Pages

Monday, 13 January 2014

HOW TO DOWNLOAD ANY WEB PAGE IN PDF FORMAT ?

Hello friends, this is a very useful trick to download any webpage in pdf file format. Just follow the below steps below:

1. Go to pdfmyurl.com by clicking here.
2. Then enter the url of the website which u want to download in pdf format as shown in the picture below.
3. Hit enter or click on the logo as shown above.
4. Download the file.

DOWNLOAD E-BOOK "HACKING FOR BEGINNERS - A BEGINNERS GUIDE FOR LEARNING ETHICAL HACKING" BY MANTHAN DESAI.


Download the e-book from here (torrent link).
Download the audio book from here (torrent link).

About the Author: Manthan Desai is a sovereign Computer Security Consultant and has state-of-the-art familiarity in the field of computer.An ethical hacker and a freelance web designer is famous for his website Hacking Tech (www.hackingtech.in) which is ranked 2nd in the ucoz.com web hosting servers for security field. Manthan is indeed a writer on the internet through his website. Over 10,000 visits have been incurred on his website and on the increase day by day. Manthan is currently perusing his bachelor’s degree in computer science engineering and is working as and information security consultant and web designer.
He is providing the services like Ethical hacking training and workshops, website Development and maintenance,security consultant, graphic designing for website. The one and the only quote that Manthan uses while his ethical hacking is “Hack it and Have it.”

Index
SECTION 1:- The Theatrical concepts and Explanation.

1. Concept of Ethical Hacking

What Is Hacking 
Types of hacker 
Why hackers hack? 
Preventions from hacker 
Steps Performed by hackers 
Working of an Ethical hacker

2. Email Hacking 

How Email Works? 
Email service protocols 
Email spoofing 
PHP Mail sending script 
Email Spamming 
Phishing 
Prevention from phishing 
Email Tracing 
Keystroke loggers 
Securing Your Email account 

3. Windows Hacking and Security.…...

Security Architecture of Windows
Windows user account Architecture
Cracking Windows User Account password 
Windows User Account Attack 
Counter Measures of Windows Attack 
To hide a file behind a image 
Make a private folder
To run net user in Vista and Windows 7 
Brute Force Attack 
Rainbow table attack 
Counter Measures for Windows Attack 

4. Trojans in Brief 

Knowing the Trojan 
Different Types of Trojans 
Components of Trojans 
Mode of Transmission for Trojans 
Detection and Removal of Trojans 
Countermeasures for Trojan attacks 

5. Attacks on web servers and Security


Introduction to Web Servers
The Basic Process: How Web servers work 
Attacks on Web servers 
Web Ripping 
Google Hacking 
Protecting Your Files from Google 
Cross Site Scripting (XSS) 
Directory Traversal Attack 
Database Servers 
Login Process on the websites 
SQL injection 
Input validation on the SQL Injection 
PHP Injection: Placing PHP backdoors 
Directory Access controls 
How Attackers Hide Them While Attacking 
Types of Proxy Servers

6. Wireless hacking 

Wireless Standards 
Services provided by Wireless Networks 
MAC address filtering
WEP key encryption 
Wireless attacks 
MAC spoofing 
WEP cracking 
Countermeasures for Wireless attacks 

7. Mobile Hacking – SMS & Call forging

What Does It Involve 
Call Spoofing / Forging 
SMS Forging 
Bluesnarfing 

8. Information gathering and Scanning 

Why Information gathering? 
Reverse IP mapping 
Information Gathering Using Search Engine 
Detecting ‘live’ systems on target network 
War diallers 

9. Sniffers

What are Sniffers ? 
Defeating Sniffers
Ant Sniff 

10. Linux Hacking

Why Linux?..............
Scanning Networks 
Hacking tool Nmap 
Password cracking in Linux 
SARA (Security Auditor’s Research Assistant) 
Linux Root kits 
Linux Tools: Security Testing tools 
Linux Security Countermeasures

SECTION 2:- The Tutorial based hacks and explaination as online.

