty good stab at it via a Google search, Yahoo or a trawl around Wikipedia. But in reality if these are your normal gateways to the net then you're missing a huge proportion of the websites that are actually online.

There are in fact two World Wide Webs, the normal 'surface' web sites which will all appear when you search through social networking sites or search engines - the second an underground, hidden web that you can't access through those means or with a standard web browser. They go by a variety of names such as the Darkweb, deep or hidden web. There is another huge network of information that I want to cover which we will call the Deep Web and it exists on the well known Anonymity network known as Tor.


Tor - The Anonymous Host

Tor was originally designed by the US Navy as means of protecting Government communication but now is freely available and used by people all across the world. It is basically a network of virtual tunnels which people use to surf the web anonymously by hiding the users IP address.

As you can see from this image, Tor creates an encrypted network using nodes which are actually other Tor users and servers. The majority of people use it for basic security and obscuring their IP address but it can equally be used to publish web sites and content on the Tor network anonymously.

It is this function that forms the infrastructure that holds the pages of the Deep Web. The sites don't
exist on any traceable server, but on an anonymous cloud hosted by the millions of anonymous Tor nodes online. To access this underground network all you need is the Tor Browser and Tor extension of Firefox which you can get from the Tor Project site.

The Hidden Wiki

For many people the first time they stumble across this hidden web is through a small portal called The Hidden Wiki,  this is one of the many directories compiled of some of the sites available on this hidden network. Here's the URL - kpvz7ki2v5agwt35.onion remember it won't work in a normal browser - you'll need to get onto Tor first (which only takes a minute from the above site) and use their browser.

But be careful, this isn't the fluffy, sanitized internet we all spend the vast majority of our time in. The Deep Web is completely uncensored and much of the material stored on here is illegal, immoral and just plain scary!
Here's a screenshot of part of the Hidden Wiki, which lists some of the commercial services available.



The anonymity of the network obviously attracts a certain type of client, here you can buy drugs, stolen credits cards or hire anyone from a hacker to a hit-man.  Want to buy the latest Facebook virus or a guide to growing and selling drugs - well you'll find them all on this network.  To be honest a lot of the Deep Web is pretty unpleasant, it is anonymous networks like these where criminals, perverts and crooks hang out.  You should be careful about what you click on as some of these sites are seriously nasty and around every corner you may find a hacker, pedophile or FBI agent!

However alongside the seedy and illegal are political activists, bloggers who would be imprisoned if they published on the normal web, whistle blowers and information idealists of all persuasions. Believe me if you think you've seen some dodgy sites online - you've seen nothing like these!

The Deep Web possibly offers a glimpse of what an unfettered network would look like - take a look if you dare !!

Sunday, April 15, 2012

How To Bypass Surveys For Free


We often come across sites in which we have to forcefully do a survey because we have to download a file or see some content.In all of these surveys we are forced to disclose our personal information like our phone number , email id etc.
Later these sites irritate you with their sms's spam mails of offers in which you not at all are interested !
So i've found a way by which you can get through these sites without leaking out your personal information !

Let's start -


1. Download this add on called ''greasemonkey'' for mozilla firefox (mozilla is needed ).

https://addons.mozilla.org/en-US/firefox/addon/greasemonkey/


After installing it,it would appear like this in your browser -


2. After installing it download this script which runs with the help of this add on(greasemonkey) --

http://userscripts.org/scripts/show/2560

Install this script and make sure the monkey on the right side of your mozilla screen is colored (which means greasemonkey is activated,to activate or deactivate just click on it)

3. Now go to the site which tells you to do the survey and asks for your information etc..

4. You'll see an option on top left side of the page which says '' Press CTRL+SHIFT+F to fill in form. ''



Do as directed..press CTRL+SHIFT+F and you will see that the form gets filled on its own and all the information filled out there is completely random !

Click on submit and you are registered on the site and now you can easily download what you wanted to ! :)

This is all random stuff filled by the script.


BUT

5. Some sites may tell you to verify your identity by logging into your mail and opening some url or to get some pin ! For this all you have to so is go to http://www.yopmail.com/en/ . Go to this site and you'll get a temporary email id for around 15-30min.>paste that temporary email id at the place of email id which your intelligent form filler has randomly filled>click on submit form.


Here ''yoyo@yopmail.com'' is the yopmail email id which is replaced by the default id given by ''form filler''


Here ''yoyo@yopmail.com'' is the yopmail email id which is replaced by the default id given by ''form filler''


6. Check http://www.yopmail.com/en/ Inbox for the mail from the site>Get the pin or confirmation link>you are done !

Here as you can see two mails from the site where we have to forcefully register and the confirmation link plus password (other mails are just spam,ignore them).

