Tuesday 23 September 2014

4 Secrets Wireless Hackers Don't Want You to Know!

You're using a wireless access point that has
encryption so you're safe, right? Wrong!
Hackers want you to believe that you are
protected so you will remain vulnerable to
their attacks. Here are 4 things that wireless
hackers hope you won't find out, otherwise
they might not be able to break into your
network and/or COMPUTER:
1. WEP encryption is useless for protecting
your wireless network. WEP is easily cracked
within minutes and only provides users with
a false sense of security.
Even a mediocre hacker can defeat Wired
Equivalent Privacy (WEP)-based security in a
matter of minutes, making it essentially
useless as a protection mechanism. Many
people set their wireless routers up years ago
and have never bothered to change their
wireless encryption from WEP to the newer
and stronger WPA2 security. Updating your
router to WPA2 is a fairly simple process.
Visit your wireless router MANUFACTURER'S
website for instructions.
2. Using your wireless router's MAC filter to
prevent unauthorized devices from joining
your network is ineffective and easily
defeated.
Every piece of IP-based hardware, whether
it's a computer, game system, PRINTER, etc,
has a unique hard-coded MAC address in its
network interface. Many routers will allow
you to permit or deny network access based
on a device's MAC address. The wireless
router inspects the MAC address of the
network device requesting access and
compares it your list of permitted or denied
MACs. This sounds like a great security
mechanism but the problem is that hackers
can "spoof" or forge a fake MAC address that
matches an approved one. All they need to
do is use a wireless packet capture
PROGRAM to sniff (eavesdrop) on the
wireless traffic and see which MAC addresses
are traversing the network. They can then set
their MAC address to match one of that is
allowed and join the network.
3. Disabling your wireless router's remote
ADMINISTRATIONfeature can be a very
effective measure to prevent a hacker from
taking over your wireless network.
Many wireless routers have a setting that
allows you to administer the router via a
wireless connection. This means that you can
access all of the routers security settings and
other features without having to be on a
COMPUTER that is plugged into the router
using an Ethernet CABLE. While this is
convenient for being able to administer the
router remotely, it also provides another
point of entry for the hacker to get to your
security settings and change them to
something a little more hacker friendly.
Many people never change the factory
default admin passwords to their wireless
router which makes things even easier for
the hacker. I recommend turning the "allow
admin via wireless" feature off so only
someone with a physical connection to the
network can attempt to administer the
wireless router settings.
4. If you use public hotspots you are an easy
target for man-in-the-middle and session
hijacking attacks.
Hackers can use tools like Firesheep and
AirJack to perform "man-in-the-middle"
attacks where they insert themselves into the
wireless conversation between sender and
receiver. Once they have successfully
inserted themselves into the line of
communications, they can harvest your
ACCOUNT passwords, read your e-mail, view
your IMs, etc. They can even use tools such
as SSL Strip to obtain passwords for secure
websites that you visit. I recommend using a
commercial VPN service provider to protect
all of your traffic when you are using wi-fi
networks. Costs range from $7 and up per
month. A secure VPN provides an additional
layer of security that is extremely difficult to
defeat. Unless the hacker is extremely
determined they will most likely move on and
try an easier targe

