Monday, December 29, 2008

How To Ontain IP Address Of A Person

In many cases, it's desired to know the IP address of someone in the reconnaissance phase. The first question to ask is what information do I have about this person. In most cases it's possible that you have the email or IM of the target. First let's discuss the methods:

Method #0x01

if you have a web server hosted someplace where you can see its logs then it's very easy to send someone a URL of an image or any webpage hosted on your web server (http://123.123.123.123/veryfunnyimage.jpg) whenever this page is visited the web server keeps a log of who visited that page (IP address, time, browser, OS ... and lots of more info) where you can check later to collect IP addresses. if

Method #0x02

sometimes people get freaked out from addresses that have ip addresses in the URL so having your webserver with a domain name would really help the person you sent the URL to press on the link (www.mywebsite.com/veryfunnyimage.jpg)

Method #0x03

Some paranoid people don't open links to unknown sites. so here comes the cool trick. you can embed the image in a post of yours in a known site that allows HTML tags with image sources like < img src = (your image URL). in this case the URL you are going to send to the person is a link to a known website but the website contains another link to your web server. And whenever someone views this page on the known website, the "img src" link is invoked and voila!, you have a log entry on your webserver.

Method #0x04

Some Ultra paranoid people don't open links at all!! for these people I use my old trick. I send an email to the target that looks important to him (depending on the target actually and what's important to him). This email is in HTML format and contains a tag that links to an image on my webserver (probably a white image not to attract attention). Now upon merely opening the email, my webserver is invoked and a log entry is saved about the persons current IP address.

Note that this method only works if the email client allows images to be displayed (gmail disable that by default)

Method #0x05

A more faster approach is IM. If you have the IM of the target, then it's possible that you try to send him a file (not malicious, a picture or smthng). upon sending the file, a direct connection is established between you and the target. with a simple connection monitoring application (e.g.netstat on windows), you can know the Ip address.

Method #0x06

Some paranoid people don't accept files! so another trick in case of MSN is background sharing. the default for MSN is to accept backgrounds shared by others. Actually background sharing performs file sending if the background is not one of the default backgrounds. So the trick is to set your background for the IM to a cool pic from your computer and share it. if the default setting was not altered on your target's IM, then he will automatically accept it right away and a connection is opened. here comes again the connection monitoring app where you can identify the new connection and extract the IP add of the target.

How To Ontain IP Address Of A Person

In many cases, it's desired to know the IP address of someone in the reconnaissance phase. The first question to ask is what information do I have about this person. In most cases it's possible that you have the email or IM of the target. First let's discuss the methods:

Method #0x01

if you have a web server hosted someplace where you can see its logs then it's very easy to send someone a URL of an image or any webpage hosted on your web server (http://123.123.123.123/veryfunnyimage.jpg) whenever this page is visited the web server keeps a log of who visited that page (IP address, time, browser, OS ... and lots of more info) where you can check later to collect IP addresses. if

Method #0x02

sometimes people get freaked out from addresses that have ip addresses in the URL so having your webserver with a domain name would really help the person you sent the URL to press on the link (www.mywebsite.com/veryfunnyimage.jpg)

Method #0x03

Some paranoid people don't open links to unknown sites. so here comes the cool trick. you can embed the image in a post of yours in a known site that allows HTML tags with image sources like < img src = (your image URL). in this case the URL you are going to send to the person is a link to a known website but the website contains another link to your web server. And whenever someone views this page on the known website, the "img src" link is invoked and voila!, you have a log entry on your webserver.

Method #0x04

Some Ultra paranoid people don't open links at all!! for these people I use my old trick. I send an email to the target that looks important to him (depending on the target actually and what's important to him). This email is in HTML format and contains a tag that links to an image on my webserver (probably a white image not to attract attention). Now upon merely opening the email, my webserver is invoked and a log entry is saved about the persons current IP address.

Note that this method only works if the email client allows images to be displayed (gmail disable that by default)

Method #0x05

A more faster approach is IM. If you have the IM of the target, then it's possible that you try to send him a file (not malicious, a picture or smthng). upon sending the file, a direct connection is established between you and the target. with a simple connection monitoring application (e.g.netstat on windows), you can know the Ip address.

Method #0x06

Some paranoid people don't accept files! so another trick in case of MSN is background sharing. the default for MSN is to accept backgrounds shared by others. Actually background sharing performs file sending if the background is not one of the default backgrounds. So the trick is to set your background for the IM to a cool pic from your computer and share it. if the default setting was not altered on your target's IM, then he will automatically accept it right away and a connection is opened. here comes again the connection monitoring app where you can identify the new connection and extract the IP add of the target.

Hacking Web 2.0

For some Web2.0 symbolizes the start of a new era of the Web, for others it is merely a marketing buzzword designed to hook unaware venture capitalists on the Web2.0 hype.

The term Web2.0 appeared for the first time in 2003 at a conference organized by O’Reilly media. The event, simply titled “Web 2.0″, attempted to reference the second generation of web technologies such as social communities, service oriented architectures, Wikis, blogs, collaborative environments, AJAX, etc. Since then the term has become widely adopted across the entire Web industry and it has been used ever since to describe innovation.

In simple words, Web2.0 outlines the technological, philosophical and social superset of what we used to know as just the Web. Although we know that the Web is not bound to any version number, it makes our lives a lot easier to do so, so we can refer to a particular set of features. The features of the Web2.0 era are rather blurred due to the enormous amount of different opinions on the matter but we all agree that they must include things such as feeds, data aggregators, collaborative environments, social networks, client-side technologies and SOA (Service Oriented Architecture).

Although Web2.0 has improved our ability to freely communicate and share via the means of the Net, it has brought some unimaginable dangers and as a result it is insecure. Web2.0 security is very much a collection of every single security aspects of its components. On their own they are just simple system abnormalities, but when put together they create a problem worth our attention.

In this paper we are going to outline some of the dangers of Web2.0 by combining fictional stories with technology that is real. Each story begins with a prologue, which introduces the problem, and finishes with a conclusion, which summarizes the attack techniques that are described within the story context.

Here Is The Whole Trick In Form Of A newspaper.
Its quite blurred, bt u wud hav to manage.



N Here V Go

Hacking Web 2.0

For some Web2.0 symbolizes the start of a new era of the Web, for others it is merely a marketing buzzword designed to hook unaware venture capitalists on the Web2.0 hype.

The term Web2.0 appeared for the first time in 2003 at a conference organized by O’Reilly media. The event, simply titled “Web 2.0″, attempted to reference the second generation of web technologies such as social communities, service oriented architectures, Wikis, blogs, collaborative environments, AJAX, etc. Since then the term has become widely adopted across the entire Web industry and it has been used ever since to describe innovation.

In simple words, Web2.0 outlines the technological, philosophical and social superset of what we used to know as just the Web. Although we know that the Web is not bound to any version number, it makes our lives a lot easier to do so, so we can refer to a particular set of features. The features of the Web2.0 era are rather blurred due to the enormous amount of different opinions on the matter but we all agree that they must include things such as feeds, data aggregators, collaborative environments, social networks, client-side technologies and SOA (Service Oriented Architecture).

Although Web2.0 has improved our ability to freely communicate and share via the means of the Net, it has brought some unimaginable dangers and as a result it is insecure. Web2.0 security is very much a collection of every single security aspects of its components. On their own they are just simple system abnormalities, but when put together they create a problem worth our attention.

In this paper we are going to outline some of the dangers of Web2.0 by combining fictional stories with technology that is real. Each story begins with a prologue, which introduces the problem, and finishes with a conclusion, which summarizes the attack techniques that are described within the story context.

Here Is The Whole Trick In Form Of A newspaper.
Its quite blurred, bt u wud hav to manage.



N Here V Go

Sunday, December 28, 2008

Install Vl Perl Kit On Windows

Here is how you can install the VI Perl Toolkit on a windows server. I have this running on the same Windows 2003 server where Virtual Center is running.

