Pages

Saturday 15 October 2011

AIRTEL FREE GPRS on Pc Via VNAP.NETBUSTER PROXY PRO


Hello Friends,I hope you all are fine.Today I am introduce a airtel tricks on pc which gives you rocket speed of 3g (if you are in 3g area).as well as 2g speed.So here is the trick.This Trick is invented by my friend and all credit goes to him.

1)First of all Download VNAP.NetBuster Proxy Pro
2.Then download .net 4
3.open vnap proxy pro,
go to profile --> edit --> url handler,
now click on proxywrite 1234 in local service port option
4. click on enable back query, write

?0.facebook.com/

and save profile
5. now open any pc browser(u can use IDM,ORBIT also)
go to Menu -----> setting ---- > preference ---advance ----> network -----> proxy servers
6. click on http and https and write
proxy=127.0.0.1 and
port 1234 7.
enjoy Full free gprs on pc

Connect with airtel settings.Now You can enjoy airtel at free of cost.Comment here if u like the trick...


How To Enable Facebook Timeline Right This Second


Facebook has introduced a new profile redesign called Timeline in its f8 developer event. You can get it right now by running simple steps.
1. Log into Facebook

2. Enable developer mode, if you haven’t already. To do this, type “developer” into the Facebook search box, click the first result (it should be an app made by Facebook with a few hundred thousand users), and add the app.
3. Jump into the developer app (if Facebook doesn’t put you there automatically, it should be in your left-hand tool bar)

4. Create a new app (don’t worry — you wont actually be submitting this for anyone else to see/use). Give your shiny new app any display name and namespace you see fit. Read through and agree to the Platform Privacy agreement. This is the step you need to be verified for.

5. Ensure you’re in your new app’s main settings screen. You should see your app’s name near the top of the page

6. Look for the “Open Graph” header, and click the “Get Started using open graph” link.

Create a test action for your app, like “read” a “book”, or “eat” a “sandwich”

7. This should drop you into an action type configuration page. Change a few of the default settings (I changed the past tense of “read” to “redd” — again, only you can see this unless you try and submit your application to the public directory), and click through all three pages of settings

8. Wait 2-3 minutes

9. Go back to your Facebook homescreen. An invite to try Timeline should be waiting at the top of the page

Use your Pen drive or USB hard drive as Virtual OS



Pen drive and portable USB hard disks are nowdays become a common method to transfer data between systems. But do you know that you can use any application directly from your pen drive or portable USB hard disk just by connecting your Pen drive to the any PC or laptop. Ahha you all are still in confusion, what actually i am talking about, so lets have better view.

