Wednesday, 11 September 2013

Reliance Free 2G 3G GPRS Trick:

Just Follow Below Simple Steps: Step:-1) Just Make a New Setting In Your Mobile As Follow Step:-2) APN (Access Point): rcommms Step:-3) Proxy IP Address: 128.8.126.111 Step:-4) Port: 3127 Step:-5) Homepage: 198.153.192.1OR 156.154.70.22 Step:-6) Save The Settings And Make As Default Settings.. Restart Your Mobile.. Hurray... Now You Can Use Free GPRS On Your Reliance Mobile..

Latest working Hack and Trick for 3G Aircel Network:

Basically it is Hacking 3G Network from a 2G sim it is Not Necessary thatyou have to buy a 3G sim You can use your Normal 2G sims- Aircel is leading GPRS and internet service provider in india.Speed of Internet is very high because Providing internet access is aircel's special service.We are posting our first aircel gprs trick by which you can use free aircel 3G internet in your mobile.We havenew working proxy by which you have to make new setting and get free internet access. #Instruction to Use Step 1: Make new setting *. APN:aircelwap *. PROXY:10.4.42.15 *. PORT:80 *. HOMEPAGE:Whatever you want Step 2: Save settings and getfree gprs on mobile.you can use this trick on PC also.just connect your mobile and try to use it. Second Trick : Step 1.Create New Gprs Settings In Your Mobile Phone Step 2.Connection Name--Aircel Free Gprs Step 3.APN (Access point name) : aircelgprs.com Step 4.Use Proxy --Yes Enabled Step 5.Proxy Address--192.168.35.201 Step 6.Proxy Port --80 Step 7.Homepage--www.google.com After Creating The Setting Switch Off Mobile Phone And Restart Again Now Go Mobile's Browser And Enjoy Free 3G Aircel Gprs at zerocost.

Sunday, 7 July 2013

Google Chrome pops up “Your preferences can not be read” upon startup

  1. Exit Google Chrome completely.
  2. Enter the keyboard shortcut Windows key [IMG] +E to open Windows Explorer.
  3. In the Windows Explorer window that appears enter the following in the address bar.
    • Windows XP: %USERPROFILE%\Local Settings\Application Data\Google\Chrome\User Data\
    • Windows Vista/ Windows 7/ Windows 8: %LOCALAPPDATA%\Google\Chrome\User Data\
  4. Locate the folder called "Default" in the directory window that opens and rename it as "Backup default."
  5. Try opening Google Chrome again. A new "Default" folder is automatically created as you start using thebrowser.http://support.google.com/chrome/bin/answer.py?hl=en&answer=142059

Thursday, 28 March 2013

Secret Tip How I Make Free Calls from Computer to Mobile Phone Anywhere in the world with yahoo messenger or Skype

  Make Free Calls from Computer to Mobile phone
You can now make free calls from your pc to any mobile in the world. All you need is a mic with ear phones, a decent internet connection and Yahoo Messenger or Skype Installed.I’m now using this free call method and the great thing is that, this trick can be used to make unlimited call to mobiles all over the world and not limited to United states. It even works to make free local mobile calls in India.

So how do we make a call from pc to mobile phone for free?
Install Yahoo messenger or Skype. In case you don’t have it Google it and download the latest version.
Sign into your yahoo messenger or Skype using your yahoo id and password. Configure your microphone and headset if you have installed a fresh yahoo or skype software
Inside your Yahoo messenger dial +18003733411 and press enter(as shown in figure).
Make Free Call from computer to mobile using Yahoo messenger or Skype
Now a small window pops up like the one shown below.
Free Call from Computer To mobile using Yahoo Messenger
An operator greets you with a recorded welcome message along with an advertisement and asks you to select one of the Free411 service. Just hear the services options until they say the last one as “Free Call”. When you hear this, don’t press any number on your keyboard and instead SAY “Free call” loudly on your microphone connected to your PC.
After this voice message is detected by their system, they will run a short advertisement of their sponsor and make sure you don’t press any number at this time.
WAIT UNTIL YOU HEAR A BEEP SOUND after the following message “Please dial the phone number country code first, don’t forget to dial 1 for north America”
After you hear this message ,immediately dial the destination number of your choice along with the country code.(e.g. for north America it’s 1 and for India it’s 91)
Your call will get connected and you can talk for 7 minutes continuous for free. When it gets disconnected, repeat the same procedure again. You can make multiple and unlimited calls with this service.
It was never easy to make a free international call like this before.
So what’s the catch?
FREE411 service toll-free number is based in USA. This company gets paid for the advertisements from sponsors.
Are there any limits on the number of call which we can make?
No. There is no limit on the number of free calls which can be made through this system.
So enjoy this trick to make free international and local calls and make sure you don’t abuse the system.