1. How to Chat with your friends using MS-DOS
2. How to change your IP address 
3. How To fix corrupted XP files …………….
4. Delete an “Undeletable” File / Folder 
5. What is Steganography? 
6. What Is MD5 Hash & How to Use It? 
7. What is Phishing and Its Demo 
8. How to view hidden passwords behind asterisk (********) 
9. Hacking Orkut Account Using Cookie Stealing 
10. Tab Napping A New Phishing Attack 
11. How to Check The email is original or Not 
12. Hack facebook account using facebook hacker 
13. What Are Key loggers 
14. How to remove New Folder virus 
15. Mobile hack to call your friends From their own Number 
16. Get Orkut Scraps on Mobile for free using Google SMS Channel!
17. Internet connection cut-off in LAN/Wi-Fi 
18. WEP cracking using Airo Wizard
19. 12 Security tips for online shopping 
20. How to check if Your Gmail account is hacked or not 
21. Beware of common Internet Scams and Frauds 
22. 12 Tips to maintain a virus free PC
23. 10 Tips for Total Online Security
24. What to do when your Orkut account is hacked
25. Making a computer virus 
26. SQL injection for website hacking
27. How a ‘Denial of service’ attack works 
28. XSS vulnerability found on You Tube explained 
29. Hacking Deep Freeze 
30. How to watch security cameras on internet 
31. List of PC file 
32. Nice List of Windows Shortcuts 
33. How to find serial numbers on Google 
34. How to create a CON folder in Windows 
35. 10 Reasons why PC’s crash you must know
36. How to use Kaspersky for Lifetime without Patch 
37. Disguise as Google Bot to view Hidden Content of a Website 
38. How to Download Facebook videos 
39. Hack a website by Remote File Inclusion 
40. What is CAPTCHA and how it works?
41. Hack Password of any Operating System 
42. Windows PowerShell Security in 
43. What is Secure Sockets Layers (SSL)? 
44. Make a Private folder With your password 
45. Making a Trojan using Beast 
46. Hacking yahoo messenger for multi login 
47. 5 Tips to secure your Wi-Fi a connection 
48. Upgrade Windows 7 to any higher version 
49. World’s top 10 internet hackers of all time 
50. The complete History of hacking.

WHAT IS A TROJAN HORSE ?













In computers, a Trojan horse is a program in which malicious or harmful code is contained inside apparently harmless programming or data in such a way that it can get control and do its chosen form of damage, such as ruining the file allocation table on your hard disk.

Trojan horse attacks pose one of the most serious threats to computer security. If you were referred here, you may have not only been attacked but may also be attacking others unknowingly. This page will teach you how to avoid falling prey to them, and how to repairthe damage if you already did. According to legend, the Greeks won the Trojan war by hiding in a huge, hollow wooden horse to sneak into the fortified city of Troy. In today's computer world, a Trojan horse is defined as a "malicious, security-breaking program that is disguised as something benign". For example, you download what appears to be a movie or music file, but when you click on it, you unleash a dangerous program that erases your disk, sends your credit card numbers and passwords to a stranger, or lets that stranger hijack your computer to commit illegal denial of service attacks like those that have virtually crippled the DALnet IRC network for months on end.

The following general information applies to all operating systems, but by far most of the damage is done to/with Windows users due to its vast popularity and many weaknesses.
(Note: Many people use terms like Trojan horse, virus, worm, hacking and cracking all interchangeably, but they really don't mean the same thing. If you're curious, here's a quick primer defining and distinguishing them. Let's just say that once you are "infected", trojans are just as dangerous as viruses and can spread to hurt others just as easily!)

HOW TO PLAY MULTIPLAYER ONLINE GAMES USING TUNNGLE




If you have ever played a multiplayer game, then you know a single player mode can’t beat that experience. Its like taking things to anext level as one is playing with another human which mean more randomness, more dynamic moves and obviously more fun.
But the problem majority of the PC users face is that they can’t play online because they are either using a pirated or cracked version. But they can actually play on LAN without a genuine version of the game because there is nothing like a server to check which one to allow and which one to not.
tunngle
Tunngle works on this principle, I should say exploit this practically by creating a virtual LAN in which other players act as if they were connected to you on LAN and then you can play with them by going to LAN options and then either starting your own game or joining someone’s else.
Its a whole lot of fun and Tunngle makes this hassle free.
So, here is how you do it.
  • Signup for a free Tunngle account.
  • Install the software and log into your account by running their software.
  • Go to Communities > Network > Search or just enter the Search on the left.
  • Type in what game do you want to play. (Type ‘Age’ for Age of empires and ‘Need for Speed’ for any version of NFS, as it will resultsmore results to chose from and avoiding ending up with no results due to searching keywords)
  • Double click to join one of the rooms.
That’s it.
Any games you host or anyone else will appear on the LAN option of all the players in that room.
They have a lot of games which you can play at the moment which covers almost all the popular ones. You can take a look at the list of the games.
Have fun playing online!
Note – Tunngle is coming up with a new client so the interface might change a bit from what it is shown in this post.

