Thursday, December 22, 2011

All Driver of Laptop & Desktop

Friends,
Many times it Happens That, We Have Laptop or Desktop But While We Are Installing Any Operating System, Than We Might Not Have Its Drivers And Else.... So, We Have To Waste Our Time To Search And Download Drivers...

I Hav A Good Thing For You...

I Have A Software by Which, You Can Install Any Driver of Any Branded r Non Branded System.... Try It.... Its Size is Almost 2.9 GB But Its Use is Very Easy...
Software Name : Driver Pack Solution 11.8
Web Site : www.drp.su
Source Add : http://drp.su/download.htm
Torrent Address : Driver Pack Solution 11.8

Enjoy It....



Registry Editor Desabled

Friends,
as well as Task Manager Is Desabled, Registry Editor Is Also Getting Desabled...

RUN - GPEDIT.MSC - USER CONFIGURATION - ADMINISTRATIVE TEMPLATES - SYSTEM - PREVENT TO USE REGISTRY EDITOR - DESABLED

almost same way as Task Manager....

Try it Or See This Photo : Click Here

Desabled Task Manager

Click Here For Image HelpHello,


Usually we have seen that due to virus effect, task manager is desabled by administrator and we are not able to open task manager.... so how will you open it!!

Here is the way for this :


Go to RUN - "gpedit.msc - User Configuration - System - Administrative Templates - Ctrl+Alt+Del Option - Remove Task Manager" --> Click n IT.

Now select Desabled Instead of Not Configure And Clock OK....

You can see your task manager is Enabled.....

Thanks.....

Wednesday, December 7, 2011

IP Binding

IP Binding


IP Binding specifies from which IP addresses the System Management Homepage accepts requests from and provides control over which nets and subnets requests are processed. Administrators can configure the System Management Homepage to only bind to addresses specified in the IP Binding page. A maximum of five subnet IP addresses and Netmasks can be defined. An IP address on the server is bound if it matches one of the entered IP Binding addresses after the mask is applied.

NOTE: The System Management Homepage always binds to 127.0.0.1. If IP Binding is enabled and no subnet/mask pairs are configured, then the System Management Homepage is only available to 127.0.0.1. If IP Binding is not enabled, you bind to all addresses.

To configure IP Binding:


  1. Click Settings->System Management Homepage->Security.
  2. Click IP Binding. The IP Binding page appears.
  3. Select IP Binding to enable IP binding.
  4. Enter the IP address.
  5. Enter the Netmask.
  6. Click Save Configuration to save the current configurations, or click Reset Values to cancel all changes. If Save Configuration is clicked, the following message appears:

On IA-32/AphaServer platforms:

Setting this value requires restarting the System Management Homepage
which may require you to log in again.

On Itanium platforms:

New SMH settings will not take effect until you restart the SMH service.

  1. Click OK.

  • Each IP address and Netmask must to consist of four octets with values between 0 and 255 (the same for each netmask).
  • Netmasks must start with a 1 in the highest bit and continue with all 1s until they switch to all 0s, for example: 255.255.0.0, 192.0.0.0, 255.192.0.0.

Totally Uninstall Softwares From Computer

Hello Friesds,
             Normally when we do not want to use some softwares than we do remove from add remove programmes..... but is it actually totally remove or not?

how will you find it out!!

so lets do...

suppose, you have uninstall VLC Player from your system.... now Go to Run and Type REGEDIT..

Than.. Press F3 and type vlc player.... you might be found some files over there which are not remover...

so, now u use REVO UNINSTALLER and Remove the same softwares by Revo.... You will get batter perfomance than Windows Based Tool....
\

Try it and post comment..

Revo Uninstaller
Download

Tuesday, April 12, 2011



Difference between DDR and DDR2
1. What is the difference between DDR and DDR2?
On the physical side, DDR has a 184-pin DIMM interface and DDR2 has 240.
DDR2 runs cooler and has generally slower timings but is a lot faster than DDR in the end. DDR2 is capable of holding more ram on one DIMM.

2.) Does DDR2 do more work per cycle? And Does AMD Support DDR2 Ram?
AMD doesn't support DDR2 as the A64's built-in RAM controllers would have to be upgraded therefore making them incompatible with all the current motherboards out there which really wouldn't be worth AMD and the board manufacturers' time.
The differences:
  • DDr1=184pin DIMM and DDR2=240pin DIMM.
  • DDR2 has much higher bandwidth and chip density/# of chips per DIMM, allowing more ram to be effectively used (also the reason why it's best to go for 1-2gb of DDR2) at a higher speed, but at the expense of latency.
  • On the other hand, DDR1 runs at lower speeds but much tighter timings

It is difficult to differentiate a DDR2 from a DDR motherboard just by looking at it.  Inserting a DDR2 DIMM into a DDR motherboard could damage the module, the motherboard, or both. To prevent such damage, the simplest process is to align the memory module and the socket, and visually check that the module “key” aligns perfectly with the socket key. You may have to turn over the memory module as the memory module direction may misalign even compatible socket and module keys.

3. What latencies will standard DDR2 DIMMs support?
JEDEC DDR2 specifications define standard DDR2 CAS Latencies of 3, 4, and 5:
– 400 MHz DDR2: CAS 3 (3-3-3)
– 533 MHz DDR2: CAS 4 (4-4-4)
– 667 MHz DDR2: CAS 5 (5-5-5)
4.: What latencies do Kingston HyperX DDR2 modules support?
HyperX memory modules support enhanced CAS Latencies:
– 533 MHz PC4300 DDR2: CAS 3 (3-3-3)
– 675 MHz PC5400 DDR2: CAS 4 (4-4-4)

Monday, April 11, 2011

Google’s Cloud Computing Phone application – translate text in real time


Google’s Cloud Computing Phone application – translate text in real time




Stumped by foreign languages when you’re traveling? Google Inc. is working on software that translates text captured by a phone camera.
At a demonstration Tuesday at Mobile World Congress, a cell phone trade show in Barcelona, an engineer shot a picture of a German dinner menu with a phone running Google Inc.’s Android software. An application on the phone sent the shot to Google’s servers, which sent a translation back to the phone.
It translated “Fruhlingssalat mit Wildkrautern” as “Spring salad with wild herbs.”
There was no word on when the software would be available.
Software that translates text from pictures is already available for some phones, but generally does the processing on the phone. By sending the image to its servers for processing, Google can apply a lot more computing power, for faster, more accurate results. The phone still won’t order for you, though — you’ll have to point at the menu.
The demonstration was part of Google CEO Eric Schmidt’s keynote speech at the trade show, the largest for the wireless industry. He said phone applications that take advantage of “cloud computing” — servers accessible through the wireless network — will bring powerful changes to the industry.

Smart GMail – Did you mean to attach files?

Today one of my friend noted a really unnoticed yet creative behavior of GMail. He tried to send an email with body containing “please find attached ….” and he clicked send, GMail instead of sending that email popped-up a message
Did you mean to attach files? You wrote “find attached” in your message, but there are no files attached. Send anyway?
This alerted him that he missed on attaching the files.
Isn’t that really smart and creative thinking! Though a minute thing, but such small things of intelligence makes GMail (Google) an innovator at email services.
Cheers Google!

