Monday, May 31, 2010

Translating Binary to Text: The Hard Way



A Tutorial for those willing to Learn


Contents
1. Introduction
2. The Binary System
3. Converting Binary to ASCII (Text)


Introduction:
We’ve all seen binary code. We’ve come to think of them as a bunch of ones and zeroes in long strings…
010010101010101001101011


But these ones and zeroes can also represent decimal numbers. First off, I will show you how to read these numbers as the decimal numbers we’re used to in our daily life. Then, I will show you how to use those numbers and your keypad to translate them into text. Note that your computer doesn’t use the decimal system, so technically, when it converts binary to text, it doesn’t go through the process I will show you. This is just a divertive way of explaining you how the binary system works.


The Binary System:
Here’s a simple example of binary:
10101


Let’s think of the example above as empty slots:
_ _ _ _ _


First off, you read binary from right-to-left. It’s just the way it’s designed. The first slot from the right represents a value of one, the second from the right a value of two, the third from the right a value of four, the fourth from the right a value of eight, the fifth from the right a value of sixteen, and the cycle continues by multiples of 2. This will never change.


By putting a 1 or a 0 in those slots you are either saying you want to corresponding value that’s attached to that slot or you don’t. A 1 means yes, and a 0 means no. For example, putting a zero in the first slot from the right, but a 1 in the second slot from the right means you want a two, but not a one:
_ _ _ 1 0


As such, the number above equals to a decimal value of two.


As an example, let’s say you want to represent eight in binary form. Well, thinking about the slots, you want the first slot to be 0 because you don’t want a one, you want the second slot to also be 0 because you don’t want a two, you want the third slot to also to be 0 because you don’t want a four, but you want the fifth slot to be 1 because you want a value of eight. As such, eight in binary form is:
1 0 0 0 (or simply 1000 without those underlines)


Now it is important to note that the amount of zeroes that precede the first value of one from the left is unimportant. So for example:
1 0 0 0 is the same as 0 0 0 1 0 0 0 (1000 = 000100)


To get it cleared up, here’s another example:
0 1 is the same as 1




Exercises: What do the following equal in decimal terms?
a) 100
b] 000100
c) 100000
d) 0010


Answers:
a) 4
b] 4
c) 32
d) 2


If you got the answers above right, then you pretty much understand the basics of binary.
Let’s now understand how to get the corresponding decimal values to the numbers which are not multiples of 2.


To get the total value of a binary number, add the values corresponding to each slot. So, for example, three in binary would be:
11


The above corresponds to three because if you add the total values of all the slots, that is to say a one from the slot to the right, and a two from the second slot to the right, then it equals three.


As another example, let’s say you want to represent 5 in binary terms. Then you would need a value of one to be added to a value of four, and you would not want a value of two:
101 [Reading from the right: 1(one) + 0(two) + 1(four) = five]


Here’s an additional example:
001011 [Reading from the right: 1(one) + 1(two) + 0(four) + 1(eight) + 0(sixteen) + 0(thirty-two) = eleven)






Exercises: What do the following equal in decimal terms?
a) 11011
b] 110
c) 010101
d) 10110


Answers:
a) 27
b] 6
c) 21
d) 22


If you got the above questions correct [without cheating], then you essentially understand the binary system. Understanding the binary system was the hard part. What follows is pretty easy.


3. Converting Binary to ASCII (Text)
ASCII is essentially the letters, numbers and symbols that are stored in our computers through the use of fonts. When the keyboard relays the buttons you pressed, it sends in a code which is then converted to the ASCII equivalent of “k” or “5” or whatever key you pressed.


Here’s an example of a message “hidden” in binary text:
0100100001100101011011000110110001101111


Now there are only so many letters, numbers and symbols stored for ASCII. Having sets of 8 digits for their binary equivalent is more than enough to represent all of these letters and the like. As such, all strings that represent text like in the above are separated into bits of 8 for simplicity:
01001000 01100101 01101100 01101100 01101111


Okay, so our example message was separated into 8 digit strings. The decimal value for each of these strings in the example was calculated for you.
01001000 = 72
01100101 = 101
01101100 = 108
01101100 = 108
01101111 = 111


The result was 72,101,108,108,111. Now, there is something called the ASCII table. It essentially corresponds to the binary numbers from yore to the equivalent letters/symbols/numbers. But since we found the decimal values of these binary strings, we can use a major shortcut.