Suppose you gone to your friends or simply college and there you want to use Microsoft excel or any other application but that is not installed on that system. Then what happen you got stuck and your work got halted there but if you have portable application for that which you can keep in your pen drive or portable hard disk and use it where ever you want then you will never face situations like above. But now you all will be thinking we need a lot of portable applications for that, right... yes are thinking in right way but Lupo pensuite has done that for us. Why don't we keep everything in our pocket and use it whenever , wherever we need the application. What it has done, it has kept all the daily use and critical applications in one portable installation which consist of all daily use applications like:
  • WEB BROWSERS
  • E-MAIL CLIENTS
  • MESSENGERS
  • P2P CLIENTS
  • WEB SERVERS
  • DOWNLOAD MANAGERS
  • FEED READERS
  • REMOTE CONTROL
  • BOOKMARKS MANAGERS:
  • FTP/SSH CLIENTS
  • PORTABLE WIKI
  • LINK CHECKER
  • PROXY SERVER
  • VIDEO PLAYERS
  • AUDIO PLAYERS
  • MEDIA EDITORS
  • MEDIA CONVERTERS
  • CD/DVD RIPPERS
  • TAG EDITORS
  • STREAM MANAGERS
  • CD/DVD BURNERS
  • VIDEO CAPTURE
  • IPOD MANAGERS
  • MEDIA INFO
  • MEDIA CATALOGERS
  • CD/DVD TOOLS
  • TEXT TO SPEECH
  • MEDIA CENTER
  • IMAGE VIEWERS
  • IMAGE EDITORS
  • GRAPHICS EDITORS
  • SCREEN CAPTURE
  • SCREEN ZOOMERS
  • ICON/CURSOR EDITORS
  • IMAGE PROCESSING
  • ALBUM CREATORS
  • COVER CREATOR
  • SYSTEM MANAGERS
  • SYSTEM INFORMATION
  • NETWORK TOOLS
  • MONITORING/TESTING TOOLS
  • PROGRAM LAUNCHERS
  • STARTUP MANAGERS
  • SCHEDULING MANAGERS
  • TWEAKERS
  • REGISTY TOOLS
  • DISK DEFRAG
  • VIRTUAL DESKTOP
  • UNINSTALL TOOLS
  • CLIPBOARD TOOLS
  • MOUSE/KEYBOARD TOOLS
  • FOLDER/WINDOW TOOLS
  • SHELL TOOLS
  • FILE ASSOCIATIONS
  • DEVICE TOOLS
  • DESKTOP TOOLS
  • PARTITION MANAGERS
  • MALWARE DETECTION
  • DISK/REGISTRY CLEANERS
  • ENCRYPTING
  • PASSWORD MANAGERS
  • FILE RECOVERY
  • SECURE DELETION
  • INTEGRITY CHECKERS
  • UNLOCKING TOOLS
  • Office SUITES
  • WORD PROCESSORS
  • SPREADSHEETS
  • TEXT EDITORS
  • PDF/TEXT READERS
  • PDF TOOLS
  • ORGANIZERS
  • PROJECT MANAGERS
  • FINANCIAL TOOLS
  • PUBLISHING
  • POST-IT
  • DIAGRAMMING
  • TEXT PROCESSING
  • FILE MANAGERS
  • FILE ARCHIVERS
  • FILE RENAMERS
  • FILE LISTERS
  • FILE SPLITTERS
  • BACKUP TOOLS
  • SYNCHRONIZERS
  • SEARCH/REPLACE TOOLS:
  • DUPLICATE FINDERS
  • FOLDER COMPARISON
  • FILE COPIERS
  • FONT MANAGERS
  • ATTRIBUTE TOOLS
  • DISK SIZE TOOLS
  • INSTALLER BUILDERS
  • DATABASE TOOLS
  • PROGRAMMING TOOLS
  • HEX EDITORS
  • EMULATORS
  • MATHEMATICS
  • UNIT CONVERTERS
  • ASTRONOMY
  • GENEALOGY
  • MUSIC TOOLS
  • DIDACTIC TOOLS
  • GAMES
  • LOGIC/PUZZLES
The list is little small but when you listen this installers size then you will be more shocked its only 200MB pen drive suite. Basically its a virtual OS that run from your pendrive and contains the all the applications that you need in day to day life...:P contains more than that..
Also you can add more and more portable application to your pensuite. That's the beauty of Lupo pensuite. So no need to worry while going to other's PC or system that he might have this software or not, keep everything in your pocket friends and enjoy the flavor of portability.

How to use Lupo Pensuite to use all applications from pen drive?

2. Install the Pen drive suite into you pendrive or portable USB hardisk.
3. Now go anywhere and just start exe to open the suite.
4. Select the application and use it directly from your pen drive.
5. That's all friends.

Nero 11 : Download Nero 11 For Free



Hi, may be you know about Nero. Because Nero is the one of the most popular tool used for burning discs, making disc images, and much more. Nero is a premium utility program but Nero is very expensive and everyone can’t afford it . But now you can download a freeware product from Nero that works same like Nero Suite called Nero Kwik Media. It gives you full control over many features of Nero.
With the help of Kwik Media, you can burn DVD’s/ CD’s. You can save your favorite playlist or you can watch Hi-Definition video burned to Blu-ray disc’s and much more. Kwik Media is a perfect solution for your daily needs like if you are music lover then you can listen and share your music with your friends. You can also create slideshows to impress your friends and you can also share and view images captured by your mobile phone, or digital camera easily. The built in photo editor lets allow you to edit your photos like color, brightness, Saturation, Red-eye removal etc.

Features of Kwik Media:

  • Play music and watch videos easily.
  • Share your photos, videos, music with your friends, and relatives on Facebook.
  • Save your favorite playlists to cd.
  • Watch HD videos from Blu-ray discs.
  • Create custom slideshows and impress your friends.
  • Take your movies, videos, music, or photos everywhere you go Android syncing.
  • And much more features.