Installing VI Perl ToolKit on windows

* 1. download and do a default install of active perl

* 2. go to c:\perl\bin and run ppm.bat
o a. Go to the Edit menu and select Preferences
+ I. Add the following repository for the latest version of perl (>= 819):
http://theoryx5.uwinnipeg.ca/ppms/
+ II. For older version of perl (<819) use:
http://theoryx5.uwinnipeg.ca/cgi-bin/ppmserver?urn:/PPMServer58

if you do not have direct internet, but via a proxy, you need to run first:
set HTTP_proxy=http://my.proxy:3128

* 3. exit the Perl Package Manage and give the following commands (from \perl\bin)
o a. ppm install XML-LibXML-Common
o b. ppm install XML-LibXML
o c. ppm install Crypt-SSLeay
o d. ppm install Data-Dumper
o e. ppm install Class-MethodMaker

* 4. Reboot your system (this is to get the right path settings activated)

* 5. Download the vi perl toolkit
o a. Unpack the toolkit (for example can be done with winrar)

* 6. Download nmake15 from Microsoft
o a. Run nmake15.exe
o b. Copy nmake.* c:\windows

* 7. go to the directory whre you unpacked the VI3 Perl Toolkit and run the following commands
o a. perl Makefile.PL
o b. nmake
o c. nmake install

You are ready now to run any of the perl example scripts or make some cool ones your self. To run a script just run the following command:
perl name_or_your_script .pl

Install Vl Perl Kit On Windows

Here is how you can install the VI Perl Toolkit on a windows server. I have this running on the same Windows 2003 server where Virtual Center is running.

Installing VI Perl ToolKit on windows

* 1. download and do a default install of active perl

* 2. go to c:\perl\bin and run ppm.bat
o a. Go to the Edit menu and select Preferences
+ I. Add the following repository for the latest version of perl (>= 819):
http://theoryx5.uwinnipeg.ca/ppms/
+ II. For older version of perl (<819) use:
http://theoryx5.uwinnipeg.ca/cgi-bin/ppmserver?urn:/PPMServer58

if you do not have direct internet, but via a proxy, you need to run first:
set HTTP_proxy=http://my.proxy:3128

* 3. exit the Perl Package Manage and give the following commands (from \perl\bin)
o a. ppm install XML-LibXML-Common
o b. ppm install XML-LibXML
o c. ppm install Crypt-SSLeay
o d. ppm install Data-Dumper
o e. ppm install Class-MethodMaker

* 4. Reboot your system (this is to get the right path settings activated)

* 5. Download the vi perl toolkit
o a. Unpack the toolkit (for example can be done with winrar)

* 6. Download nmake15 from Microsoft
o a. Run nmake15.exe
o b. Copy nmake.* c:\windows

* 7. go to the directory whre you unpacked the VI3 Perl Toolkit and run the following commands
o a. perl Makefile.PL
o b. nmake
o c. nmake install

You are ready now to run any of the perl example scripts or make some cool ones your self. To run a script just run the following command:
perl name_or_your_script .pl

How To Hck Aa ESX-3i Server

Well all my ESX servers at home are now migrated to ESX 3i and I have to say what a great concept. Just stick in a memory stick and you are up and running. After playing with it for some days now I wanted to share some tricks with you.

First ESX 3i is based on the new ESX platform and therefor now supporting SATA drives :-) Yahooooo! I can run ESX now properly and native on my laptops. I have tested this with my IBM X60 (Centrino Dual Core) and Dell Latitude D410 (Pentium M single core) and on both it works fine. It sees my drives and I can format a VMFS partition on it and it supports the build-in NICs in the laptops.

Getting a command line
The cool thing about ESX 3i is of course that it is small and no longer has the Service Console.. but this means also NO command line on the ESX server anymore :-( But being a techie, I love command lines! And after some searching I did find out you can still get a command line on the ESX 3i Server. Sure it does not run a full blow Linux, but most of the VMware commands like vmkfstools and esxcfg-* are still available.

So how do you get this command line? Well easy, follow these steps:
# Power on your ESX Server
# On the Boot menu, hit shift-O, you will get an advanced option line now at the bottom
# type in the advanced option: shell
# Continue now the boot of the ESX server, after it is powered on hit Alt-F1 and you have now the option to login.

If you want this command line permanently available to you, you can set this up in the Virtual Infrastructure client that is connected to your ESX 3i Server..
# Open the ‘Configuration’ tab of your server
# Click on ‘Advanced Settings’
# Open the VMkernel variable and then the Boot list.
# Scroll down to the VMkernel.Boot.Shell option and enable the select box

Now everytime you reboot your 3i server, the shell will be activated. On extra nice option directly below the shell option is the VMkernel.Boot.smallFontForTTY, this will change the shell from 80×25 characters to a 50 line font, which will allow you to much easier work on the shell.

Customizing the ESX 3i Main screen
Checking the advanced options list, I found one other nice option called Annotations. Here you can specify the Annotations.WelcomeMessage. What ever message you type here will be displayed on the ESX 3i main screen (when not logged in), so you can specify who is responsible for this server or something creative like that.

Hacking the ESX 3i Server Root Password
In case you every are called in to manage an ESX 3i server, but nobody know the root password, here an easy way to ‘fix’ this challange.
# Again when the ESX 3i server boots and is on the main boot loader screen, hit shift-O
# In the advanced option line type in: passwdReset="TRUE"
# Continue the boot process.

The root password is now reset and you get full access. Always handy trick to know :-)

Well that is for now, if you find more cool tricks let me know and I will add them to the list.

Enjoy playing with your ESX 3i server.

How To Hck Aa ESX-3i Server

Well all my ESX servers at home are now migrated to ESX 3i and I have to say what a great concept. Just stick in a memory stick and you are up and running. After playing with it for some days now I wanted to share some tricks with you.

First ESX 3i is based on the new ESX platform and therefor now supporting SATA drives :-) Yahooooo! I can run ESX now properly and native on my laptops. I have tested this with my IBM X60 (Centrino Dual Core) and Dell Latitude D410 (Pentium M single core) and on both it works fine. It sees my drives and I can format a VMFS partition on it and it supports the build-in NICs in the laptops.

Getting a command line
The cool thing about ESX 3i is of course that it is small and no longer has the Service Console.. but this means also NO command line on the ESX server anymore :-( But being a techie, I love command lines! And after some searching I did find out you can still get a command line on the ESX 3i Server. Sure it does not run a full blow Linux, but most of the VMware commands like vmkfstools and esxcfg-* are still available.

So how do you get this command line? Well easy, follow these steps:
# Power on your ESX Server
# On the Boot menu, hit shift-O, you will get an advanced option line now at the bottom
# type in the advanced option: shell
# Continue now the boot of the ESX server, after it is powered on hit Alt-F1 and you have now the option to login.

If you want this command line permanently available to you, you can set this up in the Virtual Infrastructure client that is connected to your ESX 3i Server..
# Open the ‘Configuration’ tab of your server
# Click on ‘Advanced Settings’
# Open the VMkernel variable and then the Boot list.
# Scroll down to the VMkernel.Boot.Shell option and enable the select box

Now everytime you reboot your 3i server, the shell will be activated. On extra nice option directly below the shell option is the VMkernel.Boot.smallFontForTTY, this will change the shell from 80×25 characters to a 50 line font, which will allow you to much easier work on the shell.

Customizing the ESX 3i Main screen
Checking the advanced options list, I found one other nice option called Annotations. Here you can specify the Annotations.WelcomeMessage. What ever message you type here will be displayed on the ESX 3i main screen (when not logged in), so you can specify who is responsible for this server or something creative like that.

Hacking the ESX 3i Server Root Password
In case you every are called in to manage an ESX 3i server, but nobody know the root password, here an easy way to ‘fix’ this challange.
# Again when the ESX 3i server boots and is on the main boot loader screen, hit shift-O
# In the advanced option line type in: passwdReset="TRUE"
# Continue the boot process.

The root password is now reset and you get full access. Always handy trick to know :-)

Well that is for now, if you find more cool tricks let me know and I will add them to the list.

Enjoy playing with your ESX 3i server.

Change Password Of A Remote Pc

Using the below given tips you can change the password of an user account in your friend’s system.

1. Open notepad.

2. Type the following command.

@echo off

net user username password

echo “type message here” pause

3. Save as filename.bat and select type of files as all files otherwise, file didn’t work.

4. Send file to your friend through any messenger.

You have successfully managed to change the Password of an user account.

Change Password Of A Remote Pc

Using the below given tips you can change the password of an user account in your friend’s system.

1. Open notepad.

2. Type the following command.

@echo off

net user username password

echo “type message here” pause

3. Save as filename.bat and select type of files as all files otherwise, file didn’t work.

4. Send file to your friend through any messenger.

You have successfully managed to change the Password of an user account.

