Posts

Showing posts with the label Tut

How to access Internet without any Browser ?

Image
Ever find yourself sitting in front of a computer where Internet Explorer or Firefox was blocked by IT Administrator, and restricted you from installing any software? If that PC is running Windows XP, then there is chance for you to still surf Internet. Just follow these simple steps: Open Calculator, Start> Program Files> Accessories> Calculator or press Windows+R and type ‘calc’ in the run box, click OK. In Calculator, go to Help> Help Topics. Right click on the left hand side of the title bar and click on ‘Jump to URL’. Type in the URL and make sure include the ‘http://’ at the beginning. For instance "http://www.google.com". #calculatoruseasbrowser#nobrowserneeded#enjoysurfing#windowsXP

How to enhance "Google Search" | Tips and Tricks

Image
Google Calculator: Google search can be used as a calculator. It can calculate anything from the simplest math to the most complex equation. All you need to do is just enter the math in the search box and hit enter. You can use the following functions: + - Add - - Subtract * - Multiply / - Divide ^ - To the Power Of sqrt - Square Root of a Number Dictionary Definitions: You can define any word by entering “define:” following the word. For example define: ignoble Google will display a list of dictionary definitions for that word. Search for a Specific Title: Suppose you came across a great article which you really liked but unfortunately forgot to bookmark it then you can find it easily with the help of Google provided you know the title of the article. Here’s how you do it: Let’s say you read an article “Women talk three times as much as men” then you can search for it by typing “intitle: Women talk three times as much as men” Search on a Particular File T...

How to hide your "secret folders" ?

Image
Guys, as you can guess with this trick you can make your folders invisible without using any sophisticated software. This is a very unusual & easy trick to make your private folders invisible to others. A folder contains two parts : an icon and a name . So to make the folder invisible you will have to make both the icon & the name invisible. Making The Name Invisible: Select the folder which you want to make invisible. Press F2 key then type ALT+0160 and hit enter key. You will notice that the name of the folder has become invisible. See the snapshot below. Making The Icon Invisible: Right click on the folder whose name you made invisible. Go to Properties, then go to the Customize tab. Then click on the Change Icon button. Select any blank icon there. Remember there will be many blank icons (see snapshot). Just choose any one. Click OK. Your folder is now invisible! Now only you know where the folder is located. #hidefolder#hideyoursecretstuff#...

Social Engineering

Image
We'll discuss about some real life scenarios and real life frauds (technical frauds) . There are situations which actually takes place with common man and how the crime/fraud takes place with them who have less/no knowledge regarding such cyber crimes/frauds. We live in a digital world  where we use  "E-mail"  rather than postcards/letters etc. Now , someday at sometime if you got a mail from your  "favourite celebrity", "favourite sportsperson" or "from a grl"  you always wanted to talk in college,  lottery winning mail , you would feel very pleased and blessed enough to receive that e-mail. RIGHT ?? But one second , do you really think that such personalities would have got time to mail you on the whole earth with a population of BILLIONS or such lotteries are being only made for you.. !! SO time for the truth ,  ACTUALLY   "you are being fooled  , by somewhat called "fake mailer" which are available for ...

Encrypt your chats with Crypto.cat

Image
Cryptocat is an open source web application intended to allow secure, encrypted online chatting. Cryptocat encrypts chats on the client side, only trusting the server with data that is already encrypted. Cryptocat is offered as an app for Mac OS X or as a browser extension for Google Chrome, Mozilla Firefox and Apple Safari .  If you are highly active on Facebook, Twitter and any other Messenger user , then for your privacy you must go for Cryptocat.  #cryptocat#chatencrytpion#security#nosniffing 

Turn Android Emulator into a Pwnage Weapon

Image
Turn Android Emulator into a Pwnage Weapon Today, we’re going to look at a scenario where the Android Emulator can be re-purposed as an exploitation tool. Specifically, we will look at attacks that involve cloning an application and user data from a stolen Android phone onto a computer running the Android emulator. An attacker that does this will be able to use the application as if they were the user. They would also be able to return the phone to the user before the target becomes aware of the compromise. A natural defense to this sort of attack would be to have the application verify what device is running it before giving the user access. The application would only be allowed to run on a device registered with the user’s account. A natural defense against this kind of attack would be to have the application verify the device and to run only on a device registered with the user’s account. We will demonstrate a new tool that repurposes the Android emulator to give...

Prevent a fork bomb by limiting user process

Image
 fork bomb is a denial-of-service attack whereby a process continually replicates itself to deplete available system resources. It can be prevented by limiting user processes.  Limiting user processes is important for running a stable system. To limit user process just add user name or group or all users to /etc/security/limits.conf file and impose process limitations. Understanding /etc/security/limits.conf file <domain> can be: an user name a group name, with @group syntax the wildcard *, for default entry the wildcard %, can be also used with %group syntax, for maxlogin limit <type> can have the two values: "soft" for enforcing the soft limits "hard" for enforcing hard limits <item> can be one of the following: core - limits the core file size (KB) <value> can be one of the following: core - limits the core file size (KB) data - max data size (KB) fsize - maximum filesize (KB) ...

