If you Like Our Blog Then

Saturday, August 9, 2008

olympics 2008 begin's

0 comments
hi friend as u all now OLYMPICS 2008 HAS BEGAN IN BEIJING

HOPE ALL COUNTRY DO THEIR BEST .

I AM JUST CREATING A POLL FOR WHO GONNA HAVE MAX. GOLD MEDALS

DO GIVE YOUR ANSWER'S

Friday, August 8, 2008

NEW ASTHMA TREATMENT

0 comments

New 3G iphone, Relesed

0 comments











Apple.com

Price is 199 $

Its pretty much same but it is way more cheaper and got all functions u need wink.gif

enjoy

Wednesday, August 6, 2008

The biggest military hacker of all times did his work over 56k modem

0 comments
Gary McKinnon, a British computer expert, claims he's just fascinated with UFOs. Using his home computer and a modem — how WarGames! — he infiltrated military networks and accessed thousands of computers trying to find evidence of alien contact. Now caught and having lost an appeal with the British courts, he's awaiting extradition to the United States to stand trial, accused of the "biggest military hack of all time." The full list of his computer-exploiting prowess:

Using his own computer at home in London, McKinnon hacked into 97 computers belonging to and used by the U.S. government between February 2001 and March 2002.

McKinnon is accused of causing the entire U.S. Army's Military District of Washington network of more than 2,000 computers to be shut down for 24 hours.

Using a limited 56-kbps dialup modem and the hacking name "Solo" he found many U.S. security systems used an insecure Microsoft Windows program with no password protection.

He then bought off-the-shelf software and scanned military networks, saying he found expert testimonies from senior figures reporting that technology obtained from extra-terrestrials did exist.

At the time of his indictment, Paul McNulty, U.S. Attorney for the Eastern District of Virginia, said: "Mr. McKinnon is charged with the biggest military computer hack of all time."

If found guilty, McKinnon could be jailed for 70 years and fined as much as $1.75 million

SOURCE:
http://valleywag.com/5031227/the-biggest-military-hacker-of-all-times-did-his-work-over-56k-modem

Sunday, August 3, 2008

How does a computer boot ?

0 comments
I have this idea of developing a bootstrap program which allows one to load iso images directly from hard disk. This can have real advantage where a system is lacking cd/dvd writer and has bootable iso images lying around on hard disk. However as simple as it may sound, bootstrap or boot loader is a very critical code in a computer system.

Bootstrap is a small program loaded by BIOS upon system startup. BIOS has no information about environment required by OS and thus cannot do anything to initialize the system beyond putting hardware in a known state. This is where bootstrap program comes to play. BIOS loads bootstrap program from a fixed location and transfers control to it. OS specific bootloaders either load operating system itself or perform a multi-stage boot by loading a more complex and advanced initialization program. It's the bootstrap's responsibility to load code and build an appropriate operating environment.

Basics of Bootstrap

A bootstrap is loaded from 1st sector of disk, track 0, head 0, sector 1. Which disk the bootstrap is loaded from is dependent on BIOS configuration saved in NVRAM. This single 512 byte sector is loaded in memory at physical address 0000:7C00. The BIOS then examines final two bytes of bootstrap (offset 1FEh) for value AA55h. If final two bytes are AA55h then it's a valid bootstap and disk is bootable. A bootstrap must be exactly 512 bytes long. After verifying a bootstrap, BIOS jumps to 0000:7C00 and turn control over to bootstrap.

Another important fact about bootstrap is that it's a 16bit code. This limitation is due to the fact that during the period when BIOS is making a jump to bootstrap, CPU is still executing in 16bit Real Mode.

Simplest bootstrap code could be as follows:

;**************************
[BITS 16]
[ORG 0x7C00h]

INT 0x18

TIMES 510-($-$$) db 0
dw 0xAA55h
;**************************

We can compile this code using nasm as follows:

nasm bootstrap.asm -o bootstrap.bin

One can add functionality to this bootloader by loading another program through this bootstrap which doesn't have to obey 512bytes limitation and thus can have more functionality and also which can execute in 32bit Protected Mode.

I guess I'd post more on this issue later, when I'm through with my own bootstrap. Till then happy coding....