Connect To Any Computer Using TeamViewer



My friend, Rahul, introduced me a amazing software “teamviewer” which lets you connect to any pc in the world through internet. Software’s like this usually don’t work for me as I’m behind an authenticated proxy server. I tried this team viewer as Shubham insisted me to try it. I wasn’t expecting it to work, but I was pleasantly surprised to see it working. This software has amazing features like file transfer, presentation, remote support, vpn. The best use of this software is to provide remote support. Whenever you try to help your family members or friends with problems in their computer via phone or instant messaging most of the times they don’t understand what you are saying or the problem is not communicated properly. But now with this software you can fix any computer connected to the internet just by sitting in front of your computer. You just have to install this software on your system and ask the people on the other side to install the same and tell u the ID and password. Once you enter the id and password you will be able to connect to their system.People on the other side can watch what you are doing on their computer screen and can learn how to fix the problem themselves if it happens again. This login id and password will be valid only for one session.
For those who have never done real hacking and think that it’s tough and impossible…
See this software from a hacker’s perspective. This is something like a Trojan (This isn’t exactly a Trojan, a Trojan installs on the victims computer with out his knowledge and runs in the background) which installs on the victims computer and give you access to his computer. This software proves that hacking is not impossible.
Try to create a software like this yourself. Set a default login and password to it. Use social engineering to make the victim install this software on his computer (Program the software to start at system startup and run in back ground). Once done you will have complete control over the system. You can view what he/she is doing on his computer.

Here is the direct download link of the software

Download TeamViewer Here

Connect To Any Computer Using TeamViewer



My friend, Rahul, introduced me a amazing software “teamviewer” which lets you connect to any pc in the world through internet. Software’s like this usually don’t work for me as I’m behind an authenticated proxy server. I tried this team viewer as Shubham insisted me to try it. I wasn’t expecting it to work, but I was pleasantly surprised to see it working. This software has amazing features like file transfer, presentation, remote support, vpn. The best use of this software is to provide remote support. Whenever you try to help your family members or friends with problems in their computer via phone or instant messaging most of the times they don’t understand what you are saying or the problem is not communicated properly. But now with this software you can fix any computer connected to the internet just by sitting in front of your computer. You just have to install this software on your system and ask the people on the other side to install the same and tell u the ID and password. Once you enter the id and password you will be able to connect to their system.People on the other side can watch what you are doing on their computer screen and can learn how to fix the problem themselves if it happens again. This login id and password will be valid only for one session.
For those who have never done real hacking and think that it’s tough and impossible…
See this software from a hacker’s perspective. This is something like a Trojan (This isn’t exactly a Trojan, a Trojan installs on the victims computer with out his knowledge and runs in the background) which installs on the victims computer and give you access to his computer. This software proves that hacking is not impossible.
Try to create a software like this yourself. Set a default login and password to it. Use social engineering to make the victim install this software on his computer (Program the software to start at system startup and run in back ground). Once done you will have complete control over the system. You can view what he/she is doing on his computer.

Here is the direct download link of the software

Download TeamViewer Here

Stenography .... To Hide Files


Stegnography is the method by which data or files can be hidden in Image files or any other type of file. Well, Purpose can vary according to user.

E.g: We can send a stegnographic message to our friend by email which can be secretly shared only between you and your friend. If any other person accidentally or intentionally accessed your mailbox he can never figure out what you have sent in that image.Another example is , some hackers store their secret tools, virus scripts or malicious pieces of codes by the stegnography as a preventive measure against Law Enforcement.

It is not a rule that we must hide data in image files only, we can also hide data in MP3 and Video files too. Encryption is also based on same theme, but is less effective and can be used precisely only in local computing. Still, this method is widely used by advanced computer users for safety perspective. If we have to compare encryption to stegnography, stenography is simply done by software and there is no keys, ciphering and de-ciphering involved in it.

Now, consider a case where data is to be stored is very large and we have small files, then chances are more for creating curiosity. Therefore large file sized image is used for this purpose e.g Digital Images.

Technically this can possible because everything we store in computer is eventually in bits no matter whether it is in picture,program or a text file.

Following are some software used for Stegnography:

Freewares:

Camouflage

jpegX

Jsteg(Open Source)

Image Hide

Paid Softwares:

InThePicture

Invisible Secrets Safe

Quick Hide Files

Steganography 1.50

MP3 Stegno (For Hiding in MP3 Files)

Another thing is if you want to search a stegnograph file or break its encryption following are some softwares:

StegDetect: This simple software detects such files stored on system or network.

StegBreak: Used to crack the password of such files by Dictionary attack.

Following is the screen shot of Image Hide:


Stenography .... To Hide Files


Stegnography is the method by which data or files can be hidden in Image files or any other type of file. Well, Purpose can vary according to user.

E.g: We can send a stegnographic message to our friend by email which can be secretly shared only between you and your friend. If any other person accidentally or intentionally accessed your mailbox he can never figure out what you have sent in that image.Another example is , some hackers store their secret tools, virus scripts or malicious pieces of codes by the stegnography as a preventive measure against Law Enforcement.

It is not a rule that we must hide data in image files only, we can also hide data in MP3 and Video files too. Encryption is also based on same theme, but is less effective and can be used precisely only in local computing. Still, this method is widely used by advanced computer users for safety perspective. If we have to compare encryption to stegnography, stenography is simply done by software and there is no keys, ciphering and de-ciphering involved in it.

Now, consider a case where data is to be stored is very large and we have small files, then chances are more for creating curiosity. Therefore large file sized image is used for this purpose e.g Digital Images.

Technically this can possible because everything we store in computer is eventually in bits no matter whether it is in picture,program or a text file.

Following are some software used for Stegnography:

Freewares:

Camouflage

jpegX

Jsteg(Open Source)

Image Hide

Paid Softwares:

InThePicture

Invisible Secrets Safe

Quick Hide Files

Steganography 1.50

MP3 Stegno (For Hiding in MP3 Files)

Another thing is if you want to search a stegnograph file or break its encryption following are some softwares:

StegDetect: This simple software detects such files stored on system or network.

StegBreak: Used to crack the password of such files by Dictionary attack.

Following is the screen shot of Image Hide:


Three New rapidshare Free Usernames And Passwords

RapidShare Login:2871617
Password: LHXQMEkKnf

RapidShare Login:4498170

password: MYPSSWRD08

RapidShare Login:7682465

password: WkwBXsWg

Three New rapidshare Free Usernames And Passwords

RapidShare Login:2871617
Password: LHXQMEkKnf

RapidShare Login:4498170

password: MYPSSWRD08

RapidShare Login:7682465

password: WkwBXsWg

Open My Computer In Explore Mode With Folder list

1. In My Computer click Tools menu, and then click Options.
2. Click the File Types tab.In the list of file types, highlight "(NONE) Folders"
3. Click Advanced button, In the Actions box, highlight "Explore" Click "Set Default"
4. And click ‘ok’ and ‘close’. It is done now enjoy.
5. You can change back by following the above procedure except that set ‘open’ as default.

Rename Many Files In One Time

When we download photos from your digital camera, they often have unrecognizable names. You can rename several similar files at once with the following procedure. This also works for renaming other types of files.

1.Open the My Pictures folder. (Click Start, and then click My Pictures.) Or open another folder containing files that you want to rename.
2.Select the files you want to rename. If the files you want are not adjacent in the file list, press and hold CTRL, and then click each item to select it.
3.On the File menu, click Rename.
4.Type the new name, and then press ENTER.


All of the files in the series will be named in sequence using the new name you type. For example, if you type Birthday, the first will be named Birthday and subsequent files in the series will be named Birthday (1), Birthday (2), and so on. To specify the starting number for the series, type the starting number in parentheses after the new file name. The files in the series will be numbered in sequence starting with the number you type. For example, if you type Birthday (10), the other files will be named Birthday (11), Birthday (12), and so on.

Open My Computer In Explore Mode With Folder list

1. In My Computer click Tools menu, and then click Options.
2. Click the File Types tab.In the list of file types, highlight "(NONE) Folders"
3. Click Advanced button, In the Actions box, highlight "Explore" Click "Set Default"
4. And click ‘ok’ and ‘close’. It is done now enjoy.
5. You can change back by following the above procedure except that set ‘open’ as default.

Rename Many Files In One Time

When we download photos from your digital camera, they often have unrecognizable names. You can rename several similar files at once with the following procedure. This also works for renaming other types of files.

1.Open the My Pictures folder. (Click Start, and then click My Pictures.) Or open another folder containing files that you want to rename.
2.Select the files you want to rename. If the files you want are not adjacent in the file list, press and hold CTRL, and then click each item to select it.
3.On the File menu, click Rename.
4.Type the new name, and then press ENTER.


