Search This Blog

Sunday, 9 February 2014

Fast file transfer between Mobile

You Can Check Original Installation date of OS in Windows

You Can Check Original Installation date of OS in Windows + Loads of More information about your System in Windows.

Check this Easy Step by step Tutorial and get to know More about your System (Things that you must know)

Must Check here > http://bit.ly/1dHHJgn

What is HACKING?

What is HACKING?
(Must read all)

It's hard to argue about the true meaning of a word 'Hacking'.

A word means whatever people use it to mean.
Still, understanding the etymological history of the word "hacker'' may help in understanding the current social situation.

The concept of hacking entered the computer culture at the Massachusetts Institute of Technology in the 1960s.
Popular opinion at MIT posited that there are two kinds of students, tools and hackers.

A "tool'' is someone who attends class regularly, is always to be found in the library when no class is meeting, and gets straight As.

latest hacking news relaunch

latest hacking news relaunch on this link
http://latesthackingnews.com/?p=49

Worlds top ten hacker and thier story ..

Worlds top ten hacker and thier story ..
may inspire hackers.

http://www.technotification.com/2014/02/top-10-black-hat-hacker-and-thier-story.html

▒ CMD tutorial ▒

▒ CMD tutorial ▒
~jS
‪#‎cmd‬ ‪#‎cmdH01‬
║What is Command Prompt?
» The Command Prompt program allows you to work in an environment that looks more like a traditional operating system as opposed to the icon based Windows environment. In Command Prompt, you will use your keyboard. You won't use your mouse at all. Command Prompt works at a lower level than Windows. This means that you will have more control over the machine. The disadvantage is that it is less user-friendly.
。To launch Command Prompt selectStart -> Runand typecmdin the box.
▒ next post will describe about useful commands.

What is vulnerability and how to prevent from occurin vulnerability in system.?


Vulnerabilities are what information security and information assurance professionals seek to reduce. 

Cutting down vulnerabilities provides fewer options for malicious users to gain access to secure information. 
Computer users and network personnel can protect computer systems from vulnerabilities by keeping software security patches up to date. 
These patches can remedy flaws or security holes that were found in the initial release. 
Computer and network personnel should also stay informed about current vulnerabilities in the software they use and seek out ways to protect against them.

/* Helpful Information */

/* Helpful Information */
1. Compact Disc (CD) invented by:
Answer: James T. Russell

2. Name the first Supercomputer in the world?
Answer: The CDC 6600, released in 1964, is generally considered as the first supercomputer.

3. Computer Programming Language 'C' introduced by:
Answer: Dennis Ritchie

4. First Cyber police station established in India was at:
Answer: Bangalore

5. RAM stands for:
Answer: Random Access Memory

6. Father of Computer Science is:
Answer: Alan Turing

7. WAP stands for:
Answer: Wireless Application Protocol

8. Father of supercomputer is:
Answer: Seymour Cray

9. WML stands 4 wireless markup language

What is PXE?


Short for Pre-Boot Execution Environment. Pronounced pixie, PXE is one of the components of Intel's WfM specification. It allows a workstation to boot from a server on a network prior to booting the operating system on the local hard drive. A PXE-enabled workstation connects its NIC to the LAN via a jumper, which keeps the workstation connected to the network even when the power is off. Because a network administrator does not have to physically visit the specific workstation and manually boot it, operating systems and other software, such as diagnostic programs, can be loaded onto the device from a server over the network.

PXE is a mandatory element of the WfM specification. To be considered compliant, the PXE must be supported by the computer's BIOS and its NIC.

Saturday, 8 February 2014

What is HACKING?

What is HACKING?
(Must read all)

It's hard to argue about the true meaning of a word 'Hacking'.

A word means whatever people use it to mean.
Still, understanding the etymological history of the word "hacker'' may help in understanding the current social situation.

The concept of hacking entered the computer culture at the Massachusetts Institute of Technology in the 1960s.
Popular opinion at MIT posited that there are two kinds of students, tools and hackers.

A "tool'' is someone who attends class regularly, is always to be found in the library when no class is meeting, and gets straight As.
A "hacker'' is the opposite: someone who never goes to class, who in fact sleeps all day, and who spends the night pursuing recreational activities rather than studying. There was thought to be no middle ground.
What does this have to do with computers? Originally, nothing.
But there are standards for success as a hacker, just as grades form a standard for success as a tool.

The true hacker can't just sit around all night; he must pursue some hobby with dedication and flair with computers.