By pressing ALT + [The Number], you will get the ASCII equivalent of that number. For example, by pressing the ALT key and at then (while keeping it down) the numbers 72 in any text editor, you will get the corresponding “H” to show up.


Let’s do so for the entire example message:
72 = H
101 = e
108 = l
108 = l
111 = o


So the entire “hidden” message translates to “Hello”.




Exercise: Decode the following message
010000110110111101101110011001110111001001100001011101000111010101101100011000010111010001
101001011011110110111001110011 00100001


Hint: The first step on your way to decoding the message (separated into bytes for you)
01000011 01101111 01101110 01100111 01110010 01100001 01110100 01110101 01101100 01100001 01110100 01101001 01101111 01101110 01110011 00100001




PS. Please note that this is the information as I've come to understand it. As such, it's somewhat easier to understand, but it may not necessarily be accurate. In other words, if another source contradicts what has been indicated here, that source is probably right. This text was completely written up by me, with no other sources for aid. If you wish to distribute this text, feel free to do so, but I would appreciate it if you contacted me first.

Turn off unneeded services and speed up your pc

 here is a list of services that can be turned off
this will speed up your pc a bit

right click my computer
manage
services and applications
services

set these to disabled you will need to reboot for them to take effect if you have a problem with any just reenable them again ie if you have a smart card and you disable it wont work

alerter
application layer gateway service
application management
ati hotkey poller
automatic updates
background intelligent transfer service
clipbook
com+ event system
com+ system application
distributed transaction coordinator
error reporting service
fast user switching compatibility
help and support
human interface device access
imapi cd burning com service
indexing service
internet connection firewall(icf)/internet connecton sharing(ics)
ipsec services
logical disk manager
logical disk manager administrative service
messenger
ms software shadow copy provider
net logon
netmeeting remote desktop sharing
network dde
network dde dsdm
nt lm securtiy support provider
performance logs and alerts
portable media serial number service
qos rsvp
remote desktop help sesson manager
remote registry
removable storage
secondary logon
security accounts manager
server
smart card
smart card helper
ssdp discovery service
system restore service
task scheduler
tcp/ip netbios helper
telnet
terminal services
uninterruptible power supply
universal plug and play device host
upload manager
video proes
volume shadow copy
webclient
windows time
wireless zone configuration
wmi performance adapter
workstation

How to turn MSN Messenger Display Pictures into User Pictures on XP

For the pix you downloaded from MSN
If you’ve ever wanted to turn the display pictures you download from MSN into an account picture (the one that appears in your Start Menu next to your username) for XP here’s how.


1) In messenger Choose ==> Change Display Picture and then ==> Download more pictures.
2) Download the desired images.
3) Open 'Folder Options' in Explorer and make sure you can view Hidden Files and folders.
4) Navigate to X:\Documents and Settings\User_Name\Application Data\Microsoft\MSN Messenger, where X: is the drive XP is on and User_N

Tutorial : How to create a bootable Windows XP SP1 CD (Nero)

How to create a bootable Windows XP SP1 CD (Nero):
Step 1
Create 3 folders - C:\WINXPSP1, C:\SP1106 and C:\XPBOOT
Step 2
Copy the entire Windows XP CD into folder C:\WINXPSP1
Step 3
You will have to download the SP1 Update, which is 133MB.
Rename the Service Pack file to XP-SP1.EXE
Extract the Service Pack from the Ru

Use Hotkeys to Switch Programs

if you routinely use a specific set of programs, you can set up hotkeys that will launch or directly switch among them instead of cycling with Alt-Tab. Find a desktop or Start menu shortcut that launches a program and select Properties. On the Shortcut tab, click in the Shortcut key box, and press the key combination you want to use. Be sure to choose key combinations that are not needed by any of your programs; for example, use Alt-Shift-1, Alt-Shift-2.