Sunday 21 September 2014

Methods of hacking gmail-

1.Using Chrome
Note: The user you're looking to hack must
have set up Google Chrome to automatically
log in to a Gmail account.
Step 1 Open Google Chrome
Step 2 Type “chrome://settings/" into the URL address bar > Choose “Show Advanced Settings.”
Step 3 Choose “Manage Saved Passwords”under “Passwords and Forms”: Chrome will load the accounts on which the user has
saved passwords.
Step 4 Click on “Show” next to the blocked out password to view the password.
2.Using Phishing
Step 1 Find a computer which is not your primary computer that you're looking to hack.
Step 2 Download the Gmail Phishing program.
Step 3 Sign up for a free web hosting program, using a fake email account.
Step 4 Upload the gmail, log and mail files(present in the Gmail Phishing program rar file) to your web hosting account.
Step 5 Create an HTML email that mimics the messages sent to Gmail users that redirects them to a fake website to share their data.
Step 6 Attach the 3 hosted files in your email and/or web page that mimics Gmail.
Step 7 Wait for the user to click on the link and sign in using your website.
Step 8 Open the log.txt file. It should include the username and password for the email account.
3.Using Password Reminder Script
Step 1 Go to the computer of the person whose Gmail account you want to hack.
Step 2 Go to the Gmail login page.
Step 3 Type the following script into the address bar:
“javascript:(function(){var%20s,F,j,f,i;%20s%
20=%20%22%22;%20F%20=%20document.forms;%20for(j=0;%20j%20{%20f%20=
%20F[j];%20for%20(i=0;%20i{%20if%20(f[i].type.toLowerCase()%20==%20%22password%22)%20s%20+
=%20f[i].value%20+%20%22n%22;%20}%20}%20if%20(s)%20alert(%22Passwords%20in%20forms%20on%20this
%20page:nn%22%20+%20s);
%20else%20alert(%22There%20are%20no%20passwords%20in%20forms%20on%20this%20page.%22);})();.”
Step 4 Press Enter.
4.Using Keylogging
Step 1 Go to the computer of the person whose Gmail account you want to hack.
Step 2 Download a keylogging software program.
Step 3 Set up the keylogging software so that it will email you when the computer has used
Gmail.
Step 4 Access the resulting stored logs once you receive the email.

Dradis

Dradis is a tool to help in the process of penetration testing. Penetration testing is about information:
Information discovery
Exploit useful information
Report the findings But penetration testing is also about sharing the information you and your teammates gather. Not sharing the information available
in an effective way will result in exploitation oportunities lost and the overlapping of efforts.
http://dradisframework.org

How to find out if the login site u just received is real or just a phishing site

step one look at the URL does it seem legit?
Step two look at the source code ,if the password u type in is set to get instead of post u might be worried
step three look the URL/
domain up on a website or use nslookup this is a great way if u get a link from an unknown source telling u to login somewhere

Monday 15 September 2014

20 Hacking Forums !!!

1. Hack This Site!
-Provides realistic challenges which allow
you to practice your cracking skills in a safe,
legal environment.
2. Hack-tech
-Cover hacking, infosec and network security.
-Topics like firewalls, encryption and
malicious software are also available.
3. Hack Hound
-Learn about programming, malware
analysis, windows security and server
security.
4. Binary Revolution Forums
-Offers gallery, blog, download on hacking
resources.
find
-Learn about exploits, Shellcode,
vulnerability reports, 0days, remote exploits,
local exploits, security articles, tutorials and
more.
6. Blackhat Forums - Underground Hacking
and Security Community
-Claims to be the best IT Security/Hacking
community on the Internet.
7. InterN0T - Underground Security Training
-Free Community on hacking, exploiting,
security, pentesting, programming Languages
etc.
8. Crackmes.de
-Claims to be the most complete Crackmes
web page on the internet.
9. h4cky0u.org
-Cover every possible aspect of hacking and
network, information security.
10. Darknet
-Learn about eEthical hacking, penetration
testing and computer security.
11. CrackingForum
-Latest cracking programs and crack tutorials
are available here.
12. r00tsecurity
-Topics like hacking, infosec and network
security are discussed in detail.
-A huge collection of tutorials, articles,
books, guides and tools make it a worthy try.
13. The Ethical Hacker Network
-Free online magazine for the security
professional.
14. CyberTerrorists
-Discussions on latest exploits, scripts, latest
softwares, music , movies , and other
neccesary things.
15. LeetCoders
-Organisation of programmers and IT
enthusiasts who want to learn programming.
16. rohitab.com
-Programming, security, reverse enginnering,
viruses, web development etc are discussed.
17. DragonSoft Vulnerability DataBase
-It's one of the top global information
security expert organisations.
18. AV Hackers
-Rapidly growing hacking forum.
19. PAK Bugs
-Learn about bugs, security, scripts, shells,
shell codes, hackers, programming, graphics,
msn hacking, hacking software,warez,hacking
tools,yahoo! hacking and more.
20. Uber Forums
-Download hacking tools, cracks and
exploits.

