Wednesday 6 August 2014

Eight unknown facts of android -

• It wasn't Google's idea: Android was the
brainchild of
Andy Rubin, who founded Android Inc. in
October 2003
with the aim of creating a new mobile
platform. Google
later bought Android Inc. and hired Rubin
and others in
August 2005.
• It almost didn't work out: Android almost
immediately
ran out of cash after its founding, only to be
saved,
according to the Businessweek, by Steve
Perlman.
• The Nexus line was a hot rumour years
before the
Nexus One: People started predicting about
the
"gPhone" as early as 2007 though Nexus
came out in
2010.
• Microsoft thought it would be a non-event:
Microsoft's Scott Horn, then head of the
Windows
Mobile marketing team, had told Engadget
after
Android's release, "I don't understand the
impact they
are going to have."
• Resolution scaling was introduced in
Version 1.6: The
ability to automatically scale images based
on display
size appeared in Donut, or Android 1.6,
paving the way
for the huge range of device form factors on
the Android
market today.
• There's an Android phone in space: A
British firm
launched a Nexus phone on Space, to control
a satellite
as part of an experiment and see how well
consumer-
grade electronics stand up to the rigors of
space.
• Every app you run on your Android phone
gets its own
virtual machine: Each active app on an
Android device
runs in its own Dalvik VM, which keeps it
safe and
separate from core functions. This improves
battery life
and boosts performance of the phone.
• The first official version code name was
NOT a
dessert: Google's Dan Morrill confirmed in
January that
the very first alpha version of Android
released to
internal developers was R2-D2.

Tuesday 5 August 2014

Microsoft Word shortcut keys

Ctrl + b : you can order your
favorite file by this command
ctrl + f : you can search for
some word
ctrl + s : save the work you've
done
ctrl + shift or right index
makes the writing go to the
left
alt + f4 : is useful to close the
windows
alt + esc you can move from
window to window
alt + tab : is very useful if
there are many windows open
you can choose the required
window
alt + shift : switch between
languages
f2 : very useful and fast to
change the name of a specific
file
Ctrl + C : Copy
Ctrl + X : Cut
Ctrl + V : Paste
Ctrl + Z : Undo
Ctrl + A : Select all
Ctrl + ESC : task list (Start)
Ctrl + Enter : Starting a new
page
Ctrl + END : Move to end of
file
Ctrl + F5 : Thumbnail file
window
Ctrl + F6 : move between files
Ctrl + F2 : preview the page
before printing
= + Ctrl : zoom in and out,
one degree
F4 : repeat the last process
Alt + Enter : repeat the last
process
Ctrl + Y : repeat the last
process
Shift + F10 : Bullets and
digital
F12 : Save As
Shift + F12 : Save the file
Ctrl + Home : the first
document
Ctrl + End : Latest document
Shift + F1 : information about
type of coordination
Ctrl + U : line under the text
Ctrl + F4 : Exit from the file
Ctrl + N : New File
Ctrl + H : Replacement
Ctrl + I : slash
Ctrl + K : Document Format
Ctrl + P : Print
Ctrl + O : open area
Alt + S : List Format
Alt + J : Help Menu
[+ Alt : List Table
] + Alt : Tools Menu
Alt + U : View menu
Alt + P : Edit Menu
Alt + L : file list
"+ Alt : window List
Alt + Q : modified procedure
Ctrl + E : Center text
Ctrl + F : Search
Ctrl + B : black line
Ctrl + Shift + P : font size
Ctrl + Shift + S : Style
Ctrl + D : line
Ctrl + Shift + K : character
conversion - Capital
Shift + F3 : character
conversion - Capital
Ctrl + Shift + L : point at the
beginning of the text
Ctrl + Alt + E : footnotes
numbered Romanian
Ctrl + Alt + R : Mark ®
Ctrl + Alt + T : Mark ™
Ctrl + Alt + C : Mark ©
Ctrl + Alt + I : preview the
page before printing
Shift + F7 : Thesaurus
Ctrl + Alt + F1 : System
Information
Ctrl + Alt + F2 : Open
Directories
Ctrl + J : resolving the text
from both sides
Ctrl + L : the beginning of the
text from the left side
Ctrl + Q : the beginning of the
text from the right side
Ctrl + E : Center text
Ctrl + M : changing the size of
the top paragraph
Shift + F5 : To return to the
position that you finished it
when you close the file
= + Ctrl + Alt : Customize
F3 : AutoText entry
F9 : Check fields
F10 : Move the framework to
open windows
F1 : Help
F5 : Jump to
F7 : Spelling
F8 : Select Zone

Why Programming For Hacking ???

