KINDLY REPLY HOW YOU LIKE IT

Programming Tutorials on different platforms

Any general and specialized interesting programming language training and exploration . Fun with knowledge .

Search This Blog

Thursday, September 16, 2010

Boot Block Recovery For Free

AWARD Bootblock recovery:
That shorting trick should work if the boot block code is not corrupted, and it should not be if /sb switch is used when flashing the bios (instead of /wb switch).
The 2 pins to short to force a checksum error varies from chip to chip. But these are usually the highest-numbered address pins (A10 and above).
These are the pins used by the system to read the System BIOS (original.bin for award v6), calculate the ROM checksum and see if it’s valid before decompressing it into memory, and subsequently allow Bootblock POST to pass control over to the System BIOS.
You just have to fool the system into believing that the System BIOS is corrupt. This you do by giving your system a hard time reading the System BIOS by shorting the 2 high address pins. And when it could not read the System BIOS properly, ROM Checksum Error is detected “so to speak” and Bootblock recovery is activated.
Sometimes, any combination of the high address pins won’t work to force a checksum error in some chips, like my Winbond W49F002U. But shorting the #WE pin with the highest-numbered address pin (A17) worked for this chip. You just have to be experimentative if you’re not comfortable with “hot flashing” or “replacement BIOS”.
But to avoid further damage to your chip if you’re not sure which are the correct pins to short, measure the potential between the 2 pins by a voltmeter while the system is on. If the voltage reading is zero (or no potential at all), it is safe to short these pins.
But do not short the pins while the system is on. Instead, power down then do the short, then power up while still shorting. And as soon as you hear 3 beeps (1 long, 2 short), remove the short at once so that automatic reflashing from Drive A can proceed without errors (assuming you had autoexec.bat in it).
About how to do the shorting, the tip of a screwdriver would do. But with such minute pins on the PLCC chip, I’m pretty comfortable doing it with the tip of my multi-tester or voltmeter probe. Short the pins at the point where they come out of the chip.
AMIBIOS Recovery bootblock:
1. Copy a known working BIOS image for your board to a floppy and rename it to AMIBOOT.ROM.
2. Insert the floppy in your system’s floppydrive.
3. Power on the system while holding CTRL+Home keys. Release the keys when you hear a beep and/or see the floppy light coming on.
4 . Just wait until you hear 4 beeps. When 4 beeps are heard the reprogramming of the System Block BIOS went succesfull, so then you may restart your system.
Some alternative keys that can be used to force BIOS update (only the System Block will be updated so it’s quite safe):
CTRL+Home= restore missing code into system block and clear CMOS when programming went ok.
CTRL+Page Up= restore missing code into system block and clear CMOS or DMI when programming went ok.
CTRL+Page Down= restore missing code into system block and do not clear CMOS and DMI area when programming went ok
Btw: the alternative keys work only with AMIBIOS 7 or higher (so for example an AMI 6.26 BIOS can be only recovered by using CTRL+Home keys).
[eminimall]
BLACKOUT Flashing
Recovering a Corrupt AMI BIOS chip
With motherboards that use BOOT BLOCK BIOS it is possible to recover a corrupted BIOS because the BOOT BLOCK section of the BIOS, which is responsible for booting the computer remains unmodified. When an AMI BIOS becomes corrupt the system will appear to start, but nothing will appear on the screen, the floppy drive light will come on and the system will access the floppy drive repeatedly. If your motherboard has an ISA slot and you have an old ISA video card lying around, put the ISA video card in your system and connect the monitor. The BOOT BLOCK section of the BIOS only supports ISA video cards, so if you do not have an ISA video card or your motherboard does not have ISA slots, you will have to restore your BIOS blind, with no monitor to show you what’s going on.
AMI has integrated a recovery routine into the BOOT BLOCK of the BIOS, which in the event the BIOS becomes corrupt can be used to restore the BIOS to a working state. The routine is called when the SYSTEM BLOCK of the BIOS is empty. The restore routine will access the floppy drive looking for a BIOS file names AMIBOOT.ROM, this is why the floppy drive light comes on and the drive spins. If the file is found it is loaded into the SYSTEM BLOCK of the BIOS to replace the missing information. To restore your BIOS simply copy a working BIOS file to a floppy diskette and rename it AMIBOOT.ROM, then insert it into the computer while the power is on. The diskette does not need to be bootable or contain a flash utility. After about four minutes the system will beep four times. Remove the floppy diskette from the drive and reboot the computer. The BIOS should now be restored.

Recovering a Corrupt AWARD BIOS
With AWARD BIOS the process is similar but still a bit different. To recover an AWARD BIOS you will need to create a floppy diskette with a working BIOS file in .BIN format, an AWARD flash utility and an AUTOEXEC.BAT file. AWARD BIOS will not automatically restore the BIOS information to the SYSTEM BLOCK for this reason you will need to add the commands necessary to flash the BIOS in the AUTOEXEC.BAT file. The system will run the AUTOEXE.BAT file, which will in turn flash the BIOS. This is fairly easy. Here are the steps you need to take.
• Create a bootable floppy diskette
• Copy the BIOS file and flash utility to the diskette
• Create an text file with any standard text editor and add the following lines
@ECHO OFF
FLASH763 BIOSFILE.BIN /py

Note: In the above example I am assuming that you are using the FLASH763.EXE flash utility. You will need to replace the FLASH763 with the name of whatever flash utility you are using, and replace the BIOSFILE.BIN with the name of the BIOS file you are using. You will also need to change the ‘/py’ to whatever the command is for your flash utility to automatically program the BIOS without user intervention. If you do not know the command to automatically flash your BIOS type the name of the flash utility with a space and then /? to display the utility’s help screen. The help screen should pecify the command switch to automatically flash your BIOS. If you are using the FLASH763.EXE utility then the switch to automatically flash your BIOS is ‘/py’.

100 Free Software For Mac OS X

System Monitoring and Maintenance Tools
1. Mactracker – provides detailed information on every Apple Macintosh computer ever made, including items such as processor speed, memory, optical drives, graphic cards, supported Mac OS versions and many other information.
2. Maintenance – a system maintenance and cleaning utility
3. xMod – a system tweaker that allows you to change some of the hidden settings.
4. iStat Menus – monitor your Mac from the menubar
5. Mini Usage – displays various data like CPU usage, amount of network flow, battery status and process names
6. SMARTReporter – warn you of some hard disk drive failures before they actually happen!
7. Onyx – verify the startup disk and the structure of its system files
8. atMonitor – system monitor and process explorer tool
9. Omni Disk Sweeper – hard disk analyzer
10. Secrets – A database of hidden settings for Mac OS X
System Enhancement Tools
1. Preferences Cleaner – a utility which aims to simplify the task of deleting preference files.
2. Wallsaver – use any screen saver as wallpaper
3. SizeWell – better window resize and zoom options
4. TrimTheFat – remove PPC architecture from applications
5. Lock-UnMatic – unlock locked files
6. QuickBoot – make it quick and easy to boot another drive/partition
7. Hide-unhide – show hidden files
8. Flying Windows – work in single application mode
9. What’s Keeping Me? – empty the Trash or eject a disk
10. BumpTop – 3D desktop
Office Suite/Word Processing/Text Editor
1. OpenOffice.org
2. NeoOffice – a port of OpenOffice
3. IBM Lotus Symphony
4. Siag Office – a free office package for UNIX
5. Beans – a small, easy-to-use rich text editor designed to make writing convenient, efficient and comfortable.
6. Editra – a multi-platform text editor with an implementation that focuses on creating an easy to use interface and features that aid in code development. Currently it supports syntax highlighting and variety of other useful features for over 60 programming languages.
7. TextWrangler – a powerful general purpose text editor, and Unix and server administrator’s tool.
8. Komodo Edit – a free and open source cross-platforms text editor.
9. Smultron – an open source text editor for Mac OS X that is designed for both beginners and advanced users.
10. Aquamacs Emacs – an Editor for Text, HTML, LaTeX, C++, Java, Python, Perl, Ruby, PHP, and more
Image Viewer/Image editor
1. GIMP
2. Inkscape – an open source vector graphics editor, with capabilities similar to Illustrator, CorelDraw, or Xara X
3. LiveQuartz – a simple and powerful free photo editor based on non destructive layers and filters.
4. Phoenix Slide – a fast full-screen slideshow program/image browser, for flipping through folders or disks full of images.
5. Image Trick – a freeware application for editing your photos and images using Mac OS X Core Image filters.
6. DrawBerry – If you don’t want applications such as illustrator or Inkscape and you want to create some simple (or less simple) illustrations, DrawBerry is for you.
7. Paintbrush – a simple paint program for Mac OS X
8. ialterImage – you can, crop, scale, size, rotate, convert and rename a single image or a folder of images by just dropping them on it’s icon.
9. Acorn – an image editor built for the Mac with simplicity in mind. Acorn provides the tools you need to alter and enhance your images, without any overhead.
Software complementing iTunes
1. iTunesShut – shut down your Mac after playing the music
2. BravoTunes – put iTunes on your menubar, with scrolling or stationary track information for both the current and upcoming songs.
3. SizzlingKeys – control iTunes without leaving the current app
4. Get Lyrical – Auto-magically add lyrics to songs in iTunes!
5. Tune.Instructor – informs you about actual track information and allows you to keep a quick access to ratings and further basic functions without having iTunes in the front
6. iTunes Menu – displays the current song artist, name, and/or album right in the menu so you can see what song is currently playing easily.
7. youcontrol: tunes – a simple app that allows you to control iTunes from Menu
8. iTunes Doodad – instantly switch playlists, skip tracks, or pause iTunes, all without using the iTunes interface, or bringing up a pokey Dashboard widget.
9. Bowtie – allows you to control iTunes with shortcuts, submits your songs to Last.fm, and change themes
10. GimmeSomeTune – an application that extends iTunes’ functionality. You can download lyrics and album covers without the user having to do anything
Productivity Tools
1. EasyFind – an alternative to or supplement of Spotlight and finds files, folders or contents in any file without the need for indexing.
2. Quicksilver – A unified, extensible interface for working with applications, contacts, music, and other data.
3. Think – enables you to get back to what you should focus, and get back to thinking.
4. Isolator – When you’re working on a document, and don’t want to be distracted, turn on Isolator. It will cover up your desktop and all the icons on it, so you can concentrate on the task in hand.
5. Spark – a powerful, and easy Shortcuts manager.
6. FlyGesture – use your mouse to control a single action, or chains of actions such as opening applications.
7. KeyRemap4MacBook – Remap your Mac shortcut key to your own preferences.
8. MagicPrefs – useful preferences for magic mouse
9. Self Control – an application which blocks access to mail servers and websites for a predetermined period of time, keep you focus on your work.
10. Caffeine – prevent your Mac from automatically going to sleep, dimming the screen or starting screen savers.
11. Spirited Away – Spirited Away checks each running application’s activity, and if an application isn’t active for a certain fixed time, Spirited Away hides the application automatically.
12. Task Till Dawn – a free task scheduler which can execute your repetitive tasks at specified times or intervals.
13. App QuitTimer – Quit any application automatically using a time delay of your choice.
14. iSofa – remote control your Mac with your iPhone/iPod Touch
15. MacTimer – a free all-purpose timer app for Mac.
Backup and Synchronization Tools
1. Carbon copy cloner – create a carbon clone of your hard drive.
2. iBackup – iBackup backs up the data, system and applications settings of a user.
3. Sync!Sync!Sync! – helps you to make copies of your data by synchronizing two folders.
4. Fruux – a lightweight and convenient system preference pane, that syncs your Address Book, Calendars, Tasks and Bookmarks between different Macs
5. Filesync – a simple utility for updating copies of your current work.
6. Backuplist+ – a powerful backup application that is simple for novice users and offers many choices for the more advanced user.
7. WinClone – Clone your XP/Vista bootcamp partition
8. SilverKeeper – automates backups to external storage devices
9. MozyHome – Backup your data to online server.
10. MaBuRe (English translation)– Backup mail.app and Thunderbird
Instant Messaging
1. Adium – the most popular IM client in Mac
2. Nimbuzz – another popular IM client. Support multi IM protocol.
3. Messenger for Mac – access native MSN in Mac
4. Canary – a Twitter client that is beautifully designed, fun to use and has everything you’ll ever need.
5. ChatX – a collection of minor modifications and additions that make using Apple’s iChat more enjoyable.
6. Yoono Desktop – an easy to use application that allows you to connect to all your social networks and instant messaging services
Archiving Tools
1. Slices – an application that allows you to split and combine files.
2. TarPit – allows you to easily create tar archives by drag and drop
3. The Unarchiver – is designed to handle many more formats than the default Archive tool in Mac, and to better fit in with the design of the Finder.
4. 7zX – a file archiver with high compression ratio
5. YemuZip – an easy-to-use application for making zip files. Just drag, drop, name your zip file and you’re done.
Screen Capture Tools
1. SimpleCap – Quick, easy and powerful Screenshot utility. SimpleCap runs on menubar.
2. Capture Me – a flexible screen capture and recording utility for Mac OS X which features a floating capture window, several saving options, and resize ability.
3. Skitch + Skitch.com – Skitch.com is a webservice that works hand in hand with Skitch to give you 1-click uploading of images for fast and fun image sharing.
4. Jing – a popular application that allows you to take screenshots, screencast, edit them and share them instantly over the Web.
5. InstantShot – offers classical screenshot functionality for capturing the whole screen, a portion of it or a window and also the option to make timed screenshots or to make delayed captures over time.
6. SnapNDrag – lets you take a screenshot by just clicking a button and dragging the resulting screenshot off.
Uninstaller Tools
1. AppCleaner – a small application which allows you to thoroughly uninstall unwanted apps.
2. AppTrap – when you move an application to the trash, you’re automatically asked if you want to move the associated preference files as well.
3. DesInstaller – a simple tool that reads the receipts generated when you install a pkg file with Apple’s Installer. Every file installed by this package is removed, even if it has been modified, and archived if you ask the DesInstaller to.
4. Permanent Eraser – provides an even stronger level of security by overwriting your data thirty-five times, scrambles the original file name, and truncates the file size to nothing before Permanent Eraser finally unlinks it from the system.
Desktop Note taking app
1. SlidePad – a convenient note-taking application that allows you to unobtrusively take notes without ever leaving your keyboard.
2. Sidenotes – appears in the form of a multi-document drawer that will hide in the corner of your screen (left or right).
3. JustNotes – a simple, beautiful and powerful notes app.
4. QuickNotes – a combined stickies and clipboard manager, useful to quickly jot down ideas and todos, store quotes, code snippets or whatever.
5. MacNote3 – a light-weight and fast notepad for Mac OS X