Shutdown Computer With Command Prompt or shortcut for shutdown

Tips to shutdown your computer automatically after specific time
Here is a trick to shutdown your computer  at a specific time. You might be thinking what great about it, well you can shutdown your computer without the use of any software. Just shutdown your computer at specific time from RUN Command. For example if you wish to shutdown at 09:45 am. Type this in

Start=>Run
Type Code:        at 11:35 shutdown -s
To cancel or Abort the shutdown:
Type Code:                   shutdown -a
Type  Code:  “shutdown –s –m\\computername –t60”. This command will shutdown the computer on network if you have administrative access.  Here computername needs to be replaced by the exact computer name of the computer on the network to work.
Auto shutdown computer using run command
Alternative method to create a shutdown timer or simply computer shutdown shortcut
Step 1: Right click on your desktop and choose “New=>shortcuts”.
Step 2: In the box that says “Type the location of the shortcut”,
type in “shutdown -s -t 3600” without the quotation marks and click next.
Note: 3600 are the amount of seconds before your computer shuts down. So , this means 3600 seconds = 60 mints (1 hour). You can change the value in the above code. You can even create multiple shutdown shortcuts. For example a computer shutdown shortcut for 30 minutes, 1 hour, 2 hours, 5 hours etc.,
Step 3: Make up a name for the shortcut and you’re done.
Optional Step 4 : You can change the icon by right clicking=>properities=>change icon=>browse
To abort or cancel the shutdown:
To make an abort key to stop the shutdown timer just create another shortcut and make
the “location of the shortcut” to ” shutdown -a” without the quotes.

Windows registry tweaks to provide restrictions or Enable/disable

Editing windows Registry entries can sometimes boost your computer performance. Mostly the registry is edited inorder to restrict or enable some features in windows operating system.
windows Registry Editor editing for security
Before editing your windows registry hives, its always recommended to first create a backup of your windows registry.

Visit http://support.microsoft.com/kb/322756/en-us to learn on how to backup windows registry in windows xp, vista or windows 7 Operating System.
Now, lets get started with some registry tweaks in windows for providing some restrictions or disabling certain features in windows OS.
Restrict Folder Options using Registry Editor:
Enable or Disable Folder Options in windows using Registry editor
1.  Start–>Run–>regedit
2.  Navigate to HKEY_CURRENT_USER/Software/Microsoft/Windows/Curre ntVersion/Policies/Explorer
3.  At right side double click on NoFolderOptions and set its value to 1. This is known as DWORD value.
Thats it, you have now successfully disabled folder options in windows under Tools–>Folder Options.
Note: If due to some virus your folder option gets disabled, you can try the above steps to restore or enable  folder options. You only need to set the NoFolderOptions value as 0 in this case.
Restrict Taskbar Properties:
1.  Start–>Run–>regedit
2. Navigate to HKEY_CURRENT_USER/Software/Microsoft/Windows/Curre ntVersion/Policies/Explorer
3.  At right side, Right Click–>New–>DWORD value. Name it “NoSetTaskbar” and set its value to 1.
Restrict Registry Editing Tools in windows:
Using this tweak you can enable or disable your windows registry Editing tool. All you need to do is some changes in the windows registry below
1.  Start–>Run–>regedit
2.  Navigate to HKEY_CURRENT_USER/Software/Microsoft/Windows/Curre ntVersion/Policies/System
3. At right side, Double Click on DisableRegistryTools and set its Value Data as 1.
In the similar way you can even enable registry editing tools if its disabled by some virus program.
Disable or Restrict Task Manager in Windows OS:
Enable or Disable task manager in windows using Registry editor
For your system security you can disable or Restrict other users from accessing Task Manger in windows. Follow the steps below to restrict task manager.
1.  Start–>Run–>regedit
2.  Navigate to HKEY_CURRENT_USER/Software/Microsoft/Windows/Curre ntVersion/Policies/System
3.    At right side, Double Click on DisableTaskMgr and set its Value Data as 1.
In the similar way you can even enable registry editing tools if its disabled by some virus program.
If you know any such trick or registry tweak to provide restrictions using Registry editor please use the comments box below to add to this list.