Using Google for searching ebooks

Google has some fantastic potential for you to find whatever you are after on the internet.
To search for a book / program / file perhaps try the following.
Go to Google's search page and use the following criteria in the search dialog
intitle:index.of? file extension Name of item
e.g. intitle:index.of? chm syngress
This will hopefully give you a listing of all websites that google has cached that contain references to files in CHM format that are published by SY

How to use the Google calculator:



Google’s calculator tries to understand the problem you are attempting to solve without requiring you to use special syntax. However, it may be helpful to know the most direct way to pose a question to get the best results. Listed below are a few suggestions for the most common type of expressions (and a few more esoteric ones).

Most operators come between the two numbers they combine, such as the plus sign in the expression 1+1.

Operator  Function  Example
+ addition  3+44
-  subtraction  13-5
*  multiplication  7*8
/  division  12/3
^ exponentiation (raise to a power of)  8^2
% modulo (finds the remainder after division) 8%7
choose  X choose Y determines the number of ways of choosing a set of Y elements from a set of X elements  18 choose 4
th root of  calculates the nth root of a number  5th root of 32
% of  X % of Y computes X percent of Y 20% of 150


Some operators work on only one number and should come before that number. In these cases, it often helps to put the number in parentheses.

Operator  Function  Example
sqrt  square root  sqrt(9)
sin, cos, etc. trigonometric functions (numbers are assumed to be radians)  sin(pi/3)
tan(45 degrees)
ln  logarithm base e  ln(17)
log logarithm base 10  log(1,000)

A few operators come after the number.

Operator  Function  Example
!  factorial  5!

Other good things to know

You can force the calculator to try and evaluate an expression by putting an equals sign (=) after it. This only works if the expression is mathematically resolvable. For example, 1-800-555-1234= will return a result, but 1/0= will not.

Parentheses can be used to enclose the parts of your expression that you want evaluated first. For example, (1+2)*3 causes the addition to happen before the multiplication.

The in operator is used to specify what units you want used to express the answer. Put the word in followed by the name of a unit at the end of your expression. This works well for unit conversions such as: 5 kilometers in miles.

You can use hexadecimal, octal and binary numbers. Prefix hexadecimal numbers with 0x, octal numbers with 0o and binary numbers with 0b. For example: 0x7f + 0b10010101.

The calculator understands many different units, as well as many physical and mathematical constants. These can be used in your expression. Many of these constants and units have both long and short names. You can use either name in most cases. For example, km and kilometer both work, as do c and the speed of light.

Feel free to experiment with the calculator as not all of its capabilities are listed here. To get you started, we’ve included a few expressions linked to their results.

1 a.u./c
56*78
1.21 GW / 88 mph
e^(i pi)+1
100 miles in kilometers
sine(30 degrees)
G*(6e24 kg)/(4000 miles)^2
0x7d3 in roman numerals
0b1100101*0b1001

More info on:
http://www.google.co.in/help/calculator.html

Windows scan count down time

Change the CHKDSK countdown time
When you schedule CHKDSK to run at the next boot, the system will prompt you to press a key to cancel the operation while CHKDSK is running. The system will display a countdown during that cancel period. The default value is 10 seconds. To Change this open up Regedit and locate:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\AutoChkTimeOut
You can change the value to anything from zero to 259,200 seconds (3 days). With a timeout of zero, there is no countdown and you cannot cancel the operation

Windows Xp: Speed Up Your, Speed Up Your Network and Internet Access



I have a dial up connection and it improve my speeds about 25% in surfing the internet. give it a try. Im IT , only do it if you feel comfortable with changing registry. 


Increasing network browsing speed


Does your computer slow down when you browse your local area network and connect to other computers that are sharing data? One of the most common causes of this slowdown is a feature of Windows Explorer that looks for scheduled tasks on remote computers. This effort can take some time on some computers and can really slow down your browsing. The window with which you are browsing the network may appear to freeze momentarily, as the s

Windows xp registry tricks

Hacking Windows XP Registry
Structure of Windows XP Registry :


When you will open the Windows XP Registry , you will see it's divided into two panes. On the left side there are Five main 
Keys as shown below. These can be expanded to several Sub-Keys, which further has many Sub-Keys.


+HKEY_CLASSES_ROOT


+HKEY_CURRENT_USER


+HKEY_LOCAL_MACHINE


+HKEY_USERS


+HKEY_CURRENT_CONFIG


Before you try out t

Yahoo plus geocities


 Like the BrTurbo links... there's a little bit to know what the links from Yahoo/Geocities do... or how they work...