Email Sheduling Coming On Gmail

Finally: E-mail scheduling coming to Gmail
No, not from Google, but from a browser plug-in called Boomerang for Gmail.
A company called Baydin sells a $14.95 product for Outlook called Boomerang for Outlook, which enables you to reschedule the delivery of e-mails you’ve received and also to schedule the sending of e-mails for some specific time in the future.
I’m sure Boomerang for Outlook, which I have not tried, adds convenience. But Outlook doesn’t need e-mail scheduling, because that functionality is already built-in.
Gmail, on the other hand, desperately needs it. Which is why Baydin’s Boomerang for Gmail will probably be very welcome. The product is a browser plug-in for both Firefox and Chrome currently in beta mode. If you sign up at the Baydin site, they’ll send you an invitation code. Or so they say. I’m still waiting for mine.
To use Boomerang, just click on a “Receive Later” button that the plug in adds. Then you select a date and time. Boomerang moves your message into Archives until the specified time, at which point it moves it back into your inbox, marks it “unread” and puts a star on it.
When in Gmail’s Compose mode, Boomerang offers a “Send Later” button. Clicking it lets you choose exactly when.
Read more @ http://www.itworld.com/internet/117967/finally-e-mail-scheduling-coming-gmai

Monday, March 7, 2011

DHCP - Dynamic Host Configuration Protocol

Dynamic Host Configuration Protocol
In simple terms, DHCP determines if your IP is static or dynamic and the length of time an IP address is assigned.


Dynamic Host Configuration Protocol is controlled by a DHCP server. Your router can be a DHCP server...and if you're on a home network, it most likely serves this purpose.
I know this might be confusing because the word dynamic is in the term, but just because you have DHCP enabled on your computer doesn't mean you can't be assigned a static IP. DHCP enabled on your computer simply means you're letting a DHCP server assign its IP. Having it enabled DOES NOT mean it's a DHCP server.


A true DHCP server (not your Linksys router) gives the LAN Admin a ton of control with IP assigning.
Ever print to a network printer? Ever wonder how that printer keeps its network assignment? Each network device has a MAC address. You can assign a static IP at the server to a specific MAC address. This allows the network printer to always get the same IP even after it reboots and without assigning the IP at the printer. If you print the network configuration at the printer, it will probably tell you that DHCP is enabled and no static IP is assigned. That's because the IP assignment is handled at the server.


Your ISP has a DHCP server. They can assign IPs by modem MAC addresses. When your modem comes online, it communicates to the network indicating it is looking for an IP address. The DHCP server listens to this communication and starts talking to the modem. The modem then transmits its MAC address to the DHCP server. At that point, either an IP has been reserved for the modem or one is assigned at that time. Hence cloning your MAC address to get a new IP from your ISP.


Routers and DHCP - Under the General Setup or LAN Setup tab in your router, you'll see a settings option for DHCP. You can control how many IPs are assigned or to enable/disable the DHCP server portion of the router. If you disable it, you'll have to statically assign IPs to each computer, or have a DHCP server or your network. This goes for wired and wireless. Any connection on your network has an IP address.
There's a lot more to DHCP than this, but this is a basic explanation.

Dynamic IP Address


Dynamic IP Address: One that is not static and could change at any time. This type is issued to you from a pool of addresses allocated by your ISP or DHCP Server. This is for a large number of customers that do not require the same address all the time for a variety of reasons. Your computer will automatically get this number as it logs on to the network and saves you the trouble of having to know details regarding the specific network configurations. This number can be assigned to anyone using a dial-up connection, Wireless and High Speed Internet connections. If you need to run your own email server or web server, it would be best to have a static IP address.

Static IP Address


Static IP Address: One that is fixed and never changes. This is in contrast to a dynamic IP address which may change at any time. Most ISP's can offer to assign a single static IP or a block of static IP's for a few extra bucks a month and may require you upgrading to a business account.

Saturday, March 5, 2011

What is IP Address?

This number is an exclusive number all information technology devices (printers, routers, modems, et al) use which identifies and allows them the ability to communicate with each other on a computer network. There is a standard of communication which is called an Internet Protocol standard. In laymans terms it is the same as your home address. In order for you to receive snail mail at home the sending party must have your correct mailing address (IP address) in your town (network) or you do not receive bills, pizza coupons or your tax refund. The same is true for all equipment on the internet. Without this specific address, information cannot be received. IP addresses may either be assigned permanently for an Email server/Business server or a permanent home resident or temporarily, from a pool of available addresses (first come first serve) from your Internet Service Provider. A permanent number may not be available in all areas and may cost extra so be sure to ask your ISP.


Friday, March 4, 2011

Seeds, Peers and Leechers

Seeds : A seeder is a peer that has an entire copy of the torrent and offers it for upload. The more seeders there are, the better the chances of getting a higher download speed. If the seeder seeds the whole copy of the download, they should get faster downloads.

- In Short, Seeders are that the downloading of particular torrent is uploading for another client system who want to download it.

Peers : A peer is one instance of a BitTorrent client running on a computer on the Internet to which other clients connect and transfer data. Usually a peer does not have the complete file, but only parts of it. However, in the colloquial definition, "peer" can be used to refer to any participant in the swarm (in this case, it's synonymous with "client").

It Means, total users who are downloads the particular torrent.

Leechers :
A leech is a term with two meanings. Usually it is used to refer a peer who has a negative effect on the swarm by having a very poor share ratio (downloading much more than they upload). Most leeches are users on asymmetric internet connections and do not leave their BitTorrent client open to seed the file after their download has completed. However, some leeches intentionally avoid uploading by using modified clients or excessively limiting their upload speed.
The often used second meaning of leech is synonymous with downloader (see above): used simply to describe a peer or any client that does not have 100% of the data. This alternative meaning was mainly introduced by most BitTorrent tracker sites.

- It Means, The Persons who are only downloading, they do not uploading for other users.
--> Seeders mean : Number of people are uploading there download for another users.
--> Peers mean : Number of people are downloading and as well as uploading.
--> Leech : Number of people are only downloading.. Not Uploading..

Thursday, March 3, 2011

How you connect the multiple cpu with one monitor

Practical consideration You need a switch will connect that I have connect the ATEN CS64U switch with 4 cpu &operate with one monitor - Switch description

4-Port USB KVM Switch

CS64U 4-Port USB KVM Switch has a handy design integrating with 6 feet of cables and built-in USB. It can control 4 servers via a single console.

2 Features

- One USB console controls 4 computers

- Compact design,built in 1.8 m cables

- Hotkey selection for OS and keyboard language

- Multiplatform support:compatible with all operation platforms PC(Windows,Linux and most others),Mac and Sun

- Multi-use USB connector-can connect any USB device, including mouse

- Supports multimedia USB keyboards and multi-function mice

- All-in-one design

- With speaker support

- Superior video quality - up to 2078 x 1536;DDC2B

- Auto Scan function to monitor computer operation

Oprating system file

FAT(File Allocation Table) A file system that is used by MS-DOS and other Windows-based operating systems to organize and manage files. The file allocation table (FAT) is a data structure that Windows creates when you format a volume by using the FAT or FAT32 file systems. Windows stores information about each file in the FAT so that it can retrieve the file later.