20 Great Google Secrets

Google is clearly the best general-purpose search engine on the Web
But most people don’t use it to its best advantage. Do you just plug in a keyword or two and hope for the best? That may be the quickest way to search, but with more than 3 billion pages in Google’s index, it’s still a struggle to pare results to a manageable number.
But Google is an remarkably powerful tool that can ease and enhance your Internet exploration. Google’s search options go beyond simple keywords, the Web, and even its own programmers. Let’s look at some of Google’s lesser-known options.
Syntax Search Tricks
Using a special syntax is a way to tell Google that you want to restrict your searches to certain elements or characteristics of Web pages. Google has a fairly complete list of its syntax elements at:
www.google.com/help/operators.html
Here are some advanced operators that can help narrow down your search results.
Intitle: at the beginning of a query word or phrase (intitle:”Three Blind Mice”) restricts your search results to just the titles of Web pages.
Intext: does the opposite of intitle:, searching only the body text, ignoring titles, links, and so forth. Intext: is perfect when what you’re searching for might commonly appear in URLs. If you’re looking for the term HTML, for example, and you don’t want to get results such as
www.mysite.com/index.html
You can also enter intext:html.
Link: lets you see which pages are linking to your Web page or to another page you’re interested in. For example, try typing in
link:http://www.hungry-hackers.com
Try using site: (which restricts results to top-level domains) with intitle: to find certain types of pages. For example, get scholarly pages about Mark Twain by searching for intitle:”Mark Twain”site:edu. Experiment with mixing various elements; you’ll develop several strategies for finding the stuff you want more effectively. The site: command is very helpful as an alternative to the mediocre search engines built into many sites.
Swiss Army Google
Google has a number of services that can help you accomplish tasks you may never have thought to use Google for. For example, the new calculator feature
(www.google.com/help/features.html#calculator)
Lets you do both math and a variety of conversions from the search box. For extra fun, try the query “Answer to life the universe and everything.”
Let Google help you figure out whether you’ve got the right spelling—and the right word—for your search. Enter a misspelled word or phrase into the query box (try “thre blund mise”) and Google may suggest a proper spelling. This doesn’t always succeed; it works best when the word you’re searching for can be found in a dictionary. Once you search for a properly spelled word, look at the results page, which repeats your query. (If you’re searching for “three blind mice,” underneath the search window will appear a statement such as Searched the web for “three blind mice.”) You’ll discover that you can click on each word in your search phrase and get a definition from a dictionary.
Suppose you want to contact someone and don’t have his phone number handy. Google can help you with that, too. Just enter a name, city, and state. (The city is optional, but you must enter a state.) If a phone number matches the listing, you’ll see it at the top of the search results along with a map link to the address. If you’d rather restrict your results, use rphonebook: for residential listings or bphonebook: for business listings. If you’d rather use a search form for business phone listings, try Yellow Search
(www.buzztoolbox.com/google/yellowsearch.shtml).
Extended Googling
Google offers several services that give you a head start in focusing your search. Google Groups
(http://groups.google.com)
indexes literally millions of messages from decades of discussion on Usenet. Google even helps you with your shopping via two tools: Froogle
CODE
(http://froogle.google.com),
which indexes products from online stores, and Google Catalogs
CODE
(http://catalogs.google.com),
which features products from more 6,000 paper catalogs in a searchable index. And this only scratches the surface. You can get a complete list of Google’s tools and services at
www.google.com/options/index.html
You’re probably used to using Google in your browser. But have you ever thought of using Google outside your browser?
Google Alert
(www.googlealert.com)
monitors your search terms and e-mails you information about new additions to Google’s Web index. (Google Alert is not affiliated with Google; it uses Google’s Web services API to perform its searches.) If you’re more interested in news stories than general Web content, check out the beta version of Google News Alerts
(www.google.com/newsalerts).
This service (which is affiliated with Google) will monitor up to 50 news queries per e-mail address and send you information about news stories that match your query. (Hint: Use the intitle: and source: syntax elements with Google News to limit the number of alerts you get.)
Google on the telephone? Yup. This service is brought to you by the folks at Google Labs
(http://labs.google.com),
a place for experimental Google ideas and features (which may come and go, so what’s there at this writing might not be there when you decide to check it out). With Google Voice Search
(http://labs1.google.com/gvs.html),
you dial the Voice Search phone number, speak your keywords, and then click on the indicated link. Every time you say a new search term, the results page will refresh with your new query (you must have JavaScript enabled for this to work). Remember, this service is still in an experimental phase, so don’t expect 100 percent success.
In 2002, Google released the Google API (application programming interface), a way for programmers to access Google’s search engine results without violating the Google Terms of Service. A lot of people have created useful (and occasionally not-so-useful but interesting) applications
not available from Google itself, such as Google Alert. For many applications, you’ll need an API key, which is available free from
CODE
www.google.com/apis
Thanks to its many different search properties, Google goes far beyond a regular search engine. Give the tricks in this article a try. You’ll be amazed at how many different ways Google can improve your Internet searching.
Online Extra: More Google Tips
Here are a few more clever ways to tweak your Google searches.
Search Within a Timeframe
Daterange: (start date–end date). You can restrict your searches to pages that were indexed within a certain time period. Daterange: searches by when Google indexed a page, not when the page itself was created. This operator can help you ensure that results will have fresh content (by using recent dates), or you can use it to avoid a topic’s current-news blizzard and concentrate only on older results. Daterange: is actually more useful if you go elsewhere to take advantage of it, because daterange: requires Julian dates, not standard Gregorian dates. You can find converters on the Web (such as
CODE
http://aa.usno.navy.mil/data/docs/JulianDate.html
excl.gif No Active Links, Read the Rules – Edit by Ninja excl.gif), but an easier way is to do a Google daterange: search by filling in a form at
www.researchbuzz.com/toolbox/goofresh.shtml or www.faganfinder.com/engines/google.shtml
If one special syntax element is good, two must be better, right? Sometimes. Though some operators can’t be mixed (you can’t use the link: operator with anything else) many can be, quickly narrowing your results to a less overwhelming number.
More Google API Applications
Staggernation.com offers three tools based on the Google API. The Google API Web Search by Host (GAWSH) lists the Web hosts of the results for a given query
(www.staggernation.com/gawsh/).
When you click on the triangle next to each host, you get a list of results for that host. The Google API Relation Browsing Outliner (GARBO) is a little more complicated: You enter a URL and choose whether you want pages that related to the URL or linked to the URL
(www.staggernation.com/garbo/).
Click on the triangle next to an URL to get a list of pages linked or related to that particular URL. CapeMail is an e-mail search application that allows you to send an e-mail to google@capeclear.com with the text of your query in the subject line and get the first ten results for that query back. Maybe it’s not something you’d do every day, but if your cell phone does e-mail and doesn’t do Web browsing, this is a very handy address to know.

