Showing posts from 2011

Robots that Help Patients Walk Again

Robots will be standing by to help paralyzed patients and the elderly walk. Toyota unveiled four such robots in Tokyo. The robots, designed to provide support in nursing and health care, are expected to be available for sale in 2013. They include sensors that detect the user's posture, grasp and holding strength, and high-precision motor control technology to facilitate the patient's desired motion. The first of the robots – the Independent Walk Assist – is a computerized leg brace that is mounted onto a paralyzed leg and helps the knee bend as the person walks. It can support the patient’s weight, and it adjusts as the patient develops more strength. The second robot uses similar technology but focuses on retraining those who are walking-impaired. The Walk Training Assist robot detects movements in the hips through sensors located at the foot and thigh of the computerized brace and supports the return to natural walking. The Balance Training Assist helps those…

10 Handy commands

Some linux handy commands for everyday use.

1)Convert Youtube videos to MP3:
youtube-dl -t --extract-audio --audio-format mp3 YOUTUBE_URL_HERE

2)Get your external public IP:

3)Get a list of IP Addresses that have failed to login via SSH:
cat /var/log/auth.log | grep -i "pam_unix(sshd:auth): authentication failure;" | cut -d' ' -f14,15 | cut -d= -f2 | sort | uniq

4)Background a wget download:
wget -b

5)Transfer files with rsync over ssh on a non-standard port.:
rsync -P -e 'ssh -p PORT' SRC DEST

6)Open a file explorer on a split screen inside your vim session:

7)Change file time stamp:
touch -t [[CC]AA]MMJJhhmm[.ss]

8)Tunnel a MySQL server listening on a UNIX socket to the local machine:
socat TCP-LISTEN:5500 EXEC:'ssh user@remotehost "socat STDIO UNIX-CONNECT:/var/run/mysqld/mysqld.sock"'

9)Create .pdf from .doc:
wvPDF test.doc test.pdf

10)Generate Random Passwords…

Hack facebook accounts on your network-2

Im back with the second part of the post. At the end of the last post, we successfully re-routed all the traffic from the victim’s computer to the router through our computer.Next, we have to capture their facebook cookies through wireshark. So How do you go about doing that? It’s very simple actually.
Open up wiresharkGoto capture – > Interfaces in the top menu and select your interface. It’s usually the one which has an IP address and  a certain number of packets flowing through it.Next goto capture and click on start.. It should look something like this.

This window has all the packets sent from the victim’s/victims’ computer to the router and all the packets sent from the router to the victim.
Next in the filter type  “http.cookie contains datr”.  You ask why? Because, when a user logs in to facebook, he is given some cookies which is unique to him. If we replace our cookies with the victim’s cookies, we can login to his account as then facebook wont know the di…

Hack facebook accounts on your network -1

Hello frnds,
In this post I am going to show you a way you can hack the facebook accounts(any online account also)  of all the people who are on your network (LAN or wifi ) . I have tried this and believe me it works..This is really the best way to hack facebook accounts. Its much easier than installing RATs, Keyloggers or making phishing sites. Ok so here we go!
You will need 3 programs for this
Cain and abel :
Wireshark :
Web developer add-on for firefox :

So what exactly happens when you type in and login with your username and password. First download the web developer addon for firefox and then login to facebook. After you log in view the cookies in the web developer toolbar.

Ok now if you click on view cookie information, you will be able to see all the cookies which facebook has transmitted to your browser.
The main coo…

Backdoor:Win32/Fynloski.A (Dark Comet): Taxonomy

Backdoor:Win32/Fynloski.A (Dark Comet): Taxonomy Microsoft has released a detailed taxonomy or detailed summary of Dark Comet RAT. Dark Comet AT is categorized as Backdoor:Win32/Flynloski.A. Read this full story to for detailed information about Microsoft's release. In the quest to compromise users' systems, malware has always employed different and resourceful techniques to achieve its goals. From using social engineering methods, to abusing legitimate software and its features, to using a design familiar to the user, malware has used every dirty trick in the book to achieve its malicious purpose. As a case study for such behavior we'll take a look at Backdoor:Win32/Fynlonski.A and how this malware uses any means necessary to gain access to the compromised system and hide its presence from a security solution. Taxonomy of Backdoor:Win32/Fynlonski.AWe have received more than 35,000 samples of Fynloski.A with varying disguises, which we discuss in the following classification.…

The Kilobots are coming....!!!!