Saturday, August 2, 2008

How does computer print characters

0 comments
Today while reading an article on some website about localization a wierd thought just ran into my mind. Why does a computer print "A" when I press "A" key on my keyboard ? Well we all know that computers understand ASCII and when I press a key "A" on my keyboard a signal goes to CPU that user has pressed a key with ASCII code 65. This was the point beyond which I was not able to understand my problem. I mean it's all okey if computer understood that I pressed a keystroke with ASCII code 65 as computer is good at understanding binary. However I was still confused as to how did "A" got displayed on computer screen. And if we can change it to print some other character from some another language. However after a bit of searching on internet, I came to know that actually ROM BIOS of VGA card has something called "OEM Hardware Font". These fonts generally use U.S. English PC8 character set - Codepage 437. The fullscreen fonts are generally stored as bitmaps in BIOS data area and are copied to computer memory during the boot process. Several font sizes are provided. The most popular is 8x16 (8 pixels wide, 16 pixels high) but 8x8 and 8x14 fonts are also common. All video cards must provide 8x16 and 8x8 fonts. Some video cards drop 8x14 fonts as VESA standard encourages manufacturers to drop this font to allow for inclusion of some other features. So next question that was in mind was that can we change these fonts ?

Modern video cards hold their software and images in EEPROM. Though many manufacturers provide flash images to upgrade the software, very few of them provide proprietary ROM Images. However luckily for popular video cards there are many publically available editors which allows one to view these bitmaps and even modify them.Subscribe to Syconet World by Email.

Complete Article

WiFi PC Cards - Frequent Disconnects Fix

0 comments
It seems like I hit a nerve – if you have a WiFi PCMCIA card that drives you nuts as it connects/disconnects with annoying frequency, you’re not alone! It’s not particular to one brand but rather an endemic Windows XP/2000 issue. Readers alerted me to a few articles that are MUST reads if this is a problem for you.

Read Complete Story

Some Cool Firefox Plugins

0 comments
Here is the list of some real cool firefox plugins that I've used over past few months.

1) Spiderzilla -> This is counterpart of httrack and allows one to download the entire websites to one's computer. I've tried it twice and it has successfully replicated the entire websites on to my computer for offline viewing.

2) Unplug -> Another cool firefox plugin which allows downloading of embedded media onto one's machine from a webpage.

3) TS -> TS stands for Torrent Search Toolbar. It's a nifty little tool that allows one to search for different things on various torrent sites like Mininova, MegaNova, Demonoids, PodTropolis etc. It also displays new additions to various torrent sites on regular basis.

4) AdBlock Plus -> Ads and Adwares were things of yesterday :)

5) Firebug -> Web debugging evolved.

6) DOM Inspector -> Inspects the properties of Windows and it's contents.

7) Tix Now -> Now stop waiting for rapidshare, megaupload etc. timer blockage.

Hope you enjoy using these plugins as much as I do. Do let us know about various plugins that you've used and found useful.

DOS window ip commands

0 comments
Display Connection Configuration: ipconfig /all

Display DNS Cache Info Configuration: ipconfig /displaydns

Clear DNS Cache: ipconfig /flushdns

Release All IP Address Connections: ipconfig /release

Renew All IP Address Connections: ipconfig /renew

Re-Register the DNS connections: ipconfig /registerdns

Change/Modify DHCP Class ID: ipconfig /setclassid



Network Connections: control netconnections

Network Setup Wizard: netsetup.cpl

Test Connectivity: ping www.whatismyip.com

Trace IP address Route: tracert

Displays the TCP/IP protocol sessions: netstat

Display Local Route: route

Display Resolved MAC Addresses: arp

Display Name of Computer Currently on: hostname

Display DHCP Class Information: ipconfig /showclassid

Friday, August 1, 2008

How Not To Get Hacked

0 comments

Protect Urself !

Follow These Simple Guidelines n u are done


*** Under the security option tab of Mozilla Firefox there is an option Show Passwords make sure its protected by the master password.