FAT32

A derivative of the FAT file system. FAT32 supports smaller cluster sizes and larger volumes than FAT, which results in more efficient space allocation on FAT32 volumes. See also: File Allocation Table (FAT),NTFS File System,Volume

NTFS

NTFS File System An advanced file system that provides performance, security (i.e.,file and folder permissions), reliability, and advanced features that are not found in any version of FAT. For example, NTFS guarantees volume consistency by using standard transaction logging and recovery techniques. If a system fails, NTFS uses its log file and checkpoint information to restore the consistency of the file system. In Windows 2000 and Windows XP, NTFS also provides advanced features such as encryption, Reparse points, Sparse files, USN Journal, and disk quotas.

See also: FAT32, File Allocation Table (FAT), File System


General Information:

File System In an operating system, the file system is the overall structure in which files are named, stored, and organized. NTFS, FAT, and FAT32 are types of file systems. See also: NTFS File System, FAT, FAT32, FAT64 and many more…….

Logical Partition Logical partitions are those partitions contained within an extended partition. In terms of use they are no different than a non-extended primary partition. The number of logical drives that may be created in extended partition is limited by the number of available disk drive letters………….

Friday, January 28, 2011

Use the Notepad as your personal diary


There is a simple feature in Notepad that can make it work like a personal diary for you.Here is how to go about it:

1.Firstly open a blank Notepad file.
2. Now write .LOG as the first line in the file, then press enter. Now save the file and close it.
3.Open the notepad file now and you will find that the current date and time has been
appended (put) at the end and the cursor is in the next line.
4. Type your notes and then save and close the file.
5. Each time you open the file, Notepad repeats the process,that is it appends the date and time
to the end of the file and places the cursor below it.

StarWars Movie in Command Prompt

Just type in
telnet towel.blinkenlights.nl
in the 'Run' command and
watch the episode!

prevent users from writing to usb

The following registry setting will prevent writing to usb in windows xp.
Expand HKEY_LOCAL_MACHINE\System\CurrentControlSet\Contro l Add a new key and name it "StorageDevicePolicies".
In the window on the right then create a new DWORD value and label it WriteProtect, give it a value of "1" and users can no longer write to USB drives.
Giving a value of "0" will allow to write again

symbols for notepad

Alt+15= ¤ Alt+79= O Alt+129= ü Alt+179= ¦ Alt+229= Õ Alt+20= ¶ Alt+80= P Alt+130= é Alt+180= ¦ Alt+230= µ Alt+21= § Alt+81= Q Alt+131= â Alt+181= Á Alt+231= þ Alt+32=espaço Alt+82= R Alt+132= ä Alt+182= Â Alt+232= Þ Alt+33= ! Alt+83= S Alt+133= à Alt+183= À Alt+233= Ú Alt+34=" Alt+84= T Alt+134= å Alt+184= © Alt+234= Û Alt+35= # Alt+85= U Alt+135= ç Alt+185= ¦ Alt+235= Ù Alt+36= $ Alt+86= V Alt+136= ê Alt+186= ¦ Alt+236= ý Alt+37= % Alt+87= W Alt+137= ë Alt+187= + Alt+237= Ý Alt+38= & Alt+88= X Alt+138= è Alt+188= + Alt+238= ¯ Alt+39= ' Alt+89= Y Alt+139= ï Alt+189= ¢ Alt+239= ´ Alt+40= ( Alt+90= Z Alt+140= î Alt+190= ¥ Alt+240= ­ Alt+41= ) Alt+91= [ Alt+141= ì Alt+191= + Alt+241= ± Alt+42= * Alt+92= Alt+142= Ä Alt+192= + Alt+242= _ Alt+43= + Alt+93= ] Alt+143= Å Alt+193= - Alt+243= ¾ Alt+44= , Alt+94= ^ Alt+144= É Alt+194= - Alt+244= ¶ Alt+45= - Alt+95= _ Alt+145= æ Alt+195= + Alt+245= § Alt+46= . Alt+96= ` Alt+146= Æ Alt+196= - Alt+246= ÷ Alt+47= / Alt+97= a Alt+147= ô Alt+197= + Alt+247= ¸ Alt+48= 0 Alt+98= b Alt+148= ö Alt+198= ã Alt+248= ° Alt+49= 1 Alt+99= c Alt+149= ò Alt+199= Ã Alt+249= ¨ Alt+50= 2 Alt+100= d Alt+150= û Alt+200= + Alt+250= · Alt+51= 3 Alt+101= e Alt+151= ù Alt+201= + Alt+251= ¹ Alt+52= 4 Alt+102= f Alt+152= ÿ Alt+202= - Alt+252= ³ Alt+53= 5 Alt+103= g Alt+153= Ö Alt+203= - Alt+253= ² Alt+54= 6 Alt+104= h Alt+154= Ü Alt+204= ¦ Alt+254= _ Alt+55= 7 Alt+105= i Alt+155= ø Alt+205= - Alt+56= 8 Alt+106= j Alt+156= £ Alt+206= + Alt+57= 9 Alt+107= k Alt+157= Ø Alt+207= ¤ Alt+58= : Alt+108= l Alt+158= × Alt+208= ð Alt+59= ; Alt+109= m Alt+159= ƒ Alt+209= Ð Alt+60= < 110=" n" 160=" á" 210=" +" 61=" =" 111=" o" 161=" í" 211=" Ë" 62=" "> Alt+112= p Alt+162= ó Alt+212= È Alt+63= ? Alt+113= q Alt+163= ú Alt+213= i Alt+64= @ Alt+114= r Alt+164= ñ Alt+214= Í Alt+65= A Alt+115= s Alt+165= Ñ Alt+215= Î Alt+66= B Alt+116= t Alt+166= ª Alt+216= Ï Alt+67= C Alt+117= u Alt+167= º
♀& #9792 widout spaces♂& #9794 widout spaces◘& #9688 widout spaces•& #8266 widout spaces♠& #9824 widout spaces♣& #9827 widout spaces Δ & #916 widout spacesΘ & #920 widout spacesΞ & #926 widout spacesΠ & #928 widout spacesΣ & #931 widout spacesΦ& #934 widout spacesΨ& #936 widout spacesΩ& #937 widout spacesα& #945 widout spacesβ& #946 widout spacesγ& #947 widout spacesδ& #948 widout spacesε& #949 widout spacesζ& #950 widout spacesη& #951 widout spacesθ& #952 widout spacesι& #953 widout spacesκ& #954 widout spacesλ& #955 widout spacesμ& #956 widout spacesξ& #958 widout spacesς
& #962 widout spacesσ & #963 widout spacesτ & #964 widout spacesψ
& #968 widout spacesω & #969 widout spacesθ & #977 widout spaces & #9829 ♥
alt+987=█ alt+6=♠

Nice Windows ShortCuts

to gtalk windows key + esc

Windows
Logo+BREAK (Display the System Properties dialog box)
WindowsLogo+D (Display the desktop)
Windows Logo+M (Minimize all of the windows)
Windows Logo+SHIFT+M (Restore the minimized windows)
Windows Logo+E (Open My Computer)