System Requirements:

  1. Operating System : Windows 7 Ultimate, Home Premium, Professional (32bit and 64bit), Windows XP (Only Service Pack 3 is supported)

DOWNLOAD Kwik Media (FILE SIZE = 174.20MB Approx.)


Friday 14 October 2011

What are Denial of Service (DoS) Attacks ?



Hello Friends,
                I hope you all are fine.Today I am going to explain the most Amaizing article... and that about "DoS Attack". Thats the most common n effective "Server Attack Process". People making mistake to understand this concept.So today i have plan to clear your concepts against "Dos Attack". Please Read the artilce carefully... and this site  will not be Responsible for any wrong use of this,The artilce is just for Edicational Purpose.


Yeah,So a denial-of-service — or DoS — attack is an attempt to prevent a website from functioning properly and is one of the most common violations happening to popular sites on the Internet. These attacks, which usually target high-profile websites, are meant to keep people from accessing such sites for an extended period of time. In short "Making the server down for some time...so that no one can use the site".

Social networking sites are among some of the most often visited and widely used on the Internet. Because of this, sites like Twitter and Facebook have to worry about DoS attacks like other important websites. Twitter has fallen victim to DoS attacks in the past already, causing the site to run extremely slow or go down entirely. But,i know that what yoy guys gonna ask me, how ?

What a DoS attack consists of, as well as how one can take down a site as big as Twitter, and the effects it has on the site and its millions of users.

What is a DoS Attack ?
Above I explained briefly the intent of a DoS attack, but what is it technologically ? A DoS attack happens when a large number of hijacked computers overwhelm a website by sending it a massive, constant stream of data. A basic site like Twitter, which is used to processing requests and displaying a simple page, has trouble keeping up with this massive flow of information due to this large spike in requests.Like if you start sending huge and fast requests to server,then it is not possible for the servers to respond you as fast you are sending...that cause the Server Down !
In a typical connection, a user sends a message for the server to authenticate. After the server acknowledges and approves this request, the user can then access the site from the server.In a DoS attack, several authentication requests are sent, filling the server up. The server tries to approve these requests, but it can’t because they all have false return addresses. So the system waits. After a minute or so, these connections are closed, but by this time, the attacker has already sent a new batch of requests, slowing up the system indefinitely.

Types of DoS Attack
Hey, Lets move on to the different types of DoS attacks.

a.) Fragmentation overlap
By forcing the OS to deal with overlapping TCP/IP packet fragments, this attack caused many OSs to suffer crashes and resource starvation. Exploit code was realeased with names such as bong,boink, and teardrop.

b.) Oversized Packets
This is called the "Ping of Death" (ping -1 65510 192.168.2.3) an a Windows system (where 192.168.2.3 is the IP adress of the intended victim). What is happening is the attacker is pinging every port on the victims computer causing it to echo back 65510 requests. Another example is a jolt attack a simple C program for OSs whose ping commands wont generate oversized packets. The main goals of the "Ping of Death" is to generate a packet size that exceeds 65,535 bytes. Which can abrubtly cause the victim computer to crash. This technique is old !

c.) Nukers
Yet another old form of attack this is related to a Windows vunlnerablity of some years ago that sent out-of-band(OOB) packets. To the consenting computer causing it to crash.

d.) SYN floods
A newer technique of DoS is SYN floods, basically this is done through a 3 step process, better known as the three way handshake. When a TCP connection is initiated this occurs. Under some normal circumstances, a SYN packet is sent from a specific port on system 1 to a specific port on system 2 that is in the LISTEN state. Then the potential connection on system 2 is in a SYN_RECV state. At this stage system 2 will attempt to send back a SYN/ACK packet to system 1.If all works out, system 1 will send back an ACK packet, and the connection will move to an ESTABLISHED state. Now thats what happens most of the time, but a SYN flood is different it creates a half open connection. Most systems can sustain hundreds of connections on a specific port, but it will only take a few half open connections to exhaust all the resources on the computer.

e.) Smurf Attacks
The smurf attack was one of the first to demonstrate the use of unwitting DoS amplifiers on the Internet. A smurf takes advantage of directed broadcasts and requires a minimum of three actors: the attacker, the amplifying network, and the victim. What happens is the attacker sends out spoofed ICMP ECHO packets to the broadcast address of the amplifying network. The source address of packets is forged to make it appear as if the victim system has initiated the request. Then all hell breaks loose!!! Because the ECHO packet was sent to the broadcast address, all systems on the amplifying network will respond to the victim. Now take a thought if the attacker sends just a single ICMP packet to an amplifying network which contains 500 systems that will respond to a broadcast ping, the attacker has now succeeded in multiplying the DoS attack by a magnitude of 500!