Use
allinurl: +(chm|zip|rar|pdf|doc) book_name
To find ebooks on google!!!

5 Best Free Antivirus Software for Linux

Antivirus software a must have software for any operating system. Today no computer is safe with Viruses whether it is Windows, Linux or Mac PC nothing is safe. To safeguard our computer we use Antivirus software. Antivirus software search viruses on our computer and delete them to safe our computer.
Linux is becoming popular day by day because it is available for free. As Linux is becoming popular as much viruses are infecting Linux computer. To prevent you Linux based computer you can use any of these free Antivirus software for Linux.
Free Antivirus software for Linux

1. AVG Anti-Virus Free Edition: Whether it is Windows or Linux AVG is always first choice for free antivirus software. AVG is most downloaded software on CNET’s download.com. It covers almost all things as paid software.
Easy to download, install and use
Protection against viruses and spyware

http://free.avg.com/download?prd=afl

2. Avira AntiVir Personal: Avira AntiVir Personal – FREE Antivirus is a reliable free antivirus solution, that constantly and rapidly scans your computer for malicious programs such as viruses, Trojans, backdoor programs, hoaxes, worms, dialers etc. Monitors every action executed by the user or the operating system and reacts promptly when a malicious program is detected.
AntiVir protection against viruses, worms and Trojans
AntiDialer protection against expensive dialers
AntiRootkit protection against hidden rootkits
Faster Scanning up to 20% faster
New User Interface
AntiPhishing protection against phishing
http://www.free-av.com/en/download/download_servers.php
3. avast! antivirus Home Edition includes ANTI-SPYWARE protection, certified by the West Coast Labs Checkmark process, and ANTI-ROOTKIT detection based on the best-in class GMER technology. Simple to use and automated Daily automatic updates ensure continuous data protection against all types of malware and spyware.
Anti-spyware built-in
Anti-rootkit built-in
Strong self-protection
Antivirus kernel
Integrated Virus Cleaner
Virus Chest
Network Shield
Web Shield
http://www.avast.com/linux-home-edition
4. Panda Antivirus: Panda Antivirus for Linux is an antivirus for Linux servers and desktops. It is an antivirus designed to be managed from the command line or console. To do this, an executable called PAVCL will be used.
The aim of Panda Antivirus for Linux is to scan and disinfect Windows and DOS workstations connected to a Linux server, as well as the Linux server itself.
Panda Antivirus for Linux scans files using both string searches and heuristic methods. The target files of the antivirus are Word documents, Java Applets, ActiveX controls and compressed files (ZIP, RAR, etc.). At the moment, it does not scan the boot sector or the partitions table.
http://www.pandasoftware.com/download/linux/linux.asp

5. Clam AntiVirus is an open source (GPL) anti-virus toolkit for UNIX, designed especially for e-mail scanning on mail gateways. It provides a number of utilities including a flexible and scalable multi-threaded daemon, a command line scanner and advanced tool for automatic database updates. The core of the package is an anti-virus engine available in a form of shared library.
http://www.clamav.net/download/

3 Firefox Tips You May Not Know About

1. Delete visited URL’s
When you drop down the box underneath the address bar, you can see your recent browsing history. But what if you want to remove one URL from that list? Maybe you’ve been looking at a naughty site and you don’t want your girfriend to know? Or maybe you’ve been shopping for your loved one online and you want to keep it a secret?
Just drop down the URL box, highlight the URL you want to zap then press the “delete” button on your keyboard. The URL will then be removed from the list.
2. Navigate to browser tabs using the keyboard
Instead of using the mouse to click on a tab, why not use the keyboard instead? Pressing CTRL + TAB together will bounce you from tab to tab, starting from the one in the far left and working its way along. Or if you want to go to a specifc tab straight away, you can do that too. CTRL + 2 will take you directly to the second tab from the left. CTRL + 5 will take you to the fifth tab from the left.
3. Grab files off webpages, even protected webpages
Have you ever wanted a picture, file or video off a webpage but you can’t, because it’s been protected? Just right-click on the page, choose “View Page Info” then the “media” tab. Find the file you’re looking for from the list and click on “save”. (note : this doesn’t work for everything but I have still had a pretty high success rate nonetheless).

Friday, August 27, 2010

What is India?

A Nation where Pizza reaches home Faster than Ambulance & Police..
Where u get Car Loan @ 5% but Education Loan @12%..
Where Rice is Rs.40 but Sim card is free..
Where people worship Goddess Durga but want 2 kill their girl child..
Olympic shooter wins gold, govt gives 3crore.
Another shooter dies fighting with terrorist, govt. pays 1 lac.. wo bhi zyadatar nahi milta ..

Really, Incredible India.

Zara socho can be call ourselves "best".

Thursday, August 12, 2010

DO DAILY FOR BLOGGING :

1. Write daily.
2. Write on a broader niche.
3. Write on topics of your interest.
4. Write Guest Articles.
5. Avoid Grammar mistakes.
6. Write limited paid post.
7. Don’t copy the content.
8. Give back links.
9. Write for your readers.
10. Give effective title.
11. Use good looking and SEO friendly theme.
12. Use Wordpress as a blogging platform.
13. Design your blog and make it attractive.
14. Take care of SEO of your blog.
15. Test your blog in different browsers.
16. Don’t use too many widgets.
17. Don’t use too much plugins. Plugins can slow your Blog.
18. Take care of blog load time.
19. Don’t display to much ads on your blog.
20. Use images in blog post.
21. Allow guest posting.
22. Build a community out of your blog.
23. Proof-read and edit your articles.
24. Use Twitter to promote your articles.
25. Use Facebook to promote your articles.
26. Don’t spam your timeline.
27. Reply every comments.
28. Don’t waste your time on Social media sites.
29. Use Copygator tool to check who is copying your post.
30. Use your home as an office.
31. Avoid any clutter on your room.
32. Use sound proof room (or use sound proof earphones).
33. Lightening condition of your room should be good.
34. Take care of your eyes.
35. Use mind-mapping tool.
36. Consult your doctor time to time.
37. Treat your working area like an office.
38. Use white board.
39. Turn off all the distractions while writing post.
40. Use Time management application.
41. Comment on other blogs.
42. Make your blog search engine friendly.
43. Make a planning for your work.
44. Try to stick with your planning.
45. Read top blogs of your niche.
45. Read Problogger.
46. Use Google Adsense.
47. Use Buysellads.
48. Always read blogs and books.
49. Use Keywords in Title.
50. Post length should be between 250 to 600.
51. Maintain Good blog frequency.
52. Write informational post.
53. Write review post.
54. Write list post.
55. Solve problems of your readers.
56. Research carefully.
57. Write posts in series.
58. Draft your article and schedule it.
59. Ask questions at the end of article.
60. Invite comments on your blog.
61. Be controversial (small extent).
62. Request links from bloggers.
63. Run competition on your blog.
64. Use social media sites such as Digg, Stumbleupon, Twitter effectively.
65. Write valuable content.
66. Use heading tags (H1, H2 etc.).
67. Use related post plugin.
68. Interlink your post.
69. Use post excerpts.
70. Use categories and tags effectively.
71. Subscribe good blogs and read them in feed reader.
72. Use forums.
73. Add Breadcrums to your Wordpress blog.
74. Watch Wordpress.tv.
75. Install Wordpress locally.
76. Use Windows Livewriter.
77. Use Snagit or Screenpresso to take a screenshot.
78. Use Google Webmaster tool.
79. Use Flickr as image storage and image search for blog.
80. Use Stock.xchng to find image for your blog.
81. Use Pingomatic to ping your blog.
82. Use Favicon maker to generate favicon for your blog.
83. Use best Wordpress plugins.
84. Generate sitemap for your blog.
85. Use robots.txt to protect your blog from duplicate content issue



These are some basic tips for bloggers. Do you have some more tips? Mention your tips in comment section.

BLOGGING IS A CULTURE RATHER THAN A HABIT :

Blogging is a culture in most developed countries like USA and UK. But in developing countries like India, very few people know about blogging and Wordpress. It is getting more famous among students.
Here are few tips for them to maintain a balance between College and blogging:
1. Attend Your Classes
2. Make A Proper Schedule
Make a time table and decide the time which suits you for blogging.
3. How much time you should devote
Try to create a balance between these two work. Both work are necessary. Stick with your schedule. Make a schedule for blogging. How many articles you will write in a day or a week and how much time you will spend in marketing your blog.
4. Tell everyone about your blog
Try to tell everyone about your work. Don’t become a suspicious guy among your friends. Give your blog address to your friends and ask them to read your blog and leave comments.
5. Part time job
In college many students join call centers and various part time job. But blogging is a favorite part time work and it pays more than any other part time job. Try to catch some web publisher and show your writing skills to them.
6. Attend Meetings in Your City
Try to catch some famous people of your field. Attend blog camps, blogger’s meet and Tweetup
7. Organize Blog classes in your college
If you are an established blogger then you can organize blog camps for other students of your college.
8. Impress your friends
Blogging is an immediate source of fame for any student. You can become famous among your friends by showing your blogging skill. Try to solve various technical problems of your friends through your blog.
9. Read blogs related to your branch

Professional layout
Firstly you want a nice and organized layout that is navigation friendly. Refrain from using a lot of flashy graphics. These will only distract your readers. People visit blogs to read them and find out what they have to offer. A straight forward professional layout with easy navigation is key for a successful blog.
Consistent Updating
Keeping your blog updated with new entries is crucial to your blogging success.
Monetize your Blog
There are a number of ways in which you can make money with your blog. The most widely used are with Google AdSense, FeedBurner, and affiliate programs. The best known affiliate programs are Amazon, ClickBank, and Commission Junction.
Social Marketing
Social marketing is all over the place. You can socialize on forum boards, Twitter, FaceBook, and other social network sites. Interact with other blogger in your niche by commenting on their blogs and through social media. It will help you a lot because you can learn many things from them.
Do Blogging with Passion and Patience
Passion and Patience are like blogging buzz words. Always choose a niche for blogging about which you know and passionate to write.
Make Your Blog a Community
The environment of your blog should be such that when new visitor comes to your blog he should feel it as a community and become the part of it. It will definitely increase your blog authority and your blog will rank well in search engines.
Write Unique Content
It is well known in Blogging that “Content is King” and it surely is a king. Don’t try to copy content because ultimately you will be banned from search engines and no one likes to read copied content.
Always Reply to Comments
Interact with your readers by replying to their comments. Readers usually love it when their comment is replied and they will come back and comment again.
Use Guest Posting
Try to write at least one article in a week to other blogs in your niche who offer you to write for their blogs.
Ask Readers for their Opinions
Ask readers for their opinions in your articles. It will increase comments on your blog and your readers will not feel that they are reading an article written by robot.
Make Your Blog Design Reader Friendly
Your Blog Design should have a clean design with proper navigation. It should be such that readers can easily find the content of their choice.
Use Effective Title
Title of the article should be both reader and SEO friendly. Title should be appealing to the readers and important keywords should also be used in the title.
I hope these tips will be useful for you. Do tell me what you do for making your blog a perfect brand and also feel free to add any other tip to the above list.