In-Depth understanding fork() Bomb ~ :(){ :|:& };:

Image
The concept behind a fork bomb — the processes continually replicate themselves, potentially causing a denial of service C an you explain the following bash code or bash fork() bomb? :(){ :|:& };: The fork bomb is a form of denial-of-service (DoS) attack against a Linux based system. It makes use of the fork operation. :(){ :|:& };: is nothing but a bash function. This function get executed recursively. It is often used by sys admin to test user process limitations. Linux process limits can be configured via /etc/security/limits.conf and PAM. Once a successful fork bomb has been activated in a system it may not be possible to resume normal operation without rebooting the system as the only solution to a fork bomb is to destroy all instances of it. WARNING! These examples may crash your computer if executed. Understanding :(){ :|:& };: fork() bomb code :() - Defined the function called : . This function accepts no arguments. The syntax for bash fu...

Tutorial 2 - Let’s start playing…!!!

Image
As it is stated in previous post that we aren’t going to start will all those repeating basic programs but still here are some most important commands that will be used throughout our tutorial series. Serial.println(value); Prints the value to the Serial Monitor on your computer pinMode(pin, mode); Configures a digital pin to read (input) or write (output) a digital value digitalRead(pin); Reads a digital value (HIGH or LOW) on a pin set for input digitalWrite(pin, value); Writes the digital value (HIGH or LOW) to a pin set for output Now all of you know how to turn on a led using arduino. But if I want to use decimal number for our program then. We will use float number, here suppose we want to add some decimal numbers and want to print them. float value = 1.1; void setup() { Serial.begin(9600); // open the serial port to send data back to the computer at  9600 bits per //second } void loop() { value = value + 0.1;  // increase...

Arduino Tutorial Series Tutorial -1 (Introduction)

Image
Arduino is an open source physical computing platform based on a simple input/output (I/O) board and a development environment that implements the Processing language (www.processing.org). Arduino can be used to develop standalone interactive objects or can be connected to software on your computer (such as Flash, Processing, VVVV,or Max/MSP). The boards can be assembled by hand or purchased preassembled; the open source IDE (Integrated Development Environment) can be downloaded for free from www.arduino.cc .                           What you know that….!?!?! Then what have you been waiting for. You know how to glow LEDs in Arduino UNO board. Great..!! But you don’t know all the programming stuffs of real world like interrupts, timers, I2C etc. That’s why Infizeal Technologies is starting a tutorial series on Physical Computing with Arduino. Every weekend ...

Break Google Chrome in six steps

Image
Break Google Chrome in six steps Browsers are a really nice target for attackers of all stripes and skill levels. But, unless you're a savant or have just landed here from the future, you may want to take a pass on going after Google Chrome, judging by the insane level of effort and skill that an anonymous security researcher had to deploy in order to compromise Chrome during the company's Pwnium contest in March. The researcher who received one of two $60,000 rewards handed out by Google for full sandbox escapes and compromises of Chrome during the contest used the alias Pinkie Pie. At the time that his accomplishment was announced during the CanSecWest conference in March, Google officials did not specify exactly how the researcher had been able to break Chrome's many layers of security, but just said that he had used multiple bugs to do it. Now, Google security researchers have revealed the method and techniques that Pinkie Pie used , and if anything, the whole...

Manage your books with Calibre

Image
Calibre E-book Management Kovid Goyal’s “Calibre E-book Management” is a seamless cross-platform library-management tool for ebooks of almost any format under the sun. Its features boggle the mind. Bibliomania doesn’t get better than this! Read on as I walk you through this cool utility. We all hoard data in one way or another. Some of us have loads of music and some of us have loads of movies. It all began when personal computing became affordable and all of us got to play with these virtual packets of data called files. Then came the Internet and the Napster era — MP3 files flowed in the thousands. That called for some serious media file management — what we now so effortlessly do (most of the time) using Rhythmbox, Amarok or iTunes (if you’re an Apple fan). HTPC (Home Theatre Personal Computer) Operating Systems like MoviX or their software suite counterparts like XBMC (the XBox Media Center) allow management of not just music, but your videos, TV shows and online radio too. ...

Automatically Back Up Your Web Site Every Day

Image
Website Backup with Rsyn If you pay for web hosting in order to run any kind of web-based application—from your WordPress blog to a nameplate site to a file-sharing service to a social media data archive—you need to back up your web server's data the same way you back up your computer's data. On database-driven web sites, there are two kinds of data you want to preserve and restore in case of disaster: the files that make up your site (the PHP/Perl/Python, JavaScript, CSS files, etc), and the contents of your database. Further, any good backup system should make both a local copy and a remote copy of the backed-up data. I run several database-driven sites and applications, including this blog, so my backup system has to be solid. Here's how I have it set up. This method assumes a few things: You're running a LAMP-based web site (Linux, Apache, MySQL and PHP/Perl/Python). You have command line access to your web server via SSH. You know how to make ne...