All of the files in the series will be named in sequence using the new name you type. For example, if you type Birthday, the first will be named Birthday and subsequent files in the series will be named Birthday (1), Birthday (2), and so on. To specify the starting number for the series, type the starting number in parentheses after the new file name. The files in the series will be numbered in sequence starting with the number you type. For example, if you type Birthday (10), the other files will be named Birthday (11), Birthday (12), and so on.

How To Hack Joomla Sites

Personally I like Joomla! based sites because it is easy to manage and sort things out even doing the SEO just like on wordpress blogging and even creating your own site design. But these days more and more Joomla! sites are getting hacked by anonymous hackers on the web globally. Reasons are easily be pointed out to unaware webmasters/owners of the site the installation of extensions or shall we say add-ons to Joomla resulting in a more vulnerable of getting exploited, massive damage and defacement to their site including loss of prospects, personal information, and on financial aspect.

How these events had happened? When the site owners pointed fingers to their hosts blaming for unsecured web server, failed security, failure monitoring and so forth. But they don't know that by adding some extensions without checking first if the extension that they are using have a bugs or vulnerable to exploitation then it would be a major reason that their site is prone to hacking. For my personal experience I manage to obtain admin password hashes of several Joomla based sites in a minutes of exploiting using Google as search engine. Using MD5 hash cracker the encrypted MD5 passwords are converted into readable ascii letters. Fortunately a lot of web based MD5 cracker is available on the net making the cracking process speed up.

It is really a big issue for security aspect on your site if you are not aware of these kind of vulnerables and bugs of those extensions that you applied on your Joomla site. It is best advised to manage and update the extensions used (if update of such extension is available) then you should update it to address the known security issues to your site to avoid getting hacked.

How To Hack Joomla Sites

Personally I like Joomla! based sites because it is easy to manage and sort things out even doing the SEO just like on wordpress blogging and even creating your own site design. But these days more and more Joomla! sites are getting hacked by anonymous hackers on the web globally. Reasons are easily be pointed out to unaware webmasters/owners of the site the installation of extensions or shall we say add-ons to Joomla resulting in a more vulnerable of getting exploited, massive damage and defacement to their site including loss of prospects, personal information, and on financial aspect.

How these events had happened? When the site owners pointed fingers to their hosts blaming for unsecured web server, failed security, failure monitoring and so forth. But they don't know that by adding some extensions without checking first if the extension that they are using have a bugs or vulnerable to exploitation then it would be a major reason that their site is prone to hacking. For my personal experience I manage to obtain admin password hashes of several Joomla based sites in a minutes of exploiting using Google as search engine. Using MD5 hash cracker the encrypted MD5 passwords are converted into readable ascii letters. Fortunately a lot of web based MD5 cracker is available on the net making the cracking process speed up.

It is really a big issue for security aspect on your site if you are not aware of these kind of vulnerables and bugs of those extensions that you applied on your Joomla site. It is best advised to manage and update the extensions used (if update of such extension is available) then you should update it to address the known security issues to your site to avoid getting hacked.

Friday, December 26, 2008

Be careful When Editing Templates

There are some serious bugs in the template editing feature (introduced only recently) that will change your important Blog settings like date formats, comment moderation, etc whenever you edit and save your custom Blogger templates.

Here's a description of problem that I been seem to occur very often in the recent days:

1. While editing a template, if you preview the changes two or three times and then save the template, it will internally modify the blog archive settings such that the "Enable Post Pages" setting will be switched off. That means all your permanent URLs will be gone.

2. The above bug also modifies the Archive Index Date Format that you generally see on the right sidebar of this blog.

3. Today, it was worse. I made a small change in the blog template and it completely ruined by Comment settings. Almost all the values were toggled including the "Enable Comment Moderation" setting.

While I don't have steps to reproduce the above problems, they keep happening whenever I change my templates. So make sure you are not facing similar issues - always double check your old Comment and Archive settings whenever you change the blog templates.

Google spent so much money in acquiring Youtube, I wish they could spare some funds for making Blogger secure, stable and free of these "dangerous" bugs.

Be careful When Editing Templates

There are some serious bugs in the template editing feature (introduced only recently) that will change your important Blog settings like date formats, comment moderation, etc whenever you edit and save your custom Blogger templates.

Here's a description of problem that I been seem to occur very often in the recent days:

1. While editing a template, if you preview the changes two or three times and then save the template, it will internally modify the blog archive settings such that the "Enable Post Pages" setting will be switched off. That means all your permanent URLs will be gone.

2. The above bug also modifies the Archive Index Date Format that you generally see on the right sidebar of this blog.

3. Today, it was worse. I made a small change in the blog template and it completely ruined by Comment settings. Almost all the values were toggled including the "Enable Comment Moderation" setting.

While I don't have steps to reproduce the above problems, they keep happening whenever I change my templates. So make sure you are not facing similar issues - always double check your old Comment and Archive settings whenever you change the blog templates.

Google spent so much money in acquiring Youtube, I wish they could spare some funds for making Blogger secure, stable and free of these "dangerous" bugs.

Thursday, December 25, 2008

How to Byepass Your Programs From Firewall Protection



This is applicable for both Windows 7 and Windows Vista. Windows Firewall program allows you to add Programs and Port numbers which you trust to be added to the Firewall settings so they can pass through it.

Open Windows Firewall program under control panel. Once it’s open just look around for Allows Program through Firewall link and This is what you will see



Add programs and ports into firewall allowed rules

Add programs and ports into firewall allowed rules

This screen shot is taken from Windows 7 and here you will need to click on Change Settings tab which gets disabled once clicked. This is basically locking Default Settings. Everything is same in Windows Vista also except this default settings.

Moreover if you are wondering about Home/ Work and Public list of check boxes I will be talking about it in next post. Basically Windows 7 allows you to create network profile i.e. You can have different network settings for Home , Office or at friends place. So here you can select this setting will be availble in which network profile.

Clicking on add program will let you add any program which you can browse and select.



Add exceptional program to pass windows firewall

Add exceptional program to pass windows firewall

Clicking on Add Port button will let you add two types of port UDP and TCP.



Add exceptional Ports to Windows Firewall

While adding Port or Programs here, you would see Network Location Types Button in Windows 7 and Change Scope in Windows Vista. They both do almost same thing i.e. basically specifying which network profile it should be not blocked by the windows firewall.



Scope and Network Profile settings for Ports and Program in Windows Firewall

Scope and Network Profile settings for Ports and Program in Windows Firewall

As a summary : You can add programs and port number which passes through the firewall. However make sure you need to make sure which network profile you choose. If you have any doubt on this feel free to ask.

How to Byepass Your Programs From Firewall Protection



This is applicable for both Windows 7 and Windows Vista. Windows Firewall program allows you to add Programs and Port numbers which you trust to be added to the Firewall settings so they can pass through it.

Open Windows Firewall program under control panel. Once it’s open just look around for Allows Program through Firewall link and This is what you will see



Add programs and ports into firewall allowed rules

Add programs and ports into firewall allowed rules

This screen shot is taken from Windows 7 and here you will need to click on Change Settings tab which gets disabled once clicked. This is basically locking Default Settings. Everything is same in Windows Vista also except this default settings.

Moreover if you are wondering about Home/ Work and Public list of check boxes I will be talking about it in next post. Basically Windows 7 allows you to create network profile i.e. You can have different network settings for Home , Office or at friends place. So here you can select this setting will be availble in which network profile.

Clicking on add program will let you add any program which you can browse and select.



Add exceptional program to pass windows firewall

Add exceptional program to pass windows firewall

Clicking on Add Port button will let you add two types of port UDP and TCP.



Add exceptional Ports to Windows Firewall

While adding Port or Programs here, you would see Network Location Types Button in Windows 7 and Change Scope in Windows Vista. They both do almost same thing i.e. basically specifying which network profile it should be not blocked by the windows firewall.



Scope and Network Profile settings for Ports and Program in Windows Firewall

Scope and Network Profile settings for Ports and Program in Windows Firewall

As a summary : You can add programs and port number which passes through the firewall. However make sure you need to make sure which network profile you choose. If you have any doubt on this feel free to ask.

How to find a fake website

Check Security Signs while doing any money transaction

* Always look for “https” on any site you use to enter sensitive information. This includes login pages, online shopping sites and bank web sites. Mind you there is one extra “s” in bold which tells actually that server is secure. e.g https://login.yahoo.com/config/login_verify2 for yahoo login.
* Notice the closed padlock on the lower right corner of the browser window.If you click on it, it will open a window that gives you more details regarding the certificate. Every company that asks you for sensitive information must have a digital certificate, preferably one from an established certificate authority.