CTRL+C (Copy)
CTRL+X (Cut)
CTRL+V (Paste)
CTRL+Z (Undo)
DELETE (Delete)
SHIFT+DELETE
(Delete the selected item permanently without placing the item in the Recycle Bin)
CTRL while dragging an item (Copy the selected item)
CTRL+SHIFT while dragging an item (Create a shortcut to the selected item)
F2 key (Rename the selected item)
CTRL+RIGHT ARROW (Move the insertion point to the beginning of the next word) CTRL+LEFT ARROW (Move the insertion point to the beginning of the previous word) CTRL+DOWN ARROW (Move the insertion point to the beginning of the next paragraph)


CTRL+A (Select all)
F3 key (Search for a file or a folder)
ALT+ENTER (View the properties for the selected item)
ALT+F4 (Close the active item, or quit the active program)
ALT+ENTER (Display the properties of the selected object)
ALT+SPACEBAR (Open the shortcut menu for the active window)
CTRL+F4 (Close the active document in programs that enable you to have multiple documents open simultaneously)
ALT+TAB (Switch between the open items)
ALT+ESC (Cycle through items in the order that they had been opened)
F6 key (Cycle through the screen elements in a window or on the desktop)
F4 key (Display the Address bar list in My Computer or Windows Explorer)
SHIFT+F10 (Display the shortcut menu for the selected item)
ALT+SPACEBAR (Display the System menu for the active window)

Windows Logo+U (Open Utility Manager) Accessibility Keyboard Shortcuts
Right SHIFT for eight seconds (Switch FilterKeys either on or off)
Left ALT+left SHIFT+PRINT SCREEN (Switch High Contrast either on or off)
Left ALT+left SHIFT+NUM LOCK (Switch the MouseKeys either on or off)
SHIFT five times (Switch the StickyKeys either on or off)
NUM LOCK for five seconds (Switch the ToggleKeys either on or off)
Windows Logo +U (Open Utility Manager) Windows Explorer Keyboard Shortcuts
END (Display the bottom of the active window)
HOME (Display the top of the active window)
NUM LOCK+Asterisk sign (*) (Display all of the subfolders that are under the selected folder)
NUM LOCK+Plus sign (+) (Display the contents of the selected folder)
NUM LOCK+Minus sign (-) (Collapse the selected folder)

Make your wndows Xp GENUINE.!!


This will allow you to bypass the Microsoft Genuine Validation thingythis method works better than many others i've tried before.
forget the cracks and injectors etc... this is the BEST WAY:
1) start > run > "regedit" (without the quotes of course)
2) go to the key:HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\Windows NT\CurrentVersion\WPAEvents\OOBETimer...and doubleclick on it.
Then change some of the value data to ANYTHING ELSE...delete some, add some letters, I don't care...just change it!now close out regedit.
3) go to start > run > "%systemroot%\system32\oobe\msoobe.exe /a" (again, dont type the quotes)
4) the activation screen will come up, click on register over telephone, then click on CHANGE PRODUCT KEY, enter in this key: JG28K-H9Q7X-BH6W4-3PDCQ-6XBFJ.
Now you can dl all the updates without activating,
and the Genuine Microsoft Validation thingy won't bug you no more!!
Works with most WinXP versions though ther r some exceptions...

See This Video

FOLDER OPTION missing


Many of us sometimes find the folder options missing in windows explorer.

Here's the solution
Open Run and then type "gpedit.msc".
Now goto
User Configuration > Administrative templates > Windows Component > Windows Explorer.

Click on Windows Explorer you will find the 3rd option on the right side of screen
"Removes the Folder Option menu item from the Tools menu"

Just check it,

if it is not configured then change it to enable by double clicking on it and after applying again set it to not configured.


I hopes that you will find the option after restarting windows.

Hidden unknown fact in MICROSOFT WORD

Bill Gates still doesn't know why it happens:
Try out yourself...
Open Microsoft Word and type
=rand(200,99)
and then HIT ENTER....see what happen

Way to get XP product CODE from CD

It really work
There is a way to get the xp product code from the cd
just explorer the cd then
open the folder I386
then open the file UNATTEND.TXT and
scroll down to the last line
and it goes to show what dumbasses microsoft are u have a product code.
Have fun u never need to search for a product code for xp again...!!!!

Chat With Command Prompt


If you want personal chat with a friend
you don't need to download any yahoo messenger
All you need is your friends IP address and Command Prompt.
Firstly, open Notepad and enter:
@echo off
:A
Cls
echo MESSENGER
set /p n=User:
set /p m=Message:
net send %n% %m%
Pause
Goto A
Now save this as "Messenger.bat". Open the .bat file and in Command
Prompt you should see:
MESSENGER
User:
After "User" type the IP address of the computer you want to contact.
After this, you should see this:
Message:
Now type in the message you wish to send.Before you press "Enter" it should look like this:
MESSENGER
User:27.196.391.193
Message: Hi
Now all you need to do is press "Enter", and start chatting!

How to Hide the drives(c:,d:,e:,...etc) in Ur Computer

This is a great trick you can play on your friends. To disable the display of local or networked drives when you click My Computer.

1.Go to start->run.Type regedit.Now go to:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer

Now in the right pane
create a new DWORD item and name it NoDrives (it is case sensitive).
Now modify it's value and set it to 3FFFFFF (Hexadecimal) .
Now restart your computer.
So, now when you click on My Computer, no drives will be shown(all gone...).

To enable display of drives in My Computer, simply delete this DWORD item that you created.Again restart your computer.You can now see all the drives again. Magic........lol....

To Create Folder " CON "

Without using Command Prompt.

Here is a simple method..........
Rename folder from the right click option........
Now press alt and press 255...
press 255 frm the right sideof the key bords i.e., num pad....
where only numbers r given.....
now write con and then press enter.....huh!!
you ll see a con folder in ur pc
and also you can delete it easily.

How to find the IP address of the sender in Gmail

How to find the IP address of the sender in Gmail
When you receive an email, you receive more than just the message. The email comes with headers that carry important information that can tell where the email was sent from and possibly who sent it. For that, you would need to find the IP address of the sender. The tutorial below can help you find the IP address of the sender. Note that this will not work if the sender uses anonymous proxy servers.

Finding IP address in Gmail:

1.Log into your Gmail account with your username and password.

2. Open the mail.

3. To display the headers,* Click on More options corresponding to that thread. You should get a bunch of links.* Click on Show original.

4. You should get headers like this:Gmail headers : nameLook for Received: from followed by a few hostnames and an IP address between square brackets. In this case, it is65.119.112.245.That is be the IP address of the sender!

5. Track the IP address of the sender.

How to find the IP address of the sender in Hotmail

When you receive an email, you receive more than just the message. The email comes with headers that carry important information that can tell where the email was sent from and possibly who sent it. For that, you would need to find the IP address of the sender. The tutorial below can help you find the IP address of the sender. Note that this will not work if the sender uses anonymous proxy servers.
Finding IP address in Hotmail
1. Log into your Hotmail account with your username and password.
2. Click on the Mail tab on the top.
3. Open the mail.
4. If you do not see the headers above the mail message, your headers are not displayed. To display the headers,
* Click on Options on the top-right corner
* In the Mail Options page, click on Mail Display Settings
* In Message Headers, make sure Advanced option is checked
* Click on Ok button
* Go back to the mails and open that mail.

