Wednesday, July 31, 2013

WHATS NEW IN ANDROID 4.3

Just few Days ago Google Announced Android v4.3 And Google Nexus 7 was the 1st Device to Run Android 4.3 out of the box and this update came after 9months after introducing android 4.2 and this will be the last update of Jelly Bean Version and the next update of Android will the New Version 5.0 (Key Lime Pie). Google has not brought a big change in Android 4.3 just some major update from Android 4.2 to android 4.3. And the new version begin to roll out to Nexus Devices like Nexus 7, Nexus 4, Nexus 10 and Galaxy Nexus.

1. Restricted profiles
Google added multi-user profiles in Android 4.2 but through the new restricted profiles feature, users can restrict app usage and content consumption on an Android device. So you’ll be able to set profiles for each user of the device in case of multiple users.

2. Bluetooth Smart Ready:
Android 4.3 will now support low-energy Bluetooth Smart accessories like heart rate monitors, pedometers, thermometers and many others.

3. Dial-pad Auto-complete
Android 4.3 now adds the autocomplete feature in the dial-pad suggesting contact names or phone numbers when users start keying-in something which however is already available in some OEMs like Samsung.

4.Notification Access
The Notification bar has been a popular feature on Android and with Android 4.3, you can control and interact with the status bar notifications. This would allow users to control how notifications are pushed to the primary and connected devices(smart watches, fitness bands). Users will also be able to see all the notifications at one place.

5. OpenGL ES 3.0
Android 4.3 now supports the new version of the industry standard for high performance graphics. Google also gave a demo of a game showing detailed textures, lens flare, and reflections. This was missing in Android 4.2.

6. Simplified Setup Wizard
Android Jelly Bean now supports corrections to user inputs while signing-in to the device, the first time. This is due to more streamlined user agreements. Now a user can change the information that was keyed-in during the first boot of the device. Google has also introduced faster user switching from the lock screen in case of multiple users.

7. Bluetooth AVRCP
Google devices running Android 4.3 Jelly Bean can sync with Bluetooth enabled car stereos and offer additional functionality. The Bluetooth AVRCP 1.3 version allows stereos to display metadata such as song names when music is being streamed from an Android 4.3 device.

8. Wi-Fi location Scan
Google has now increased the location accuracy of Android devices by allowing location scanning via Wi-Fi. It now allows apps to get location data through Wi-Fi even when Wi-Fi is set to off and not being used for data access.

9. Keyboard & input
Android 4.3 comes with an upgraded algorithm for tap-typing recognition that makes text input easier while chatting via messages or even while composing emails. It also brings a new emoji keyboard. The update also adds lower latency input for game-pad buttons and joysticks.

10.New language Added
Google has introduced native local language support to its operating system for Africaans, Amharic, Hindi, Swahili and Zulu. Hindi has finally reached the stock Android operating platform.Google has also added support for Hebrew and Arabic (right-to-left) in the home screen, Settings, Phone, People, and Keep apps.

11.New Camera UI
Android 4.3 also offers a new updated Camera app that features a new arch based menu which makes it easier to control settings and switch camera.



Enjoy

What is an IP address?

Every device connected to the public Internet is assigned a unique number known as an Internet Protocol (IP) address. IP addresses consist of four numbers separated by periods (also called a 'dotted-quad') and look something like 127.0.0.1.

Since these numbers are usually assigned to internet service providers within region-based blocks, an IP address can often be used to identify the region or country from which a computer is connecting to the Internet. An IP address can sometimes be used to show the user's general location.

Because the numbers may be tedious to deal with, an IP address may also be assigned to a Host name, which is sometimes easier to remember. Hostnames may be looked up to find IP addresses, and vice-versa. At one time ISPs issued one IP address to each user. These are called static IP addresses. Because there is a limited number of IP addresses and with increased usage of the internet ISPs now issue IP addresses in a dynamic fashion out of a pool of IP addresses (Using DHCP). These are referred to as dynamic IP addresses. This also limits the ability of the user to host websites, mail servers, ftp servers, etc. In addition to users connecting to the internet, with virtual hosting, a single machine can act like multiple machines (with multiple domain names and IP addresses).


Enjoy

Top Ten Tips To Improve System Speed

1. Let your PC boot up completely before opening any applications.

2. Refresh the desktop after closing any application. This will remove any unused files from the RAM.

3. Do not set very large file size images as your wallpaper. Do not keep a wallpaper at all if your PC is low on RAM (less than 64 MB).

4. Do not clutter your Desktop with a lot of shortcuts. Each shortcut on the desktop uses up to 500 bytes of RAM.

5. Empty the recycle bin regularly.The files are not really deleted from your hard drive until you empty the recycle bin.