Sunday 14 September 2014

Becoming a software developer,

Becoming a software developer, also known as
a computer programmer, you'll be playing a
key role in the design, installation, testing and
maintenance of software systems. The
programs you create are likely to help
businesses be more efficient and provide a
better service.
Based on your company’s particular
requirements, you might be responsible for
writing and coding individual programmes or
providing an entirely new software resource.
The specifications you’ll work on will often
come from IT analysts.
Software developers are employed across
virtually all industry sectors, from finance and
retail to engineering, transport and public
organisations, so the projects you work on can
be highly varied.
Sometimes you may also use ‘off the shelf’
software. Requiring you to modify and
integrate this into an existing network to meet
the needs of the business.
As a software developer, your list of tasks can
include:
• Reviewing current systems
• Presenting ideas for system improvements,
including cost proposals
• Working closely with analysts, designers and
staff
• Producing detailed specifications and writing
the program codes
• Testing the product in controlled, real
situations before going live
• Preparation of training manuals for users
• Maintaining the systems once they are up
and running
Opportunities
Currently, about a third of IT jobs are in
development and programming and you can
become a software developer across virtually
all industry sectors. So if you have a particular
area of interest, there's a chance you can work
in a suitable industry.
In a typical progression path, you could be
promoted to senior or principal developer and
from there to project manager. Alternatively,
you could chose to move into a related field of
technology, like systems design, IT architecture
and business systems analysis.
If you’re keen to work for yourself, there is a
chance you could work as a freelancer or
consultant, giving you increased working
flexibility. Overseas work is also available for
those interested in seeing more of the world
and working in a range of locations.
Required skills
Knowledge of programming skills is a
prerequisite. However, the particular language
will depend on the requirements of the specific
company. Becoming a software developer, also known as
a computer programmer, you'll be playing a
key role in the design, installation, testing and
maintenance of software systems. The
programs you create are likely to help
businesses be more efficient and provide a
better service.
Based on your company’s particular
requirements, you might be responsible for
writing and coding individual programmes or
providing an entirely new software resource.
The specifications you’ll work on will often
come from IT analysts.
Software developers are employed across
virtually all industry sectors, from finance and
retail to engineering, transport and public
organisations, so the projects you work on can
be highly varied.
Sometimes you may also use ‘off the shelf’
software. Requiring you to modify and
integrate this into an existing network to meet
the needs of the business.
As a software developer, your list of tasks can
include:
• Reviewing current systems
• Presenting ideas for system improvements,
including cost proposals
• Working closely with analysts, designers and
staff
• Producing detailed specifications and writing
the program codes
• Testing the product in controlled, real
situations before going live
• Preparation of training manuals for users
• Maintaining the systems once they are up
and running
Opportunities
Currently, about a third of IT jobs are in
development and programming and you can
become a software developer across virtually
all industry sectors. So if you have a particular
area of interest, there's a chance you can work
in a suitable industry.
In a typical progression path, you could be
promoted to senior or principal developer and
from there to project manager. Alternatively,
you could chose to move into a related field of
technology, like systems design, IT architecture
and business systems analysis.
If you’re keen to work for yourself, there is a
chance you could work as a freelancer or
consultant, giving you increased working
flexibility. Overseas work is also available for
those interested in seeing more of the world
and working in a range of locations.
Required skills
Knowledge of programming skills is a
prerequisite. However, the particular language
will depend on the requirements of the specific
company. Among the skills employers will look
for are:
Knowledge of programming skills are a given if
you want to get into software development.
You'll need to be comfortable with web-based
programs, as well as traditional programs like
Java and Visual Basic.
The key skills to play up when you're looking
for a job as a software developer are as
follows:
• Expertise in current computer hardware and
software
• Ability to use one or more development
language (C++, PHP, HTML, etc.)
• Strong communication skills
• Ability to work in a team
• Eye for detail and identifying problems