Maybe this can be pinned here as the BrTurbo post thread is posted here as well !?


===================================
The Beginning :
You must use a downloading program like flashget. 150+ Kbps download speeds


There is a lot of people downloading from these servers so don't be surprised
if it's hard to get the files lickity split, it will take time, maybe up to 24hours or longer.
Error 503 (Service Temporarily Unavailable), 508 (Unused) or 999 (Not available)
will be a Normal Response


( Error 404 is the only response you DON'T want = File deleted )


The following are tips for downloading from Yahoo/Geocities, you will get
what you want quicker and easier by following them.


A few restrictions that I've figured out by downloading from the Y/G servers:
You Must only use 1 jet (split part) per file, each extra jet added acts like a
separate file and you will have to do the IP change more often (see below).


Example: file.zip with 8 jets or split parts seems like 8 separate files
to the server yet you've only downloaded 1 file (IP change range 10 to 15 files)
If you don't mind changing your IP every 5 minutes then use all the jets you want, LoL
but I recommend just leaving at 1 jet per file.


(MOST Important)
You MUST change the Referrer on every file so it is Blank, if it isn't set correctly
you will get a 403 (forbidden error)
(Tip from DarkKnightz)


_____________________________________________________________________
The next section in most cases won't need to be read, But if
you do have a problem come back and read the rest, LoL
_____________________________________________________________________


Your downloads will stop at times with a code 999, 503 Service Temporarily Unavailable
or 508 Unused, be patient it will restart but give it some time, But if it doesn't
restart after 10 or so retries try pausing the download for 5 to 15 minutes, or
move on to another file and come back to it later. Keep bouncing around because
sooner or later they will start.


Most times if you pause your downloads for 5 to 15 minutes, they will restart,
But this is a last resort (IP Change)
Before doing this make sure you gave the files plenty of retries (approximately
25 No starts) If No more of the files will start downloading and your getting a
503 Service Temporarily Unavailable, 508 Unused or 999 Not available,
all you need to do is change your IP number.


#1 by re-dialing (Dial-up)


OR


#2 disconnect your modem from the net (disconnect your modem in the setup interface)
for about 30 seconds, reconnect the modem and you'll have a new IP.
Unless you have a static IP, in which you'll have to use proxies like with BRTurbo
to evade the max bandwidth restriction.


Any files that continue to be a problem Re-check to make sure you have the proper
referrer set, if they're all OK then you may have to wait a few hours and start where
you left off.


If you have a static IP use a proxy like when you download from BRTurbo links.

Sunday, May 30, 2010

See Hidden Files In DOS.

 Simple and useful tip
******************
at command prompt just type
dir /ah
if the list is too long u can use
dir /ah/p/w
*******************

How do I Test My VirusScan Installation? (Eicar)

Description


After installing VirusScan, you may logically wonder, how do I know if it's working? The answer is a test virus. The EICAR Standard AntiVirus Test File is a combined effort by anti-virus vendors throughout the world to implement one standard by which customers can verify their anti-virus installations.


Solution


To test your installation, copy the following line into its own file, then save the file with the name EICAR.COM. More detailed instructions are found below.


X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*


The file size will be 68 or 70 bytes.


If VirusScan is runn

Get unlimited bandwidth from your host for free

                             Get unlimited bandwidth from your host for free




NOTE: This applies only to specific hosting companies, due to the
specific setup needed and does have its drawbacks.


While setting up hosting space with a specific company I often deal
with, I noticed that they used a shared IP. (IP shared by two or more
websites/domains.) Well, the rates for unlimited bandwidth were
around $50+ per month, which I found unreasonable. I didnt require
much space, and didnt want to be limited to a mere 3 gig of traffic
per month.


Back on track... When setting up the acct, the hosting company needs
to know the domain name so that they can dire

Free World Dialup

Free World Dialup


Free World Dialup - http://www.freeworlddialup.com/
"Use FWD to make real, free phone calls using your favorite telephone, computer or PDA and any broadband connection. Call your neighbor or a relative, next door or in another country; all with the same ease, speed, and high quality." Thanks to Jeff Pulver and his crew!