5. If you find a header with X-Originating-IP: followed by an IP address, that is the sender's IP addressHotmail headers : name ,In this case the IP address of the sender is [68.34.60.59]. Jump to step 9.
6. If you find a header with Received: from followed by a Gmail proxy like thisHotmail headers : nameLook for Received: from followed by IP address within square brackets[].In this case, the IP address of the sender is [69.140.7.58]. Jump to step 9.
7. Or else if you have headers like thisHotmail headers : nameLook for Received: from followed by IP address within square brackets[].In this case, the IP address of the sender is [61.83.145.129] (Spam mail). Jump to step 9.
8. * If you have multiple Received: from headers, eliminate the ones that have proxy.anyknownserver.com.
9. Track the IP address of the sender

How to find the IP address of the sender in Yahoo! mail

When you receive an email, you receive more than just the message. The email comes with headers that carry important information that can tell where the email was sent from and possibly who sent it. For that, you would need to find the IP address of the sender. The tutorial below can help you find the IP address of the sender. Note that this will not work if the sender uses anonymous proxy servers.

Finding IP address in Yahoo! Mail

1. Log into your Yahoo! mail with your username and password.
2. Click on Inbox or whichever folder you have stored your mail.
3. Open the mail.
4. If you do not see the headers above the mail message, your headers are not displayed. To display the headers,
* Click on Options on the top-right corner
* In the Mail Options page, click on General Preferences
* Scroll down to Messages where you have the Headers option
* Make sure that Show all headers on incoming messages is selected
* Click on the Save button
* Go back to the mails and open that mail.
5. You should see similar headers like this:Yahoo! headers : nameLook for Received: from followed by the IP address between square brackets [ ]. Here, it is 202.65.138.109.That is be the IP address of the sender!
6. Track the IP address of the sender

Updated trick for enabling Folder option

Many times Windows users face a common problem. The “Folder Options” in “Tools” menu is not visible. Even It can’t be accessed from Control Panel. Also “Registry Editor” is disabled.
Follow the simple steps mentioned in this tutorial and your problem will be solved:

1. If Folder Options is disabled but Registry Editor is still working in your system, then you can enable Folder Options by editing Windows Registry.
Type regedit in RUN dialog box and press Enter.
it’ll open Registry Editor, now go to following keys:
HKEY_CURRENT_USER\Software\Microsoft\Windows\Current Version\Policies\ExplorerHKEY_LOCAL_MACHINE\Software\Microsoft\Windows\Current Version\Policies\Explorer
In right-side pane, check whether a DWORD value named NoFolderOptions exists or not? If it exists, delete it.


2. If you are not familiar with editing the registry, then you can simply download following file, extract it and then run the .REG file:
http://www.askvg.com/wp-content/uploads/2007/09/folder_options.zip

Tips to recover scratched CD's

1. Spread a cloth on a flat surface and place the CD on it.
2. Then, hold the disc with one hand, use the other to wipe the polish into the affected area with a soft cloth.
3. Wait for it to dry and buff using short, brisk strokes along the scratch, not across it.
4. A cloth sold to wipe spectacles or camera lenses will work super m8's.
5. When you can no longersee the scratch,, wash the disc with water and let it dry before playing. Intersting isnt it? Try it right now
I have used toothpaste with good effects before Ive also used car paint cutting compound on deeper scratches. It does leave lots of smaller scratches (as it is a cutting compound after all) but it will remove the worst scratches in most cases.
ya u r gng to b surely befinited by this Operation

Add Your Name (or) Application to right click Of My Computer

Caution ..
As it is related to Windows regisrty it can be dangerous
so,Try This at ur own risk


To write your name on right click application
please follow the steps.

1.Copy/Paste the following code in Notepad And then Save it as .reg

Windows Registry Editor Version 5.00
[HKEY_CLASSES_ROOT\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell\Registry Editor]
@="Your Name Or Name of the Application"
[HKEY_CLASSES_ROOT\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell\Registry Editor\command]
@="Location Of The Application"

2.
Now edit it and then Type your name In

Eg:

[HKEY_CLASSES_ROOT\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell\Registry Editor]
@="Rajesh"

3. If u want to get any application, once you click Your name or name of application
Then , Type the location Of the application Which u want to open In:

[HKEY_CLASSES_ROOT\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell\Registry Editor\command]
@="Location Of The Application"

For eg.C:\Program Files\Yahoo!\Messenger\messenger.exe
Thats It finally save it And then Run it .


------------------------------------------------------------
To add Application Control Panel

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell\Control Panel\command]
@="rundll32.exe shell32.dll,Control_RunDLL"

To add Application Add/Remove

[HKEY_CLASSES_ROOT\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell\Add/Remove\command]
@="control appwiz.cpl"

To add Application Reboot

[HKEY_CLASSES_ROOT\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell\[Reboot]\command]
@="shutdown -r -f -t 5"

To add Application Shutdown

[HKEY_CLASSES_ROOT\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell\[Shutdown]\command]
@="shutdown -s -f -t 5"

How to "Delete administrator Password" without any software

Hello Friends,

its a amazing trick that you world like..

Boot up with DOS and delete the sam.exe and sam.log files from Windows\system32\config in your hard drive. Now when you boot up in NT the password on your built-in administrator account which will be blank (i.e No password). This solution works only if your hard drive is FAT kind.

Method 2

Step
1. Put your hard disk of your computer in any other pc .
Step 2. Boot that computer and use your hard disk as a secondary hard disk (D'nt boot as primary hard disk ).
Step 3. Then open that drive in which the victim’s window(or your window) is installed.
Step 4. Go to location windows->system32->config
Step 5. And delete SAM.exe and SAM.log
Step 6. Now remove hard disk and put in your computer.
Step 7. And boot your computer :-)

Tuesday, January 25, 2011

What is MAC Address?

Friends,

you have often listen about the mac address, but do you know that whats it exactly?

MAC Address is the address of our lan card and its unique..

we cant change the mac address..
there are few tricks to change the mac address, but its not recommended..
it may stop your network activity and crash your system network card as useless.

In computer networking, the Media Access Control (MAC) address is every bit as important as an IP address. Learn in this article how MAC addresses work and how to find the MAC addresses being used by a computer... (see below)


What Is a MAC Address?
The MAC address is a unique value associated with a network adapter. MAC addresses are also known as hardware addresses or physical addresses. They uniquely identify an adapter on a LAN.

MAC addresses are 12-digit hexadecimal numbers (48 bits in length). By convention, MAC addresses are usually written in one of the following two formats:

MM:MM:MM:SS:SS:SS


MM-MM-MM-SS-SS-SS

The first half of a MAC address contains the ID number of the adapter manufacturer. These IDs are regulated by an Internet standards body (see sidebar). The second half of a MAC address represents the serial number assigned to the adapter by the manufacturer. In the example,

00:A0:C9:14:C8:29

The prefix

00A0C9

indicates the manufacturer is Intel Corporation.
Why MAC Addresses?
Recall that TCP/IP and other mainstream networking architectures generally adopt the OSI model. In this model, network functionality is subdivided into layers. MAC addresses function at the data link layer (layer 2 in the OSI model). They allow computers to uniquely identify themselves on a network at this relatively low level.

Intersting Networks Topics

My Friends,

I have put some networking basic concepts topics to understand network identity and define it...

What is Peer-to-Peer Networking?