Learn a programming language. You
shouldn't limit yourself to any particular
language, but there are a few guidelines.
C is the language the Unix was built with. It
(along with assembly language) teaches
something that's very important in hacking:
how memory works.
Python or Ruby are high-level, powerful
scripting languages that can be used to
automate various tasks.
Perl is a reasonable choice in this field as
well, while PHP is worth learning because the
majority of web applications use PHP.
Bash scripting is a must. That is how to
easily manipulate Unix/Linux systems—
writing scripts, which will do most of the job
for you.
Assembly language is a must-know. It is the
basic language that your processor
understands, and there are multiple
variations of it. At the end of the day, all
programs are eventually interpreted as
assembly. You can't truly exploit a program
if you don't know assembly.

Top Ten Torrent Web Sites

1) The Pirate Bay
2) KickassTorrents
3) Torrentz
4) ExtraTorrent
5) YIFY-Torrents
6) EZTV
7) 1337x
8) isoHunt.to
9) BitSnoop
10) RARBG
": Legal Warning :- Copy right Files
Downloading From Pirates Sites Are illegal "

What is Tabnabbing?

Tabnabbing is a computer exploit and
phishing attack, which persuades users
to submit their login details and
passwords to popular websites by
impersonating those sites and convincing
the user that the site is genuine. The
attack's name was coined in early 2010
by Aza Raskin, a security researcher
and design expert.
The attack takes advantage of user
trust and inattention to detail in
regard to tabs, and the ability of
modern web pages to rewrite tabs and
their contents a long time after the
page is loaded. Tabnabbing operates in
reverse of most phishing attacks in that
it doesn’t ask users to click on an
obfuscated link but instead loads a fake
page in one of the open tabs in your
browser.
The exploit employs scripts to rewrite a
page of average interest with an
impersonation of a well-known website,
when left unattended for some time. A
user who returns after a while and sees
the rewritten page may be induced to
believe the page is legitimate and enter
their login, password and other details
that will be used for improper purposes.
The attack can be made more likely to
succeed if the script checks for well
known Web sites the user has loaded in
the past or in other tabs, and loads a
simulation of the same sites. This attack
can be done even if JavaScript is
disabled, using the "meta refresh" meta
element, an HTML attribute used for
page redirection that causes a reload of
a specified new page after a given time
interval.
The NoScript extension for Mozilla
Firefox defends both from the
JavaScript-based and from the
scriptless attack, based on meta
refresh, by preventing inactive tabs

Sniffing password over network by cain and abel

Introduction
UNIX users often smugly assert that the best
free security tools support their platform
first, and Windows ports are often an
afterthought. They are usually right, but Cain
& Abel is a glaring exception. This Windows-
only password recovery tool handles an
enormous variety of tasks. It can recover
passwords by sniffing the network, cracking
encrypted passwords using Dictionary, Brute-
Force and Cryptanalysis attacks, recording
VoIP conversations, decoding scrambled
passwords, revealing password boxes,
uncovering cached passwords and analyzing
routing protocols.
We are going to explain Cain & Abel in
context to Man-in-the-middle attack.
Sniffing LAN passwords using Cain & Abel.
(Works only for ethernet netwoks)
>Run Cain and abel
>Now click on the sniffer tab, right click and
select Scan MAC Addresses.
>Check "All tests" and click OK. Cain & Abel
will start scanning the MAC addresses
>Click to ARP ( yellow symbol ) after
scanning the host then click to Plus Symbol
>Click to left side box of any IP. it
automatically comes right hand side box
>Pess the Ctrl or shift select all then click ok
>All the host in Idle postion then click to
yellow symbol to Start the poisoning
>now ARP Poisoning start in the network
>Check the logs. Click to passoword options