Computer scientists and engineers at Harvard University have developed and licensed technology that will make it easy to test collective algorithms on hundreds, or even thousands, of tiny robots. Called Kilobots, the quarter-sized bug-like devices scuttle around on three toothpick-like legs, interacting and coordinating their own behavior as a team. A June 2011 Harvard Technical Report demonstrated a collective of 25 machines implementing swarming behaviors such as foraging, formation control, and synchronization. Once up and running, the machines are fully autonomous, meaning there is no need for a human to control their actions. The communicative critters were created by members of the Self-Organizing Systems Research Group led by Radhika Nagpal, the Thomas D. Cabot Associate Professor of Computer Science at the Harvard School of Engineering and Applied Sciences (SEAS) and a Core Faculty Member at the Wyss Institute for Biologically Inspired Engineering at Harvard. Her team also includ…

Cloud Computing Concerns

This is the forth post in the cloud computing series, in this post we will be discussing further about cloud computing. The previous posts related to cloud computing are listed as follows:
The power of cloud (Introduction to Cloud Computing) The architecture of cloud computing.Cloud computing ApplicationsPerhaps the biggest concerns about cloud computing are security and privacy. The idea of handing over important data to another company worries some people. Corporate executives might hesitate to take advantage of a cloud computing system because they can't keep their company's information under lock and key.
The counterargument to this position is that the companies offering cloud computing services live and die by their reputations. It benefits these companies to have reliable security measures in place. Otherwise, the service would lose all its clients. It's in their interest to employ the most advanced techniques to protect their clients' data.
Privacy is ano…

Install Nagios On CentOS in 20 minutes

Nagios is an open source host, service and network monitoring program.An introductory post  to Nagios have has been published before. So lets continue that a with instructing the installation of Nagios on CentOS.


This guide is intended to provide you with simple instructions on how to install Nagios from source (code) on CentOS and have it monitoring your local machine inside of 20 minutes. No advanced installation options are discussed here - just the basics that will work for 95% of users who want to get started.
These instructions were written based on a standard CentOS 5.5 Linux distribution.
What You'll End Up With
If you follow these instructions, here's what you'll end up with:
Nagios and the plugins will be installed underneath /usr/local/nagiosNagios will be configured to monitor a few aspects of your local system (CPU load, disk usage, etc.)The Nagios web interface will be accessible at http://localhost/nagios/Prerequisites
During portions of the…

Cloud Computing Applications

The applications of cloud computing are practically limitless. With the right middleware, a cloud computing system could execute all the programs a normal computer could run. Potentially, everything from generic word processing software to customized computer programs designed for a specific company could work on a cloud computing system. Why would anyone want to rely on another computer system to run programs and store data? Here are just a few reasons:
Clients would be able to access their applications and data from anywhere at any time. They could access the cloud computing system using any computer linked to the Internet. Data wouldn't be confined to a hard drive on one user's computer or even a corporation's internal network.It could bring hardware costs down. Cloud computing systems would reduce the need for advanced hardware on the client side. You wouldn't need to buy the fastest computer with the most memory, because the cloud system would take care …

Access your PC anywhere with desi iTwin

Chennai: Four years ago, when Chennai-born Lux Ananthraman, then a researcher specializing in cryptography and security at a government-run lab in Singapore, lost his USB drive with all his data, he decided to do something about it.
    “In spite of all the security work I was doing, I suddenly felt helpless,” says Anantharaman. This experience led to the creation of iTwin, a pair
of identical USB drives that share data exclusively between them over any connection without being accessible to any other system.
    It’s a device that lets you access the hard disk of your computer from anywhere in the world by just inserting one USB drive in the home PC and carrying the other with you. It’s cable-less cable, says proud iTwin creator
Chennai: Chennai-born Lux Ananthraman has created iTwin, a pair of identical USB drives that share data exclusively between them over any connection. The procedure is insert the USB drive you are carrying in any computer and youcanaccessall…