1. U may avoid using Internet Explorer(old versions) and make the switch to Opera, it's more secure, plain and simple.

2. Get Spybot Search and Destroy or Spyware Doctor and immediately update it.

3. Get Adaware SE and immediately update it.
(Use both as a 1-2 punch on infected client computers and between the two there's not much they won't kill)

4. Update your anti virus,

5. Boot into safe mode and run all three scans (once in a month)

6. While the scans are going check your registry (Click start --> Run and type regedit to get intot he registry) and look in HKEY_CurrentUser/software/microsoft/windows/currentversion/run & HKEY_Local_Machine/software/microsoft/windows/currentversion/run. Verify that all programs listed are legitimate and wanted.

7. If or when your antivirus scan comes across anything, search for that file name in your registry and delete it, at least quarantine it.

8. Use explorer to go to the windows/system32 folder and sort by date. If you haven't already done so, make sure you can see the entire file names. click Tools --> Folder Options and unclick the box labeled "Hide extensions for known file types" and under Hidden files and folders click "Show hidden files and folders." However, make sure you choose "Hide protected operating system files" so you don't accidentally remove anything that would cripple your computer.. You are looking for recent files with names ending with .exe and .dll that look suspicious. Major culprits will have gibberish names such as alkjdlkjfa.exe.

9. Once you can get clean scans in safe mode, reboot in normal mode and scan all over again. If you can't get a clean scan in regular mode then you have something more persistant that could take more research.

10. Make sure your firewall doesn't have strange exceptions.

11. If you suspect anything that is going wrong with your computer is the action of a stalker, on a more secure system change all your major passwords, mostly bu using a virtual keyboard(to prevent keyloggers).

12. If your system has been specifically targeted and hacked you can never be 100% sure that your system is no longer compromised so start with 11, make backups of personal files on the infected system and format and re-install Windows.

Good luck!

Find who is Invisible on Yahoo messenger

0 comments
Sometimes some of your friends who appear offline in yahoo messenger may not be actually offline,they may in the 'Invisible' mode.This maybe if they are trying to ignore you or are too busy to talk to anyone.

There is this small trick that you can use to find out what the truth is.

Firstly open your yahoo messenger main window and double click on the name of the person whom you want to check.The chat window will open obviously.

Click IMVironment button, select See all IMVironments, select Yahoo! Tools or Interactive Fun, and click on Doodle.
After loading the Doodle imvironment there can be two possibilities

1.If the user is offline Doodle are will show this "waiting for your friend to load Doodle" continuously .See in the picture below:

Find who is Invisible on Yahoo messenger - The Ethical Hacking
2. If the user is online (but in invisible mode), after few seconds (it can take up to one minute, depending on your connection speed), you should get a blank page like in the picture below.So you know that the user is online.

Find who is Invisible on Yahoo messenger - The Ethical Hacking



Alternate Method:


Chose a person you want to check .Double click to open the chat window.Now simply invite the person for a voice conference.This is done by clicking on the "conference' button on the top of the chat window.
If the talk button appears and turns green then that person is online.But if you receive the message 'Voice chat could not be started ' then the person is offline.

Note:Some people use softwares like buddy spy to check who is invisible.I DONT RECOMMEND you to use such third party softwares as they can expose your Pc to hackers by sending your personal information and can even steal information from your Pc.So avoid such softwares and instead use the simple tricks given above.

Speed up XP Network Browsing

0 comments
The speed of your network connection doesn't just depend on the speed of your hardware. Windows is an operating system that is designed to work on a variety of different hardware and network setups. Because of the abstract nature of the operating system, it cannot be optimized for user-specific hardware setups.

Depending on the type of network connection you have, you might be able to tweak your connection so that the speed of your Internet, as well as your local area network, will be faster. By hacking the System Registry and editing the TCP/IP parameters, you can fine-tune the values to take advantage of more reliable, faster Internet connections, such as DSL and cable.

These next sections will guide you through the steps of increasing both the speed of your local area network and your Internet connection.

Increasing network browsing speed

Does your computer slow down when you browse your local area network and connect to other computers that are sharing data? One of the most common causes of this slowdown is a feature of Windows Explorer that looks for scheduled tasks on remote computers. This effort can take some time on some computers and can really slow down your browsing. The window with which you are browsing the network may appear to freeze momentarily, as the system is waiting for a response from the remote computer.