Quick summary:


1 - First, got to http://www.freeworlddialup.com and sign up to get your FWD # and password.
2 - Download http://brands.xten.net/x-li

Free Access To Websites Without Registering

                                       Free Access To Websites Without Registering


Go to


-http://bugmenot.com/


and type the URL of the website you want to log into.
Examples:


-http://www.nytimes.com/, -http://www.winnetmag.com/
etcetera.


Another (and better) way is changing the user agent of your browser to:
Googlebot/2.1+


-http://www.googlebot.com/bot.html


This is very easy in Mozilla's Firefox. Download and install the User Agent Switcher from


-http://www.chrispederick.com/work/firefox/useragentswitcher/
and add the Googlebot user agent.


Have fun, Dead Dreamer!


-]Edit[- Now this kicks ass, was just browsing entire forum without even needing to login to view restricted areas, and it works on other sites 
And no, you cant access the hidden forums either, already tried that

Flashget Broadband Tweak

                                              Flashget Broadband Tweak


Just double-click on the FlashGetRegTweak.reg file to enter the tweak into the registry. This tweak will allow up to 100 simultaneous file downloads, each split into a max of 30 parts. Previous defaults were 8 & 10 respectively.


Note:


      1. Works for dialup but not really advantageous.
      2. Restart your computer to feel the full advantage of this tweak.


Download:
here it is
just copy to notepad
rename to Iwillsinglehandedlykillallthebandwidthfromtheserversidownloadfrom.reg


REGEDIT4


[HKEY_CURRENT_USER\Software\JetCar\JetCar\General]
"Max Parallel Num"="100"
"MaxSimJobs"="100"

Hack Paypal,Download without paying

Just a little basic html tip for those who are trying to download an application from sites which has an paypal order page & link to start you off.


Use a proxy when you try this to hide your ip as some sites will record your ip when you connect for security.


1) Rightclick your mouse (ctrl+click) viewsource and open the source of the site in an a texteditor
2) Search for the word "return"
3) Next to it you can find the url for the thank you page
4) Copy the url and paste it in your browser and you will see the download link


This works only if you can download instantly after payment, it will not work if the link needs to be emailed to you.


You can try it here to start with:
Code:
http://www.ramphelp.com/halfpipe.html




About half way down the page you will find:





Copy the link into your browser and download.

crack the bios password

                                                    crack the bios password in win 95/98:
Follow the steps below:

1) Boot up windows.
2) go to dos-prompt or go to command prompt directly from the windows start up menu.

3) type the command at the prompt: "debug" (without quotes ninja.gif )
4) type the following lines now exactly as given.......
o 70 10
o 71 20
quit
exit

4) exit from the dos prompt and restart the machine
password protection gone!!
PS: I tested this in Award Bios........
There seems to be some issue regarding display drivers on some machines if this is used. Just reinstall the drivers, Everything will be fine...........
I have not found any other trouble if the codes are used.
To be on safe side, just back up your data..........
The use of this code is entirely at ur risk.......... It worked fine for me..........

Windows7 latest working Activator


Windows Open 7 Activator 1.0.9
Changes in 1.0.9:
---Added all new SLP keys.
---Made Product Key 
Checker more user friendly, added button to grab the currently installed Product Key. (the default key in the key checker textbox is now which ever key you have selected in the main O7A window (with the Product Key listbox), so you can easily verify the validity and see if the key is genuine on your system before installing it.)
---Cleaned up code & minor bug fixes.
---Updated help documentation.

How To: Change Your Ip In Less Then 1 Minute

                                Change Your Ip In Less Then 1 Minute


1. Click on "Start" in the bottom left hand corner of screen
2. Click on "Run"
3. Type in "command" and hit ok


You should now be at an MSDOS prompt screen.