6. Delete the temporary internet files regularly.

7. Defragment your hard drive once every two months. This will free up a lot of space on your hard drive and rearrange the files so that your applications run faster.

8. Always make two partitions in your hard drive. Install all large Software's (like PSP, Photoshop, 3DS Max etc) in the second partition. Windows uses all the available empty space in C drive as virtual memory when your Computer RAM is full. Keep the C Drive as empty as possible.

9. When installing new Software's disable the option of having a tray icon. The tray icons use up available RAM, and also slow down the booting of your PC. Also disable the option of starting the application automatically when the PC boots. You can disable these options later on also from the Tools or preferences menu in your application.

10. Protect your PC from dust. Dust causes the CPU cooling fan to jam and slow down thereby gradually heating your CPU and affecting the processing speed. Use compressed air to blow out any dust from the CPU. Never use vacuum.

RAM IS THE WORKING AREA (DESKTOP) OF THE CPU, KEEP IT AS EMPTY AND UNCLUTTERED AS POSSIBLE! have fun !

Enjoy

Monday, July 29, 2013

Components of a Server Computer

The hardware components that a typical server computer comprises are similar to the components used in less expensive client computers. However, server computers are usually built from higher-grade components than client computers. The following paragraphs describe the typical components of a server computer.
Motherboard
The motherboard is the computer's main electronic circuit board to which all the other components of your computer are connected. More than any other component, the motherboard is the computer. All other components attach to the motherboard.
The major components on the motherboard include the processor (or CPU), supporting circuitry called the chipset, memory, expansion slots, a standard IDE hard drive controller, and input/output (I/O) ports for devices such as keyboards, mice, and printers. Some motherboards also include additional built-in features such as a graphics adapter, SCSI disk controller, or a network interface.
Processor
The processor, or CPU, is the brain of the computer. Although the processor isn't the only component that affects overall system performance, it is the one that most people think of first when deciding what type of server to purchase. At the time of this writing, Intel had four processor models designed for use in server computers:
·         Itanium 2: 1.60GHz clock speed; 1–2 processor cores
·         Xeon: 1.83–2.33GHz clock speed; 1–4 processor cores
·         Pentium D: 2.66-3.6GHz clock speed; 2 processor cores
·         Pentium 4: 2.4-3.6GHz clock speed; 1 processor core
Each motherboard is designed to support a particular type of processor. CPUs come in two basic mounting styles: slot or socket. However, you can choose from several types of slots and sockets, so you have to make sure that the motherboard supports the specific slot or socket style used by the CPU. Some server motherboards have two or more slots or sockets to hold two or more CPUs.
The term clock speed refers to how fast the basic clock that drives the processor's operation ticks. In theory, the faster the clock speed, the faster the processor. However, clock speed alone is reliable only for comparing processors within the same family. In fact, the Itanium processors are faster than Xeon processors at the same clock speed. The same holds true for Xeon processors compared with Pentium D processors. That's because the newer processor models contain more advanced circuitry than the older models, so they can accomplish more work with each tick of the clock.
The number of processor cores also has a dramatic effect on performance. Each processor core acts as if it's a separate processor. Most server computers use dual-core (two processor cores) or quad-core (four cores) chips.
Memory
Don't scrimp on memory. People rarely complain about servers having too much memory. Many different types of memory are available, so you have to pick the right type of memory to match the memory supported by your motherboard. The total memory capacity of the server depends on the motherboard. Most new servers can support at least 12GB of memory, and some can handle up to 32GB.
Hard drives
Most desktop computers use inexpensive hard drives called IDE drives (sometimes also called ATA).These drives are adequate for individual users, but because performance is more important for servers, another type of drive known as SCSI is usually used instead. For the best performance, use the SCSI drives along with a high-performance SCSI controller card.
Recently, a new type of inexpensive drive called SATA has been appearing in desktop computers. SATA drives are also being used more and more in server computers as well due to their reliability and performance.
Network connection
The network connection is one of the most important parts of any server. Many servers have network adapters built into the motherboard. If your server isn't equipped as such, you'll need to add a separate network adapter card.
Video
Fancy graphics aren't that important for a server computer. You can equip your servers with inexpensive generic video cards and monitors without affecting network performance. (This is one of the few areas where it's acceptable to cut costs on a server.)
Power supply
Because a server usually has more devices than a typical desktop computer, it requires a larger power supply (300 watts is typical). If the server houses a large number of hard drives, it may require an even larger power supply.

ENjoy

20 unknown facts about Facebook Founder Mark Zucerkberg.


1). Facebook’s main color is blue because Mark Zuckerberg is color blind. The color that he can see the best is blue.

2). His dog name is Beast, and he has his own Facebook page .

3). He is known as ‘Zuck’ by his friends while his mother calls him Princely.