Sunday, June 20, 2010

What is a DDoS attack?

Trojans are often used to launch Distributed Denial of Service (DDoS) attacks against targeted systems, but just what is a DDoS attack and how are they performed?
At its most basic level, a Distributed Denial of Service (DDoS) attack overwhelms the target system with data, such that the response from the target system is either slowed or stopped altogether. In order to create the necessary amount of traffic, a network of zombie or bot computers is most often used.
Zombies or botnets are computers that have been compromised by attackers, generally through the use of Trojans, allowing these compromised systems to be remotely controlled. Collectively, these systems are manipulated to create the high traffic flow necessary to create a DDoS attack.
Use of these botnets are often auctioned and traded among attackers, thus a compromised system may be under the control of multiple criminals – each with a different purpose in mind. Some attackers may use the botnet as a spam-relay, others to act as a download site for malicious code, some to host phishing scams, and others for the aforementioned DDoS attacks.
Several techniques can be used to facilitate a Distributed Denial of Service attack. Two of the more common are HTTP GET requests and SYN Floods. One of the most notorious examples of an HTTP GET attack was from the MyDoom worm, which targeted the SCO.com website. The GET attack works as its name suggests – it sends a request for a specific page (generally the homepage) to the target server. In the case of the MyDoom worm, 64 requests were sent every second from every infected system. With tens of thousands of computers estimated to be infected by MyDoom, the attack quickly proved overwhelming to SCO.com, knocking it offline for several days.
A SYN Flood is basically an aborted handshake. Internet communications use a three-way handshake. The initiating client initiates with a SYN, the server responds with a SYN-ACK, and the client is then supposed to respond with an ACK. Using spoofed IP addresses, an attacker sends the SYN which results in the SYN-ACK being sent to a non-requesting (and often non-existing) address. The server then waits for the ACK response to no avail. When large numbers of these aborted SYN packets are sent to a target, the server resources are exhausted and the server succumbs to the SYN Flood DDoS.
Several other types of DDoS attacks can be launched, including UDP Fragment Attacks, ICMP Floods, and the Ping of Death. For further details on the types of DDoS attacks, visit the The Advanced Networking Management Lab (ANML) and review their Distributed Denial of Service Attacks (DDoS) Resources.

Common Botnets

A botnet is a collection of compromised (infected) computers under the collective control of remote attackers. The malware on the infected computer is known as a bot, a type of backdoor or remote access trojan (RAT). Bots communicate with botnet command and control (c&c) servers, enabling the remote attacker to update existing infections, push new malware, or instruct the infected computer to carry out specific tasks. In general, the presence of the bot gives the remote attacker the same abilities as the legitimate logged in user.
Botnets are used for everything from delivering spam, phishing attacks, data theft, to distributed denial of service attacks. Most botnets sell 'space' or 'services' on the botnet to bidders who may then deliver additional malware or use it for additional malicious purposes. These botnets-for-hire make it difficult to define what any specific botnet is intended to do, as that intent may change depending on the bidder.
Common botnets include the following:
• Asprox Botnet
• Gumblar Botnet
• Koobface Botnet
• Mariposa Botnet
• Storm Botnet
• Waledec Botnet
• Zeus Botnet

Are You in a Botnet?

A botnet is a collection of infected computers under the control of one or more attackers. These botnets are used for a variety of criminal purposes – all of which pose serious risk to the infected user as well as to the entire Internet community.
Once your computer is under the control of a botnet, it may be used to spam others, host phishing sites and other illicit files, infect or attack others, or have adware and spyware foisted on it so the attackers can collect from various affiliate advertising programs.
Even worse, many of today’s threats include keylogging capabilities. Of special interest to the attackers are your personal financial details – once stolen they are used for everything from credit card fraud to outright identity theft. In short, it’s not just your computer at risk – it’s your wallet.
The Botnet Population is Huge
According to a study by McAfee, "at least 12 million computers around the world (are) compromised by botnets." That means the botnet operators are controlling a population rougly the size of Guatemala. In fact, the number of infected systems would place it at about 70 out of 230 sovereign states and territories. More than Greece, bigger than Hungary, Belgium, Portugal or Cuba, and just a million behind Zimbabwe and Ecuador. The Czech Republic, Bolivia, Sweden, and the Dominican Republic would all be smaller.
While broadband users are favorite targets, dial-up users are equally vulnerable. Various studies have demonstrated that an unpatched, unprotected system can be compromised in as little as 5 minutes online. And if you're thinking it can't happen to you, think again.
It's All About the Money
Viruses, worms, and Trojans have evolved far beyond the childish pranks of yesteryear. Today's attackers are serious criminals - in it for the money - and your system spells international currency. Botnet operators get somewhere between 15 to 40 cents per infected computer, which means they need thousands of infected computers to make serious cash. And with all the focus on money, and not on notoriety, you can bet they'll make every effort to stay under your radar and get onto your system.
To ensure the greatest chance of survival, malware authors routinely submit their creations to online scanners. They repeat this process over and over again, until they've successfully created a virus, worm, or Trojan that the scanner won't detect. And that's the one they'll use to attack your system.
This means the vast majority of new viruses, worms, Trojans and other malicious software may not be detected by most antivirus or antispyware scanners until after (a) it's been discovered and (b) you've applied the necessary updates. But the malware authors have a trick for this, too. They also craft their malicious code to cripple the scanners such that the necessary updates may never take place.
Become Actively Engaged in Your Own Security
This isn't to say that antivirus isn't needed. Antivirus software is a must - and on a properly managed system, it's invaluable. But it's not a panacea and if it's your only line of defense, chances are it will be breached. Security isn't a passive endeavor and to stay secure you must become actively engaged in your own protection.

Achieving good computer security can seem like a daunting task. Fortunately, following the few simple steps outlined below can provide a good measure of security in very little time.
Use antivirus software and keep it updated. You should check for new definition updates daily. Most antivirus software can be configured to do this automatically.
Install security patches. Vulnerabilities in software are constantly being discovered and they don't discriminate by vendor or platform. It's not simply a matter of updating Windows; at least monthly, check for and apply updates for all software you use.
Use a firewall. No Internet connection is safe without one. Firewalls are necessary even if you have a dial-up Internet connection - it takes only minutes for a a non-firewalled computer to be infected.
• Free ZoneAlarm Firewall
• Using the Windows Firewall
Secure your browser. Many labor under the dangerous misconception that only Internet Explorer is a problem. It's not the browser you need to be concerned about. Nor is it a matter of simply avoiding certain 'types' of sites. Known, legitimate websites are frequently being compromised and implanted with malicious javascript that foists malware onto visitors' computers. To ensure optimum browsing safety, the best tip is to disable javascript for all but the most essential of sites - such as your banking or regular ecommerce sites. Not only will you enjoy safer browsing, you'll be able to eliminate unwanted pop-ups as well.
Take control of your email. Avoid opening email attachments received unexpectedly - no matter who appears to have sent it. Remember that most worms and trojan-laden spam try to spoof the sender's name. And make sure your email client isn't leaving you open to infection. Reading email in plain text offers important security benefits that more than offset the loss of pretty colored fonts.
Treat IM suspiciously. Instant Messaging is a frequent target of worms and trojans. Treat it just as you would email.
Avoid P2P and distributed filesharing. Torrent, Kazaa, Gnutella, Morpheus and at least a dozen other filesharing networks exist. Most are free. And all are rife with trojans, viruses, worms, adware, spyware, and every other form of malicious code imaginable. There's no such thing as safe anonymous filesharing. Avoid it like the plague.
Keep abreast of Internet scams. Criminals think of clever ways to separate you from your hard earned cash. Don't get fooled by emails telling sad stories, or making unsolicited job offers, or promising lotto winnings. Likewise, beware of email masquerading as a security concern from your bank or other eCommerce site.
Don't fall victim to virus hoaxes. Dire sounding email spreading FUD about non-existent threats serve only to spread needless alarm and may even cause you to delete perfectly legitimate files in response.
Remember, there's far more good than bad on the Internet. The goal isn't to be paranoid. The goal is to be cautious, aware, and even suspicious. By following the tips above and becoming actively engaged in your own security, you'll not only be protecting yourself, you'll be contributing to the protection and betterment of the Internet as a whole.

Malware and Vulnerabilities

Common Botnets
A botnet is a collection of compromised (infected) computers under the collective control of remote attackers. The malware on the infected computer is known as a bot, a type of backdoor or remote access trojan (RAT). Here is a collection of the most common botnets.
Asprox Botnet
The Asprox botnet was originally a botnet used primarily to deliver phishing scams. In 2008, the Asprox botnet began employing the bots to discover and use SQL injection on vulnerable Active Server pages on weakly configured websites.