Hacking Windows SEND TO MENU

How often do you copy songs from a CD? Or some photos from a CD?

What do you do? You select the required files and do a CTRL –C. Open the destination folder and do a CTRL-V. Here is something you can benefit time from. Customize your SEND TO MENU.

This sounds simple and you can do it in less than sixty seconds.
You can create your own BASKET.

First you’ll need access to hidden files. So change your view settings to make all hidden files visible.
Tools -> folder options -> view (tab) and select the show hidden files and folders.
go to parent drive:/documents and settings/(user name)/send to

Open up my computer and locate your most used folders.

Create a shortcut of the most used folders in SEND TO FOLDER.You can do this in a number of ways.

Right click -> send to desktop(create shortcut) and move the shortcut from the desktop to the SEND TO FOLDER

Copy the most used folder and go to SEND TO FOLDER and right click -> paste shortcut.

Also remember to rename the shortcuts to send to videos or send to potos. We don’t need confusion when we use the same later.

5. DONE.

Top Ten Tips To Improve System Speed

1. Let your PC boot up completely before opening any applications.

2. Refresh the desktop after closing any application. This will remove any unused files from the RAM.
 
3. Do not set very large file size images as your wallpaper. Do not keep a wallpaper at all if your PC is low on RAM (less than 64 MB).
 
4. Do not clutter your Desktop with a lot of shortcuts. Each shortcut on the desktop uses up to 500 bytes of RAM

5. Empty the recycle bin regularly. The files are not really deleted from your hard drive until you empty the recycle bin.

6. Delete the temporary internet files regularly.

7. Defragment your hard drive once every two months. This will free up a lot of space on your hard drive and rearrange the files so that your applications run faster.
 
8. Always make two partitions in your hard drive. Install all large Softwares (like PSP, Photoshop, 3DS Max etc) in the second partition. Windows uses all the available empty space in C drive as virtual memory when your Computer RAM is full. Keep the C Drive as empty as possible.
 
9. When installing new Softwares disable the option of having a tray icon. The tray icons use up available RAM, and also slow down the booting of your PC. Also disable the option of starting the application automatically when the PC boots. You can disable these options later on also from the Tools or preferences menu in your application.

10. Protect your PC from dust. Dust causes the CPU cooling fan to jam and slow down thereby gradually heating your CPU and affecting the processing speed. Use compressed air to blow out any dust from the CPU. Never use vacuum.
 
RAM IS THE WORKING AREA (DESKTOP) OF THE CPU, KEEP IT AS EMPTY AND UNCLUTTERED AS POSSIBLE!

How to Hack Softwares to use them Lifetime





Hi, I am back today with a most usefull article..Hope all of you will Like It ! Here i will show you that "How to Hack Softwares to use them Forever ?" . That really a useful article,because in our daily life we need thousand of softwares today,which of most are highly paid..So how to use them Freely for whole Like ??

Most of us are familiar with many softwares that run only for a specified period of time in the trial mode.Once the trial period is expired these softwares stop functioning and demand for a purchase.But there is a way to run the softwares and make them function beyond the trial period. Isn’t this interesting?

Before I tell you how to hack the software and make it run in the trial mode forever, we have to understand the functioning of these softwares.I’ll try to explain this in brief.Because Purpose if ICA is 1st to clear your basics.So,When these softwares are installed for the first time, they make an entry into the Windows Registry with the details such as Installed Date and Time, installed path etc.After installation every time you run the software, it compares the current system date and time with the installed date and time.So, with this it can make out whether the trial period is expired or not.