DOWNLOAD CCLEANER PC OPTIMIZER LATEST VERSION 2013

CCleaner is a freeware system optimization, privacy and cleaning tool developed by Piriform Softwares Limited. This optimization tool is available for the Windows and Mac OSX platform.






Special Features of CCleaner are listed below:

1. Protects your privacy online.
2. Makes your computer faster and more secure.
3. Easy to install software [very small in size].
4. Cleans temporary internet files, history, cookies, index.dat files, autocomplete form history, download history, cookies, etc of your browsers.
5. Scans for Windows registry issues and fixes them.
6. Cleans unnecessary & temporary files of various applications and utilities thereby making your computer run faster.
7. Runs on Microsoft Windows 8, 7, Vista and Windows XP including both 32 and 64-bit versions.

Software name: CCleaner
Developer: Piriform
Version: 3.26
File size: 4 MB

Download CCleaner for yor PC by clicking the link below:

>>Download_CCleanerv3.26<<

Saturday, 11 January 2014

5 Essential Apps For Rooted Android Devices

Here is a suggestion of the most essential apps that one should consider installing after rooting their Android smartphone or tablet
5 essential apps for rooted Android devices
If you are an Android user, then you might have heard about rooting your device. In simple terms it is a process that allows a user to gain privilege control of the Android subsystem. A rooted device enables the user to perform functions that are not available to a normal Android user like running special apps that require administrator permissions, alter system applications and settings, or even remove and replace the OS to the most recent version.
Rooting a device is not that tough and there are a number of sources on the web that will help you perform the procedure. However, rooting a device means that you could lose the warranty of your device and could even end up with a bricked device, so be very careful.
Right, so you managed to root your Android device, what next? Well, you should definitely get these apps as soon as you are done with the procedure.

1.    Root Checker

As the name suggests, this app confirms whether your device was rooted properly or not. It even tells you some basic system information of your device. Once you run the app, it checks for system admin access. In case you do not have root access, it means that you need to go through the rooting process once again. Quite useful for people who are rooting their device for the first time.

Grab the app for free from the Google Play store.

2.    ClockworkMod (CWM)
This is very the terms get a little technical. Clockwork recovery is a very essential tool for all rooted devices as this app enables you to access your device’s recovery mode. Through the recovery mode you can install different customized ROMs, make an entire backup of your whole system as an image, install apps directly into the system, perform system related functions like formatting and partitioning your memory and a lot more. If you are rooting for the first time, do go through instructions and tips on using CWM because it isn’t that easy to use.

 
You need to install ROM manager to install CWM into your system. Download the app from here.


3.    Titanium backup pro

One of the best backup tools available for Android is Titanium backup pro. The app requires root access and lets you back-up all of your apps along with your data. It even lets you backup your system apps in case you plan to change your smartphone or just plan to change your ROM. One of the best features of Titanium is that you can uninstall any app from your device meaning that all the unnecessary bloat-ware apps that you don’t use can be removed from your device. Just a word of caution, do not remove any Android system related apps as you could end up damaging the operating system files.
Titanium backup pro is available from the Google Play store for Rs. 329


4.    Root Browser

This is your traditional file manager application which allows you to access all of your files and folders. You can move, copy or delete files, open or create zip files, sort your files to any order, share files with anyone, etc. Once you have rooted your device this app will let you access your system files and set read and write permissions of files and folders. Root browser is a very useful app as it makes the task for searching files and folders very easy.
The app is available for free from the Google Play store over here.