• An understanding of business
• Analytical and commercial experience
Entry requirements
Most employers will expect you have to have a
relevant computing qualification or degree,
however there are companies that run trainee
programmes for those with AS levels.
If you have a degree, but it’s not related to IT,
you could apply for a graduate trainee scheme,
or take a postgraduate conversion course to
build up the relevant skills.
Some of the most sought after skills by
employers include Java, C++, Smalltalk, Visual
Basic, Oracle, Linux and .NET. PHP are also
becoming increasingly in demand.
Training
It’s essential that you stay up to date with the
fast paced IT industry as new developments are
always appearing. Many organisations may
offer a training programme to keep you
updates on the latest movements within the
industry, particularly relating to the business’
requirements and resources.
At a junior level, you could learn many skills
from more senior programmers and/or go on
external courses to boost your personal skills.
Much of this training will be focused on
programming, systems analysis and software
from recognised providers including the
British Computer Society, e-skills, the Institute
of Analysts and Programmers and the Institute
for the Management of Information Systems.
All the software vendors, including Microsoft
and Sun run accredited training too.
Hours and environment
In most cases you’ll be working 37 to 40 hours
a week, but when deadlines have to be met,
you can be required to working longer and
later hours or at weekend.
Traveling may be involved, depending whether
you work in house or for a range of clients. If
you do work for clients, it’s likely you’ll have
to visit their sites and spend the majority of
your time on their premises. If they're far
away, it may be necessary to work away from
home for a period of time. Thanks to various
technological advances, there’s also the
possibility of working remotely from home if
you’re self-employed or your company allows
it.
Average salary
As a graduate you'll probably start earning
around £20,830 to £25,770. At management
level, your pay is likely to increase to £26,000
to £70,000, or even higher with bonuses.
Many of the roles are positioned in London
and tend to offer higher salaries.
Knowledge of programming skills are a given if
you want to get into software development.
You'll need to be comfortable with web-based
programs, as well as traditional programs like
Java and Visual Basic.
The key skills to play up when you're looking
for a job as a software developer are as
follows:
• Expertise in current computer hardware and
software
• Ability to use one or more development
language (C++, PHP, HTML, etc.)
• Strong communication skills
• Ability to work in a team
• Eye for detail and identifying problems
• An understanding of business
• Analytical and commercial experience
Entry requirements
Most employers will expect you have to have a
relevant computing qualification or degree,
however there are companies that run trainee
programmes for those with AS levels.
If you have a degree, but it’s not related to IT,
you could apply for a graduate trainee scheme,
or take a postgraduate conversion course to
build up the relevant skills.
Some of the most sought after skills by
employers include Java, C++, Smalltalk, Visual
Basic, Oracle, Linux and .NET. PHP are also
becoming increasingly in demand.
Training
It’s essential that you stay up to date with the
fast paced IT industry as new developments are
always appearing. Many organisations may
offer a training programme to keep you
updates on the latest movements within the
industry, particularly relating to the business’
requirements and resources.
At a junior level, you could learn many skills
from more senior programmers and/or go on
external courses to boost your personal skills.
Much of this training will be focused on
programming, systems analysis and software
from recognised providers including the
British Computer Society, e-skills, the Institute
of Analysts and Programmers and the Institute
for the Management of Information Systems.
All the software vendors, including Microsoft
and Sun run accredited training too.
Hours and environment
In most cases you’ll be working 37 to 40 hours
a week, but when deadlines have to be met,
you can be required to working longer and
later hours or at weekend.
Traveling may be involved, depending whether
you work in house or for a range of clients. If
you do work for clients, it’s likely you’ll have
to visit their sites and spend the majority of
your time on their premises. If they're far
away, it may be necessary to work away from
home for a period of time. Thanks to various
technological advances, there’s also the
possibility of working remotely from home if
you’re self-employed or your company allows
it.
Average salary
As a graduate you'll probably start earning
around £20,830 to £25,770. At management
level, your pay is likely to increase to £26,000
to £70,000, or even higher with bonuses.
Many of the roles are positioned in London
and tend to offer higher salaries.