So with this being the case, just manually changing the system date to an earlier date will not solve the problem.For this purpose there is a small Tool known as RunAsDate.

RunAsDate is a small utility that allows you to run a program in the date and time that you specify. This utility doesn’t change the current system date, but it only injects the date/time that you specify into the desired application.



Download RunAsDate v1.10

Intercepts the kernel API calls that returns the current date and time (GetSystemTime, GetLocalTime, GetSystemTimeAsFileTime), and replaces the current date/time with the date/time that you specify.It works with Windows 2000, XP, 2003 and Vista.

NOTE: FOLLOW THESE TIPS CAREFULLY
You have to follow these tips carefully to successfully hack a software and make it run in it’s trial mode forever.
1. Note down the date and time, when you install the software for the first time.
2. Once the trial period expires, you must always run the software using RunAsDate .
3. After the trial period is expired, do not run the software(program) directly.If you run the software directly even once, this hack may no longer work.
4. It is better and safe to inject the date of the last day in the trial period.

What is Encryption?


Encryption is a method or a technique used to encode a message so that it can’t be read by a normal user/person. Its an art of secret writing, It can also be defined as converting information from plain text using an algorithm or a cipher to make it unreadable, So that the converted information can only be read by the person who is having the special knowledge. The process of encoding is known as Encryption and its reverse process i.e. decoding it is known as Decryption. Encryption is very useful when it comes to protecting your confidential data from being stolen. It is helpful when data is transmitted over the network, it safe guards you data from sniffers. When data is needed to be encrypted over a network, SSL Protocol is used for encryption purpose. SSL stands for Secure Socket Layer.

Types of Encryptions


Symmetrical Key : This type of encryption is also know as Shared Key Secret. In symmetrical encryption, the key which is used in the process of encryption, that same key is also used in the process of decryption. If two parties want to exchange the encrypted data securely, both of them should have the same copy of symmetric key.


Asymmetrical Key : This type of encryption is also know as Public Key. In this type of encryption, keys are generated in pairs, public key and private key. In asymmetrical encryption key used to encipher is different from the key used to decipher. Therefore the two partners have two different keys, one is made public and other one is made private. Let’s take up an example to understand the concept in an easy way.
Suppose, John wants to send a message to Mike, he just ciphers the message with the public key and sends it to Mike. Since Mike is having the secret key, he can and decipher the message and read its content.

How to make you computer fresh and fast



In this Article We will explain some simple methods to make your computer cleaner and run faster for long period of time. It’s so frustrating to see our computer slowed down after a period of time. So in this article you will get some methods or you can say ways to make your computer run faster.
Follow the methods listed below:-
Remove Useless software and apps : We often install many unnecessary application and later forget to uninstall them These application becomes burden in our computer and eventually slow down our computers So at first you need to delete all this unnecessary application and software To uninstall the software you should go to Control Panel->Add or remove->find and select the software you would like to uninstall.
Utilize your RAM performance : A lot of you may have these setting already set. But If you don’t have then don’t worry. You just have to follow the process. Right click on My computer->Properties->Advanced system settings->Setting(Under Performance)->Advanced->Change(Under Virtual Memory). Now double the number in Maximum size then the number initial size. It will surely help your PC to utilize the most of RAM.
Check for errors : Our computers face errors very oftenly in daily use and some errors stuck to our computer hard disk which makes our computer slow. So its very important to kill those errors to make our computer work better. Go to My computer and press enter .Our main hard disk is usually C: and we need this drive to be free from error So right click on Hard disk C and then click tools Then from the Error-Checking option click You may need to restart the computer to do so It will make your computer Faster.
Desktop-cleaning : We often keep unnecessary file in our desktop but it actually affects the performance of our computer. Delete the useless files or another choice is to move them to Local disk if necessary. You should only keep shortcuts in your Desktop only if you needed. If we keep Wallpapers on our desktop it also effect slightly to slow down our computer a blank screen is always better remove temporary internet files and cache from your web browser Browsing internet slow down our computer You need to clean these temporary files and cookies to make your computer stay clean and faster. There are a no. of software available today in the market which can do the task for you. You can use Ccleaner for this purpose which is a very trusted software. To proceed to the official website to download Click here
Disk Defragmentation : We should defragment our disk to make our PC faster. For deframentation process, just follow the same steps given below. Locate Hard disk C then click properties then click tools and then click defragment Now from the option Disk defragmentation.
Use a Trusted antivirus : he last but not the least tip is to use a reliable trusted antivirus which will protect your PC from harmful antivirus. Kaspersky and AVG are some of the trusted antivirus but you have to pay to use them. If you don’t wish to pay some money then you can also download free Microsoft security essential to save your computer from harmful Malware and spywares. Check the link here