5.    STweaks

If you are looking for an app to mess around with your system then Stweaks is the answer. The app is a very powerful tool which directly allows you to reconfigure your Android kernel so use this app with extreme caution. You can perform various system functions like changing the clock speed of your processor, change the levels on your display, enable backlight notifications, boost your audio output, enable dual-booting, change the power consumption modes, and so on.
The only drawback of this app is that it is supported by limited number of kernels, so make sure you go through the list of supported kernels when you install the app.
Stweaks can be downloaded free of cost from the Google Play store.

Wednesday, 1 January 2014

How to make your pendrive bootable using Command Prompt

Hello friends, in this post, i will show you how to make your pendrive bootable to install Windows Vista/7 and 8 using only Command Prompt. Follow the tsep by step tutorial below:

1. Insert your USB (4GB+ preferable) stick to the system and backup all the data from the USB as we are going to format the USB to make it bootable.

2. Open elevated Command Prompt. To do this, type in CMD in Start menu search field and hit Ctrl + Shift + Enter. Alternatively, navigate to Start > All programs >Accessories > right click on Command Prompt and select run as administrator.

3. When the Command Prompt opens, enter the following commands:


DISKPART and hit enter.

LIST DISK and hit enter.

Once you enter the LIST DISK command, it will show the disk number of your USB drive. In the below image my USB drive disk no is Disk 1.

4. In this step you need to enter all the below commands one by one and hit enter. As these commands are self explanatory, you can easily guess what these commands do.

SELECT DISK 1 (Replace DISK 1 with your disk number)

CLEAN

CREATE PARTITION PRIMARY

SELECT PARTITION 1

ACTIVE

FORMAT FS=NTFS

(Format process may take few seconds)

ASSIGN

EXIT




Once it is done, copy the windows DVD contents to the pendrive.


You are done with your bootable USB. You can now use this bootable USB as bootable DVD on any computer that comes with USB boot feature (most of the current motherboards support this feature).

Note: This bootable USB guide will not work if you are trying to make a bootable USB on XP computer.

A short Description on Animation

Animation is a graphic representation of drawings to show movement within those drawings.  A series of drawings are linked together and usually photographed by a camera.  The drawings have been slightly changed between individualized frames so when they are played back in rapid succession (24 frames per second) there appears to be seamless movement within the drawings.
Extinct dinosaur?Pioneers of animation include Winsor McCay of the United States and Emile Cohl and Georges Melies of France.  Some consider McCay's Sinking of the Lusitania from 1918 as the first animated feature film.
     Early animations, which started appearing before 1910, consisted of simple drawings photographed one at a time.  It was extremely labor intensive as there were literally hundreds of drawings per minute of film.  The development of celluloid around 1913 quickly made animation easier to manage.  Instead of numerous drawings, the animator now could make a complex background and/or foreground and sandwich moving characters in between several other pieces of celluloid, which is transparent except for where drawings are painted on it.  This made it unnecessary to repeatedly draw the background as it remained static and only the characters moved.  It also created an illusion of depth, especially if foreground elements were placed in the frames.
Night time sky     Walt Disney took animation to a new level.  He was the first animator to add sound to his movie cartoons with the premiere of Steamboat Willie in 1928.  In 1937, he produced the first full length animated feature film, Snow White and the Seven Dwarfs.
     With the introduction of computers, animation took on a whole new meaning.  Many feature films of today had animation incorporated into them for special effects.  A film like Star Warsby George Lucas would rely heavily on computer animation for many of its special effects.  Toy Story, produced by Walt Disney Productions and Pixar Animation Studios, became the first full length feature film animated entirely on computers when it was released in 1995.
     With the advent of personal computers, it has now become possible for the average person to create animations.
Bibliography
Finch, Christopher. The Art of Walt Disney, 1973.
Laybourne, Kit.  The Animation Book, 1998.
Locke, Lafe.  Film Animation Techniques, 1992
Manvell, Roger. Grolier Multimedia Encyclopedia, 1998.
Mosley, Leonard. Disney's World, 1985.

Download Bat to Exe Converter


Bat To Exe-Converter is a tool that lets you convert bat script files that you write on notepad to exe files. There are some differences to normal bat files. You can create invisible applications, you can include additional binaries, icons and version informations to your program.

Download Bat to exe-converter by clicking here.