Peer to peer networks share responsibility for processing data among all of the connected devices. Peer-to-peer networking (also known simply as peer networking) differs from client-server networking in several respects.

What Is a Network Name?

A network name is a string that computing devices use to identify a specific computer network. Network names are typically different from names of individual computers or the addresses computers use to identify each other.

How is Network Performance Measured?

The performance or "speed" of a computer network is normally measured in units of bits per second (bps). This quantity can represent either an actual data rate or a theoretical limit to available network bandwidth. The related units of Kbps, Mbps, Gbps represent increasingly larger multiples of bps.

Computer Networking FAQ List

Index of answers to commonly-asked quesstions about any computer networking-related topic.

What Is the WWW?

The term "WWW" refers to the open development phase of the Internet in the 1990s. The WWW comprises a global network of Web sites accessible on the Internet.

What Is a URL?

URLs (Uniform Resource Locators) identify by name Web servers and individual Web pages stored on those servers, anywhere on the Internet.

What Is a URI?

A URI (Uniform Resource Identifier) names both local and remote Internet resources similar to URLs.

How Data Recover From HDD or MMC or Flash Drive?

Dear Friends,

Usually you might have listen that someone has recover their data from Hard Disk Drive or MMC which are deleted or formatted...
So, Have You ever Think That Hows Its Possible while we delete the data or Format The Drive And Its Recover as it was format and condition!!!!!

So, Let Me Explain You,

In our Hard disk, there are many parts inside this...
Header, Motor, Disks......... nd etc...

So, there might be problem with motor, circuit or disks.....

There are many sectors and clusters in hard disk and all that sectors and clusters having own unique address code and our data stores in that address......

when we create a folder or file, than it will store in our hard disk and it will allocate a sector address to identify them.

when we click on particular file or folder, than header is directly point to that address and we can access this file or folder...

while we remove file or format the drive. than we can see the free space in our hdd or pen drive, but actually its stored in the fetch area of sector address until you put another data on that sector...

there are many tools to recover data from hard disk or pen drive...

so, what does the tools do!

they read each sector and fetching the data from each sector and show you the list...

its take time as simple copy and paste... but while you are scanning the hdd or pen drive, than it will take much time to scan process coz it read the each sector and fetch it out in the form of tree.....


you can see your data and copy it...

but, verify that there must not red cross mark on any file or folder name coz that means, you cant recover that file or folder...

the health of file or folder is not good....

to recover the file, software that you are using is also main part of recovery..
suppose you are using the software which is not fully able to recover the file or identify the file in proper format or bad health condition, than you will not able to recover file correctly...

as per my recommend, Get Data Back is very useful software tool to recover the file...

http://www.runtime.org/data-recovery-software.htm

Its Download Trial Link to download tool....

otherwise, Stellar Phoenix is another option to recovery process.....

Get Data Back is used if your data is formatted or deleted....

Stellar Phoenix is used if your partition is deleted or volume is not avail....

So, use this software and start your own business of data solution.....


You can also repair and recover Outlook PST Files, Photo JPG files, Windows and MAC Operation Data recovery, Mail Recovery and password recovery from mail box..

You can also recover SQL Database and Oracle Recovery....

all these functions, i have mention is possible in Stellar Phoenix Data Recovery Software....
Thanks

Six ways to protect your gmail account from being cracked

Its Very IMP Topic about Phishing....

the concept of site study and info globing...


What is phishing?

Phishing is the best working method of hacking email accounts. The advantage of phishing in email account hacking is that victim is not able to recognize the fake page (phisher) as this phisher matches with the original page (depends on cracker’s skills).

So, here I have mentioned few tips which you should follow to prevent cracking of your email account by crackers.

1. Phishing filter:
I will recommend use of browser which has phishing filter.Web browsers like Firefox 3.0+ (my favorite), Internet Explorer 7+, Opera 7x supports phishing filter and should be used for safe browsing.

2. Do not provide sensitive information :
Yes, this is the main thing you have to remember. Unless and until, you know the person or institute, do not give your sensitive information like user ids , passwords, bank account numbers as a reply to any email. In fact, 90% emails demanding such information are meant for cracking!

3. Suspicious Filters :
Check whether there are any suspicious filters not created by you. For checking your email filters, go to Settings->Filters. If you find any such suspicious filter not created by you, delete it urgently.

4. Great offers, ads, winners :
Generally, Gmail users are deceived by emails which contain great offers, ads or declaring that you are a lucky winner and you should provide listed query information to receive your cash prize. Never click or provide any information for such claiming emails, unless you’ve actually participated in any of the said competitions, chances are that, you never had!

5. Disable Forwarding and POP/IMAP :
To disable forwarding and POP/IMAP, go to Settings-> Forwarding and POP/IMAP and disable forwarding and POP/IMAP.

6. The most important :
The most important precaution which one must follow is “do not click on the link” provided in the email without knowing to which page the link will take you. I have added my personal experience of phishing and the method to determine the link target, where i received a paypal phisher, in my article Paypal phisher to crack Paypal account. One more thing, always open link given in email by typing address of site in new tab/window.

Thus, if you will follow these guidelines, i bet your Gmail account will never be cracked by a phisher. Just remember the guidelines and prevent Gmail account from being cracked by crackers.

source: This isn’t my original article, but an aggregate information I’ve gathered in time, which will hopefully help you.

Code Snippets, Networking and Security ARP Spoofing – ARP Poisoning :Info And Defence

Friends,

Lets study this topic and try to understand...

Introduction

A computer connected to an IP/Ethernet LAN has two addresses. One is the address of the network card, called the MAC address. The MAC, in theory, is a globally unique and unchangeable address which is stored on the network card itself. MAC addresses are necessary so that the Ethernet protocol can send data back and forth, Independent of whatever application protocols are used on top of it. Ethernet builds “frames” of data, consisting Of 1500 byte blocks. Each frame has an Ethernet header, containing the MAC address of the source and the Destination computer.

The second address is the IP address. IP is a protocol used by applications, independent of whatever Network technology operates underneath it. Each computer on a network must have a unique IP address to Communicate.
IP and Ethernet must work together. IP communicates by constructing “packets” which are similar to frames, but have a different structure. These packets cannot be delivered without the network layer. In our case they are delivered by Ethernet, which splits the packets into frames, adds an Ethernet header for delivery, and sends them down the cable to the switch. The switch then decides which port to send the frame to, by comparing the destination address of the frame to an internal table which maps port numbers to MAC addresses. When an Ethernet frame is constructed, it must be built from an IP packet. However, at the time of construction, Ethernet has no idea what the MAC address of the destination machine is which it needs to create an Ethernet header. The only information it has available is the destination IP from the packet’s header. There must be a way for the Ethernet protocol to find the MAC address of the destination machine, given a destination IP. This is where ARP, the Address Resolution Protocol, comes in.

the Address Resolution Protocol, to resolve IP addresses into hardware, or MAC (Medium Access Controllers), addresses. All the hosts in the LAN keep a cache of resolved addresses. ARP resolution is invoked when a new IP address has to be resolved or an entry in the cache expires. The ARP poisoning attack consists of maliciously modifying the association between an IP address and its corresponding MAC address.

Although this is the most popular version, ARP poisoning is not connected to Ethernet networks. Layer 2 switched LANs, 802.11b networks, and cryptographically protected connections are also vulnerable.