Gumblar Botnet
Gumblar, known in Japan as Geno, is a unique botnet - it not only creates a botnet of compromised PCs, it also backdoors compromised websites enabling continued remote access and manipulation.
Koobface Botnet
Koobface spreads through social networking sites, most prevalently through Facebook. Generally, Koobface relies on social engineering in order to spread. The Koobface message is designed to trick recipients into clicking through to a fraudulent website and either (a) enter their Facebook (or other social networking) credentials or to accept the installation of malware disguised as a video codec o…
Zeus Botnet
Zeus, often spelled ZeuS, is a crimeware botnet typically engaged in data theft. Zeus is also often referred to as Zbot. Zeus is not a single botnet nor a single trojan, but rather refers to an entire family of trojans and their respective botnets.
Storm Botnet
The Storm bot is a backdoor component that allows remote surreptitious access to infected systems. The Storm-infected computers (collectively, the Storm botnet) are outfitted with a spam relay component (to send spam through infected computers) and a peer networking component (to enable the remote attackers to communicate with the bot infected computers).
Mariposa Botnet
Mariposa is Spanish for butterly. In computer lingo, Mariposa is a botnet created by the Butterfly bot kit. Mariposa is typically spread via instant messaging, peer-to-peer file sharing networks and as an autorun worm.
Waledec
Waledec, also spelled Waledac, is the name of a botnet used to relay malicious spam. The Waledec distributed spam often consists of fraudulent greeting cards and breaking news events.
CDC / H1N1 Vaccination Scam Infects Victims
Attackers are sending email disguised as correspondence from the Centers for Disease Control (CDC). The email claims an H1N1 vaccination registration is required. Those who comply with the request won't be registering with the CDC - instead they will be infecting their computer with a version of the Banker trojan
Remove SecurityTool Scareware
securitytool scareware rogue scanner process explorer safe mode registry editor securitytool rogue scareware regedit blocked task manager security tool
Fear-Based Reporting: Have You Been a Victim?
Fear sells. Whether intentional or otherwise, this can sometimes work to the advantage of the media and the disadvantage of consumers. Have you ever been influenced by fear-based reporting, only to find out later that the reports were wrong?
Conficker: More Conflict than Worm
Barely a week after the 60 Minutes April Fools' Conficker doomsday update failed to materialize, the closely watched Conflicker.C did finally manage an update. And in an ironic twist, the worm itself debunks much of the hype surrounding it.
PowerPoint Zero Day Vulnerability In-the-Wild
Microsoft has released Security Advisory 969136 warning of a newly discovered zero day PowerPoint vulnerability. The flaw impacts PowerPoint versions found in Windows versions of Office 2000, 2002, 2003, and Office 2004 for Mac.
60 Minutes, Conficker, and April's Fool
Is the Conficker worm set to detonate some evil payload on April 1st? According to 60 Minutes, it seems so. Here's the non-FUD behind the Conficker worm.
Downadup.AL aka Conficker.B Worm
Downadup.AL aka Conficker.B is a network worm that spreads via autorun, dictionary attacks on weakly protected network shares, and by exploiting the vulnerabilities described in MS08-067. The worm disables services related to automatic updates, error reporting, the Windows Security Center service, and the Windows Defender service. To prevent access to protection and removal tools, the worm also b…
Autorun Worms: How to Remove Autorun Malware
Autorun worms spread from USB/thumb drives as well as fixed and mapped drives. Autorun worms typically drop or download additional malware, usually backdoors and password stealers. Here's how to remove an autorun worm.
Sality Virus
Sality is a family of file infecting viruses that spread by infecting exe and scr files. The virus also includes an autorun worm component that allows it to spread to any removable or discoverable drive. In addition, Sality includes a downloader trojan component that installs additional malware via the Web.
Winthb 'Virus' Tied to Backdoor Trojans
A family of backdoor and autorun trojans are working together to plague users. One symptom that may appear - the drive volume name and icon may be changed. The more insiduous aspects of the infection are far more silent and may be overlooked when users attempt manual removal.
A Storm of Scary Email
In recent weeks, a rash of spam has been sent that bear much resemblance to the all-too-familiar tactics of the Storm botnet.
Most Damaging Malware
All malware is bad, but some types of malware do more damage than others. That damage can range from loss of files or total loss of security. This list (in no particular order) provides an overview of the most damaging types of malware.
Easily Remove the MonaRonaDona 'Virus'
The MonaRonaDona 'virus' is a self-advertised 'virus' that isn't even a virus at all. It's a non-replicating program (i.e., a Trojan) that loads when Windows is started, changing the Internet Explorer title bar to read MonaRonaDona and displaying a message which blocks access to your legitimate running programs.
What is JS/Psyme (and How to Get Rid of It)
Many users have experienced repeated warnings of infection by Psyme each time they open their browser. Depending on the antivirus in use, the name given in the warning may be any of the following: Downloader.Psyme (Symantec), Troj/Psyme (Sophos), Trojan.VBS.KillAV (Kaspersky), TrojanDownloader.VBS.Psyme (CA),Trojan.Downloader.JS.Psyme (Kaspersky), VBS/Petch.A (F-Prot), VBS/Psyme (McAfee)
What is the Storm Worm?
The so-called Storm worm is actually not a worm, but rather a family of Trojans that typically include a backdoor, SMTP relay, P2P communications, email harvester, downloader, and often a rootkit.
U.Z.A. O/S Eliminator Worm
The so-called "U.Z.A. O/S Eliminator" worm appears to have originated in Maldives sometime in late July or early August 2007. The worm exploits the autorun feature, enabling it to spread from removable USB/thumb drives to other computers.
Freedom / Outlaw Worm
The Freedom 'virus' is a worm that infects local and USB drives, disables access to Task Manager, Registry Editor and other system utilities, and may try to delete MP3 files found on infected systems. Here's how to clean it.
Trojan.MeSpam Makes You the Spammer
Instead of relying on bots to do the dirty work, Trojan.MeSpam makes you the culprit. Once infected, every forum post you make, every webmail you send, and every blog comment you leave will also deposit a link pointing to a nefarious website.
Rinbot Worm Prompts Repeated Denials
Is Rinbot the little worm that isn't? Or is it simply the worm that no one wants to acknowledge exists? Here's a timeline of this "non-threat".
Storm Worm
The Storm worm spreads via email, using a variety of subject lines and message text that may masquerade as news articles or other current events.
Skype Chatosky Worm: Friend or Foe?
Thanks to the Chatosky worm, I uncovered some things about the Skype service that I might not otherwise have known.
Qspace Javascript Worm Targets MySpace Users
MySpace users are yet again a victim of another targeted attack. Dubbed JS_QSPACE.A by antivirus vendor Trend Micro and JS.Qspace by Symantec, the Javascript worm exploits a cross-site scripting (XSS) vulnerability embedded in a malicious Quicktime .MOV file.
Rontokbro aka Brontok Worm
A mass-mailing email worm that also spreads via USB and thumb drives, the Rontokbro worm - also know as Brontok - takes a multifacted approach to defy detection and removal.
Stration Email Worm
Stration is a mass-mailing email worm that attempts to download a file from a remote server. The worm may inject itself into certain running processes, potentially causing it to bypass firewalls or other security software.
Stration Worm
Stration is a mass-mailing email worm that may attempt to download files from a remote server.
VML FUD FAQ
There's a lot of misinformation being disseminated around the recently discovered VML vulnerability. Here's an attempt to address those misconceptions and alleviate some of the fears.
Zero-Day VML Vulnerability Impacts IE, Windows
A zero-day vulnerability in the Windows implementation of Vector Markup Language (VML) impacts all supported versions of Internet Explorer, all supported versions of Microsoft Windows 2003, Windows XP, and Windows 2000, and recent versions of Outlook and Outlook Express.
Are You in a Botnet?
With 12 million infected systems under their control, botnet operators are controlling a population rougly the size of Guatemala. In fact, the number of infected systems would place it at about 70 out of 230 sovereign states and territories worldwide.
Popular Antivirus Apps *Do* Work
The more a story gets told, the more the original story gets changed by each new storyteller. Sometimes, the story gets so far removed from the original, that the entire intent of the story is lost and new intent construed. Such is the case with the story of antivirus effectiveness, which was recently put through the spin cycle, wrung out, and reformed by Charlie White, editor of the Gizmodo gadget blog.
McAfee Downplays Security Flaws
Vulnerability researchers at eEye Digital uncovered serious flaws in McAfee security products that could allow attackers to gain remote control of affected systems.
Yahoo worm: JS/Yamanner
An early-morning report on a security mailing list led to the discovery of Yamanner, a mass-mailing email worm that impacted Yahoo webmail users.
Gamblers Lose Big with Free Tool
Every successful gambler knows how to handle a certain amount of risk, and how to minimize their losses. But a free tool that promised to help gamblers get the most out of the game turned out to be a Trojan that scammed them out of their winnings.
Hoot Worm Preys on Company
It seems a disgruntled employee targeted their enterprise with a worm that causes pictures of a rather odd looking owl to print on nearly 40 printers specific to the targeted firm.
Nugache Worm
Nugache is a worm that may spread via email, IM, or P2P networks.
Ransomware: Trojans demand money from victims
Having your computer infected with a virus or other malicious software is upsetting enough. But over the past year, a new type of attack promises to be even more disconcerting. Dubbed ransomware, this new attack infects the system, encrypts the files, and then demands payment from its victims.
QuickBatch Trojan Targets the Blind
There is no such thing as a good virus, but some viruses are more despicable than others. Case in point, the newly discovered W32/QuickBatch.G!tr Trojan that specifically targets members of the blind community.
Bagle worm variant warns: 'Lawsuit Against You'
Bagle worm variant that spreads via email and fileshares/P2P networks warns of 'Lawsuit Against You'
Nyxem aka Blackmal worm
Discovered on January 17, 2006, the Nyxem worm has a dangerous payload that executes on the 3rd of each month, overwriting files with specific extensions.
2005: Top Ten Malware Events
Here's the best and worst of 2005 from a malware perspective.
2003: Year of the Black Sheep
It seems appropriate that the Chinese dubbed 2003 as the Year of the Black Sheep. Among other things, the sheep is a symbol of untidiness - and from a virus standpoint, the year was indeed a mess.
2002: Virus Writers Contribute to SPAM
The year 2002 ushered in a new era of malicious marketing code
2001: Year of the Virus
Detecting email-borne viruses every 18 seconds, MessageLabs calls 2001 The Year of the Virus
WMF Image Handling Exploit
A serious vulnerability in Windows Fax and Picture Viewer can allow remote attackers to use .WMF image files to gain control of your system.
Sober.X Worm Description
Sober.X is a mass-mailing email worm that sends itself in either English or German depending on the recipient's domain. In addition to mass-mailing, Sober.X terminates processes related to various antivirus and security programs.
Sober.U Worm
Sober.U arrives in an email message that may be in either German or English language, depending on the recipient's domain.
Sober.T Worm
Sober.T arrives in an email message that may be in either German or English language, depending on the recipient's domain.
sober.s Worm
sober.s arrives in an email message that may be in either German or English language, depending on the recipient's domain.
Sober.R Worm
Sober.R arrives in an email message that may be in either German or English language, depending on the recipient's domain.
Sony Stinx Trojan
The Sony Stinx Trojan exploits the Sony DRM cloaking technology (aka rootkit) installed by music CDs published by Sony after March 2005. This allows the malware to be hidden from view - effectively masking its presence even from most antivirus scanners. The Sony Stinx Trojan installs an IRC Backdoor Trojan that allows remote access to compromised PCs, downloads other malware, and disables the Windows XP firewall.
Slapper worm gets facelift: Linux Lupper worm, aka Plupi and Lupii
The Linux Slapper worm has been given a facelift and this time BBS admins and web bloggers are the target. The new worm has been given a half dozen new names, including Linux/Lupper worm Linux.Plupi, Backdoor.Linux.Smal, ELF_LUPPER.A and Exploit.Linux.Lupii.
Sony President Defends Rootkit
the President of Sony BMG's Global Digital Business, Thomas Hesse, defends Sony's installation of a rootkit by declaring, "Most people, I think, don't even know what a Rootkit is, so why should they care about it?"
Sony Rootkit Strikes Sour Note
If you've purchased a Sony-labeled music CD since March 2005 and used it on your PC, chances are it installed a rootkit that can be easily exploited by virus writers.
Alleged Botnet Creators Arrested
Dutch police have announced the arrests of the alleged author of W32.Toxbot and two alleged accomplices.
First Sony PSP Trojan
PSP.Brick impacts the Sony PSP game console, flashing critical system files and rendering the console unbootable. The newly discovered PSP.Brick isn't technically a virus - it's a Trojan. But the news surrounding PSP.Brick could be described as a polymorphic virus - it spreads fast and the story changes with each reporter it infects.
IM Worms Pose Signficant Threat
Since January 1, 2005, at least 358 descriptions have been published for specific IM threats.
Kelvir Instant Messenger (IM) worm
The most prevalent IM worm is Kelvir family of worms that target MSN Messenger users.
Agent.AD Trojan nabs headlines from London attacks
Just hours after BBC published a news report titled "London attackers 'meant to kill'", the Agent.AD Trojan email stole the headline and part of the copy, using it as a ruse to entice victims into opening its infected attachment.
AIM worm impersonates iTunes app
IM worms continue to expand their repertoire of social engineering tricks. W32/Olameg-net, a.k.a. Opanki.Y and AIM/Megalo, installs itself to the Windows System directory as itunes.exe, presumably trying to disguise itself as the popular Apple iTunes application.
Michael Jackson suicide spam a Trojan
Malware authors eager to capitalize on the Michael Jackson trial have been sending booby-trapped spam messages claiming the pop-singer has attempted suicide.
Mytob.BI worm
Discovered May 31, 2005, Mytob.BI is a mass-mailing email worm that compromises system security by terminating processes related to various antivirus software, disabling the XP SP2 firewall, and modifying the HOSTS file to prevent access to antivirus updates and certain other websites.
Mytob.AR
Discovered May 30, 2005, Mytob.AR is a mass-mailing email worm that compromises system security by terminating processes related to various antivirus software, disabling the XP SP2 firewall, and modifying the HOSTS file to prevent access to antivirus updates and certain other websites.
Prevent the Mytob worm
The Mytob variants are mass-mailing email worms that compromise system security by terminating processes related to various antivirus software and modifiying the Registry to disable the XP SP2 firewall.
Sober.P turns to spam
The Sober.P worm has morphed into a spam Trojan, sending politically-charged messages from infected systems.
Sober hangover begins
The Sober.P worm abruptly stopped its mass-mailing at midnight GMT on May 9th, presumably entering its second stage of infection.
Firefox flaws rated extremely critical
Firefox flaws rated extremely critical
Sober.P worm threatens
Discovered May 2, 2005, Sober.P (also known as Sober.O) is a mass-mailing email that sends itself in either German or English language, depending on the intended recipient's domain.
Crog IM worm
The Crog worm edits the system registry to lower security settings, modifies the HOSTS file to redirect access to various security sites and shuts down processes associated with various security software.
Kelvir IM worms
Three new IM worms, Kelvir.A, Kelvir.B, and Kelvir.C were discovered by antivirus vendors on March 6th and 7th, 2005.
Bagle.BE worm
Discovered on March 1, 2005 in conjunction with several mass-spammed Bagle-like Trojans, Bagle.BE arrives in an email with a blank subject line
Troj/BagleDl-L
Troj/BagleDl-L is a Trojan, not a worm, and does not contain mass-mailing capabilities. However, Troj/BagleDl-L was mass-spammed via email during the morning of March 1st, 2005.
Bagle.AZ worm
Like Bagle.AY, Bagle.AZ is a mass mailing email and P2P filesharing worm with downloader capabilites.
Bagle.AY worm
Bagle.AY is a mass mailing email and P2P filesharing worm with backdoor and downloader capabilites. As with previous variants and most modern email worms, the worm uses its own SMTP engine to spread via email and the From address is spoofed.
MyDoom.AM hijacks HOSTS
MyDoom.AM is a mass-mailing email and P2P filesharing worm that modifies the HOSTS file to prevent infected users from accessing certain antivirus vendor sites.
Lovgate.W worm
A mass-mailing email and filesharing worm, Lovgate.W also contains backdoor capabilities
A stocking full of coal: Multiple flaws in Windows could lead to compromise
Ever wonder what Bill Gates gets for Christmas? This year, the Chinese security firm VenusTech delivered three new Windows exploits just in time for the holidays.
Zafi.D worm spreads Christmas fear
A new variant of the Zafi worm, dubbed Zafi.D, sends itself as a Christmas greeting - in a variety of languages depending on the recipient's domain.
MakeLOVEnotSPAM mask worn byTrojan
Dubbed TrojanDropper.FakeSpamFighter and Troj/Mdrop-IT, the Trojan masquerades as the Lycos infamous MakeLOVEnotSPAM screensaver
Sober.I worm
Sober.I is a mass-mailing email worm that sends itself in both German and English, depending on the infected users' operating system language. Sober.I uses is own SMTP engine to send itself to email address found on infected systems, spoofing the From address.
Bofra.A worm exploits SHDOCVW.DLL flaw
Bofra.A worm exploits SHDOCVW.DLL flaw
Klez Help Center
The Klez virus uses a variety of techniques to fool and aggravate users
Homepage Virus
Also known as Homepage, this e-mail worm was discovered in the wild on May 8th, 2001
IRCsome McVeigh Video a RAT
Alleged movie of Timothy McVeigh execution really the Subseven remote access Trojan.
Sobig.E worm
The Sobig.E worm spreads via email. The Sobig.E worm attachment is a ZIP file.
Virus Encyclopedia
From your Antivirus.About.com guide, an encyclopedia of virus and hoax descriptions. Includes PC, Macintosh, Unix, Active Content, and Wireless infectors.
AntiVirus Research Center
Timely and searchable information concerning viruses currently in-the-wild and even those that are not.
AVP's VirusList
So comprehensive, it might be somewhat difficult to navigate. Well worth the effort, AVP delivers the definitive virus encyclopedia.
Hoaxes and Myths
Though not a virus, hoaxes and myths can still cause downtime and loss of productivity due to unwarranted panic. Rob Rosenberger maintains a plethora of information concerning these non-threatening threats.
Computer Virus Info
From F-Secure, an alphabetized database of virus descriptions. Search by exact name or keyword.
Panda Virus Descriptions
From the makers of Panda Antivirus, an encyclopedia searchable by name, category or family. The database is prefaced by an introduction to computer viruses and a handy glossary of terms.
The WildList
Compiled from various reporting agencies and individuals. Listing all viruses actually causing active infections worldwide, the wildlist is updated monthly.
Virus Analyses
One very long list of just some of the viruses detected by Sophos.
Virus Information Library
The McAfee AVERT Virus Information Library includes detailed information on viruses as well as popular hoaxes and myths.
WildList Virus Descriptions
F-Secure simplifies the WildList by linking descriptions to the names of the viruses reported to be in the wild. Updated monthly.