Security tips to Aviod Virus /Trojan/ Keylogger Infection


Security tips to Aviod Virus /Trojan/ Keylogger Infection

1. Install a good antivirus. Free or Paid is good, but dont used cracked or pirated versions.

2. Install real-time anti-spyware protection

3. Update your Anti-virus programs daily.

4. Perform scans on your computer daily.

5. Disable autorun to prevent infection from pendrives.

6. Disable image previews if usiing Outlook

7. Use good anti-virus which has browser plugins and scans all URL's for malacious content.

8. Use Hardware based Firewall.

9. Dont click on any mail links or attachments from unknown sources or malacious users.

10. Never download softwares from third-party sites. Download from original website. Dont use cracks or keygens which may be a virus/trojan itself.

Secure Browsing Tips

Secure Browsing Tips


1. Never keep same password for different services you use online like gmail , facebook, bank accounts etc.,

2. Use multiple accounts so that you dont get spams in your personal/ official email address.

3. Install good Antivirus and Two way firewall.

4. Use VPN for hiding identity and secure browsing when using internet out of your home.

5. Update your OS, Antivirus, Firewall and Browsers regularly.

6. Install a good spyware & Adware scanner .

7. Never provide personal information openly in public websites. Share your information carefully.

8. Never click on unwanted or suspiicious links. It may be hacking attempt.

9. Change your passwords regularly to increase the security of your daily actiivities.

System Security For User........



1. Always use a strong password with a combination of alphabets, numbers and special characters

2. Use Original Antivirus. Dont download Cracks & Keygens which are the main entry point for Viruses and Trojans.

3. Use Original Windows OS ( Paid ) or Use Open source OS such as Linux, Ubuntu, Flavours of Linux. Do not use some programs to patch your system.

4. Regularly Update your Antivirus and OS to remove and/or patch vulnerabilities and keep your system secure.

5. Shutdown / Uninstall unwanted programs or programs which you dont use such as FTP, Telnet or any softwares which use your resource.

6. Use Drive Encryption tools to protect your data from data theft and to protect from data loss.

7. Always create a back-up of your important files to a Hard disk or Online Servers ( like Drop box )

8. Never trust any other network to which you connect( OPen WiFi ). Crackers & hackers can compromise your data and also steal your data transmitted .

9. Have a routine check of your computer for defects and patch immediately.

10. Never leave your computer unattended, even for a short time. It is easy for a cracker to inject a virus or spyware into your system.

Secure YourSelf by Knowing- Proxy and Anonymous Internet surfing


1) What is a proxy?
A proxy is an address of a proxy server (look @ kind of proxy's) that is placed between your computer and the internet :

Normal :
Computer --------> Internet
With proxy :
Computer ---------> Proxy server -----------> Internet

The main advantage of the Proxy is that it will cover up your IP address (your identity on net) which may help you in opening the ban sites in your country. It was very much popular in days when Facebook was banned in Pakistan and user use Proxies to log into their accounts.