What Linux newbies Need to Know

"Linux is like that classic muscle car, in that if you are willing to put in the hours and don't mind spending your weekends under the hood, you'll have yourself a sweet ride at the end of the day and the knowledge you built and tweaked it with your own two hands," said Slashdot blogger hairyfeet. "But if you aren't willing to put in the work, all it is gonna do is make you frustrated."

Just Google It ! "Every newbie, to be deemed worthy, must possess the Two Virtues of the Linux Acolyte: Patience and Curiosity,"

"Patience, because sometimes things are just different enough to throw you off, and curiosity to keep you motivated when your patience wears thin like a cheap rug from everyone saying, 'Just google it, n00b!'

Also, "please don't handicap yourself by making your first experience be on some old oddball hardware that will be so slow that it turns you off the whole experience,"
'Go for the Quick De…

Windows 8 now includes touch gesture to close Metro style apps

Microsoft’s latest Windows 8 pre-beta builds include a touch gesture to close Metro applications.

The gesture allows touch based Windows 8 systems to quickly close off running apps. Microsoft’s Windows 8 developer preview does not include such a feature and relies on the task manager to close applications. The new touch gesture was demonstrated in a video. The feature appears to work for Metro “immersive” applications only and looks to be the first of many gestures that Microsoft is planning for Windows 8. The software maker is also building in a zoom feature for the Start Screen to allow users to organize their applications into groups and move items around the screen easily.
Images of Microsoft’s improved Windows 8 Charms Bar were released on Saturday too. The images show off a translucent Charms Bar. Microsoft has enabled support for automatic updates to Internet Explorer 10. Windows 8 users can enable the feature from the about dialog box in Microsoft’s latest browser.…

Microsoft bids Yahoo for half the rate !..

Bloomberg reported that the Silver Lake consortium - which includes Microsoft - has offered $16.60 per share for a minority stake in Yahoo, much lower than the $31 per share tender made in 2008.

"Silver Lake, working with Microsoft Corp., venture-capital firm Andreessen Horowitz and Canada Pension Plan Investment Board, offered to buy convertible preferred securities equal to a 10 percent to 15 percent stake for as much as $3 billion, said one of the people, who asked not to be identified because the bids made this week are private," Bloomberg stated.

The offer is about 6 percent higher than Yahoo's current stock price. Another potential buyer, TPG Capital has offered more.

Bids are lower than what recent Yahoo investors must have been expecting. The company was expected to discuss the offers yesterday.

Alibaba, which Yahoo owns a 40 percent interest in, have indicated a desire to buy the entire company and are waiting to see how the partial stake offers are receive…

Cloud Computing Architecture

When talking about a cloud computing system, it's helpful to divide it into two sections: the front end and the back end. They connect to each other through a network, usually the Internet. The front end is the side the computer user, or client, sees. The back end is the "cloud" section of the system.

The front end includes the client's computer (or computer network) and the application required to access the cloud computing system. Not all cloud computing systems have the same user interface. Services like Web-based e-mail programs leverage existing Web browsers like Internet Explorer or Firefox. Other systems have unique applications that provide network access to clients.
On the back end of the system are the various computers, servers and data storage systems that create the "cloud" of computing services. In theory, a cloud computing system could include practically any computer program you can imagine, from data processing to video games. Usually,…

Robotic Bug get Wings to fly.....