http://antivirus.about.com/od/virusdescriptions/Latest_Malware_and_Vulnerabilities.htm

Mailinator - - A Very Disposable Email Account

Mailinator - - A Very Disposable Email Account
Free Service Description:

Mailinator offers you any email address you want -- for a few hours. This may make Mailinator the ultimate disposable email account. You can make-up an email address using the mailinator domain and use it as a temporary junk email account.
How do I use this free service?:

After you have given out your made-up email address you then go to Mailinator.com and check that account for any email received. The email is kept for a couple hours and then deleted. You don't need to register with Mailinator at all. Mailinator just collects all email to any address using the mailinator.com domain. You just type in the address you just gave out and any email to that address is displayed.
That sounds cool but what good is it?:

Mailinator has basically just one purpose. It allows you to receive email for a short period of time without giving out your own email address. If you need an email address to register on a site that you are not sure you trust, use a Mailinator address. You can get your confirmation email to validate your registration. There is no worry about getting spam because you never need to check that account again.
What are the drawbacks of the free Mailinator address?:

Since email is deleted after a couple hours you cannot use a Mailinator account as a permanent email address. There is no security on a Mailinator account. Anyone can check any account as long as they know what it is. It's best not choose a common address like a first name or a common word. You also cannot send email from a Mailinator account.
What are the risks in in using the Mailinator site?:

There are none as long as you understand that mail is deleted after a couple hours and that anyone can check it if they know the address you used. Since Mailinator does not require a registration you are not giving them any personal information.