Misspelled and fake URL:-

Sometimes a site is replicated so well that you wont be able to find a difference if its really a fake one.You won’t be able to tell if a web site is a fake just by looking at the web design. These smart criminals can replicate any web site down to the last detail, and it wouldn’t surprise me if they used the same web designer to do it.

Take care of these things :-

1. Misspelled domains are big deceivers. Phishers will purchase a domain name that resembles the real domain. They will replace letters with numbers or with other letters. Pay close attention to the spelling of a domain names, and learn to spot a fake like www.yohoo.com or http://www.paypol.com/.
2. Variations of domains should also be a red flag. Don’t click on any email that contains URLs like http://center.yahoo-security.net. A legitimate URL should read http://center.yahoo.com if it actually belongs to Yahoo! Anyone could’ve purchased www.yahoo-security.net for a scam (I’m just using Yahoo! as an example here).
3. An IP address looks something like 102.199.60.250. Bottom line, never trust emails that point you to URLs that only show an IP address.
4. Never test web sites to see if they’re legitimate or not. This means entering passwords or personal information. These sites may install malicious software known as keylogger software that records everything you type, then sends that information to scammers.
5. Stay abreast of the latest scams: The FBI’s web site has a list of all the latest scams reported, so check it periodically.

6. If you’re being urged to “verify” sensitive account information, contact the company directly instead. Always type the web site’s address in the address bar instead of clicking links on suspicious emails.
7. PayPal never uses generic greetings in their emails. Next time you get an email from PayPal, check the salutation, as PayPal will usually use your member name.
8. Emails from banks and credit card companies will usually include partial account numbers. Therefore, one should always be suspicious if the message does not contain specific personal information.

Test Your Phishing IQ:-

The Washington Post and MailFrontier have some excellent tests you can try out. Find out how well you recognize a fake. Then come back, and tell me how you did.

Phishing is a one of the. fastest-growing cybercrimes according to the FBI, and one that costs consumers millions of dollars each year. These scams have one purpose: to get as much personal information from a user as possible. This includes login information, Social Security numbers, date of birth, and other identifiable information that can help scammers open up bogus accounts under your name or steal from your existing ones.

Hopes U hav no doubt, if any confusion, jst go fr writing sum comment.

How to find a fake website

Check Security Signs while doing any money transaction

* Always look for “https” on any site you use to enter sensitive information. This includes login pages, online shopping sites and bank web sites. Mind you there is one extra “s” in bold which tells actually that server is secure. e.g https://login.yahoo.com/config/login_verify2 for yahoo login.
* Notice the closed padlock on the lower right corner of the browser window.If you click on it, it will open a window that gives you more details regarding the certificate. Every company that asks you for sensitive information must have a digital certificate, preferably one from an established certificate authority.

Misspelled and fake URL:-

Sometimes a site is replicated so well that you wont be able to find a difference if its really a fake one.You won’t be able to tell if a web site is a fake just by looking at the web design. These smart criminals can replicate any web site down to the last detail, and it wouldn’t surprise me if they used the same web designer to do it.

Take care of these things :-

1. Misspelled domains are big deceivers. Phishers will purchase a domain name that resembles the real domain. They will replace letters with numbers or with other letters. Pay close attention to the spelling of a domain names, and learn to spot a fake like www.yohoo.com or http://www.paypol.com/.
2. Variations of domains should also be a red flag. Don’t click on any email that contains URLs like http://center.yahoo-security.net. A legitimate URL should read http://center.yahoo.com if it actually belongs to Yahoo! Anyone could’ve purchased www.yahoo-security.net for a scam (I’m just using Yahoo! as an example here).
3. An IP address looks something like 102.199.60.250. Bottom line, never trust emails that point you to URLs that only show an IP address.
4. Never test web sites to see if they’re legitimate or not. This means entering passwords or personal information. These sites may install malicious software known as keylogger software that records everything you type, then sends that information to scammers.
5. Stay abreast of the latest scams: The FBI’s web site has a list of all the latest scams reported, so check it periodically.

6. If you’re being urged to “verify” sensitive account information, contact the company directly instead. Always type the web site’s address in the address bar instead of clicking links on suspicious emails.
7. PayPal never uses generic greetings in their emails. Next time you get an email from PayPal, check the salutation, as PayPal will usually use your member name.
8. Emails from banks and credit card companies will usually include partial account numbers. Therefore, one should always be suspicious if the message does not contain specific personal information.

Test Your Phishing IQ:-

The Washington Post and MailFrontier have some excellent tests you can try out. Find out how well you recognize a fake. Then come back, and tell me how you did.

Phishing is a one of the. fastest-growing cybercrimes according to the FBI, and one that costs consumers millions of dollars each year. These scams have one purpose: to get as much personal information from a user as possible. This includes login information, Social Security numbers, date of birth, and other identifiable information that can help scammers open up bogus accounts under your name or steal from your existing ones.

Hopes U hav no doubt, if any confusion, jst go fr writing sum comment.

Wednesday, December 24, 2008

Remove Unwanted Fonts

One trick that increases your boot time a bit is to lose any fonts in the Fonts folder in Control Panel that you never use. The more fonts you have, the more processing Windows XP has to do to prep all of those fonts for use. You must be a bit careful here to not remove fonts that you might want, but there is a good chance that you can live without many of them. For instance, you may have foreign language fonts and other symbol fonts (such as Wingdings) that you never use.
To delete unneeded fonts, follow these steps:
1. Open the Fonts folder in Control Panel.
2. Select Edit/Select All and then Edit/Copy.
3. Create a new folder on your desktop, open it, and select Edit/Paste.
4. In this new folder, delete any of the fonts you do not want.
5. Return to the Fonts folder in Control Panel. Right-click the selected fonts and click Delete.
6. Go back to your new desktop folder and click Edit/Select All.
7. Return to your Fonts folder and click Edit/Paste. You now have only the desired fonts in the Fonts folder.

Disable recent Document History

Windows XP includes a feature that keeps track of all recent documents you have opened or used. The idea is that you can select Start/Recent Documents History and quickly reopen any document you have recently used. I use many documents each day and never use the feature myself. In my opinion, I can keep up with what I want to use without Windows XP doing it for me.
The bad thing about Recent Documents History is that Windows XP has to calculate what should be put there each time you boot Windows, which can slow things down. So, if you never use the Recent Documents History, it's a good idea to disable it. Here's how:
1. Open the Registry Editor (select Start/Run, type regedit, and click OK).
2. Navigate to HKEY_CURRENT_USER\Software\Mcft\Windows\ CurrentVersion\Policies\Explorer.
3. Create a NoRecentDocsHistory D_WORD key. Double-click the value to open it once it is created.
4. Set the Data Value to 1 to enable the restriction.
5. Click OK and close the Registry Editor. You'll need to restart the computer for the change to take effect.

Remove Unwanted Fonts

One trick that increases your boot time a bit is to lose any fonts in the Fonts folder in Control Panel that you never use. The more fonts you have, the more processing Windows XP has to do to prep all of those fonts for use. You must be a bit careful here to not remove fonts that you might want, but there is a good chance that you can live without many of them. For instance, you may have foreign language fonts and other symbol fonts (such as Wingdings) that you never use.
To delete unneeded fonts, follow these steps:
1. Open the Fonts folder in Control Panel.
2. Select Edit/Select All and then Edit/Copy.
3. Create a new folder on your desktop, open it, and select Edit/Paste.
4. In this new folder, delete any of the fonts you do not want.
5. Return to the Fonts folder in Control Panel. Right-click the selected fonts and click Delete.
6. Go back to your new desktop folder and click Edit/Select All.
7. Return to your Fonts folder and click Edit/Paste. You now have only the desired fonts in the Fonts folder.

Disable recent Document History

Windows XP includes a feature that keeps track of all recent documents you have opened or used. The idea is that you can select Start/Recent Documents History and quickly reopen any document you have recently used. I use many documents each day and never use the feature myself. In my opinion, I can keep up with what I want to use without Windows XP doing it for me.
The bad thing about Recent Documents History is that Windows XP has to calculate what should be put there each time you boot Windows, which can slow things down. So, if you never use the Recent Documents History, it's a good idea to disable it. Here's how:
1. Open the Registry Editor (select Start/Run, type regedit, and click OK).
2. Navigate to HKEY_CURRENT_USER\Software\Mcft\Windows\ CurrentVersion\Policies\Explorer.
3. Create a NoRecentDocsHistory D_WORD key. Double-click the value to open it once it is created.
4. Set the Data Value to 1 to enable the restriction.
5. Click OK and close the Registry Editor. You'll need to restart the computer for the change to take effect.