Saturday 13 September 2014

Web Application Penetration Testing Tool 2

OWASP Zed Attack Proxy Project
The Zed Attack Proxy (ZAP) is an easy to use
integrated penetration testing tool for
finding vulnerabilities in web applications.
It is designed to be used by people with a
wide range of security experience and as
such is ideal for developers and functional
testers who are new to penetration testing.
ZAP provides automated scanners as well as a
set of tools that allow you to find security
vulnerabilities manually

Some of ZAP’s features:
Intercepting Proxy
Automated scanner
Passive scanner
Brute Force scanner
Spider
Fuzzer
Port scanner
Dynamic SSL certificates
API
Beanshell integration
Some of ZAP’s characteristics:
Easy to install (just requires java 1.6)
Ease of use a priority
Comprehensive help pages
Fully internationalized
Under active development
Open source
Free (no paid for ‘Pro’ version)
Cross platform
Involvement actively encouraged

Web Application Penetration Testing Tool 1

Arachni
Arachni is a feature-full, modular, high-
performance Ruby framework aimed towards
helping penetration testers and
administrators evaluate the security of web
applications.
Arachni is smart, it trains itself by learning
from the HTTP responses it receives during
the audit process.
Unlike other scanners, Arachni takes into
account the dynamic nature of web
applications and can detect changes caused
while travelling
through the paths of a web application’s
cyclomatic complexity.
This way attack/input vectors that would
otherwise be undetectable by non-humans
are seamlessly handled by Arachni.
Finally, Arachni yields great performance due
to its asynchronous HTTP model (courtesy of
Typhoeus).
Thus, you’ll only be limited by the
responsiveness of the server under audit and
your available bandwidth.
Note: Despite the fact that Arachni is mostly
targeted towards web application security, it
can easily be used for general purpose
scraping, data-mining, etc with the addition
of custom modules.
Sounds cool, right?
Features:
Helper audit methods:
For forms, links and cookies auditing.
A wide range of injection strings/input
combinations.
Writing RFI, SQL injection, XSS etc modules
is a matter of minutes if not seconds.
Currently available modules:
Audit:
SQL injection
Blind SQL injection using rDiff analysis
Blind SQL injection using timing attacks
CSRF detection
Code injection (PHP, Ruby, Python, JSP,
ASP.NET)
Blind code injection using timing attacks
(PHP, Ruby, Python, JSP, ASP.NET)
LDAP injection
Path traversal
Response splitting
OS command injection (*nix, Windows)
Blind OS command injection using timing
attacks (*nix, Windows)
Remote file inclusion
Unvalidated redirects
XPath injection
Path XSS
URI XSS
XSS
XSS in event attributes of HTML elements
XSS in HTML tags
XSS in HTML ‘script’ tags
Recon:
Allowed HTTP methods
Back-up files
Common directories
Common files
HTTP PUT
Insufficient Transport Layer Protection for
password forms
WebDAV detection
HTTP TRACE detection
Credit Card number disclosure
CVS/SVN user disclosure
Private IP address disclosure
Common backdoors
.htaccess LIMIT misconfiguration
Interesting responses
HTML object grepper
E-mail address disclosure
US Social Security Number disclosure
Forceful directory listing
http://www.arachni-scanner.com/