4). He promised and wore a tie everyday for a whole year.

5). He learned Chinese in 2010 so that he could talk to his girlfriends family members who were Chinese.

6). He said that the only accurate thing in the Facebook movie ‘The Social Network’ was the dress worn by the character who played his role. He added that every single T-shirt that was correct.

7). Mark wore a hoodie and jeans in a meeting with investors on Wall Street. Photo via Into wire.

8). Mark Zuckerberg met his girlfriend, Priscilla Chan in line for the bathroom at a Harvard party in 2003.

9). He designed his wife’s wedding ring.

10). The guest didn’t know that they were on a weeding untill it was announced. Priscilla had just graduated and they thought the party was for her graduation.

11). Mark Zuckerberg is the most followed (circled) person in Google Plus .

12). He even has a Twitter account with an amazing username.

13). He rejected a $1 billion dollar offer from Yahoo to buy Facebook.

14). Mark had a business card which read “I’m CEO Bitch” .

15). Some of his favourite musical artist are Green Day, Jay-Z, Taylor Swift, and Shakira.

16). His T-shirt has the Facebook friend request, Message, and notification logo. Notice the 3 things in his T-shirt?

17). His Facebook profile CANNOT be BLOCKED.

18). He used to work sitting like normal employee before.

19). He rarely wears a suit.

20). He wears the same trademark hoodie and jeans to work ‘everyday’ !!!

HEHEHe!!! ENjoy


Welcome to Hacking!!!

To become a professional in IT Field ( whether you are a security Expert or a Black / White / Grey hat Hacker) , you need to know the information below.


1. Learn TCP/IP, Basic Information gathering, Proxies, Socks, SSL, VPN, VPS, RDP, FTP, POP3, SMTP, Telnet, SSH.

2. Learn Linux, Unix, Windows - You can do this using vmware or any virtual desktop utility.

3. Learn a programming language that's compatible with all OS - Perl, Python, C, ASM

4. Learn HTML, PHP, Javascript, ASP, XML, SQL, XSS, SQLI, RFI, LFI

5. Learn Reverse engineering and crack some programs for serials easy ones like mirc, winzip, winrar or old games.

6. Code a fuzzer for common protocols - ftp, pop3, 80, 8080 - Pick some free software like ftp server, mail server, apache or iis webserver or a webserver all-in-one pack, or teamspeak, ventrilo, mumble.

7. Code a tool that uses grep to sort out unique code in source codes.

8. Make a custom IPtable, IPsec firewall that blocks all incoming traffic and out going traffic and add filters to accept certain ports that your software or scripts use.

9. Pick a kernel in linux or unix, also pick a Microsoft OS version lets say Winxp pro sp2 put them on the virtual desktops (vmware) and find and code a new local exploit in those versions, then install a Apache webserver on the Linux/Unix and a IIS webserver on the winxp pro and attempt to find and code a new local reverse_tcp_shell exploit.

10. Learn Cisco Router and Switch configuration and setup.

11. Learn Checkpoint Setup and Config

12. Learn Wifi scanning, cracking, sniffing.

13. Pick a person in you phonebook for the area code you live in or city then ring the person on a anonymous line like skype or a payphone or a carded sim and attempt to social engineer the person for his name, address, data of birth, city born, country born, ISP connected with, Phone company connected with, What bank he/she uses and anything else you can get. Then Attempt to ring using a spoof caller ID software with the person's phone number - call the ISP and try reset the password to his/her internet connection/webmail, get access to bank account or ask them to send out a new *** to a new address (drop) with a new pin, reset of phone company passwords.

14. Use your information gathering skills to get all the information off a website like a shop then use the spoof callerID software or hack your phone to show a new number of the Webserver's Tech Support number then ring the shop owner and try get the shop site password.

15. Do the same thing but attempt to use a web attack against a site or shop to gain admin access.

16. Once got access upload a shell and attempt to exploit the server to gain root using a exploit you coded not someone else s exploit.

17. Make your own Linux Distro

18. Use your own Linux Distro or use a vanilla Linux gnome (not kde) keep it with not much graphics so you can learn how to depend on the terminal and start from scratch install applications that you will only need for a blackbox (Security test box), make folders for fuzzers, exploits, scanners..etc Then load them up with your own scripts and other tools ( By this stage you shouldn't need to depend on other peoples scripts).

19. Learn macosx and attempt to gain access to a Macosx box whether it be your own or someones elses.

20. Create a secure home network and secure your own systems with your own Security policies and firewall settings.

All this isn't a over night learning it will take a nice 3 - 4 years to learn a bit of this 5+ years to learn most of it and even then you may need time to keep learn as IT keeps changing ever day.