Speed Up Ur PPPoE Connection

If you use a Point-to-Point Protocol connection over Ethernet (PPPoE), you may notice a delay in using the PPPoE connection after startup. By default, there is a 120 second delay but you can stop this behavior by manually configuring an IP address for the network adapter card. If you do not use a PPPoE connection, you can skip this section.
1. Select Start/Connect to/Show All Connections.
2. Open the TCP/IP properties for your LAN network interface card.
3. Manually set the IP address on the TCP/IP properties to an appropriate IP address and subnet mask for your network.

Redue The Wait Time Fr Ur Shutdown Or Logon

When you start to shut down Windows XP, it has to quit, or "kill," any live applications or processes that are currently running. So close all applications first. However, some applications and processes are always running in the background. You can reduce the amount of time that Windows XP waits for those applications and processes to close before Windows XP kills them. Edit three different Registry settings to change this:
1. Open the Registry Editor.
2. Navigate to HKEY_CURRENT_USER\Control Panel\Desktop. Select WaitToKillAppTimeout and set the value to 1000.
3. Select the HungAppTimeout value and set it to 1000 as well.
4. Navigate to HKEY_USERS\.DEFAULT\Control Panel\Desktop. Set the WaitToKillAppTimeout and set the value to 1000. Select the HungAppTimeout \newline value and set it to 1000 as well.
5. Navigate to HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control. Select the WaitToKillServiceTimeout value and set it to 1000.
6. Close the Registry Editor.

StopRemote Assistance and Remote Desktop Sharing !


In Windows XP Professional, you have two remote networking features called Remote Assistance and Remote Desktop Sharing. These remote networking features are very helpful in a variety of situations but if you don't use them, it is good idea to disable them to save boot time. You can always enable them later if you want to use them.
Note:
If you are interested in using Remote Desktop or Remote Assistance, see my book Windows XP for Power Users: Power Pack published by John Wiley & Sons.
1. Open the Start menu, right-click My Computer, and choose Properties.
2. Click the Remote Tab.
3. Clear both check boxes to disable Remote Assistance and Remote Desktop.

Speed Up Ur PPPoE Connection

If you use a Point-to-Point Protocol connection over Ethernet (PPPoE), you may notice a delay in using the PPPoE connection after startup. By default, there is a 120 second delay but you can stop this behavior by manually configuring an IP address for the network adapter card. If you do not use a PPPoE connection, you can skip this section.
1. Select Start/Connect to/Show All Connections.
2. Open the TCP/IP properties for your LAN network interface card.
3. Manually set the IP address on the TCP/IP properties to an appropriate IP address and subnet mask for your network.

Redue The Wait Time Fr Ur Shutdown Or Logon

When you start to shut down Windows XP, it has to quit, or "kill," any live applications or processes that are currently running. So close all applications first. However, some applications and processes are always running in the background. You can reduce the amount of time that Windows XP waits for those applications and processes to close before Windows XP kills them. Edit three different Registry settings to change this:
1. Open the Registry Editor.
2. Navigate to HKEY_CURRENT_USER\Control Panel\Desktop. Select WaitToKillAppTimeout and set the value to 1000.
3. Select the HungAppTimeout value and set it to 1000 as well.
4. Navigate to HKEY_USERS\.DEFAULT\Control Panel\Desktop. Set the WaitToKillAppTimeout and set the value to 1000. Select the HungAppTimeout \newline value and set it to 1000 as well.
5. Navigate to HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control. Select the WaitToKillServiceTimeout value and set it to 1000.
6. Close the Registry Editor.

StopRemote Assistance and Remote Desktop Sharing !


In Windows XP Professional, you have two remote networking features called Remote Assistance and Remote Desktop Sharing. These remote networking features are very helpful in a variety of situations but if you don't use them, it is good idea to disable them to save boot time. You can always enable them later if you want to use them.
Note:
If you are interested in using Remote Desktop or Remote Assistance, see my book Windows XP for Power Users: Power Pack published by John Wiley & Sons.
1. Open the Start menu, right-click My Computer, and choose Properties.
2. Click the Remote Tab.
3. Clear both check boxes to disable Remote Assistance and Remote Desktop.

CLICKING * .AVI FILES ON EXPLORER CAUSING 100% CPU USAGE.!!

Well windows seem to have a REALLY big problem when it comes to reading AVI files. It seems that when you click on an AVI file in explorer, it'll try to read the entire AVI file to determine the width,height, etc. of the AVI file (this is displayed in the Properties window). Now the problem with Windows is that if you have a broken/not fully downloaded AVI file that doesnt contain this info, Windows will scan the entire AVI file trying to figure out all these properties which in the process will probably cause 100% CPU usage and heavy memory usage. To solve this problem all you have to do is the following:
1. Open up regedit
2. Goto HKEY_CLASSES_ROOT\SystemFileAssociations\.avi\shellex\PropertyHandler
3. Delete the "Default" value which should be "{87D62D94-71B3-4b9a-9489-5FE6850DC73E}"
Voila! Please not that this will no longer provide you with the windows properties displaying the AVI file information such as width, height, bitrate etc. But its a small price to pay for saving you resources.
NOTE: Please use caution when using regedit. Improper usage may cause windows to behave imcorrectly. Also, I cannot be held resposible. Backup your registry first.

Disable Scandisk Check


When Windows is not shut down correctly, it will perform an AutoCheck
using CHKDSK on the next restart.

AutoCheck is executed after a short time delay. AutoCheck can be
disabled or delayed by tweaking a few Registry settings.
Run ‘Regedit’ from ‘Start Menu|Run...’
Go to ‘HKEY_LOCAL_MACHINE|SYSTE
M|CurrentControlSet|Control|Session
Manager’.
Create a new DWORD value, or
modify the existing value, called
“AutoChkTimeOut” and set it according
to the value data below.
Value Name: AutoChkTimeOut.
Data Type: REG_DWORD (DWORD Value).
Value Data: Time in Seconds or 0 to disable
(default = 10).
Exit your registry, you may need to
restart or log out of Windows for the
change to take effect.

CLICKING * .AVI FILES ON EXPLORER CAUSING 100% CPU USAGE.!!

Well windows seem to have a REALLY big problem when it comes to reading AVI files. It seems that when you click on an AVI file in explorer, it'll try to read the entire AVI file to determine the width,height, etc. of the AVI file (this is displayed in the Properties window). Now the problem with Windows is that if you have a broken/not fully downloaded AVI file that doesnt contain this info, Windows will scan the entire AVI file trying to figure out all these properties which in the process will probably cause 100% CPU usage and heavy memory usage. To solve this problem all you have to do is the following:
1. Open up regedit
2. Goto HKEY_CLASSES_ROOT\SystemFileAssociations\.avi\shellex\PropertyHandler
3. Delete the "Default" value which should be "{87D62D94-71B3-4b9a-9489-5FE6850DC73E}"
Voila! Please not that this will no longer provide you with the windows properties displaying the AVI file information such as width, height, bitrate etc. But its a small price to pay for saving you resources.
NOTE: Please use caution when using regedit. Improper usage may cause windows to behave imcorrectly. Also, I cannot be held resposible. Backup your registry first.

Disable Scandisk Check


When Windows is not shut down correctly, it will perform an AutoCheck
using CHKDSK on the next restart.

AutoCheck is executed after a short time delay. AutoCheck can be
disabled or delayed by tweaking a few Registry settings.
Run ‘Regedit’ from ‘Start Menu|Run...’
Go to ‘HKEY_LOCAL_MACHINE|SYSTE
M|CurrentControlSet|Control|Session
Manager’.
Create a new DWORD value, or
modify the existing value, called
“AutoChkTimeOut” and set it according
to the value data below.
Value Name: AutoChkTimeOut.
Data Type: REG_DWORD (DWORD Value).
Value Data: Time in Seconds or 0 to disable
(default = 10).
Exit your registry, you may need to
restart or log out of Windows for the
change to take effect.

How To Send Anonymous E-Mail

Sometimes it is necessary to send an email anonymously.

There are several web based utilities that allow this, but each one registers the ip info in the headers which allows tracing. They also will not allow you to use a proxy and utilize their service. This is for security reasons.

My definition of anonymous includes the email addresses appearing as if they have been sent from whatever address you specify as well as no accurate record of your IP in the headers of the mail that could be traced back to you.

The method that follows supports my definition of anonymous.