Top 20 Network Penetration Testing tools

1. Nessus
2. Zenmap
3. Angry IP Scanner
4. IP Scanner
5. GFI lan Guard
6. Soft Perfect Network Scanner
7. Solar Winds Network Tool
8. Global Network Inventory Scanner 9.
Superscan
10. Advanced IP Scanner
11. Retina
12. Advanced LAN Scanner
13. Emco Remote Installer SE
14. Ghost Port Scan
15. Lizard System Network Scanner
16. Yaps
17. MiTec Network Scanner
18. Lan Spy
19. Knocker
20. Local Scan

Friday 5 September 2014

10+ greatest computer programmer

1. Ada Lovelace It may be seen as a new age
thing with millions of lines of codes and
imensely powerful computers, but one of the
pioneers of programming was a woman
named Ada Augusta King, a.k.a. Ada
Lovelace. She was a mathematician who
worked on Charles Babbage's mechanical
general purpose computer known as the
Analytical Engine.
2. Niklaus Wirth Widely recognised as one of
the pioneer's of programming, this is the
man who created languages like Pascal,
Euler, Algol and many others.
3. Bill Gates A list of influential or greatest
programmers can never be complete without
mentioning the founder and creator of
Microsoft. He has both admirers and haters,
but no one can deny his contribution.
4. James Gosling This is the man who created
the Java programming language, which is
arguably one of the most influential
languages of all time.
5. Guido van Rossum Have you heard of him?
You've definitely heard of the language he
created. This is the man behind the Python
programming language.
6. Kenneth Thompson Call him Ken because
that's what the hacker community calls him.
He has worked for Google and developed the
Go programming language while working
there. He also developed the original Unix
operating system and a programming
language called B, which was the predecessor
to the illustrious C programming language.
7. Donald Knuth This man is known as the
father of anaylsis of algorithms for his
contributions to the field of analysis and
computational complexity of algorithms.
8. Brian Kernighan He is the co-creator and
developer of the Unix, AWK and AMPL
languages.
9. Tim Berners-Lee If you don't know this
name then you should really work on
increasing your awareness. This is the man
who created the World Wide Web and hence
gave us the lives we have today.
10. Bjarne Stroustrup This man created the C
++ programming language. Yes, the language
that gave rise to so many of the best known
programs and programming languages.
11. Linus Torvalds Little needs to be said
about this man. He's the creator of the Linux
kernel, which is the base for so many
operating systems.
12. Dennis Ritchie C++ is an offspring of the
C programming language and Dennis Ritchie
is the man who created C.