As long as your dedicated to learning you won't have any problems and if you learn all that you should easy get a job in any company if you show proof that you can do these things (print out scripts that you made or put on disc) to show the companies.

ENjoy


How To Dual Boot Ubuntu With Windows (EFI Booting).

So, many of you might be having problems on dual booting windows and ubuntu on a EFI enabled machine. Well this is because the grub boot loader is not able to recognize the GUID (GPT) Partitions used. Sometimes when you install ubuntu alongside with windows, It would directly load into Windows without showing grub menu, or it would load into ubuntu without showing grub menu.

There are many ways to fix this problem, Here i will be showing an easy way to fix this problem.

We will use a tool called "Boot Repair" to fix the grub loader.

So first of all, If your system loads directly into ubuntu without showing grub, half of your work is done

Now all you need to do is, open up the terminal (Ctrl + Alt + T) and type these lines:

sudo add-apt-repository ppa:yannubuntu/boot-repair
sudo apt-get update
sudo apt-get install boot-repair

Now after Installing Boot Repair open it up and click "Recommended Repair". Thats it. The software will do all the work for you. After its done reboot your computer, you should see the grub menu with "Windows Boot UEFI Loader" listed in it.

Now If you're system is booting directly to windows without showing grub menu, than you have to insert the installation media (Live USB/CD) and install Boot Repair as I've shown before.


Enjoy

10 Free Keyloggers to monitor your Local PC or Laptop!


Here is an exclusive list of top 10 free local keyloggers. However If you are planning to monitor only your PC or any PC which you have control of, then you can blindly go for “Hardware Keyloggers” as they are the safest keyloggers and operate in a complete stealth. If you Still wanna Prefer Free Keyloggers then below is the list of Free keyloggers that will really help you monitor your PC.

1) REFOG Free Edition
Refog Free Keylogger beats competition in two respects: it’s simple to use and it’s free. REFOG Free Keylogger can look after your children without them even noticing. Even technically minded children won’t detect the key logger when it runs in a stealth mode. The program removes all the shortcuts and can be accessed only through a hot key combination. Running unobtrusively from the moment the system boots, REFOG Free Keylogger keeps track of all typed or pasted text.
Download link: http://www.refog.com/trial2.html

2) Black box express
Simple to use monitoring of one local computer; Monitor Screen recordings, Programs, Keystrokes typed, Websites, Web Searches, Emails/Webmails/ Instant Messenger Chat sent and received. Alerts and Warnings instantly or as a summary on your e-mail or cell phone. everything for 100% Free. No strings attached.
Download link:www.asmsoftware.com/MyAccount/Downloads/Download.ashx?ProductId=1c3ff8b2-f4c6-434e-9810-95de152cdce0

3) Personal keylogger
The Personal Keylogger application was designed to be a small tool that will allow you to secretly record all keystrokes and other input. All specific instructions are explained in the application. To exit it and receive your logs, you will need to enter in your keycode. If you have forgotten your keycode, you will need to restart the computer. Keycode is like password. To stop Personal keylogger, you can enter your keycode anywhere on the screen. Once you type-in your keycode, the keylogger will stop monitoring and the log.txt file will be created in your selected destination folder.
Download link: www.nfyre.com/prog/Personal%20Keylogger.zip

4) Py keylogger
PyKeylogger is an easy-to-use and simple keylogger written in python. It is primarily designed for backup purposes, but can be used as a stealth keylogger, too. It does not raise any trust issues, since it is a short python script that you can easily examine. It is primarily designed for personal backup purposes, rather than stealth keylogging. Thus, it does not make explicit attempts to hide its presence from the operating system or the user. That said, the only way it is visible is that the process name shows up in the task list, so it is not immediately apparent that there is a keylogger on the system.
‪#‎Tip‬: Press and hold ‘left-CTRL + Right-CTRL + F12′ keys simultaneously to bring up the Control Panel (default password is blank).Download link:http://sourceforge.net/projects/pykeylogger/files/pykeylogger/1.2.1/pykeylogger-1.2.1_win32_installer.exe/download

5) Heretic Macro
Heretic is a powerful tool that is able to record user events, such as mouse clicks and keys, into a C/Java-like script, and play that script either once or repeatedly. It has many commands for dynamic pixel-based botting, window based botting, and static botting/macro-ing (i.e. key presses, mouse clicks, mouse moves, and pauses).
Download link: http://zone-dev.com/downloads/Hereticsetup.exe

6) Ultimate Keylogger
Ultimate Keylogger Free is a free popular all-round monitoring solution. It runs in the background and monitors all typed keystrokes, applications, passwords, clipboard, email, and visited websites’ URLs. You can view the reports as HTML files. Ultimate Keylogger Free will help you to find out, what exactly took place in the system.
Download link:www.ultimatekeylogger.com/downloads/ultimatekeyloggerfree.exe