Thursday, 6 February 2014

6 Most Common Password Cracking Methods



There are number of methods out their used by hackers to hack your account or get your personal information. 

Today in this post i will share with you guys 6 Most commonly used method to crack password and their counter measures. 
You must check out this article to be safe and to prevent your online accounts from hacking.

1. BruteForce Attack

brute force attack
Any password can be cracked using Brute-force attack. Brute-force attacks try every possible combinations of numbers, letters and special characters until the right password is match. Brute-force attacks can take very long time depending upon the complexity of the password. The cracking time is determined by the speed of computer and complexity of the password.
Counter measure: Use long and complex passwords. Try to use combination of upper and lowercase letters along with numbers. Brute-force attack will take hundreds or even thousands of years to crack such complex and long passwords.
Example: Passwords like "iloveu" or "password" can be cracked easily whereas computer will take years to crack passwords like "aN34lL00"

2. Social Engineering

Why HACKERS prefered LINUX instead of other operating system?

Why HACKERS prefered LINUX instead of other operating system?

Linux use is growing at an amazing rate. This operating system, which has no public relations department, advertising, or government lobby, is being used widely in homes and server rooms alike. 
It's also free, and 100% open source, meaning anyone can look at each and every line of code in the Linux kernel.

Linux is a true multiuser operating system, and has been since the very first version.
It is powerful in it's simplicity.
Though there are robust graphical environments and tools, you can still do everything you could possibly need with just a keyboard and a shell prompt. Since you have the code, you could even make Linux do things it was never meant to.
That's one of the things that draws both the gurus and the attackers alike.
The black-hats have thronged to Linux.
It allows them the control they require to do strange and ingenious things. If they want to experiment with new or invalid network packets, they can do so easily without relying on undocumented (or non-existant) API support from the vendor.

I Am telling you a Gmail secret . An amazing trick.



Dear readers,
Do you know? You can create multiple user accounts (IDs) on 90% websites with a single gmail id .

Atleast Every website dont allow you to create more then one account associate with same email id and you know it better.. 

But if you have gmail account then you can create many accounts on a websites.
Its possible because gmail account don't count dot(.) in email addresses.
thats means

where is ipv5 ? why ipv6?

where is ipv5 ? why ipv6?

The version of Internet Protocol (IP) used on most computer networks today is four, typically called IPv4. 
The next version of IP expected to one day become the new worldwide standard is version six (IPv6).
Some people who study computer networking are understandably curious to know what happened to the protocol version in-between, the hypothetical IPv5.

In short, IPv5 never became an official protocol. Many years ago, Internet Stream Protocol (ST) was considered IP version five by industry researchers, but ST was abandoned before ever becoming a standard or widely known as IPv5. Work on ST and IPv5 is not expected to ever restart.

how to hack facebook password?

how to hack facebook password?

hello guys many time you ask us how to hack facebook passwords.
but its not easy at all..
its very hard to do but there are several ways to crack facebook passwords.
you can lean them for education purpose.

http://www.technotification.com/2014/01/4-ways-to-crack-facebook-password.html

Must read all facebook users

Must read all facebook users

Don't want the entire Facebook-using and -abusing population to see your friends list?

You can always change the setting to private - a setting labeled, for some strange reason, "only me", chosen in response to the "who can see your friends list?" setting.

Fat lot of good it will do you, though.

Irene Abezgauz, a vice president of product management at the security software company Quotium, has discovered a way for any casual visitor, stranger, stalker or troll to see friend lists that their users have set to be private, and that includes any friends who've also set their lists to be private.

people you may know

To access anybody's friend list, all someone has to do is to create a fake Facebook account and send a friend request to his or her target.

Even if the targeted Facebook user doesn't respond to the friend request, they’ll get to see a list of his or her friends, courtesy of Facebook’s People You May Know feature.

It’s all about privacy and people trusting that Facebook is making the best effort to protect the privacy of users. … It’s not about protecting the privacy of users as long as it stays out of the way of Facebook growing and expanding.

Facebook's People You May Know feature, introduced in 2008, helps people discover new connections, be they long-forgotten school chums or colleagues.

It both helps people to build out their Facebook networks and enables Facebook to build a treasure trove of valuable data about us and the people with whom we associate.

(That daisy-chaining analysis, of course, enables people like NSA agents to pull the communications of innocent people into far-reaching surveillance dragnets that snare friends of friends of actual targets, as was shown in recently revealed documents from whistleblower Edward Snowden.)