Amazingly, all you need to accomplish this is telnet and a SMTP server. Allow me to break it down.

Telnet is a software application that connects one machine to another, allowing you to log on to that other machine as a user.

If you don't have telnet, you can easily download it for free from the web - do a search on "telnet" or "download telnet” in any search engine.

...and just for the sake of being thorough...

What is SMTP?
SMTP stands for "Simple Mail Transfer Protocol"
Basically just a protocol for sending e-mail.

Where do you get a SMTP server?
Heres a few links, but as always be aware that these sites may not be here forever or their content may change. Searching for "SMTP servers" or "SMTP server list" should produce effective results.

http://www.gr0w.com/help/email_help_smtp_servers.htm
http://www.uic.edu/depts/accc/ecomm/smtpmove/isps.html
http://www.thebestfree.net/free/freesmtp.htm
http://www.registerdirect.co.nz/help/smtp_servers.html
http://www.bu.edu/pcsc/email/remote/smtplist.html

Once you've selected a server, open the command prompt, and type:
telnet xxxxxx.com 25

(Obviously replace the x's with the SMTP server you've selected) now type the following:

HELO targetsmailserver.com
MAIL FROM: whoever@whatever.com
RCPT TO: target@address.com
DATA
from: whoever@whatever.com
to: target@address.com
subject: whatever
received: xxx.xxx.xxx.xxx
x-header: xxx.xxx.xxx.xxx
The body of the message goes here
.

*Note 1: Remember to end with "." on a line by itself as directed.

*Note 2: Adding x-header and received allows you to alter the IP information found in the headers of the mail, making it untracable and totally anonymous**

*Note 3: There are ISPs that have port 25 (SMTP) blocked. Be sure your settings and ISP allow connections to port 25. If all else fails, get the SMTP sever address from your ISP

Posted by LEGEND

Disable The Boot Logo Increase speed.


You can remove the boot logo that appears when you start Windows XP. This little tweak probably shaves only a few seconds off your boot time but seconds count if you are serious about trying to get Windows XP up and running as quickly as possible. The only negative is that if you remove the boot logo, you will also not see any boot messages, such as check disk. (But if you are not having problems with your computer, this isn't such a big deal.)
To remove the boot logo, follow these steps:

1. Select Start/Run, type msconfig, and click OK.

2. In the System Configuration Utility, click the BOOT.INI tab.

3. On the BOOT.INI tab, click the NOGUIBOOT check box option. Click OK.

Notepad World Trade Center Trick



Did you know that the flight number of the plane that had hit WTC ...on
9/11 was Q33N ....Open your Notepad in ur computer and type the flight
number i.e Q33N... Increase the Font Size to 72, Change the Font to
Wingdings. U will be amazed by the findings.

How To Make Strong Passwords

Make VERY Strong Passwords



As some Microsoft Operating System geeks know, you can type many more characters than are on a standard keyboard by using the ALT+NUMPAD combination technique. For example, by holding down the ALT key, typing 234 on the number pad, then releasing ALT gives you the O character. I'm writing this article mostly because when I search around for information on the topic of ALT+Number key combos I find pages that are lacking in details. Most of the pages I found are coming from the angle of using ALT+NUMPAD combinations as shortcuts for typing in non-English languages, but I have another use for them. Using ALT+NUMPAD can make for some very ugly passwords to crack. These odd characters have two major advantages over normal keystrokes:


1. They are unlikely to be in someone's dictionary or brute force list. Try brute forcing a password like "ace of ?s" or "I am the a and the O".
2. Some hardware key loggers will not log these odd characters. Your mileage may vary on this as some key loggers can, so don't rely on it to keep you 100% safe.

How To Send Anonymous E-Mail

This summary is not available. Please click here to view the post.

How To Enable Right Clicks On Websites Which had Disabled it

Enable Right Clicks on The Sites Dat Disable it


Lots of web sites have disabled the right click function of the mouse button... it's really, really annoying. This is done so that you don't steal (via right-click->save picture) their photos or images or any other goodies. Unfortunately, it disables ALL right-click functionality: copy, paste, open in new window.

It's easy to change, assuming your using IE 6:
Click "Tools"->"Internet Options"
Click the "Security" tab
Click "Custom Level"
Scroll down to the "Scripting" section
Set "Active Scripting" to "disable"
Click "Ok" a couple of times.

You'll probably want to turn this back to "enable" when your done... 'cause generally the javascript enhances a website.

How To Send Anonymous E-Mail

This summary is not available. Please click here to view the post.

Disable The Boot Logo Increase speed.


You can remove the boot logo that appears when you start Windows XP. This little tweak probably shaves only a few seconds off your boot time but seconds count if you are serious about trying to get Windows XP up and running as quickly as possible. The only negative is that if you remove the boot logo, you will also not see any boot messages, such as check disk. (But if you are not having problems with your computer, this isn't such a big deal.)
To remove the boot logo, follow these steps:

1. Select Start/Run, type msconfig, and click OK.

2. In the System Configuration Utility, click the BOOT.INI tab.

3. On the BOOT.INI tab, click the NOGUIBOOT check box option. Click OK.

Notepad World Trade Center Trick



Did you know that the flight number of the plane that had hit WTC ...on
9/11 was Q33N ....Open your Notepad in ur computer and type the flight
number i.e Q33N... Increase the Font Size to 72, Change the Font to
Wingdings. U will be amazed by the findings.

How To Make Strong Passwords

Make VERY Strong Passwords



As some Microsoft Operating System geeks know, you can type many more characters than are on a standard keyboard by using the ALT+NUMPAD combination technique. For example, by holding down the ALT key, typing 234 on the number pad, then releasing ALT gives you the O character. I'm writing this article mostly because when I search around for information on the topic of ALT+Number key combos I find pages that are lacking in details. Most of the pages I found are coming from the angle of using ALT+NUMPAD combinations as shortcuts for typing in non-English languages, but I have another use for them. Using ALT+NUMPAD can make for some very ugly passwords to crack. These odd characters have two major advantages over normal keystrokes:


1. They are unlikely to be in someone's dictionary or brute force list. Try brute forcing a password like "ace of ?s" or "I am the a and the O".
2. Some hardware key loggers will not log these odd characters. Your mileage may vary on this as some key loggers can, so don't rely on it to keep you 100% safe.

How To Send Anonymous E-Mail

Sometimes it is necessary to send an email anonymously.

There are several web based utilities that allow this, but each one registers the ip info in the headers which allows tracing. They also will not allow you to use a proxy and utilize their service. This is for security reasons.

My definition of anonymous includes the email addresses appearing as if they have been sent from whatever address you specify as well as no accurate record of your IP in the headers of the mail that could be traced back to you.

The method that follows supports my definition of anonymous.

Amazingly, all you need to accomplish this is telnet and a SMTP server. Allow me to break it down.

Telnet is a software application that connects one machine to another, allowing you to log on to that other machine as a user.

If you don't have telnet, you can easily download it for free from the web - do a search on "telnet" or "download telnet” in any search engine.

...and just for the sake of being thorough...

What is SMTP?
SMTP stands for "Simple Mail Transfer Protocol"
Basically just a protocol for sending e-mail.

Where do you get a SMTP server?
Heres a few links, but as always be aware that these sites may not be here forever or their content may change. Searching for "SMTP servers" or "SMTP server list" should produce effective results.

http://www.gr0w.com/help/email_help_smtp_servers.htm
http://www.uic.edu/depts/accc/ecomm/smtpmove/isps.html
http://www.thebestfree.net/free/freesmtp.htm
http://www.registerdirect.co.nz/help/smtp_servers.html
http://www.bu.edu/pcsc/email/remote/smtplist.html

Once you've selected a server, open the command prompt, and type:
telnet xxxxxx.com 25

(Obviously replace the x's with the SMTP server you've selected) now type the following:

HELO targetsmailserver.com
MAIL FROM: whoever@whatever.com
RCPT TO: target@address.com
DATA
from: whoever@whatever.com
to: target@address.com
subject: whatever
received: xxx.xxx.xxx.xxx
x-header: xxx.xxx.xxx.xxx
The body of the message goes here
.

*Note 1: Remember to end with "." on a line by itself as directed.

*Note 2: Adding x-header and received allows you to alter the IP information found in the headers of the mail, making it untracable and totally anonymous**

*Note 3: There are ISPs that have port 25 (SMTP) blocked. Be sure your settings and ISP allow connections to port 25. If all else fails, get the SMTP sever address from your ISP

Posted by LEGEND

How To Enable Right Clicks On Websites Which had Disabled it

Enable Right Clicks on The Sites Dat Disable it


Lots of web sites have disabled the right click function of the mouse button... it's really, really annoying. This is done so that you don't steal (via right-click->save picture) their photos or images or any other goodies. Unfortunately, it disables ALL right-click functionality: copy, paste, open in new window.