OR

7. Some sites may ask you for voice calls confirmation ..I have the solution for that too :)
In that case go to this site http://www.k7.net/ ..on this site you can receive voice calls via mail ! So you bypass Survey again without giving any details !

Register here and you'll be able to receive voice calls via mail.

Friday, April 13, 2012

How to Recover Your Windows Product Key












Losing your product key is something that happens to the best of us, especially when you’re as accident-prone as I am and misplace the box your Windows CD came in. Many people think about calling Microsoft tech support to resolve this issue, only to realize that they’re hitting a brick wall and wasting time. Instead of ruffling through tons of different CD/DVD cases you’ve kept over the years, you might decide to purchase a new product key or an entirely new license of Windows. Don’t make that mistake and keep that debit card in your wallet! You can use the registry to fetch the product key for your particular Windows license only if you use an older version of Windows, but Vista/7 need another procedure.

Where’d The Product Key Go?

Up until Windows XP, the product key was always stored in the registry, within the HKEY_LOCAL_MACHINE key, under the “ProductID” key in “Windows” under “SOFTWARE”, making the path something like: HKEY_LOCAL_MACHINE\SOFTWARE\Windows\ProductID. Unfortunately, that’s not the case since Windows Vista. It seems that Microsoft wanted to make it difficult for you to find your product key, so that you end up buying another license when you lose one. You don’t have to do this if you use Magic JellyBean KeyFinder. Although it sounds like something fishy, it is a legitimate application that scans your Windows installation for your product key.
Oh, and here’s the other thing: The Windows “ProductID” doesn’t show the key anymore, but shows a special ID to help Microsoft identify and distinguish between one Windows installation and another. This is used to prevent two Windows installations from using Windows Update, since it’s against the company’s policy to use one Windows installation on more than one computer.

Using KeyFinder

First of all, download KeyFinder’s ZIP file from this link. Open the ZIP file and extract it to a folder named in a way that you’ll remember in your local drive or on your desktop. Within the folder, you’ll find a file called “KeyFinder.exe”. Double-click it and you’ll find a screen that looks like this:


As you can see, you can also recover other product keys for anything else you install on your computer, depending on whether they have a key or whether they store their keys in a central location. Some applications store their keys in a file within their respective directories. For this, you’d have to do a little more investigation.

Conclusion

If manual searching doesn’t work, you can always find your product key with handy little applications like the Magic JellyBean Keyfinder. The alternative, in case Keyfinder doesn’t do anything for you, is Belarc Advisor, an application that gives you a full audit of your computer but also includes the product key. If everything else fails, you could always try your luck with Microsoft and give them a phone call for a replacement product key. It’s probably going to take a long time, but with luck, you’ll resolve your problem as quickly as possible.

As a habit, it is always good to backup your license keys when you first got your hand on the CD/DVD. You can easily take a photo of the license key with your mobile phone and upload the pic to your Dropbox, or Google+ account, so that when you need it, you know where to look for it.

Let us know what experiences you’ve had with the application and don’t hesitate to ask questions below. We’ll be more than happy to answer them!

Samsung Officially launched "youm" Brand for Flexible AMOLED Displays



Samsung
 has officially launched its "YOUM" brand for flexible AMOLED displays, ahead of the bendable panels showing up in commercial hardware later this year. Registered as a trademark complete with a bendy YOUM logo in mid-March, and detailed on the new Samsung

 Mobile Display site, YOUM promises to be thinner and lighter than traditional AMOLED and LCD-TFT screens, as well as being "unbreakable."


youm Logo


That is down to the differences in the "sandwich" of layers that make up a YOUM flexible display. An LCD screen would usually have six, two of which would be glass; an OLED panel would have four, again two of which would be glass.



It is that glass which makes the screens more vulnerable to damage, and indeed stops them from flexing or folding. In contrast, Samsung

 YOUM panels use film-based encapsulation ("encap") and TFT layers, rather than glass substrates, which make them more resilient to damage along with allowing more flexibility in device design.



Samsung

 has previously shown off foldable devices as well as various flexible prototypes, and has suggested that as well as gadgets which literally bend, it could also use the YOUM AMOLED technology to create wraparound displays that could cover two or more surfaces. That way, your phone could have a regular front screen that continues around to the side.










Related Posts Plugin for WordPress, Blogger...