7) Actual keylogger
It runs hidden in the background and automatically records all keystrokes (including Alt, Ctrl and other functional buttons). The interface can be password protected and the log files are encrypted. You can view the reports as HTML or plain text. In the hidden mode it is invisible in all operating systems.
Download link: http://www.actualkeylogger.com/actualspy.exe

8) Revealer Keylogger Free Edition
Revealer Keylogger is surely the easiest and faster way to record keyboard inputs. There is almost nothing to configure, in fact everything is configured internally with the best settings. Free keylogger monitoring tool that logs every keystroke even passwords behind asterisks and conversations in common instant messengers. Its interface is password protected, the software does not appear in Add/Remove programs or in the taskbar.
Download link: www.logixoft.com/rkfree_setup.exe

9) Romaco Keylogger
Romaco Keylogger is a small and easy to use tool that can log all key-presses that are made while it is running, and display them to you in its window. It automatically exports the logged text to a text file every 5 minutes, or manually. It can be hidden at the click of a button, and recalled by vigorously pressing one of the least used keys on the keyboard, the break key.
Download link:http://sites.google.com/site/theubuntuguy/keylogger

10) KidLogger
KidLogger collects user activity journal on the Computer and creates detailed Analysis of the user activity available online. Creates the list of most used web sites. Record the text was typed on the keyboard in any application
Download link: kidlogger.net/kidlogger_pro.exe


Enjoy

What, How, Which and various types of Hacking?


"where to begin with hacking". So here is my opinion about how they should get around starting.

There are commonly three types of hackers:

White Hats: 
The White Hat hacker has dedicated himself to fight malware and help others with their computer problems. He is a person you can trust, and he will most likely end up in a good paying job as a computer programmer or a security consultant. He will most certainly not end up in jail.

Grey Hats: 
The Grey Hat hacker are in between white Hats and Black Hats. He will most likely commit pranks at people that he thinks is harmless, but it can also be illegal. He can at one time be helpful and help you with a computer problem, but at the same time infect you with his own virus. There is a chance that the grey hat will end up in prison.

Black Hats: 
The Black hat hacker also known as a cracker is the one who deface websites, steal private information and such illegal activity. It is very time consuming to become a black hat. It can be very hard for them to get a job because of the illegal activity. If law enforcement gets you, you can expect jail time. 

So where to start?
You should know the answer to these questions before you start your hacking career.
Which type of hacker do you want to be (white hat, grey hat or black hat)?
Which type of hacking do you want to work with (website hacking, system exploits, pen testing etc.)?
What is your end-goal?

You should meet these requirements to become a successful hacker.
You shall be patient.
You shall dedicate a lot of time to hacking. You will never stop learning, since hacking is a lifestyle.
You should have a computer (I expect you to have one since you are reading this).
You shall be interested in how the different computer systems works, and how to control them.

Now that you have an idea of what kind of hacker, you want to be we will look closer into the different topics you can work with as a hacker.

Website Hacking:
You properly already guessed it, but website hacking is about hacking websites. You use your skills to find exploits and vulnerabilities in websites and web applications. Almost all major hacking stories in the news are about websites and databases that have been hacked. Once you have enough experience in website security you will be amazed about how easy it is to find vulnerabilities in websites. However, it will take a lot of effort and time to reach that level of skills. You will need to know a large amount of server-side languages and website construction languages like PHP, HTML, JavaScript, SQL, ASP, ASP.NET and Perl. This was just some of the languages you should know about. I will recommend you to take JavaScript, SQL and PHP very serious since it is in those languages you will find the most vulnerabilities.

Pen testing and Forensics:
Pen testing and forensics can earn you big money. It is these guys the company’s call when they have been hacked. They are experts in operating systems, wireless connections and exploiting computers. This way will take A LOT of time and effort since there is so much you should know about. You shall know about how the different operating systems works, which exploit there is to them, how to exploit them, routers, encryption, malware etc. the list is almost endless.

Code exploiting:
Not many people know about this. This will require you to be a complete expert at programming. You shall be at least as good at these programming languages as your main language like English. This kind of hacking is taking a lot of time, and will require you to be patient. Do not get me wrong, every company that releases software like Symantec, Google, Microsoft, Adobe, and Oracle have hackers with these skills employed to check their software for vulnerabilities. Sadly, they cannot find every security hole and therefore some very smart black hat hackers are able to find them, and exploit them before the companies get the vulnerability patched. You should know the most popular languages like C++, Java and C etc.

Computer security:
The work these people do looks a lot like the pentesters. These people is able to detect and analyze new viruses and malware. They are working for companies like Symantec, KasperSky and Avira etc. Some of them are also working on labs that tests AV’s and new viruses. They are experts in how viruses works and how they infect systems.