2) Kind of Proxies:

You have 2 different proxy's (some more but these are for a normal internet users) :
-1: Private proxies : They are only for you (it's the same like buy your own ip address ) and will cost 15-20$
-2: Public Proxies : They are for everyone but the problem is sometimes you can get fast proxy's and sometimes slow ones. If you have a good site/list with fast proxy's there as good as private proxy's

3) Where get your proxy ?
There are many ways to find the proxies but some address are also expired , so just search Google for the Fresh Sites. (search : free Proxy, free anonymous surfing)

4) Use proxy with IE(Internet Explorer):
-1: Open Internet explorer
-2: Go to tools > Internet Options > Connections
-3: Now you will see “LAN Settings” open it
-4: Check Use a Proxy server for LAN. Than you will be able to use Address and Port.
-5: Get a proxy (Read Wear get your proxy's) and fill the address you don't have to fill it the port.
-6: Hit ok , ok and it's done. You surf now with a proxy !

5) How safe is it ?
The use of proxy's is legal and it's a good protection BUT don't think ur full protected/undetected. It's more and more popular and some (protected) site block public proxy's because of the spammers …

6) Proxy software
You have lots of software that work with proxies like a Anonymous Surfing, bruteforcer or proxy port scanner.I have even added an link to download 16 various anonymous IP tools from (http://rapidshare.com/files/242280367/IP_Anonymous_Surfing_Tool_16in1_.rar)


7) WARNING!!!!
It is true that a proxy hide your identity but don’t think that you are really safe if you hack CIA Database because in case of hack the Proxy site will give your real identity and you will end up in jail for at least 20 years. So be responsible!!!

BSNL Broadband Hacked | How To Hack Bsnl Broadband

Here is the trick for How To Hack Bsnl Broadband I hope you will really enjoy it Follow the below steps to do this 

1. Identify your IP address(dont knw visit @ whatismyip.com)

2.Download IP scanner.( i preferangryziber.com/w/Download).

3. 
Open IP scanner .GO to option/select port.Enter 80 in 1st option(enter post to scan)

4.In hostname option type ur ip.Click On the ip button next to host name on opening it will automatically fill the ip range.



5.In the first option Let ur original IP be but in the second option fill the ip greated then original.Now click Scan

6.IT will give you LIst of ips showing some ips green on left side.

7.Right click that ip and then to option 'open computer' & select browser

8.ASk for username and pass.GIve username :admin password:admin

9.if it doesnt respond take some other green IP.

10. When pages get open go to home & click Wan.Here uu will see user id and pass in coded form

11.To fetched actual passowrd download this soft from "(scanwith.com/X-Pass_download.htm)

12.Extract files from tht and run'X-pass'.Drag d 'x' icon in password filled and u will get the pass.

13. To check that pass go to http://10.240.160.195/webLogin.jsp

Ethical Hacking Class First Book Online : Introduction to Ethical Hacking

BEHC Ethical Hacking class chapter one, Introduction to Ethical Hacking Book is online for readers. Below is the download link of the book. I would like to give the brief about the book.






This is the very first handbook of BEHC campaign and below is the list of topics being covered.

List of Topics covered in BEHC Ethical Hacking Class First Book : Introduction to Ethical Hacking
1. Introduction to BEHC
2. Hack , what is it?
3. Hacking  and its introduction
4. Can hacking be Ethical?
5. Difference between Hackers and Crackers
6. Security and its three pillars ( confidentiality, integrity and availability )
7. How a Hacking attempt is launched
8. Different Phases of Hacking Attempt
9. Phases in Description


DOWNLOAD BEHC HACKING BOOK NOW  


Alternate Download Link: Download

I hope you all will enjoy the book. Please report all the bugs or errors though above mentioned media and you can also suggest improvements.
All improvement suggestions will be heartily welcomed.

DOWNLOAD BEHC HACKING BOOK NOW

If you have any issues or concerns or doubts ask me in form of comments. A gesture of thanks is greatly appreciated.