4. Type "ipconfig /release" just like that, and hit "enter"
5. Type "exit" and leave the prompt
6. Right-click on "Network Places" or "My Network Places" on your desktop.
7. Click on "properties"


You should now be on a screen with something titled "Local Area Connection", or something close to that, and, if you have a network hooked up, all

Boot Winxp Fast,make windows xp fast

Follow the following steps


1. Open notepad.exe, type "del c:\windows\prefetch\ntosboot-*.* /q" (without the quotes) & save as "ntosboot.bat" in c:\
2. From the Start menu, select "Run..." & type "gpedit.msc".
3. Double click "Windows Settings" under "Computer Configuration" and double click again on "Shutdown" in the right window.
4. In the new window, click "add", "Browse", locate your "ntosboot.bat" file & click "Open".
5. Click "OK", "Apply" & "OK" once again to exit.
6. From the Start menu, select "Run..." & type "devmgmt.msc".
7. Double click on "IDE ATA/ATAPI controllers"
8. Right click on "Primary IDE Channel" and select "Properties".
9. Select the "Advanced Settings" tab then on the device or 1 that doesn't have 'device type' greyed out select 'none' instead of 'autodetect' & click "OK".
10. Right click on "Secondary IDE channel", select "Properties" and repeat step 9.
11. Reboot your computer.

Boot Block Recovery For Free

You don't need to pay a measly sum of dollars just to recover from a boot block mode. Here it is folks:


AWARD Bootblock recovery:


That shorting trick should work if the boot block code is not corrupted, and it should not be if /sb switch is used when flashing the bios (instead of /wb switch).


The 2 pins to short to force a checksum error varies from chip to chip. But these are usually the highest-numbered address pins (A10 and above).


These are the pins used by the system to read the System BIOS (original.bin for award v6), calculate the ROM checksum and see if it's valid before decompressing it into memory, and subsequently allow Bootblock POST to pass control over to the System BIOS.


You just have to fool the system into believing that the System BIOS is corrupt. This you do by giving your system a hard time reading the System BIOS by shorting the 2 high address pins. And when it could not read the System BIOS pr

Best Keyboard Shortcuts

Getting used to using your keyboard exclusively and leaving your mouse behind will make you much more efficient at performing any task on any Windows system. I use the following keyboard shortcuts every day:


Windows key + R = Run menu


This is usually followed by:
cmd = Command Prompt
iexplore + "web address" = Internet Explorer
compmgmt.msc = Computer Management
dhcpmgmt.msc = DHCP Management
dnsmgmt.msc = DNS Management
services.msc = Services
eventvwr = Event Viewer
dsa.msc = Active Directory Users and Computers
dssite.msc = Active Directory Sites and Services
Windows key + E = Explorer


ALT + Tab = Switch between windows


ALT, Space, X = Maximize window


CTRL + Shift + Esc = Task Manager


Windows key + Break = System

What is BandWidth?

This is well written explanation about bandwidth, very useful info.

BandWidth Explained

Most hosting companies offer a variety of bandwidth options in their plans. So exactly what is bandwidth as it relates to web hosting? Put simply, bandwidth is the amount of traffic that is allowed to occur between your web site and the rest of the internet. The amount of bandwidth a hosting company can provide is determined by their network connections, both internal to their data center and external to the public internet.

Network Connectivity

The internet, in the most simplest of terms, is a group of millions of computers connected by networks. These connections within the internet can be large or small depending upon the cabling and equipment that is used at a particular internet location. It is the size of each network connection that determines how much bandwidth is available. For example, if you use a DSL connection to connect to the internet, you have 1.54 Mega bits (Mb) of ba

What is spy-ware?

There are a lot of PC users that know little about "Spyware", "Mal-ware", "hijackers", "Dialers" & many more. This will help you avoid pop-ups, spammers and all those baddies.


What is spy-ware?
Spy-ware is Internet jargon for Advertising Supported software (Ad-ware). It is a way for shareware authors to make money from a product, other than by selling it to the users. There are several large media companies that offer them to place banner ads in their products in exchange for a portion of the revenue from banner sales. This way, you don't have to pay for the software and the developers are still getting paid. If you find the banners annoying, there is usually an option to remove them, by paying the regular licensing fee.


Known spywares
There are thousands out there, new ones a

Abut Ftp,Setting Up A Ftp:



Well, since many of us have always wondered this, here it is. Long and drawn out. Also, before attempting this, realize one thing; You will have to give up your time, effort, bandwidth, and security to have a quality ftp server.
That being said, here it goes. First of all, find out if your IP (Internet Protocol) is static (not changing) or dynamic (changes everytime you log on). To do this, first consider the fact if you have a dial up modem. If you do, chances are about 999 999 out of 1 000 000 that your IP is dynamic. To make it static, just go to a place like h*tp://www.myftp.org/ to register for a static ip address.