Although this problem is a complex one, the solution is very simple. Instead of having to wait for the remote scheduled tasks, which is useless information to anyone who is not a system administrator remotely configuring scheduled tasks, you can disable this feature.

In order to do this, you will have to hack the System Registry and delete a reference to a key so that this feature will not be loaded. To do this, follow these steps:

1. Open up the Registry Editor by clicking the Start Menu and selecting Run. Then type regedit in the text box and click the OK button.
2. Once the Registry Editor has loaded, expand the HKEY_LOCAL_MACHINE key.
3. Next, expand Software and then Microsoft.
4. Locate Windows and expand that as well.
5. You will want to be editing the main system files, so expand CurrentVersion.
6. Because this feature is a feature of the Windows component known as Explorer, expand the Explorer key.
7. Next, you will want to modify the remote computer settings, so expand the RemoteComputer key and then expand the NameSpace key to show all of the features that are enabled when you browse to a remote computer.
8. In the NameSpace folder you will find two entries. One is "{2227A280-3AEA-1069-A2DE-08002B30309D}" which tells Explorer to show printers shared on the remote machine. The other, "{D6277990-4C6A-11CF-8D87-00AA0060F5BF}," tells Explorer to show remote scheduled tasks. This is the one that you should delete. This can be done by right-clicking the name of the key and selecting Delete.

Tip:
If you have no use for viewing remote shared printers and are really only interested in shared files, consider deleting the printers key, "{2227A280-3AEA-1069-A2DE-08002B30309D}", as well. This will also boost your browsing speed.

Once you have deleted the key, you just need to restart and the changes will be in effect. Now your network computer browsing will be without needless delays.
Disabling unneeded protocols

With every computer comes programs installed that you do not need. As with extra programs taking up space, extra protocols are just wasting your network connection and can actually slow it down. How is this possible? By default, a few different protocols are installed on your computer to allow for maximum compatibility with other computers on a network; these protocols each require bandwidth to operate. Most users will not use too many protocols, and their computers will use up a portion of their connection as they respond and transmit information for these protocols.

Additionally, with extra protocols installed on your network adapter connected to the Internet, you increase your risk of security-related problems. One of the most common risks for broadband users is that they have the Client for Microsoft Networks networking protocol enabled on their connection. This protocol allows everyone in their neighborhood to connect to the users' computers and view any files that they may be sharing. This fact alone should be a good enough reason for you to turn off the extra protocols. But with them disabled, you will also save a little bandwidth as well.

Viewing protocols on your network adapters
Viewing the protocols installed and active on your various network adapters is easy. Just follow these quick steps and you will be viewing them in no time:

1. Right-click the My Network Places icon on the desktop or in the Start Menu and select Properties. If the My Network Places icon is not in either of those locations, then go to the Control Panel and click the Network Connections icon that is shown under the Classic view.
2. Next, right-click the network adapter with which you want to view the network protocols and select Properties.
3. This will bring up a list of the protocols installed as well as active on your adapter, as Figure 11-11 shows. The protocols that are installed but not active are indicated by the absence of a check in the checkbox.

Disabling a specific protocol
Now that you have the list of installed and active protocols on your screen, you are ready to disable a protocol. To do so, just click the check box to remove the check. Then click the OK button and the protocol is no longer active on the network adapter.

I highly recommend that you disable all protocols except for the TCP/IP protocol (also referred to as the Internet Protocol). Doing so will optimize your adapter for speed and security

A Home Server of Our Own

0 comments

"One of the issues is as simple as the term 'server' to consumers. It tends to conjure up nightmares of technical problems and IT support from some people," said In-Stat's Joyce Putscher. "However, when you ask consumers if they would like to listen to their digital music that they have on their PC on a stereo system that is in another room in the house ... most broadband consumers say, 'Yes.'"


Read Complete story

Will the Next MacBook Touchpad Look Like an iPhone?

0 comments

The hints Apple dropped during its latest financial open house have had the company's fans guessing about what the "wonderful new products" in line to launch soon will be. One attractive possibility: A glass touchpad for the MacBook that looks, acts and feels just like the multi-touch interface found on the iPhone and iPod touch. Such a development would blow other laptops out of the water, writes Chris Maxcer.


Complete Article

Enter your email address:

Delivered by FeedBurner