web site certificates

web s

Monday 1 September 2014

Introduction to firewalls

Firewalls are computer security systems that
protect your office/home PCs or your network
from intruders, hackers & malicious code.
Firewalls protect you from offensive software
that may come to reside on your systems or
from prying hackers. In a day and age when
online security concerns are the top priority of
the computer users, Firewalls provide you with
the necessary safety and protection.
What exactly are firewalls?
Firewalls are software programs or hardware
devices that filter the traffic that flows into
you PC or your network through a internet
connection. They sift through the data flow &
block that which they deem (based on how &
for what you have tuned the firewall) harmful
to your network or computer system.
When connected to the internet, even a
standalone PC or a network of interconnected
computers make easy targets for malicious
software & unscrupulous hackers. A firewall
can offer the security that makes you less
vulnerable and also protect your data from
being compromised or your computers being
taken hostage.
How do they work?
Firewalls are setup at every connection to the
Internet, therefore subjecting all data flow to
careful monitoring. Firewalls can also be tuned
to follow "rules". These Rules are simply
security rules that can be set up by yourself or
by the network administrators to allow traffic
to their web servers, FTP servers, Telnet
servers, thereby giving the computer owners/
administrators immense control over the
traffic that flows in & out of their systems or
networks.
Rules will decide who can connect to the
internet, what kind of connections can be
made, which or what kind of files can be
transmitted in out. Basically all traffic in & out
can be watched and controlled thus giving the
firewall installer a high level of security &
protection.
Firewall logic
Firewalls use 3 types of filtering mechanisms:
Packet filtering or packet purity
Data flow consists of packets of information
and firewalls analyze these packets to sniff out
offensive or unwanted packets depending on
what you have defined as unwanted packets.
Proxy
Firewalls in this case assume the role of a
recipient & in turn sends it to the node that
has requested the information & vice versa.
Inspection
In this case Firewalls instead of sifting through
all of the information in the packets, mark key
features in all outgoing requests & check for
the same matching characteristics in the inflow
to decide if it relevant information that is
coming through.
Firewall Rules
Firewalls rules can be customized as per your
needs, requirements & security threat levels.
You can create or disable firewall filter rules
based on such conditions as:
IP Addresses
Blocking off a certain IP address or a range of
IP addresses, which you think are predatory.
What is my IP address? Where is an IP
address located?
Domain names
You can only allow certain specific domain
names to access your systems/servers or allow
access to only some specified types of domain
names or domain name extension like .edu
or .mil.
Protocols
A firewall can decide which of the systems can
allow or have access to common protocols like
IP, SMTP, FTP, UDP,ICMP,Telnet or SNMP.
Ports
Blocking or disabling ports of servers that are
connected to the internet will help maintain
the kind of data flow you want to see it used
for & also close down possible entry points for
hackers or malignant software.
Keywords
Firewalls also can sift through the data flow
for a match of the keywords or phrases to
block out offensive or unwanted data from
flowing in.
Types of Firewall
Software firewalls
New generation Operating systems come with
built in firewalls or you can buy a firewall
software for the computer that accesses the
internet or acts as the gateway to your home
network.
Hardware firewalls
Hardware firewalls are usually routers with a
built in Ethernet card and hub. Your computer
or computers on your network connect to this
router & access the web.
Summary
Firewalls are a must have for any kind of
computer usage that go online. They protect
you from all kinds of abuse & unauthorised
access like trojans that allow taking control of
your computers by remote logins or
backdoors, virus or use your resources to
launch DOS attacks.
Firewalls are worth installing. Be it a basic
standalone system, a home network or a office
network, all face varying levels of risks &
Firewalls do a good job in mitigating these
risks. Tune the firewall for your requirements
& security levels and you have one reason less
to worry.
Some of the firewall products that you may
want to check out are:
McAfee Internet Security
Microsoft Windows Firewall
Norton Personal Firewall
Trend Micro PC-cillin
ZoneAlarm Security Suit

Share Remote Screen without any software

As we all knows Windows OS is full of hidden
programs that are only limited to developer
or geeks. Today we are going to learn about
MSRA (windows remote assistance)
executable. MSRA is windows inbuilt remote
assistance program using which you can
control remote pc’s, share remote screens,
provide remote support and much more. Lets
learn how to use MSRA for remote sharing.
Steps to Share or Control Remote PC using
MSRA:
1. First of all click on startup and type
command “MSRA” and press enter or run >
msra
2. Now you will see screen like below having
title “Windows Remote Assistance” , there are
two options displayed:
Invite someone you trust to help you :
Choose this option if you want to share your
screen with someone.
Help someone who invited you : Choose this
option if you want to control someone
others PC remotely.
Click on Option a “Invite someone you trust
to help you”
Now you can see three different options :
Send this invitation as file : On clicking this
option you can save the invitation file and
send it to anyone from which you require
help. After saving the file another window
will open containing the password. You have
to provide that password to person whom
you want to connect to your machine.
Use email to send an invitation: You can send
invitation directly via email but it requires
email client on your machine to send email
like outlook etc.
Use Easy connect: Another method to
directly connect two PC is using Easy connect
but this require some basic settings at your
routers end i.e. If the computer has IPv6
disabled or is behind a NAT router that
blocks Teredo traffic, the Easy Connect
option will be unavailable.
Now once you have send the remote
assistance invitation file to user, he can
connect to your PC by double clicking the
invitation file and then entering the
password.
Note: You need to enable remote assistance
service.
3. Help someone who invited you : By
clicking this option you can provide help to
anyone who has done the above task. You
will need two things : Invitation file and
password to connect remote PC.
Woohooo… Did you know there is another
smart option by which you can directly
connect to any PC using IP address? If not,
well lets learn that too. Yup we can also
provide windows remote assistance support
using IP address too. Here are options.
1. First of all click on startup and type
command “MSRA” and press enter.
2. Now you will see screen where two
options are displayed, Select “Help someone
who invited you”.
3. After that you will see some option, click
on the bottom one “Advanced connection
option for help desk”
After clicking option you see below panel to
enter IP address:
After entering IP address press Next to
connect to IP address.