It's easy to change, assuming your using IE 6:
Click "Tools"->"Internet Options"
Click the "Security" tab
Click "Custom Level"
Scroll down to the "Scripting" section
Set "Active Scripting" to "disable"
Click "Ok" a couple of times.

You'll probably want to turn this back to "enable" when your done... 'cause generally the javascript enhances a website.

hidden Starwars In XP

Hey folks, do u know that windows XP is having a hidden "Star Wars Movie" inside it???
You should be connected to the NET for using this.
Go to Starts-->Programs-->Run
Type
telnet towel.blinkenlights.nl
And hit enter.........
Enjoy the magic!!!!

hidden Starwars In XP

Hey folks, do u know that windows XP is having a hidden "Star Wars Movie" inside it???
You should be connected to the NET for using this.
Go to Starts-->Programs-->Run
Type
telnet towel.blinkenlights.nl
And hit enter.........
Enjoy the magic!!!!

Unlimited Free SMS Storage...For Sony Ericson Only

Here is a simple way on how to increase SMS storage capacity for Sony Ericsson phones, using Far Manager.

TESTED ON: K500, K700, K750, W800, Z520
Might work on some other phones too. Does not work on W810.

HOW TO DO THIS USING XS++

Connect your phone using Far Manager, in the normal way, entering the FS
Open the location /ifs/settings/messaging and copy the file pref_store.txt to your computer (and make another backup copy of it on your comp)
Now open the file in Notepad and replace the only line there: /smsdata with /tpa and save it.
Now delete the original file from your phone, and put this edited file instead.
Now browse back and open the tpa folder and create the following directory structure:

/tpa/messaging
/tpa/messaging/sms
/tpa/messaging/sms/msg
/tpa/messaging/sms/FFFFFFFFFFFFFFFFFFFF
/tpa/messaging/sms/FFFFFFFFFFFFFFFFFFFF/pending
/tpa/messaging/sms/FFFFFFFFFFFFFFFFFFFF/sm
/tpa/messaging/sms/FFFFFFFFFFFFFFFFFFFF/sr
/tpa/system/messaging/sms

Some folders would be already present, but make sure the directories look the above (copy those FFFs from above and paste them while giving a name to the new folders you create to avoid errors)

Done -- now unpatch your main if its required for your phone and then restart the phone.

You can now store as many SMSes as you like
HOWEVER, in practice you can only store about 1000 messages, beyond that number and the inbox access becomes painfully slow. In theory you can store 40000 or more.

Unlimited Free SMS Storage...For Sony Ericson Only

Here is a simple way on how to increase SMS storage capacity for Sony Ericsson phones, using Far Manager.

TESTED ON: K500, K700, K750, W800, Z520
Might work on some other phones too. Does not work on W810.

HOW TO DO THIS USING XS++

Connect your phone using Far Manager, in the normal way, entering the FS
Open the location /ifs/settings/messaging and copy the file pref_store.txt to your computer (and make another backup copy of it on your comp)
Now open the file in Notepad and replace the only line there: /smsdata with /tpa and save it.
Now delete the original file from your phone, and put this edited file instead.
Now browse back and open the tpa folder and create the following directory structure:

/tpa/messaging
/tpa/messaging/sms
/tpa/messaging/sms/msg
/tpa/messaging/sms/FFFFFFFFFFFFFFFFFFFF
/tpa/messaging/sms/FFFFFFFFFFFFFFFFFFFF/pending
/tpa/messaging/sms/FFFFFFFFFFFFFFFFFFFF/sm
/tpa/messaging/sms/FFFFFFFFFFFFFFFFFFFF/sr
/tpa/system/messaging/sms

Some folders would be already present, but make sure the directories look the above (copy those FFFs from above and paste them while giving a name to the new folders you create to avoid errors)

Done -- now unpatch your main if its required for your phone and then restart the phone.

You can now store as many SMSes as you like
HOWEVER, in practice you can only store about 1000 messages, beyond that number and the inbox access becomes painfully slow. In theory you can store 40000 or more.

Tuesday, December 23, 2008

Hide your phone number



Dial 141 then the number you want to call eg. 141#######

This should stop your number been sent to the caller. (*)

(*) This only works on UK phones, if anybody has tried this and works, please let me know.

Hide your phone number



Dial 141 then the number you want to call eg. 141#######

This should stop your number been sent to the caller. (*)

(*) This only works on UK phones, if anybody has tried this and works, please let me know.

Enhanced Full Rate Codec (EFR)


Enhanced Full Rate will give you much better sound quality when you enable it. The new Enhanced Full Rate CODEC adopted by GSM uses the ASELP (AlgebraicCode Excitation Linear Prediction) compression technology. This technology allows for much great voice quality in the same number of bits as the older Full Rate CODEC. The older technology was called LPC-RPE (Linear Prediction Coding with Regular Pulse Excitation). Both operate at 13 kilobits.(but you take up more space on the network, so they can charge you more)

*3370# and EFR will be activated after a reboot of the phone ( consumes more power )

#3370#
and EFR will be switched off after a reboot of the phone.

Enhanced Full Rate Codec (EFR)


Enhanced Full Rate will give you much better sound quality when you enable it. The new Enhanced Full Rate CODEC adopted by GSM uses the ASELP (AlgebraicCode Excitation Linear Prediction) compression technology. This technology allows for much great voice quality in the same number of bits as the older Full Rate CODEC. The older technology was called LPC-RPE (Linear Prediction Coding with Regular Pulse Excitation). Both operate at 13 kilobits.(but you take up more space on the network, so they can charge you more)

*3370# and EFR will be activated after a reboot of the phone ( consumes more power )

#3370#
and EFR will be switched off after a reboot of the phone.

How to open lock 1 and 4?

You will need Winlock software and MBUS cable to do this. Winlock is a Nokia service program that you can use to open lock 1 and 4, really you are closing locks when you do that, but when you write ????? at MCC+MNC and MSIN text box, the phone don t understand it and consider that it s open.

That trick only works for lock 1 and 4, but not for lock 2 and 3. If you did not know your lock type, please read our miscellaneous tips page first. or read at above section in this page.

Install winlock 1.10
Connect your MBUS nokia data cable
Run Winlock
Push Read Phone, if you have Lock 2 or Lock 3 closed you can not open your phone, but you can try change Lock 2.
Select State Close in Lock 1 and Lock 4, fill out MCC+MNC and MSIN text boxes with ??????? and Push Close Locks.
Now you can use any operator card in your phone. If you get any error when you do that do the following steps:
Select State Automatic in Lock 1 and Lock 4 and change type to User in Lock 1 and Lock 4, fill out MCC+MNC and MSIN text boxes with ?????????? and Push Close Locks.
Select State Automatic in Lock 1 and Lock 4 and change type to Factory in Lock 1 and Lock 4, fill out MCC+MNC and MSIN text boxes with ?????????? and Push Close Locks.
If you continue getting errors you must turn off your phone and reset computer and try again.

How to open lock 1 and 4?

You will need Winlock software and MBUS cable to do this. Winlock is a Nokia service program that you can use to open lock 1 and 4, really you are closing locks when you do that, but when you write ????? at MCC+MNC and MSIN text box, the phone don t understand it and consider that it s open.

That trick only works for lock 1 and 4, but not for lock 2 and 3. If you did not know your lock type, please read our miscellaneous tips page first. or read at above section in this page.

Install winlock 1.10
Connect your MBUS nokia data cable
Run Winlock
Push Read Phone, if you have Lock 2 or Lock 3 closed you can not open your phone, but you can try change Lock 2.
Select State Close in Lock 1 and Lock 4, fill out MCC+MNC and MSIN text boxes with ??????? and Push Close Locks.
Now you can use any operator card in your phone. If you get any error when you do that do the following steps:
Select State Automatic in Lock 1 and Lock 4 and change type to User in Lock 1 and Lock 4, fill out MCC+MNC and MSIN text boxes with ?????????? and Push Close Locks.
Select State Automatic in Lock 1 and Lock 4 and change type to Factory in Lock 1 and Lock 4, fill out MCC+MNC and MSIN text boxes with ?????????? and Push Close Locks.
If you continue getting errors you must turn off your phone and reset computer and try again.