How to Lock your PRIVATE FOLDER


1. Make a folder on the desktop and name it as “folder”
2. Now, open notepad and write ren folder folder.{21EC2020-3AEA-1069-A2DD-08002B30309D} and now (Notepad Menu) File>save as.
3. In the ‘save as’ name it as lock.bat and click save ! (Save it on Desktop)
4. Now, again open notepad again and write ren folder.{21EC2020-3AEA-1069-A2DD-08002B30309D} folder and now (Notepad Menu) File>save as.
5. In the ‘save as’ name it as key.bat and click save ! (Save it on Desktop)
6. Now, double click lock.bat to lock the folder and now if you open your folder, control panel will open up !
7. Now, double click key.bat to open the folder and now if you open your folder, you can access your data inside the folder again !
8. Lock your folder and hide the key.bat somewhere else on your hard disk !
9. Whenever you want to open your folder just paste the key.bat on desktop and open your folder using it ! :)

What is HTTP Header Injection Vulnerability

HTTP Header

HTTP Header is the component of HTTP requests and responces. Header fields are transimitted with each request and responce and carry additional data about the requests and responces.

See the typical request and responce headers Here at Web-Sniffer.net

HTTP header injection

HTTP header injection is a kind of web application vulnerability which exists on those web applications that generatd HTTP headers based on the input given by users. If it uses User based input in the headers, it can be used for HTTP response splitting, cross-site scripting (XSS), Session fixation via the Set-Cookie header, and malicious redirects attacks via the location header.


I recently found a similar kind of vulnerability in http://canadaedu.apple.com and for this I was also acknowledged by Apple on its website.

It used apache 1.3.33 that was vulnerable to the HTML and malicious javascript injection through  "Expect" header.

See the responce header of the website:
GET / HTTP/1.0
Accept: */*
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0; .NET CLR 1.1.4322)
Host: canadaedu.apple.com
Cookie: PHPSESSID=3b8026225d719c6945155129c5c7335d
Connection: Close
Expect: <script>alert(411731119275)</script>
Pragma: no-cache
The alert box added in the Expect field could be injected for Cross Site Scripting.

HOW TO CRACK ANY TYPE OF CD PROTECTION




Using W32Dasm, and HIEW. 

OK, let’s start:
First of all, you have to run the damn game you want to crack, without the CD.
The game, doesn’t work of course, (Please, don’t panic) BUT a window pops up, telling you an error message. 
This error message will help you to crack the game so, you’ve got to remember it.
For example: Please insert the - CD, or: You need the CD to play the - . 
( -, is the game you want to crack). Anyway, if you are so idiot and you can’t remember it, write it, in a little piece of paper.
Now, run Win32Dasm, and on the toolbar, press the first little button on the left, OR, go to Disassembler ->Open file to Disassemble. A menu will pop up. Select the exe which you want to crack. The disassemble, will take few minutes so, I suggest you, to go for shitting. 

OK, it finished its process. 
Now, in your screen, there is a strange text, and we can’t understand anything of course. Don’t worry, the only thing we have to do, ( If you want, you can change the font), is to click on the String Data References, the button next to the print button (Strn.REF). 
You can see a window which is called String Data Items. Scroll down, and try to find the game’s error message. When you’ll find it, double click on it, and then, close the window, to go back to the Win32Dasm text. 
As you can see you are somewhere in the CD check routine. This is the message’s place. Now comes the interesting and difficult part, so, be careful. 
We don’t know what all these shits mean, BUT we must know the @ offset of every call and jump command.
Write down, every call and jump @ offset number. (You have to be sure, that the OPBAR change its used color to green). You need the number behind the @offset without the h. Let’s go to HIEW, now.

HIEW:
To move up and down, use the cursor keys. Start HIEW. exe. 
In the HIEW directory, there is a list of exes and programs. Go to the directory, which you saved the game’s exe, we want to crack, and click on the exe. Click F4, and then, a menu will pop up, with 3 words. Text, Hex, and Decode. Click on Decode, and now, we can understand the list of numbers.
Click F5, and you can now enter the number, we wrote down, in Win32Dasm. Type it, and you will be placed at the number’s place. The cursor is placed on a command. 

Before I’ll continue, I want to explain you something. For example, if the command where our cursor is placed on, is E92BF9BF74, means that it is 5 bytes.
Every 2 numbers, are one byte: E9-2B-F9-BF-74 = 90-90-90-90-90. 10 letters, mean, 5 bytes. 
OK, if you understood it, you can continue. 