You should now have an idea on where to start and in which direction you want to go.

Enjoy

Why did Hacker pick Linux?


When deciding on an operating system to cover in depth, we had a variety to choose from: Windows 95/98/NT/2000/ME/etc, MacOS, OpenBSD, NetBSD, FreeBSD, Solaris, HPUX, AIX, IRIX, and many others. So how did Linux win our favor?

It's use is on the rise.
It's an Open Source operating system.
It's available to everyone at a great price -- free.
It comes in many flavors (aka distributions.)
It is too commonly broken into due to out of date packages, poor system configuration, and its ubiquity.
Hackers use Linux.
We feel that Linux can be secured.
Linux use is growing at an amazing rate. This operating system, which has no public relations department, advertising, or government lobby, is being used widely in homes and server rooms alike. It's also free, and 100% open source, meaning anyone can look at each and every line of code in the Linux kernel.

Linux is a true multiuser operating system, and has been since the very first version. It is powerful in it's simplicity. Though there are robust graphical environments and tools, you can still do everything you could possibly need with just a keyboard and a shell prompt. Since you have the code, you could even make Linux do things it was never meant to.

That's one of the things that draws both the gurus and the attackers alike.

The black-hats have thronged to Linux. It allows them the control they require to do strange and ingenious things. If they want to experiment with new or invalid network packets, they can do so easily without relying on undocumented (or non-existant) API support from the vendor.

Millions of lines of code have been written for Linux applications and libraries, usually in an extremely modular manner, which allows it to be integrated into widely diverse projects. For example a library that allows you to sniff the network for proactive performance monitoring could be used as part of network hijacking code.

The power and flexibility of Linux makes it the hacker's playground. They use it, learn it, and understand it intimately. And that means that if there's an insecurity, they're going to find it.

However the very reasons the hackers like Linux are the same reasons more folks are installing it on their own systems today. The ability to look at each and every line of Linux code, and patch it when problems arise, means that Linux can be secured not just by a few programmers locked away in some corporate headquarters, but by any user at any time.


Enjoy

Sunday, July 28, 2013

Apt-Get

The apt-get command is a powerful command-line tool used to work with Ubuntu's Advanced Packaging Tool (APT) performing such functions as installation of new software packages, upgrade of existing software packages, updating of the package list index, and even upgrading the entire Ubuntu system.

Being a simple command-line tool, apt-get has numerous advantages over other package management tools available in Ubuntu for server administrators. Some of these advantages include ease of use over simple terminal connections (SSH) and the ability to be used in system administration scripts, which can in turn be automated by the cron scheduling utility.
Some examples of popular uses for the apt-get utility:
·         Install a Package: Installation of packages using the apt-get tool is quite simple. For example, to install the network scanner nmap, type the following:
sudo apt-get install nmap

·         Remove a Package: Removal of a package or packages is also a straightforward and simple process. To remove the nmap package installed in the previous example, type the following:
sudo apt-get remove nmap

Tip: Multiple Packages: You may specify multiple packages to be installed or removed, separated by spaces.

·         Update the Package Index: The APT package index is essentially a database of available packages from the repositories defined in the /etc/apt/sources.list file. To update the local package index with the latest changes made in repositories, type the following:
sudo apt-get update
 
·         Upgrade Packages: Over time, updated versions of packages currently installed on your computer may become available from the package repositories (for example security updated). To upgrade your system, first update your package index as outlined above, and then type:
sudo apt-get upgrade
 
·         If a package needs to install or remove new dependencies when being upgraded, it will not be upgraded by the upgradecommand. For such an upgrade, it is necessary to use the dist-upgrade command.
Also, you may upgrade your entire Ubuntu system from one revision to another with dist-upgrade. For example, to upgrade from Ubuntu version 5.10 to version 6.06 LTS, you would first ensure the version 6.06 LTS repositories replace the existing 5.10 repositories in your computer's /etc/apt/sources.list, then simply issue the apt-get update command as detailed above, and finally, perform the actual upgrade by typing:
sudo apt-get dist-upgrade
 
After a fairly considerable amount of time, your computer will be upgraded to the new revision. Typically, some post-upgrade steps would be required as detailed in the upgrade notes for the revision you are upgrading to.
Actions of the apt-get command, such as installation and removal of packages, are logged in the /var/log/dpkg.log log file.
Enjoy



Tuesday, July 23, 2013

Do you see a lot of messages like, "This program performed an illegal operation and will be shut down" ? Or do you find that your mouse often freezes and you have to reset your computer to regain control?