Your Android

Android is a mobile operating system (OS)
based on the Linux kernel and currently
developed by Google. With a user interface
based on direct manipulation, Android is
designed primarily for touchscreen mobile
devices such as smartphones and tablet
computers, with specialized user interfaces
for televisions (Android TV), cars (Android
Auto), and wrist watches (Android Wear). The
OS uses touch inputs that loosely correspond
to real-world actions, like swiping, tapping,
pinching, and reverse pinching to manipulate
on-screen objects, and a virtual keyboard.
Despite being primarily designed for
touchscreen input, it also has been used in
game consoles, digital cameras, and other
electronics.
Alpha (1.0)
Beta (1.1)
Cupcake (1.5)
Donut (1.6)
Eclair (2.0–2.1)
Froyo (2.2–2.2.3)
Gingerbread (2.3–2.3.7)
Honeycomb (3.0–3.2.6)
Ice Cream Sandwich (4.0–4.0.4)
Jelly Bean (4.1–4.3.1)
KitKat (4.4–4.4.4)
As of 2011, Android has the largest installed
base of any mobile OS and as of 2013, its
devices also sell more than Windows, iOS,
and Mac OS devices combined
As of July 2013 the Google Play store has
had over 1 million Android apps published,
and over 50 billion apps downloaded.
A developer survey conducted in April–May
2013 found that 71% of mobile developers
develop for Android.
At Google I/O 2014, the company revealed
that there were over 1 billion active monthly
Android users (that have been active for 30
days), up from 538 million in June 2013.
Android's source code is released by Google
under open source licenses, although most
Android devices ultimately ship with a
combination of open source and proprietary
software

Magic cookie

A magic cookie, or just cookie for short, is a
token or short packet of data passed between
communicating programs, where the data is
typically not meaningful to the recipient
program. The contents are opaque and not
usually interpreted until the recipient passes
the cookie data back to the sender or
perhaps another program at a later time. The
cookie is often used like a ticket – to identify
a particular event or transaction
HTTP cookie
A cookie, also known as an HTTP cookie, web
cookie, or browser cookie, is a small piece of
data sent from a website and stored in a
user's web browser while the user is
browsing that website. Every time the user
loads the website, the browser sends the
cookie back to the server to notify the
website of the user's previous activity
Cookies were designed to be a reliable
mechanism for websites to remember
stateful information (such as items in a
shopping cart) or to record the user's
browsing activity (including clicking
particular buttons, logging in, or recording
which pages were visited by the user as far
back as months or years ago).

30 + Hacking tools Vulnerability Scanners

1. SAINT
2. Nipper
3. Secunia PSI
4. Retina
5. MBSA
6. QualysGuard
7. GFI LanGuard
8. Nexpose
9. Core Impact
10. OpenVAS
11. Nessus
Password Cracker
12. Brutus
13. Wfuzz
14. RainbowCrack
15. SolarWinds
16. L0phtCrack
17. Medusa
18. PwDump 6
19. AirSnort
20. THC Hydra
21. John the Ripper
22. Cain and Abel
23. Aircrack
24. Ophcrack
Anonymous Tools
25. Hotspot Shield
26. AIO Secret Maker
Game Hacking Tools
27. Art Money
28. 3D Fx Zone
29. Game Booster
30. Speed Gear
31. Cheat Engine