Press F3, which means edit, and now you can edit these ten numbers.
Type five times, the number 90. For every byte, 90. Now click on F10 to exit.
We cracked the CD protection

Friday, 22 February 2013

Namumkin Jesi Koi Bhi Cheez Nahi Jo Khud Naa Bane Woh Koi Bhi Nasib Nahi


Namumkin Jesi Koi Bhi Cheez Nahi Jo Khud Naa Bane Woh Koi Bhi Nasib Nahi Milegi Manzil Chaahe Karib Nahi Mai Hoon Dil Ka Amir Bhai Garib Nahi Koi Bhi Lakir Nahi Aisi Jo Keh De Tujhe Teri Takdir Nahi Agar Hui Teri Haar Toh Maan Le Tu Yeh Baat Banda Tu Hi Zimmedaar Koi Aur Nahi Hah Hah Kehte Hai Geet Yahi Naye Zammane Ki Hai Dekho Nayi Reet Yahi Jo Kujh Chaahega Tu Woh Bhi Bajayega Tu Jeet Hogi Teri Kar Khud Pe Yakin Haan Paani Ho Kam Kankar Se Nikaal Aedi Ka Pasina Apne Sur Se Nikaal Bass Kar Baat-Chit Abb Raat Gayi Beet Tere Saamne Sawera Tere Saamne Hai Jeet Jeet Hogi Meri Jeet Haan Haan Meri Jeet Hogi Meri Jeet Jeet Punjabi Main Tik-Tik Gahdi Kehndi Aa Gaya Samah Utth Vi Jawaana Kujh Kar Ke Wakhaa Lai Le Apni Tu Thaan Naa Apna Bana Aiven Gaddiyaan Chh Ghum Ke Tu Jind Na Gava Haan Assi Vi Hai Apna Aap Banaya Jitti Jaave Kive Baaji Saadde Veer Ne Sikhayaa Haan Naam Banaya Naale Pehya Vi Kamaya Lokki Karde Ne Gallan Aappa Kar Ke Wekhayaa Maa Payan Da Naa Chamka De Chaa Ja Bai Tu Chaa Ja Tu Duniya Hila De Mitti Nu Vi Haath Laavan Bann Jaandi Sona So Get Your Shine On People Com'on Now I Got The Role Got The Bling-Bling Don't Have Any Crown But Still I'm A King Babbaji Di Meher Hovey Kari Jaa Tu Mehnta Jeet Teri-Teri Hauni Bandya Tu Vekkhi Ja

Friday, 8 February 2013


Image Social networking giant Facebook has opened registration for its third annual Hacker Cup, set to begin from January 25. 

The top prize will be $ 10,000 (approx. Rs 5.5 lakh) as against $ 5,000 (Rs 2.75 lakh) last year and as many 25 of the best hackers will be taken to Facebook's headquarter in USA, a statement said. 

The Facebook Hacker Cup is an annual worldwide programming competition where hackers compete against each other for fame, fortune, glory and a shot at the coveted Hacker Cup. 

"The competition will be held in two rounds starting with an online qualification, out of which 25 of the best hackers are then flown by Facebook to their headquarters inMenlo Park, CA," Facebook said. 

"The preliminary round will be held between January 25 and February 16 while the onsite final round is scheduled for March 22-23, 2013. 

Contestants will be judged on accuracy and speed as they race to solve algorithmic problems to advance through up to five rounds of programming challenges," it added. 

Last year, the Hacker Cup attracted 8,000 participants from 150 countries, with the winner- Roman Andreev, hailing from Russia, Facebook said. 

"Hacking is core to how we build at Facebook. Whether we're building a prototype for a major product like Timeline at a Hackathon, creating a smarter search algorithm, or tearing down walls at our new headquarters, we're always hacking to find better ways to solve problems," Facebook said in its Hacker's Cup page. 

Facebook said that those who registered for a previous year are automatically registered for the competition year, however, they still need to check their information is up-to-date.

Java Tutorials on You Tube with Eclipse

Follow the link Below

http://www.youtube.com/watch?v=CG_BDUJ9K8Q&list=PLF03C6B2C0B292A1E