Police your Password Recovery Options

Police your Password Recovery Options
Cybercriminals can hijack your online accounts to order items at your expense, gain access to your email, or use your good name to send spam, malware and scams to people you know. One way attackers can gain access is by taking advantage of lax security in your password reset and recovery options for the account.
Most online services offer some means of recovering forgotten passwords. This typically consists of answering a few questions, after which a new password is emailed to the account on record. While this method is convenient, it can leave you at greater risk unless you follow a few simple security precautions.
1. Make sure the email address specified for the account is a valid, monitored email address.
2. Make sure the answers to the password recovery / reset option are not easily guessable.
Skipping either of these steps makes it far easier for attackers to gain control of your account. For example, a "throwaway" email address could easily wind up registered to another user. This means that any attempts to recover or reset your password, will result in that password being sent to the wrong person. Make sure the email address you have specified for the account is active, in your name, and monitored regularly.
Most security related questions can be either easily guessed or discovered through a quick online search. For example, things like the name of the school you attended or the town you were born in may be part of your public social networking profile.
Your best bet is to pick a nonsensical answer to the question. Instead of entering your favorite pet's name, input a completely bogus response that only you will know. Avoid easily guessed single word responses like 123456, password, or other dictionary words or sequential number responses. Attackers can simply enter lists of commonly used words/number sequences until one gets accepted. Use a passphrase instead - a favorite quote or short phrase with all spaces removed.
Some online accounts will allow you to enter a mobile phone number. If a password reset or recovery is requested, you'll receive a text message alerting you. If available, this is one of the most secure methods you can use. However, phones can be lost or stolen, so remember to still have a valid email on file with the service and use hard-to-guess passphrases for the security questions.

Online Security Tips Defending Yourself Against 3 Common Online Attacks

The Internet has become a dangerous place in which to do business. To remain secure online, you need to maintain a strong defense on several fronts. Here are tips for defending your email, social networking sites and online bank accounts and from hackers.
Email Security
Spear Phishing attacks that target victims by name have become a serious and sophisticated threat. The emails fabricated by spear phishers may be addressed to a C-level employee or appear to come from a trusted individual within an organization.
The spear phisher's modus operandi involves tricking the victim into clicking on a link leading to a bogus web site. This infected site will secretly install data logging software designed to record the victim's key strokes. Once they have pirated information such as user names and passwords, spear phishers have been known to suck company bank accounts dry.
As one example, spear phishers identified key employees at companies such as Google and Adobe and then back-tracked to find out the names of their friends. The hackers then compromised the friends' social network accounts and used them trick the targets into clicking on infected links.
Said Sam Curry, Vice President of RSA:
This is a loud message for the commercial world, which is: wake up, this isn't all happiness and goodness and new business. Doing business on the internet is as risky as sending ships through the Panama Canal.
Here are just a few steps that you can take to protect yourself and your company from spear phishing;
• Be suspicious of any emails requesting confidential information, and verify the request with the company or individual named in the email. Just clicking on a malicious web link can infect your computer,
• Limit the amount of personal information you provide on social networking sites,
• Use strong passwords.

Social Networking Attacks
ID Theft expert, Robert Siciliano related how a white hat hacker used Facebook to breach a company's physical security and infiltrate their network. It is a perfect illustration of how employees can compromise themselves and their companies through a careless use of social networking.
In the article, the hacker describes stealing the identity of a company employee found on Facebook:
On the day we intended to breach the facility, our guy was dressed with a shirt embroidered with our client's logo, and armed him with business cards, a fake company badge, and his laptop. Upon entering the building, he was immediately greeted by reception. Our man quickly displayed his fake credentials and immediately began ranting about the perils of his journey and how important it was for him to get a place to check his email and use a restroom. Within in seconds, he was provided a place to sit, connection to the Internet, and a 24×7 card access key to the building. Later that evening, he returned to the empty office building to conduct a late-night hacking session. Within a short period of time, he had accessed the company's sensitive secrets.
Most people drop their guard on Facebook. And why not? After all, on Facebook, you're surrounded by people you "know like and trust." How could you possibly be in danger with 6 bazillion "friends" to look out for you?


Online Banking Protection
If your company does high value online banking transactions, limit those activities to a secured, stand alone computer that has no access to email or web browsing, The American Bankers Association now recommends that businesses use a dedicated PC for online transactions.
Cybercriminals are writing malware to create fraudulent Automatic Clearing House (ACH) and wire transfers. In order to hijack your transactions, a criminal must first insert the malware onto one or more of your company's computers. Infecting a computer is much easier if that computer is connected to the internet or used for email.
In particular, the ABA recommends
commercial banking customers carry out all online banking activities from a stand-alone, hardened and completely locked down computer system from which e-mail and Web browsing are not possible.
To add another layer of protection, consider implementing "locked down computing" for your online transactions.
Devices such as IBM's ZTIC (Zone Trusted Information Channel) are designed to protect online bank customers from a "man in the middle" attack. In this scenario, an attacker intercepts an online transaction as it occurs, and re-directs funds to a fraudulent account.
The ZTIC is a smart card reader that attaches to a computer used for online banking. During a transaction, it bypasses the web browser completely and establishes a secure connection with the bank. This approach is referred to as "locked down computing" and lets users see exactly how their transaction is being directed. If a hacker attempts to channel funds to a frauduent account, the user can immediately abort the transaction.

Online Banking Security 7 Best Practices for Online Banking Security

Sending your bank transactions surfing across the web can be as hazardous as piloting a ship through pirate-infested waters. Here are seven best practices for online banking security.
Use a Dedicated PC
The American Bankers Association now recommends that businesses use a dedicated PC for online transactions. Cybercriminals are writing malware to create fraudulent Automated Clearing House (ACH) and wire transfers. In order to hijack your transactions, a criminal must first insert the malware onto one or more of your company's computers. Infecting a computer is much easier if that computer is regularly connected to the internet or used for email. In particular, the ABA recommends that "commercial banking customers carry out all online banking activities from a stand-alone, hardened and completely locked down computer system from which e-mail and Web browsing are not possible."
Lock Down Your Computer
So-called "locked down" computing creates a secure channel between your PC and your bank's server. IBM's ZTIC is one hardware solution that you can use to secure your online transactions.
Establish Dual Control
Work with your bank to establish "dual control" over your account. Once this safeguard is in place, two individuals from your organization will need to log on and authorize any transaction. With dual control in place, a hacker would need to breach two computer accounts in order to commit a fraudulent transaction.
Get Alerts
You can also request that your bank send email confirmations of online transactions. This will provide you with an early warning of any fraudulent activity.
Use Strong Passwords
Treat your password like a toothbrush; change it often, and don't ever share. Strong passwords are the first line of defense in your online kingdom. Follow this link to rea more about creating strong passwords.

Check Account Balances at the End of the Workday
Automated Clearing House (ACH) transactions are not usually processed until the next business day. If you catch a fraudulent transaction at the end of a business day, you may be able to cancel it before any funds are transferred.
Don't "Friend" Strangers
An article by ID Theft expert, Robert Siciliano should give every CIO and CSO heartburn. Siciliano relates how a white hat hacker used Facebook to breach a company's physical security and infiltrate their network. The same techniques could be used to to hack into online banking accounts. Siciliano says that most people drop their guard on Facebook. And why not? After all, on Facebook, you're surrounded by people you "know, like and trust." The author's bottom line: "Mom told you not to talk to strangers. I'm telling you not to "friend" strangers, because they could be scammers. Scammers are watching. They know that once you are on Facebook, your guard goes way down."

Top Ten Ways to Get Infected

How your online habits leave you and your computer at risk
Keeping safe online takes more than just installing a few security programs. To protect both you and your computer, here are the top ten bad habits you need to avoid.
1. Browsing the Web with javascript enabled by default
Today's attackers are more likely to host their malicious files on the web. They may even update those files constantly using automated tools that repackage the binary in an attempt to bypass signature-based scanners. Whether through social engineering or through website exploit, the choice of browser will be of little help. All browsers are equally susceptible to Web-based malware and this includes Firefox, Opera, and the much maligned Internet Explorer. Disabling Javascript on all but the most trusted sites will go a long ways towards safer web browsing.

2. Using Adobe Reader/Acrobat with default settings
Adobe Reader comes pre-installed on most computers. And even if you never use it, just the mere presence can leave your computer at risk. Vulnerabilities in Adobe Reader and Adobe Acrobat are the number one most common infection vector, bar none. Making sure you stay up-to-date with the latest version of Adobe products is imperative, but not foolproof.
3. Clicking unsolicited links in email or IM
Malicious or fraudulent links in email and IM are a significant vector for both malware and social engineering attacks. Reading email in plain text can help identify potentially malicious or fraudulent links. Your best bet: avoid clicking any link in an email or IM that is received unexpectedly - particularly if you do not know the sender.
4. Clicking on popups that claim your computer is infected
Rogue scanners are a category of scam software sometimes referred to as scareware. Rogue scanners masquerade as antivirus, antispyware, or other security software, claiming the user's system is infected in order to trick them into paying for a full version. Avoiding infection is easy - don't fall for the bogus claims.
5. Logging in to an account from a link received in email, IM, or social networking
Never, ever login to an account after being directed there via a link received in an email, IM, or social networking message (i.e. Facebook). If you do follow a link that instructs you to login afterwards, close the page, then open a new page and visit the site using a previously bookmarked or known good link.
6. Not applying security patches for ALL programs
There are dozens of security vulnerabilities waiting to be exploited on your system. And it's not just Windows patches you need to be concerned with. Adobe Flash, Acrobat Reader, Apple Quicktime, Sun Java and a bevy of other third-party apps typically host security vulnerabilities waiting to be exploited. The free Secunia Software Inspector helps you quickly discover which programs need patching - and where to get it.
7. Assuming your antivirus provides 100% protection
Don't believe everything your antivirus does (or rather doesn't) tell you. Even the most current antivirus can easily miss new malware - and attackers routinely release tens of thousands of new malware variants each month.
8. Not using antivirus software
Many (probably infected) users mistakenly believe they can avoid malware simply by being 'smart'. They labor under the dangerous misconception that somehow malware always asks permission before it installs itself. The vast majority of today's malware is delivered silently, via the Web, by exploiting vulnerabilities in software. Antivirus software is must-have protection.
Of course, out-of-date antivirus is almost as bad as no antivirus software at all. Make sure your antivirus software is configured to automatically check for updates as frequently as the program will allow or a minimum of once per day.
9. Not using a firewall on your computer
Not using a firewall is akin to leaving your front door wide open on a busy street. There are several free firewall options available today - including the built-in firewall in Windows XP and Vista. Be sure to choose a firewall that offers both inbound and (as importantly) outbound protection.
10. Falling for phishing or other social engineering scams
Just as the Internet makes it easier for legitmate pursuits, it also makes it easier for scammers, con artists, and other online miscreants to carry out their virtual crimes - impacting our real life finances, security, and peace of mind. Scammers often use sad sounding stories or promises of quick riches to hook us into being willing victims to their crimes. Exercising common sense is one of the best ways to avoid online scams. For extra help, consider installing one of the free anti-phishing toolbars

Saturday, June 19, 2010

Microsoft Certified IT Professional (MCITP)

Microsoft Certified IT Professional (MCITP)
The Microsoft Certified IT Professional (MCITP) credential validates that an individual has the comprehensive set of skills necessary to perform a particular job role, such as database administrator or enterprise messaging administrator. MCITP certifications build on the technical proficiency measured in the Microsoft Certified Technology Specialist (MCTS) certifications, therefore you will earn one or more MCTS certifications on your way to earning an MCITP credential.
MCITP candidate profile

MCITP candidates are capable of deploying, building, designing, optimizing, and operating technologies for a particular job role. They make the design and technology decisions necessary to ensure successful technology implementation projects.