 f.) Fraggle Attack
A fraggle attack is the same as a smurf attack, but it uses UDP ports instead.

g.) DDoS Attack { The most famous and effective }
This is a much harder to block kind of attack, it has been used against big sites such as E-Trade, Ebay, and countless others. The problem with these attacks there very hard to trace. Most traces can link back to at Home users! The new DDoS attacks are termed Zombies or Bots. These bots rely heavily on remote automation techniques borrowed from Internet Relay Chat (IRC) scripts of the same name. A group of zombies under the control of a single person is called a zombie network or a bot army. The master of these armys or networks can do full fledged DDoS attacks or SYN floods. The basic estimate size of zombie networks are from a few systems to 150,000 systems. Even a few hundred machines could prove very dangerous. Note : keep tuned to ICA  For the explanation of DDoS attack ...

How to do DoS attack ?

1) Using Botnets for DoS Attacks : 
A botnet is a collection of compromised computers that can be used for malicious acts (like spam) on the Internet. Botnet-based DoS attacks are difficult for websites to deal with. This is because it is hard to distinguish legitimate requests from those coming from a botnet.


2) A simple DOS attack :

Open cmd, Type "ping {ip} -t -l 20000 "    -  This command will ping the server,through its {ip} and 20000 bytes data.
DOS attack with ping flood will work only if the following cafeterias are satisfied:

1. Attacker should have higher bandwidth than the victim.
2. Victim should respond to the ping requests

3. ) Using Tools :
There are lost of tools availabe,that can do this job easily...Some of them are listed below...

a.) LOIC (Low Orbit Ion Cannon) :  Probably the best DoS Tool there is.  Download Here
b.) Rocket v1.0 : Sends the +++ath0 to a modem and disconnects them from the web. The S2=225 string must be added to your modem for it to function properly ! Download Here
c.) Nemesy :  Nemesy generates random packets. The source IP is poofed because of random progressive generation. Download Here
d.) IGMP Nuke :  An easy basic nuker, but a bit slow, overall it;s pretty good. Download Here
e.) Panther Mode 2 : A great fire-wall killer. Sends so much attacks that the firewall will force shut-down. (depends on the firewall) Download Here



Warning : Never never Do any attack from your pc,once if you traced,then no one can Help you !

Hope now your concepts clear,Are you Enjoying the Articles Post comments........




Windows Mystery Exposed : Can you make a folder named ‘CON’ ?



Hello Guys,I hope you all are fine,Today iam introduce new topic.So enjoy I bring a most funny and mysterious artice.. Hope all of you will enjoy to know all this... One day my Sir told me that he got a mail the message written on that is almost as below...
Nobody can create a FOLDER anywhere on the computer which can be named as “CON”.
This is something pretty cool…and unbelievable… At Microsoft the whole Team, including Bill Gates, couldn’t answer why this happened!
TRY IT NOW !!



This is not the first time I listen about this funny question that "why we can't create a folder with name 'CON' " ?, and I’m sure most of you also try to make folder "CON" just now after reading the title of article  ! if no,then go and 1st try it .... If you try creating a folder named CON, as the mail claims, it’ll get renamed automatically to New Folder. But there is no mystery behind this, and the team at Microsoft very well knows the reason for this. :-)

Why is it not possible to create a folder named CON ?
Before we proceed further, let me tell you a small secret you can’t even create a folder named PRN, AUX, NUL and many others.

The reason you can’t create a folder with these names is because these are reserved keywords used by DOS. The below screen-shot taken from Microsoft’s website shows a list of reserved keywords in DOS.

If you try creating a folder with any of these names, the name automatically changes back to the default “New Folder”. And this is what has caused the confusion. Instead of automatically renaming the folder, had an explanatory warning message popped up.

You can actually create a folder named CON !!
There is actually a way to create a folder named CON, or any other name from the above list of reserved keywords. This can be done through command prompt. But it is advisable not to do so, as it might result in your system becoming unstable.