ARP spoofing

For my example we will connect 3 systems to the network switch. The system “HDB” is the default gateway. The IP of the default gateway is 10.0.2.121. The System “HD” is the Originating host, the IP of “HD” is 10.0.2.211. “ARBU” is the attack host, The IP of “ARBU” is 10.0.2.233, “ARBU” will act as our “Man in the Middle”. To launch our Attack we will need to run ARP Redirect, Part of the dsniff package available from Dug Song (http://www.XYZ.org/~ABC/dsniff), on ARBU. The package will let us intercept the packets from a target host on the network intended for another host,

Typically the default gateway. Remember we are connected to a switch; We should only be able to see network broadcast traffic. Using ARP Redirect however will allow us how to view all the traffic between
HD and HDB. On “ARBU” execute the following Commands:

[root@ARBU @ ~] ping HDB
PING 10.0.2.121 from 10.0.2.233 : 56(84) bytes of data.
64 bytes from 10.0.2.121L icmp_seq=0 ttl=128 time=1.3 ms
[root@ARBU @ ~] ping HD
PING 10.0.2.211 from 10.0.2.233 : 56(84) bytes of data
64 bytes from 10.0.2.211: icmp_seq=0 ttl=255 time=5.2 ms

This will allow ARBU to cache the target hardware address, this will be required when executing our redirect :

[root@ARBU @ ~] arpredirect -t 10.0.2.211 10.0.2.121
intercepting traffic from 10.0.2.211 to 10.0.2.121 (^c to exit)…

This will run our ARP Redirect and will redirect all traffic for the gateway (HDB) to the attacker (ARBU). This is done by arp redirect by replacing the default gateway of HD to ARBU, thus telling the target to send all of the traffic to ARBU first, in turn ARBU will send the traffic (Once sniffed through) to the intended target. In effect ARBU is turned into a router and will redirect the traffic from HD to HDB so we must make it act like a router and enable IP forwarding on ARBU so it can redirect the traffic to HDB once it has been captured by ARBU. Instead of using Kernel-level IP forwarding we use fragrouter as kernel-level may send out ICMP redirects and can disrupt the process. fragrouter will allow us to easily enable simple IP forwarding from command line using the -B1 Switch as shown.

[root@ARBU ~] fragrouter -B1
10.0.2.211.2079 > 192.168.20.20.21: S 592459704:592459704(0)
10.0.2.211.2079 > 192.168.20.20.21 : P 592459705:592459717(12)
10.0.2.211.2079 > 192.168.20.20.21 : . ack 235437339
10.0.2.211.2079 > 192.168.20.20.21 : P 592459717:592459730(13)
(output trimmed)

Finally we need to enable a packet analyzer on ARBU to capture any traffic worth
sniffing out.
[root@ARBU ~] linsniff
Linux Sniffer Beta v.99
Log opened.
———[SYN] (slot 1)
10.0.2.121 => 192.168.20.20 [21]
USER UltimA
PASS lol.you.got.owned
PORT 10,1,1,18,8,35
NLST
QUIT
———[SYN] (slot 1)
10.0.2.121 => 192.168.20.20 [110]
USER UltimA@HD.com PASS ARBU.pwned.Me
[FIN] (1)

Lets examine what happened. Once ARPRedirect was enabled, ARBU began to send
spoofed ARP replied to HD claiming to be HDB. HD(Being Retarded) happily updated the ARP Table to reflect HDB’s new Hardware address. Then a HD user stared an FTP Connection and a POP session to 192.168.20.20 and the USER and PASS was logged by the sniffer. In the last example we were only redirecting traffic from HD to HDB; However if we miss the -t switch in the arpredirect command we can redrect ALL traffic on the network

ARP Poisoning attacks

Sniffing

Switches determine which frames go to which ports by comparing the destination MAC on a frame against a table. This table contains a list of ports and the attached MAC address. The table is built when the switch is powered on, by examining the source MAC from the first frame transmitted on each port. Network cards can enter a state called “promiscuous mode” where they are allowed to examine frames that are destined for MAC addresses other than their own. On switched networks this is not a concern, because the switch routes frames based on the table described above. This prevents sniffing of other people’s frames. However, using ARP spoofing, there are several ways that sniffing can be performed on a switched network. A “man-in-the-middle” attack is one of these. When a MiM is performed, a malicious user inserts his computer between the communications path of two target computers. Sniffing can then be performed. The malicious computer will forward frames between the two target computers so communications are not interrupted. The attack is performed as follows (where ARBU is the attacking computer, and JIM and USMANI are targets):

-ARBU poisons the ARP cache of USMANI and JIM.
-USMANI associates JIM’s IP with ARBU’s MAC.
-JIM associates USMANI’s IP with ARBU’s MAC.
-All of USMANI and JIM’s IP traffic will then go to ARBU first, instead of directly to each other.

This is extremely potent when we consider that not only can computers be poisoned, but Routers/gateways as well. All Internet traffic for a host could be intercepted with this method by performing a MiM(man in the middle ) on a target computer and the LAN’s router.

Another method of sniffing on a switched network is MAC flooding. By sending spoofed ARP replies to a switch at an extremely rapid rate, the switch’s port/MAC table will overflow. Results vary by brand, but some switches will revert to broadcast mode at this point. Sniffing can then be performed.

DOS

Updating ARP caches with non-existent MAC addresses will cause frames to be dropped. These could be sent out in a sweeping fashion to all clients on the network in order to cause a Denial of Service attack. This is also a side effect of post-MiM attacks, since targeted computers will continue to send frames to the attacker’s MAC address even after they remove themselves from the communication path. To perform a clean MiM attack, the target computers would have to have the original ARP entries restored by the attacking computer.

Hijacking

Connection hijacking allows an attacker to take control of a connection between two computers, using methods similar to the MiM attack. This transfer of control can result in any type of session being transferred. For example, an attacker could take control of a telnet session after a target computer has logged in to a remote computer as administrator.

Cloning

MAC addresses were intended to be globally-unique identifiers for each network interface produced. They were to be burned into the ROM of each interface, and not be changed. Today, however, MAC addresses are easily changed. Linux users can even change their MAC without spoofing software, using a single parameter to “ifconfig”, the interface configuration program for the OS. An attacker could DoS a target computer, then assign themselves the IP and MAC of the target computer, receiving all frames intended for the target.

Tools Used

ARPOISON
ETTERCAP
PARASITE
Cain and Able

Defense

A possible defense against ARP poisoning is using static entries in the ARP cache. Static entries cannot be updated by ARP replies and can be changed only manually by the system administrator. Such an approach however is not viable for networks with hundreds of hosts because those entries must be inserted manually on each host. Automating such a solution via a network script is not recommendable Since it relies on higher levels of the ISO/OSI stack. Relying on higher levels when the data link layer has not been secured yet may be dangerous because the protocol used to exchange the list can be hijacked using ARP poisoning before the list is distributed. Even worse, some operating system (such as Windows) may accept dynamic updates even if an entry is set as static, thus making static Ethernet routing useless.

Port security, Is another mechanism for tackling the problem. It is a feature present in many modern switches that allows the switch to recognize only one MAC address on a physical port. This is often suggested as an effective protection against ARP poisoning, but it is not. If the attacker does not spoof its own MAC address, it can poison the two victims’ cache without letting the switch interfere with the poisoning process.