To exploit the privacy hole, an attacker creates a new user account on Facebook and sends a friend request to the victim.

Even if the intended victim declines the request, Facebook begins to suggest to the attacker people he or she may know, with the option of clicking a "see all" button for convenience.

The people suggested in that list are friends of the target who received the friend request, even when the friends list of the victim is set to private and the other suggested users also have their friends list set to private.

If you don't have friends on Facebook and send a friend request to someone who's chosen to hide their complete friend list from their timeline, you may see some friend suggestions that are also friends of theirs. But you have no way of knowing if the suggestions you see represent someone's complete friend list.

but it has shows that most of the friends list - which often includes hundreds of friends - is available to the attacker.

yesterday i told you how facebook allow our friend to see our email and today tihs one...

Is Facebook privacy only an illusion, designed to lull us into sharing more than we would if we knew what the company really did with our data?

Hands off, Facebook, and please, fix this privacy hole.
COMMON FACEBOOK SLANG SHORT CHAT CODES

MUST SHARE

ASAP - As Soon As Possible
GN - Good Night
M/F - Are You Male or Female?
ASL - Tell me your Age,Sex and Location
IDK - I don’t Know
SD - Sweet Dreams
BRB - Be Right Back
JK - Just Kidding

How to hack any website with google search (full tutorial with demo)

How to hack any website with google search (full tutorial with demo)

http://www.technotification.com/2014/01/hack-any-website-with-google-live-exmple.html

Most commonly used techniques for hacking Passwords.

Most commonly used techniques for hacking Passwords.

1. Hacking into a server that stores passwords in plaintext

there are many ways to do this. I won’t delve into the technical details but they can range from sophisticated-sounding methods like an ‘SQL injection’ to “manual” methods like stealing the server’s hard disk.
Once the attacker gets into the system, passwords can be easily retrieved from the database because they are all in plaintext.

considering the risks of storing sensitive data in plaintext, you’d think it would be unimaginable for big companies to store passwords in this manner. Well, think again.
That’s exactly what Yahoo! did (result: 4 million passwords shown online), which led to that massive data breach referred to earlier.

2. Operating as a man-in-the-middle

In a man-in-the-middle (MITM) attack, an attacker hijacks communications between two machines (e.g. a server and a client, two clients, a router and a client, or a router and a server).
Hacker then sets up his computer to impersonate both legitimate machines and then makes it appear they are still communicating with one another.

How I Hacked Snapchat's Dumb Anti-Robot Security In Less Than 30 Minutes

How I Hacked Snapchat's Dumb Anti-Robot Security In Less Than 30 Minutes
- STEVEN HICKSON

I woke up this morning and saw an article detailing Snapchat's new verification system designed to help cut back the snap spam that seems to be slowly infiltrating the service.

You may not have seen it but if not I will summarize it for you. They basically have you choose from amongst a bunch of images, identifying the ones that have the Snapchat ghost to prove you are a person. It is kind of like a less annoying CAPTCHA.

How I Hacked Snapchat's Dumb Anti-Robot Security In Less Than 30 Minutes

How to hack Gmail accounts !!

The Internets MOST ASKED QUESTION OF ALL TIME !
HOW CAN I HACK HOTMAIL/GMAIL/YAHOO/FACEBOOK
OK ?

Here is the “CORRECT” answer,
I’m merely disappointed by the number of technically illiterate people around the world. The most popular question in any hacking related site is “How to hack e-mail” its not tolerated in any security/hacking related forum and if asked you can expect to get a rant from people. the reason is simple because there are NO ways of hacking a e-mail address by easy means and the people who know this fact often get very annoyed when most people don’t understand WHY its NOT POSSIBLE

The hacking of a e-mail is possible when a person who owns the account gets hacked. the other way is to hack them directly from the e-mail servers which is most unlikely because these sites use sophisticated Intrusion Detection and highly skilled consultants who are up to date with exploits and patch’s. unless you are a real professional hacker its highly unlikely you will ever break into a e-mail server.

People MUST understand that there are NO PROGRAMS/SOFTWARE’S that can hack a e-mail password when you enter an e-mail address. to understand this better let me explain you how e-mail works
Lets say you have a gmail account

facebook hacked

how to hack sites

Learn to hack websites with XSS (cross site scripting) http://www.technotification.com/2014/01/hack-websites-with-cross-site-scripting.html