This is a very common complaint for many computer users. Why this happens can be due to a number of things. The most common causes of these troublesome problems will be covered here. They fall into the following general categories:

·   Hardware: Defective or mismatched components in your computer.
·   Aluminum Migration & ESD: Premature ageing and “Electro Static Discharge” can make a computer very intermittent.
·   Operating System: Some versions of Windows have bugs that can cause these problems.
·   Drivers: Buggy or down-level drivers can cause many problems.
·   Software: Some programs have bugs in them that can cause these problems.
·   Memory Fragmentation: Do you often see the message, "System is dangerously low in resources" If so you are probably suffering Memory Fragmentation.
·   CMOS Settings: Improper CMOS settings can cause many problems. Changing CMOS settings can also be used to help diagnose some hardware problems.
·   Loading Order: The order in which the software components of your computer are loaded into memory, at startup each day, can cause a multitude of odd problems.

·   A Combination of the above: Defects in any of the above may only show up under specific circumstances.

Enjoy

IMPORTANT SECURITY TIPS FOR SAFE ONLINE BANKING


1.   Access your bank website only by typing the URL in the address bar of your browser.
2.   Do not click on any links in any e-mail message to access the site.
3.   State Bank never sends e-mail and embedded links asking you to update or verify personal, confidential and security details. NEVER RESPOND to such e-mails/phone calls/SMS if you receive.
4.   Do not be lured if you receive an e-mail/SMS/phone call promising reward for providing your personal information or for updating your account details in the bank site.
5.   Having the following will improve your internet security:
6.   Newer version of Operating System with latest security patches.
*Latest version of Browsers (IE 7.0 and above , Mozilla Firefox 3.1 *and above, Opera 9.5 and above, Safari 3.5 and above, Google chrome,etc.)
      *Firewall is enabled.
      *Antivirus signatures applied
5.   Scan your computer regularly with Antivirus to ensure that the system is Virus/Trojan free.
6.   Change your Internet Banking password at periodical intervals.
7.   Always check the last log-in date and time in the post login page.
8.   Avoid accessing Internet banking accounts from cyber cafes or shared PCs.

Enjoy

Sunday, July 21, 2013

Guys I m going to show a method to block and replace a website on a PC!!!!

My computer=> C drive => Windows=>System32=>drivers=>etc=> host file

Open host file in WordPad or notepad

Now open CMD and type in CMD ping www.google.com then copy the IP Address of Google website

In host file just write the IPaddress of Google website that you copy and name of the website which one you want to block.

Like:
87.248.112.181 www.facebook.com

in this case you will type in URL www.facebook.com but Google website will open.

for block:

type 127.0.0.1 www.facebook.com or www.yahoo.com


it’s not going to open which one you will type.


Enjoy

Hack Codes for Android Mobile


1. Complete Information About your Phone
*#*#4636#*#*

2. Factory data reset
*#*#7780#*#*

3. Format Android Phone
*2767*3855# (think twice before using this code)

4. Phone Camera Update
*#*#34971539#*#* (Don't Update camera firmware in image)

5. End Call/Power
*#*#7594#*#*

6. File Copy for Creating Backup
*#*#273283*255*663282*#*#*

7. Service Mode
*#*#197328640#*#*

8. WLAN, GPS and Bluetooth Test Codes:

*#*#232339#*#* OR *#*#526#*#* OR *#*#528#*#* - WLAN test (Use "Menu" button to start various tests)

*#*#232338#*#* - Shows WiFi MAC address

*#*#1472365#*#* - GPS test

*#*#1575#*#* - Another GPS test

*#*#232331#*#* - Bluetooth test

*#*#232337#*# - Shows Bluetooth device address


9. Codes to get Firmware version information:

*#*#4986*2650468#*#* - PDA, Phone, H/W, RFCallDate

*#*#1234#*#* - PDA and Phone

*#*#1111#*#* - FTA SW Version

*#*#2222#*#* - FTA HW Version

*#*#44336#*#* - PDA, Phone, CSC, Build Time, Changelist number



10. Codes to launch various Factory Tests:

*#*#0283#*#* - Packet Loopback

*#*#0*#*#* - LCD test

*#*#0673#*#* OR *#*#0289#*#* - Melody test

*#*#0842#*#* - Device test (Vibration test and BackLight test)

*#*#2663#*#* - Touch screen version

*#*#2664#*#* - Touch screen test

*#*#0588#*#* - Proximity sensor test

*#*#3264#*#* - RAM version



Enjoy

ALL WINDOWS RUN Commands !