Why get certified?
Earning a Microsoft Certification validates your proven experience and knowledge in using Microsoft products and solutions. Designed to be relevant in today’s rapidly changing IT marketplace, Microsoft Certifications help you utilize evolving technologies, fine-tune your troubleshooting skills, and improve your job satisfaction.
Whether you are new to technology, changing jobs, or a seasoned IT professional, becoming certified demonstrates to customers, peers, and employers that you are committed to advancing your skills and taking on greater challenges. In addition, certification provides you with access to exclusive Microsoft Certified Professional (MCP) resources and benefits, including opportunities to connect with a vast, global network of MCPs
By earning an MCITP credential, you distinguish yourself as an IT professional with the skills and proven job-role capabilities to effectively work with Microsoft technologies.

Certification
Required exam(s)*
Windows Client
MCITP: Consumer Support Technician
Exam 70-620
Exam 70-623
MCITP: Enterprise Support Technician
Exam 70-620
Exam 70-622
Windows Server
MCITP: Enterprise Administrator
Exam 70-640
Exam 70-642
Exam 70-643
plus either
Exam 70-620 or Exam 70-624
and
Exam 70-647
MCITP: Server Administrator
Exam 70-640
Exam 70-642
Exam 70-646
Microsoft SQL Server
MCITP: Database Administrator 2008
Exam 70-432
Exam 70-450
MCITP: Database Developer 2008
Exam 70-433
Exam 70-451
MCITP: Business Intelligence Developer 2008
Exam 70-448
Exam 70-452
MCITP: Database Administrator
Exam 70-431
Exam 70-443
Exam 70-444
MCITP: Database Developer
Exam 70-431
Exam 70-441
Exam 70-442
MCITP: Business Intelligence Developer
Exam 70-445
Exam 70-446
Microsoft Office Project Server
MCITP: Enterprise Project Management with Microsoft Office Project Server 2007
Exam 70-632
Exam 70-633
Exam 70-634
Microsoft Exchange Server
MCITP: Enterprise Messaging Administrator
Exam 70-236
Exam 70-237
Exam 70-238

Only for Gmail : AMAZING ONE

Only for Gmail

Now Friends the very first Trick Of Gmail that I Love the most.
So, it goes like this, say i have a email id saurav1977@gmail.com

If my Friends wants to send a mail then they will send it at this email address.

Now, Let there be three friends of mine, there may be many, just talk about three at present.


Bithika

Seema

Neeta

If i want to give my friends a unique email id

For Bithika It could be " saurav1977+ Bithika@gmail.com"

For Seema It could be " saurav1977+ Seema@gmail.com"

For Neeta It could be " saurav1977+ Neeta@gmail.com"

So, its simple you could add anything after the initial mail by adding a "+" sign.

As all these Email Addresses saurav1977+ Bithika@gmail.com, saurav1977+ Seema@gmail.com, & saurav1977+ Neeta@gmail.com are the same as saurav1977@gmail.com

If you have a girlfriend/Boyfriend then impress her/him that how much you love her/him by showing her/him name mail id.

Note: This only works when you are sending mails, Not for logging into your account.

Enjoy.....

VERY IMPORTANT : GOOGLE HACKING AND SEARCHING

Introduction
lGoogle Search Technique
–Just put the word and run the search
lYou need to audit your Internet presence
–One database, Google almost has it all!
lOne of the most powerful databases in the world
lConsolidate a lot of info
lUsage:
–Student …
–Business …
–Al’Qaeda …
And Man Moreeeee.............


Google Operators:
–Operators are used to refine the results and to maximize the search value. They are your tools as well as hackers’ weapons
lBasic Operators:
+, -, ~ , ., *, “”, |, OR
lAdvanced Operators:
–allintext:, allintitle:, allinurl:, bphonebook:, cache:, define:, filetype:, info:, intext:, intitle:, inurl:, link:, phonebook:, related:, rphonebook:, site:, numrange:, daterange

BASIC OPERATORS
 Basic Operators
– (+) force inclusion of something common
– Google ignores common words (where, how, digit, single letters) by default:
Example: StarStar Wars Episode +I
– (-) exclude a search term
Example: apple –red
– (“) use quotes around a search term to search exact phrases:
Example: “Robert Masse”
– Robert masse without “” has the 309,000 results, but “robert masse” only has 927 results. Reduce the 99% irrelevant results
 Basic Operators
– (~) search synonym:
Example: ~food
– Return the results about food as well as recipe, nutrition and cooking information
– ( . ) a single-character wildcard:
Example: m.trix
– Return the results of M@trix, matrix, metrix…….
– ( * ) any word wildcard
– Advanced Operators: “Site:”
– Site: Domain_name
– Find Web pages only on the specified domain. If we search a specific site, usually we get the Web structure of the domain
– Examples:
site:ca
site:gosecure.ca
site:www.gosecure.ca

ADVANCE OPERATORS 1.“Intitle:”


– Intitle: search_term
– Find search term within the title of a Webpage
– Allintitle: search_term1 search_term2 search_term3
– Find multiple search terms in the Web pages with the title that includes all these words
– These operators are specifically useful to find the directory lists
– Example:
Find directory list:
Intitle: Index.of “parent directory”

ADVANCE OPERATORS 1.“Intitle:”


– Intitle: search_term
– Find search term within the title of a Webpage
– Allintitle: search_term1 search_term2 search_term3
– Find multiple search terms in the Web pages with the title that includes all these words
– These operators are specifically useful to find the directory lists
– Example:
Find directory list:
Intitle: Index.of “parent directory”

“Inurl:”
Advanced Operators “Inurl:”
– Inurl: search_term
– Find search term in a Web address
– Allinurl: search_term1 search_term2 search_term3
– Find multiple search terms in a Web address
– Examples:
Inurl: cgi-bin
Allinurl: cgi-bin password

“Intext;”
Advanced Operators “Intext;”
– Intext: search_term
– Find search term in the text body of a document.
– Allintext: search_term1 search_term2 search_term3
– Find multiple search terms in the text body of a document.
– Examples:
Intext: Administrator login
Allintext: Administrator login

“Cache:”
Advanced Operators: “Cache:”
– Cache: URL
– Find the old version of Website in Google cache
– Sometimes, even the site has already been updated, the old information might be found in cache
– Examples:
Cache: www.gosecure.com

“Daterange:”
 Advanced Operators: “Daterange:”
– Daterange: -
– Find the Web pages between start date and end date
– Note: start_date and end date use the Julian date
– The Julian date is calculated by the number of days since January 1, 4713 BC. For example, the Julian date for August 1, 2001 is 2452122
– Examples:
2004.07.10=2453196
2004.08.10=2453258
– Vulnerabilities date range: 2453196-2453258

“Link:”
Advanced Operators “Link:”
– Link: URL
– Find the Web pages having a link to the specified URL
– Related: URL
– Find the Web pages that are “similar” to the specified Web page
– info: URL
– Present some information that Google has about that Web page
– Define: search_term
– Provide a definition of the words gathered from various online sources
– Examples:
Link: gosecure.ca
Related: gosecure.ca
Info: gosecure.ca
Define: Network security

“phonebook:”
Advanced Operators “phonebook:”
– Phonebook
– Search the entire Google phonebook
– rphonebook
– Search residential listings only
– bphonebook
– Search business listings only
– Examples:
Phonebook: robert las vegas (robert in Las Vegas)
Phonebook: (702) 944-2001 (reverse search, not always work)
The phonebook is quite limited to U.S.A

Google, Friend or Enemy?
Google, Friend or Enemy?
– Google is everyone’s best friend (yours or hackers)
– Information gathering and vulnerability identification are the tasks in the first phase of a typical hacking scenario
– Passitive, stealth and huge data collection
– Google can do more than search
– Have you used Google to audit your organization today?
 What can Google can do for a hacker?
– Search sensitive information like payroll, SIN, even the personal email box
– Vulnerabilities scanner
– Transparent proxy
 Salary
– Salary filetype: xls site: edu
 Security social insurance number
– Intitle: Payroll intext: ssn filetype: xls site: edu
 Financial Information
– Filetype: xls “checking account” “credit card” - intext: Application -intext: Form
 Personal Mailbox
– Intitle: Index.of inurl: Inbox
 Confidential Files
– “not for distribution” confidential



Google Hacking

Usually it takes a very long time to find something on google search, but isn’t it wonderful if you directly find the same whatever you want just by adding few more characters.

1. If you making a project for your school or for your collage then it will really very helpful if you got few e-books on the same topic. Say, if you are making a project over the topic ‘Networking’. Then go to google search and type networking filetype:pdf

2. If you are looking for your project materials in Doc file then use networking filetype:doc

3. If you are looking for any presentation on the topic networking then use networking filetype:ppt

4. And if you are a music freak and don’t want to waste time on surfing the whole internet just for your favorite song then try using this ?intitle:index.of? mp3 enrique . This search will show you all mp3 songs of Enrique all together and free of cost.

5. If you are a little bit computer conscious and want disc images of various operating systems and of games then try this inurl:vista filetype:iso . This search will give you download link of images of windows Vista.




GOOGLE HACKING REFERENCES
Google APIS:
www.google.com/apis
Remove:
http://www.google.com/remove.html
Googledorks:
http://johnny.ihackstuff.com/
O’reilly Google Hack:
http://www.oreilly.com/catalog/googlehks/
Google Hack Presentation, Jonhnny Long:
http://johnny.ihackstuff.com/modules.php?op=modload&name= ownloads&file=index&req=viewdownload&cid=1
“Autism: Using google to hack:
www.smart-dev.com/texts/google.txt
“Google: Net Hacker Tool du Jour:
http://www.wired.com/news/infostructure/0,1377,57897,00.html