When engineers at the University of California, Berkeley, outfitted a six-legged robotic bug with wings in an effort to improve its mobility, they unexpectedly shed some light on the evolution of flight. Even though the wings significantly improved the running performance of the 10-centimeter-long robot -- called DASH, short for Dynamic Autonomous Sprawled Hexapod -- they found that the extra boost would not have generated enough speed to launch the critter from the ground. The wing flapping also enhanced the aerial performance of the robot, consistent with the hypothesis that flight originated in gliding tree-dwellers. The research team, led by Ron Fearing, professor of electrical engineering and head of the Biomimetic Millisystems Lab at UC Berkeley, reports its conclusions online on Oct. 18, in the peer-reviewed journal Bioinspiration and Biomimetics. Using robot models could play a useful role in studying the origins of flight, particularly since fossil evidence is so limi…

2500+ Indian Websites Hacked

It seems that the pakistani hackers have reverted back on cyber attack of an Indian hackers group named ‘Indishell’. In the reply of the cyber attack of 26/11 on Pakistani sites by ‘Indishell’ many Pakistani hackers and hackers group hacked about 2500+ websites of India including Government, Universities and Private Institutions websites.

Links of hacked websites of paskistan by Indishell are provided below:

Links of hacked website are provided below:-

Link of hacked govt. websites

Mirror Links :-

Other Hacked Websites :-


An Introduction to Nagios

Nagios Introduction
Nagios is a free, open-source web-based network monitor developed by Ethan Galstad. Nagios is designed to run on Linux, but can be also be used on Unix variants. Nagios monitors the status of host systems and network services and notifies the user of problems.

Nagios Functionality
In common with many open source utilities, installation requires a degree of system administrator experience. Nagios is definitely not for the novice, unless you are prepared to put the effort in learning the basics. But with a wide range of features, including a number of web interfaces, Nagios is a very useful, feature rich monitoring tool.
A large number of plug-ins available from the Nagios Library, means you can design its capabilities to your own requirements. Amongst others, Nagios monitors services such as SMTP, POP3, HTTP, PING and resources such as disk and memory usage, log files, processor load and so o…

Cloud Computing: Power of Cloud !..

Let's say you're an executive at a large corporation. Your particular responsibilities include making sure that all of your employees have the right hardware and software they need to do their jobs. Buying computers for everyone isn't enough -- you also have to purchase software or software licenses to give employees the tools they require. Whenever you have a new hire, you have to buy more software or make sure your current software license allows another user. It's so stressful that you find it difficult to go to sleep on your huge pile of money every night.
Soon, there may be an alternative for executives like you. Instead of installing a suite of software for each computer, you'd only have to load one application. That application would allow workers to log into a Web-based service which hosts all the programs the user would need for his or her job. Remote machines owned by another company would run everything from e-mail to word processing to comple…

New era of Computing: Optical Computing

There has been enormous progress in recent years toward the development of photonic chips — devices that use light beams instead of electrons to carry out their computational tasks.There has been enormous progress in recent years toward the development of photonic chips — devices that use light beams instead of electrons to carry out their computational tasks. Now, researchers at MIT have filled in a crucial piece of the puzzle that could enable the creation of photonic chips on the standard silicon material that forms the basis for most of today’s electronics.

In many of today’s communication systems, data travels via light beams transmitted through optical fibers. Once the optical signal arrives at its destination, it is converted to electronic form, processed through electronic circuits and then converted back to light using a laser. The new device could eliminate those extra electronic-conversion steps, allowing the light signal to be processed directly.

The new component is a “d…

How To Install Zimbra Collaboration Suite (ZCS) On Ubuntu

Zimbra combines email, calendar and address book tools in an integrated system. For the Web Client, this is all found at one address and under one login.Based on Postfix MTA, includes AJAX based web mail and calendering, antispan, search, backup, archiving, .... Built on top of Tomcat, MySQL, JAVA, Apache, Lucene, ClamAV, SpamAssassin, OpenLDAP and of course Postfix technologies. It rocks.

I will use the hostname in this tutorial together with the IP address Adjust this to your needs, but make sure that has a valid MX record in DNS (Zimbra needs this!). I assume you want to create email accounts for instead of, so you should have an MX record for as well.

In this example the Zimbra server is in a local network ( is a private IP address) behind a router, so make sure you use the router's public IP address ( in this example) in the DNS records - of course this I…