1.         Accessibility Controls - access.cpl
2.         Accessibility Wizard - accwiz
3.         Add Hardware Wizard - hdwwiz.cpl
4.         Add/Remove Programs - appwiz.cpl
5.         Administrative Tools - control admintools
6.         Automatic Updates - wuaucpl.cpl
7.         Bluetooth Transfer Wizard - fsquirt
8.         Calculator - calc
9.         Certificate Manager - certmgr.msc
10.        Character Map - charmap
11.        Check Disk Utility - chkdsk
12.        Clipboard Viewer - clipbrd
13.        Command Prompt - cmd
14.        Component Services - dcomcnfg
15.        Computer Management - compmgmt.msc
16.        Control Panel - control
17.        Date and Time Properties - timedate.cpl
18.        DDE Shares - ddeshare
19.        Device Manager - devmgmt.msc
20.        Direct X Troubleshooter - dxdiag
21.        Disk Cleanup Utility - cleanmgr
22.        Disk Defragment - dfrg.msc
23.        Disk Management - diskmgmt.msc
24.        Disk Partition Manager - diskpart
25.        Display Properties - control desktop
26.        Display Properties - desk.cpl
27.        Dr.Watson System Troubleshooting­ Utility - drwtsn32
28.        Driver Verifier Utility - verifier
29.        Event Viewer - eventvwr.msc
30.        Files and Settings Transfer Tool - migwiz
31.        File Signature Verification Tool - sigverif
32.        Findfast - findfast.cpl
33.        Firefox - firefox
34.        Folders Properties - control folders
35.        Fonts - control fonts
36.        Fonts Folder - fonts
37.        Free Cell Card Game - freecell
38.        Game Controllers - joy.cpl
39.        Group Policy Editor (for xp professional) - gpedit.msc
40.        Hearts Card Game - mshearts
41.        Help and Support - helpctr
42.        HyperTerminal - hypertrm
43.        Iexpress Wizard - iexpress
44.        Indexing Service - ciadv.msc
45.        Internet Connection Wizard - icwconn1
46.        Internet Explorer - iexplore
47.        Internet Properties - inetcpl.cpl
48.        Keyboard Properties - control keyboard
49.        Local Security Settings - secpol.msc
50.        Local Users and Groups - lusrmgr.msc
51.        Logs You Out Of Windows - logoff
52.        Malicious Software Removal Tool - mrt
53.        Microsoft Chat - winchat
54.        Microsoft Movie Maker - moviemk
55.        Microsoft Paint - mspaint
56.        Microsoft Syncronization Tool - mobsync
57.        Minesweeper Game - winmine
58.        Mouse Properties - control mouse
59.        Mouse Properties - main.cpl
60.        Netmeeting - conf
61.        Network Connections - control netconnections
62.        Network Connections - ncpa.cpl
63.        Network Setup Wizard - netsetup.cpl
64.        Notepad - notepad
65.        Object Packager - packager
66.        ODBC Data Source Administrator - odbccp32.cpl
67.        On Screen Keyboard - osk
68.        Outlook Express - msimn
69.        Paint - pbrush
70.        Password Properties - password.cpl
71.        Performance Monitor - perfmon.msc
72.        Performance Monitor - perfmon
73.        Phone and Modem Options - telephon.cpl
74.        Phone Dialer - dialer
75.        Pinball Game - pinball
76.        Power Configuration - powercfg.cpl
77.        Printers and Faxes - control printers
78.        Printers Folder - printers
79.        Regional Settings - intl.cpl
80.        Registry Editor - regedit
81.        Registry Editor - regedit32
82.        Remote Access Phonebook - rasphone
83.        Remote Desktop - mstsc
84.        Removable Storage - ntmsmgr.msc
85.        Removable Storage Operator Requests - ntmsoprq.msc
86.        Resultant Set of Policy (for xp professional) - rsop.msc
87.        Scanners and Cameras - sticpl.cpl
88.        Scheduled Tasks - control schedtasks
89.        Security Center - wscui.cpl
90.        Services - services.msc
91.        Shared Folders - fsmgmt.msc
92.        Shuts Down Windows - shutdown
93.        Sounds and Audio - mmsys.cpl
94.        Spider Solitare Card Game - spider
95.        SQL Client Configuration - cliconfg
96.        System Configuration Editor - sysedit
97.        System Configuration Utility - msconfig
98.        System Information - msinfo32
99.        System Properties - sysdm.cpl
100.      Task Manager - taskmgr
101.      TCP Tester - tcptest
102.      Telnet Client - telnet
103.      User Account Management - nusrmgr.cpl
104.      Utility Manager - utilman
105.      Windows Address Book - wab
106.      Windows Address Book Import Utility - wabmig
107.      Windows Explorer - explorer
108.      Windows Firewall - firewall.cpl
109.      Windows Magnifier - magnify
110.      Windows Management Infrastructure - wmimgmt.msc
111.      Windows Media Player - wmplayer
112.      Windows Messenger - msmsgs
113.      Windows System Security Tool - syskey
114.      Windows Update Launches - wupdmgr
115.      Windows Version - winver
116.      Wordpad - write


Enjoy