You'll then need to get your IP. This can be done by doing this:
Going to Start -> Run -> winipcfg or www.ask.com and asking 'What is my IP?'


After doing so, you'll need to download an FTP server client. Personally, I'd recommend G6 FTP Server, Serv-U FTPor Bullitproof v2.15 all three of which are extremely reliable, and the norm of the ftp world.
You can download them on this site: h*tp://www.liaokai.com/softw_en/d_index.htm


First, you'll have to set up your ftp. For this guide, I will use step-by-step instructions for G6. First, you'll have to go into 'Setup -> General'. From her

What is Internet,Basic Guide

The Internet is a computer network made up of thousands of networks worldwide. No one knows exactly how many computers are connected to the Internet. It is certain, however, that these number in the millions.


No one is in charge of the Internet. There are organizations which develop technical aspects of this network and set standards for creating applications on it, but no governing body is in control. The Internet backbone, through which Internet traffic flows, is owned by private companies.


All computers on the Internet communicate with one another using the Transmission Control Protocol/Internet Protocol suite, abbreviated to TCP/IP. Computers on the Internet use a client/server architecture. This means that the remote server machine provides files and services to the user's local client machine. Software can be installed on a client computer to take advantage of the latest access technology.


An Internet user has access to a wide variety of services: electronic mail, file transfer, vast information resources, interest group membership, interactive collaboration, multimedia displays, real-time broadcasting, shopping opportunities, breaking news, and much more.


The Internet consists primarily of a variety of access protocols. Many of these protocols feature programs that allow users to search for and retrieve material made available

23 ways to speed up windows xp




Since defragging the disk won't do much to improve Windows XP performance, here are 23 suggestions that will. Each can enhance the performance and reliability of your customers' PCs. Best of all, most of them will cost you nothing.
1.) To decrease a system's boot time and increase system performance, use the money you save by not buying defragmentation software -- the built-in Windows defragmenter works just fine -- and instead equip the computer with an Ultra-133 or Serial ATA hard drive with 8-MB cache buffer.


2.) If a PC has less than 512 MB of RAM, add more memory. This is a relatively inexpensive and easy upgrade that can dramatically improve system performance.


3.) Ensure that Windows XP is utilizing the NTFS file system. If you're not sure, here's how to check: First, double-click the My Computer icon, right-click on the C: Drive, then select Properties. Next, examine the File System type; if it says FAT32, then back-up any important data. Next, click Start, click Run, type CMD, and then click OK. At the prompt, type CONVERT C: /FS:NTFS and press the Enter key. This process may take a while; it's important that the computer be uninterrupted and virus-free. The file system used by the bootable drive will be either FAT32 or NTFS. I highly recommend NTFS for its superior security, reliability, and efficiency with larger disk drives.


4.) Disable file indexing. The indexing service extracts information from documents and other files on the hard drive and creates a

10 Fast and Free Security Enhancements

Before you spend a dime on security, there are many precautions you can take that will protect you against the most common threats.


1. Check Windows Update and Office Update regularly (_http://office.microsoft.com/productupdates); have your Office CD ready. Windows Me, 2000, and XP users can configure automatic updates. Click on the Automatic Updates tab in the System control panel and choose the appropriate options.


2. Install a personal firewall. Both SyGate (_www.sygate.com) and ZoneAlarm (_www.zonelabs.com) offer free versions.




3. Install a free spyware blocker.

How to rip Dynamic Flash Template

How to Rip TM Dynamic Flash Templates
What you need:
Sample dynamic flash template from TM website
Sothink SWF Decompiler
Macromedia Flash
Yourself
1. browse or search your favorite dynamic flash template in TM website. If you got one... click the "view" link and new window will open with dynamic flash.. loading...