Step 1: To create a folder named CON, go to command prompt and type “MD \\.\D:\CON” (without quotes). This will create a folder named CON in D:. See the screenshot.


Step 2: You cannot delete this folder by normal delete. To delete the folder, again go to command prompt and type “RD \\.\D:\CON” without quotes.

Step 3: I’ll again recommend you not to try this on your system, as it might become unstable. In case you can’t stop yourself, don’t do it on a drive on which Windows is installed (generally C:).

So people ,On a machine everything is possible.
So,enjoy frends and dont foget to comment......

What is TCP/IP & UDP Attacks ?



Hello Guys.I hope you all are fine,Today Iam intoduce ''What is TCP/IP & UDP Attacks ?''
 Lets explain "TCP/IP & UDP Attacks", Most common and effective Web attacks...Lets Know abt its basic and types...

TCP/IP Attacks
1. TCP SYN or TCP ACK Flood Attack
2. TCP Sequence Number Attack
3. TCP/IP

UDP attacks

1. ICMP Attacks
2. Smurf Attacks
3. ICMP Tunneling

TCP operates using synchronized connections. The synchronization is vulnerable to attack; this is probably the most common attack used today. The synchronization or handshake, process initiates a TCP connection. This handshake is particularly vulnerable to a DoS attack referred to as the TCP SYN Flood attack. The process is also susceptible to access and modification attacks, which are briefly explained in the following sections.

TCP SYN or TCP ACK Flood Attack - This attack is very common... The purpose of this attack is to deny service. The attack begins as a normal TCP connection: the client and the server exchange information in TCP packets. The TCP client continues to send ACK packets to the server, these ACK packets tells the server that a connection is requested. The server thus responds to the client with a ACK packet, the client is supposed to respond with another packet accepting the connection to establish the session. In this attack the client continually send and receives the ACK packets but it does not open the session. The server holds these sessions open, awaiting the final packet in the sequence. This cause the server to fill up the available connections and denies any requesting clients access.

TCP Sequence Number Attack - This is when the attacker takes control of one end of a TCP session. The goal of this attack is to kick the attacked end of the network
for the duration of the session. Only then will the attack be successful. Each time a TCP message is sent the client or the server generates a sequence number. The attacker intercepts and then responds with a sequence number similar to the one used in the original session. This attack can then hijack or disrupt a session. If a valid sequence number is guessed the attacker can place himself between the client and the server. The attacker gains the connection and the data from the legitimate system. The only defense of such an attack is to know that its occurring... There is little that can be done...

TCP Hijacking - This is also called active sniffing, it involves the attacker gaining access to a host in the network and logically disconnecting it from the network. The attacker then inserts another machine with the same IP address. This happens quickly and gives the attacker access to the session and to all the information on the original system.

UDP packets aren't connection oriented and don't require the synchronization process as with TCP. UDP packets, however, are susceptible to interception, thus it can be attacked. UDP, like TCP, doesn't check the validity of an IP address. The nature of this layer is to trust the layer above it (I'm referring to the IP layer). The most common UDP attacks involve UDP flooding. UDP flooding overloads services, networks, and servers. Large streams of UDP packets are focused at a target, causing UDP services on that host to shut down. It can also overload the network and cause a DoS situation to occur.

ICMP Attacks - This occur by triggering a response from the ICMP protocol when it responds to a seemingly legitimate request (think of it as echoing). Ping for instance, that uses the ICMP protocol. sPing is a good example of this type of attack, it overloads te server with more bytes than it can handle, larger connections. Its ping flood.

Smurf Attacks - This attack uses IP spoofing and broadcasting to send a ping to a group of hosts on a network. When a host is pinged it send back ICMP message traffic information indicating status to the originator. If a broadcast is sent to network, all hosts will answer back to the ping. The result is an overload of network and the target system. The only way to prevent this attack is to prohibit ICMP traffic on the router.

ICMP Tunneling - ICMP can contain data about timing and routes. A packet can be used to hold information that is different from the intended information. This allows an ICMP packet to be used as a communications channel between two systems. The channel can be used to send a Trojan horse or other malicious packet. The counter measure is to deny ICMP traffic on your network.

Warning : ICMP can be very dangerous..and Even,as i said ...Don't try such attack from your pc,untill you don't know that how to be invisible on net ! Beccause once you get traced out ...No one can help you from Troubles..
Open Cbox