Besides static cache entries and port security, the only other defense that will not modify ARP behavior is detection. IDS and personal firewalls usually notice the ARP switch and warn the user that the entry in the cache is changed. As it often happens in the computer security domain, the decision is left to the user and his/her awareness. Given the particularly sophisticated level of operation in this case, we doubt the average user will take the proper actions.

Some kernel patches exist that try to defend against ARP poisoning. .Anticap. Does not update the ARP cache when an ARP reply carries a different MAC address for a given IP from then one already in cache and will issue a kernel alert that someone is trying to poison the ARP cache. Such a solution is against ARP definition itself, since it drops legal gratuitous ARP.

When a new ARP replies announcing a change in a (IP, MAC) pair is received, it tries to discover if the previous MAC address is still alive. If the previous MAC address replies to the request, the update is rejected and the new MAC address is added to a list of banned Addresses.

In a solution that implements two distinct queues, for requested addresses and received replies, is roposed. The system discards a reply if the corresponding request was never sent, i.e., is not in the queue, and in the received queue an IP address associated with a different Ethernet address is already present.

All these solutions have the same problem. If the malicious ARP reply is sent before the real one is put in the cache, for a real request, the victim caches the wrong reply and discards the real one. A race condition exists between the attacker and the victim. When the first ARP request is broadcast, both the victim and the attacker receive the message. The first one who replies will take over the other forever. Furthermore, the attacker could also spoof an ICMP echo request message and immediately send after
it a false ARP reply. When the victim receives the ICMP echo request, it performs an ARP request, but the false reply is already in its queue of received packet, so it accepts it a valid one. If Antidote is installed, a host can spoof the sender MAC address and force a host to ban another host. Solutions such as a centralized ARP cache or a DHCP server broadcasting ARP information, as they are deployed
in IP over ATM networks [8], have not been considered as the attacker could spoof the source of the broadcast and poison the whole LAN. A digitally signed or MAC-ed broadcast packet would not be vulnerable to spoofing, yet broadcasting ARP tables could generate large traffic on the LAN. Since an entry for each host needs to be broadcast, on large networks this will generate considerable traffic and every host would have to store the entire ARP table even if it might not be needed at the moment. The main problem with centralized ARP cache is that if a host goes down, the central server will not notice the event. Thus, when a host that wishes to communicate with the one currently down asks for ARP information to the central server, it will receive the information even if the host is down. At this point an attacker could impersonate the offline host using its MAC address and receive all the packets sent to it.

Reference –

intro to arp poisoning by Sean Whalen

www.rootsecure.net/content/downloads/pdf/arp_spoofing_intro.pdf

S-ARP: a Secure Address Resolution Protocol by D. Bruschi, A. Ornaghi, E. Rosti

www.milw0rm.com/papers/267

ALSO I WOULD LIKE TO THANX ShoKz, JR, ReMuSoMeGa , Mad-Hatter, UltimA , str0ke , IDU , l33t , n0f34r....


Read It And Post It.............

Monday, January 24, 2011

How to make windows xp boot faster

Friends,

now forget low speed in booting in your system... follow these steps..

You can make Windows XP boot faster by 5 - 15 seconds (on some machines).

To do so do the following:

Start Registry Editor (Regedit.exe).

Locate the following key in the registry:

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControl
Set\Control\SessionManager\MemoryManagement\PrefetchParameters

Make sure you backup the keys by exporting them to a .reg file.

On the EnablePrefetcher value, change the setting from 3 to 5 (decimal).

Close the registry editor.

Restart your computer.

Thanks

Automatic Update

This service enables Windows XP to check the Web automatically for updates. If you don't want to use
Automatic Updates, you can disable the service. You can always check for updates manually at the Windows Update Web site.

If you want to check update directly from internet than open www.microsoft.com

if you are using pirated windows xp or another o.s. than you might be get an encored an error and your windows might be crashed or damaged.....

Concept of 1 GB Calculation = 0.93 GB Memory Show

Dear Friends,
Have you ever think that if your pendrive is 2 gb than why u cant use full space? why u can use only 1.97 gb out of 1 gb?

so, its calculation is as below....

the size of 1 gb is different in logical and physical form...

for the physical, 1 gb = 1000 mb, bt when you recognize it into system, than it will count as logical calculation.

logically, 1 gb = 1024 mb..

so friends, lets do a maths..

suppose you have 1 gb pen drive..

Locally You Have - 1024 MB
Physically You Have - 1000 MB

we have convert GB to KB...

so,

1GB * 1000 * 1000 * 1000 = 1000000000 KB

now, we have got 1000000000 KB in your 1 GB pendrive and its physical storage capacity..
now, we have convert it into logical bcoz we will store data in pen drive logically..

so,
now convert kb to GB but in logically calculation,

1000000000 kb / 1024 = 976562.5
976562.5 / 1024 = 953.64 mb
953.64 / 1024 = 0.93 GB.....

so, actually you get 1 gb full pendrive, but just coz of the difference between physically and logically calculation, your usage memory size is less than full....


Its simple logic, and you can try it to any hdd or pen drive or flash drive..

Thanks

Saturday, January 22, 2011

Why Virus not much effect in Linux?

so,
New topic is that as we know that virus does not effect in linux. but do you know why?

let me tell you..
virus is onw type of application and its file format is .com, .bat or .exe..
its windows execution file format extensions.

while, in linux, these extensions does not support..

virus is a application which is affect in registry and system files of windows. and than, our operating settings is changed.... and we wish that virus has affect our system so let use linux..

but, if the software developer crate a virus with the linux fat extension
than, the same problem may exists in linux software... than what will you do?

so, over all, virus is only a application by its, you have to aware with the virus file and should know that what is the effect of virus...

some time, our task bar is disabled or some another program does not work.. coz virus delete the file or link to the file...


Thanks

Friday, January 21, 2011

Downloading movies, songs and any softwares or games.

dear friends,
now you not need to purchase any cd or dvd for any software's, games, songs or movies...

all the need you wish, you can download from torrent..
torrent is peer to peer engine and you need to download torrent client and than download torrent file from any soft or movies or else...

Torrent File Download Link : www.torrentz.com
Torrent Client Download : www. utorrent.com

For this, you have to check the seeder and peers of perticuler file of torrent.

so open site torrentz.com and than, search what ever you wish..
than, select any file which are latest uploaded and open it..
than you will many servers source to download file...
select any server and open it..
select "Download Torrent" and click on it..
file will be download on your system hard drive..
double click this file and open with utorrent which is torrent client..
and your download will start....


Enjoy original movies, crecked tools and games...

Good quality audio and video songs..

Video Editing Tools

Dear Friends,
Now we can edit photos and make them in to a slide show or create cd with back ground music as you wish..

you can use a software name : pro show gold. and u can download it from http://www.photodex.com/products/proshow/gold.

so friends, you become a photo designer and you can create your own business for photo editing and studio works..

Network Funda

Hello Friends,
Let me tell you a thing about the network... The network is connection of multiple system by single media.

First of all,

I wish you thanks to visit my blog & This blog contain the funda of network and tools to diagnostics system problem.. herewith, we will be connected via this blog and discuss about the problem and find the solution.