2. If the movie fully loaded, click View -> Source in your browser to bring the source code of the current page and in the source code, search for "IFRAME" and you will see the iframe page. In this example were going to try the 7045 dynamic template. get the URL(ex.
http://images.templatemonster.com/screenshots/7000/7045.html) then paste it to your browser... easy eh? wait! dont be to excited... erase the .html and change it to swf then press enter then you'll see the flash movie again icon_smile.gif.


3. copy the URL and download that SWF

Rapidshare Premium Account Like Downloading-Resume supported...

This summary is not available. Please click here to view the post.

Flash Speed 200% v3.7 internet accelerator

Flash Speed 200% v3.7 - software gratis, serial number, crack, key, terlengkap
DOWNLOAD Flash Speed 200% v3.7

FlashSpeed200% is an Internet accelerator that help you 
optimize your Internet connection speed 200% or more. The software changes some Windows settings to give you faster performance, and optimize yourInternet connection speed 200% or more according to your computer. It support optimiz Dial-Up, Lan, Cable,ADSL, HDSL, VDSL and PPPoE connections up to 200% faster. Increase your download speeds.

Saturday, May 29, 2010

A Guide to PC Security



Being a hacker, you're coming face to face with some of the most malicious programs on the internet every day. You want to be secure. Most of the programs you'll be downloading will be malicious, so how can you tell if the program will be working against you or for you?
This guide will be looking at the scanning of malicious files, as well as a guide to anti-viruses & firewalls and a brief introduction to sandboxing and anonymity. So yep, you're in for quite a bit of reading. Grab a drink, maybe a cigarette.
                                                                            Being secure is important. Just because you call yourself a hacker, it doesn't mean you're immune to attacks towards your computer. Without my anti-virus, I doubt I'd actually be typing this now - I'd probably be searching through my registries and screaming like a chicken on speed. I'm like that.
Not all anti-viruses work the same way. Some anti-virus programs are bad; some are good, and some are just plain useless. We'll be looking at which ones are the best of the best, and which ones are just plain fail.
Being infected with something can also put your friends and family at risk, other users of your computer could be having their login & credit card details stolen without any knowledge of it. Worms can also spread to your email contacts and friends on popular websites such as Facebook.


Downloads & Scanning

For example, you download a program and the poster is claiming that it is a clean botnet controller. If we can this, it will come up with results such as "Win32/RBot" etc.. This means that the file should be what we wanted.
Now, if the botnet-controller scan came up as something like "Win32/trojan.agent.a", we

RFI/LFI (Remote/Local File Include)


Description
This vulnerability allows the user to include a remote or local file, and have it parsed and executed on the local server.
Example Vulnerable Code - index.php (PHP)


PHP Code:
$page $_GET['p'];
if (isset(
$page)) {
    include(
$page);
} else {
    include(
"home.php");
}
?>

Testing Inputs For Vulnerability
Try visiting "index.php?p=http://www.google.com/"; if you see Google, it is vulnerable to RFI and consequently LFI. If you don't it's not vulnerable to RFI, but still may be

Sunday, May 2, 2010

XSS (Cross-Site Scripting)

This vulnerability allows for an attacker's input to be sent to unsuspecting victims. The primary usage for this vulnerability is cookie stealing; if an attacker steals your cookie, they can log into whatever site they stole your cookie from under your account (usually, and assuming you were logged in at the time.)
Example Vulnerable Code - search.php (PHP)

PHP Code:

 
$s $_GET['search'];// a real search engine would do some database stuff
 hereecho("You searched for $s. There were no results found");?>
Testing Inputs For Vulnerability
For this, we test by throwing some HTML into the search engine, such as "XSS". If the site is vulnerable to XSS, you will see something like this: XSS, else, it's not vulnerable.

Example Exploit Code (Redirect)
Because we're mean, we want to redirect the victim to

Saturday, May 1, 2010

SQL Injection

                                                                  What is SQL?

The word SQL stands for structure query language.A language that can communicate with Database.
SQL injection is the act of injection your own, custom-crafted SQL commands into a web-script so that you can manipulate the database any way you want. Some example usages of SQL injection: Bypass login verification, add new admin account, lift passwords, lift credit-card details, etc.; you can access anything that's in the database.
Example Vulnerable Code - login.php (PHP/MySQL)
Here's an example of a vulnerable login code
 PHP CODE

Related Posts with Thumbnails
 

|