Thursday, October 27, 2011

Problems of AERO in Windows 7/VISTA

Many of my friends asked me that how to overcome problems of AERO on windows 7 or vista they always  encountered a problem that their windows 7 color theme changed into windows basic theme which really don't  look cool, this happens not only with PICASA but also QUICKTIME, and many other softwares, because when these softwares are used they force the DESKTOP WINDOW MANAGER(DWM) to stop, which is necessary for the functioning of AERO, also we can overcome this problem by following techniques:-

  • By checking that your graphics card is updated till date, or else just check windows update and see whether there are any updates available.
  • many of them say that the real problem is QUICKTIME, but not the PICASA, so try updating QUICKTIME or remove(uninstall) it completely.
  • See that you not using too much of your RAM because too much usage of RAM also shuts down AERO
  • Also see that you don't have "Disable visual themes" in your compatibility tab.
using WINDOWS 7/VISTA without AERO effects is like using WINDOWS XP again if you ask me......


Here are some frequently asked questions about AERO, you can see them by clicking the MICROSOFT link below

.........................................................................
thanks and please share your comments on the post..........

Monday, October 10, 2011

Hackers and Hacker Hierarchy

What is a hacker?
A hacker is someone who likes to tinker with electronics or computer systems. Hackers like to explore and learn how computer systems work, finding ways to make them do what they do better, or do things they weren’t intended to do. There are two types of hackers:
White Hat: These are considered the good guys. White hat hackers don’t use their skills for illegal purposes. They usually become Computer Security experts and help protect people from the Black Hats.
Black Hat: These are considered the bad guys. Black hat hackers usually use their skills maliciously for personal gain. They are the people that hack banks, steal credit cards, and deface websites.
These two terms came from the old western movies where the good guys wore white hats and the bad guys wore black hats.


Now if you’re thinking, “Oh boy! Being a black hat sounds awesome!”, Then I have a question for you. Does it sound cool to live in a cell the size of your bathroom and be someone’s butt buddy for many years? That’s what I thought.
Hacker HierarchyScript kiddies: These are the wannabe hackers. They are looked down upon in the hacker community because they are the people that make hackers look bad. Script kiddies usually have no hacking skills and use the tools developed by other hackers without any knowledge of what’s happening behind the scenes.
Intermediate hackers: These people usually know about computers, networks, and have enough programming knowledge to understand relatively what a script might do, but like the script kiddies they use pre-developed well-known exploits (- a piece of code that takes advantage of a bug or vulnerability in a piece of software that allows you to take control of a computer system) to carry out attacks
Elite Hackers: These are the skilled hackers. They are the ones that write the many hacker tools and exploits out there. They can break into systems and hide their tracks or make it look like someone else did it. You should strive to eventually reach this level.
What does it take to become a hacker?Becoming a great hacker isn’t easy and it doesn’t happen quickly. Being creative helps a lot. There is more than one way a problem can be solved, and as a hacker you encounter many problems. The more creative you are the bigger chance you have of hacking a system without being detected. Another huge quality you must have is the will to learn because without it, you will get nowhere. Remember, Knowledge is power. Patience is also a must because many topics can be difficult to grasp and only over time will you master them.

i personally believe that hackers need to learn LINUX clearly, have a great idea of LINUX, and always apply programming on whatever they observe in nature........

source: The Hackers Underground Handbook

Friday, September 16, 2011

AntiVirus Softwares: choosing the best out of many

firstly any computer user must acknowledge that his the antivirus he is going to use must suit his work, like 
home user 
business user
for home users i recommend the usage of AVG or one can use the AVAST free Antivirus or AVIRA , because these antivirus softwares are light and easy to use, and the home internet users never have to worry about the deterioration of the internet speeds, they are not going to effect the inernet downloading speeds
for business users i recommend KASPERSKY or BITDEFENDER or ESET Nod32, because these softwares make thorough checking and suit the business compatible systems, which have greater configurations when compared to home PCs or laptops or notebooks.
Anyway rating of top 10 antivirus sotwares goes as follows:-

1.) BitDefender


2.)Kaspersky


3.)ESET Nod32


4.) AVG


5.) Norton


6.)Avira


7.) McAfee


8.)Avast


9.) Trend Micro


10.) Webroot


source: Top 10 Antivirus 2011

the question of antivirus is frequently asked by my friends, college mates and a pretty routine question in  YAHOO Q/A.
So i made up an idea to write towards it. 
Guess this post of mine will help the people out there who are in a dilemma to choose the best antivirus......
thank you.......Bhargav

Saturday, September 10, 2011

tips to overcome crashes of google chrome

Primarly
Try restarting the browser, or else when the chrome browser crashes it on self shows restore the closed tabs.

Whenever possible, Google Chrome will restore webpages from your previous browsing session.
Do you have Internet Download Manager installed?

If you have Internet Download Manager installed, update to IDM version 6.03 Beta or disable the "Advanced browser integration" option by going to Options > General.
Check for conflicting software.

or try installing the latest version of the IDM which is recommended, IDM has become a problem for chrome for many people out there, i experienced it.

You can check for conflicting software on Windows by typing about:conflicts in the address bar. If you have software that is known to cause Google Chrome to crash, it will be highlighted for you on this page, along with any recommended actions to resolve the conflict. In many cases, the conflicting software is malware that needs to be removed using anti-virus software.
Check whether you need a new browser user profile.

check whether your antivirus is blocking some websites and add them to exceptions in your antivius firewall.
some other tips like always try to run:-
1.)ccleaner
2.)Advanced system care
3.)Tuneup utilities
4.)AVG tuneup
personally the ccleaner and AVG tuneup remove a lot of junk from browser and temporary files and whatever browser stores the junk in it.
also always try to keep to the browser light by installing less number if applications from the GOOGLE WebStore.
 

If you see this error message repeatedly, your browser user profile may be corrupted. First try moving the Default subfolder from your User Data folder to see if that fixes the problem:

    Go to Start menu > Run.
    Enter one of the following directories in the text field, depending on your operating system:

    Windows
        Windows XP: %USERPROFILE%\Local Settings\Application Data\Google\Chrome\User Data\
        Windows Vista and Windows 7: %LOCALAPPDATA%\Google\Chrome\User Data\

    Mac OS X: ~/Library/Application Support/Google/Chrome/Default

    Linux: ~/.config/google-chrome/Default
    Click OK.
    In the window that opens, rename the "Default" folder as "Backup."
    Move the "Backup" folder from the "User Data" folder up one level to the "Chrome" folder.

If you continue to see the error, try creating a new user profile to replace your current one.
Check for problems with protected system files.

    Go to Start menu > Run.
    Enter the following: SFC.EXE /SCANNOW (make sure there is a space between SFC.EXE and /SCANNOW). This initiates the Microsoft utility that will scan and repair problems with protected system files on your computer.

Try opening Google Chrome and see whether the error message still appears.


Sometimes SFC/SCANNOW asks to restart the computer to scan it completely 
source: Google Chrome

Tuesday, August 30, 2011

best data recovery softwares

i personally prefer the Recuva data recovery software, because it does the recovery of my deleted pictures, videos, documents, e-mails stored on my drives, songs, all the other stuff, but it cannot recover the stuff on the installed drive, that's the main problem, even the easeus data recovery software which is other best data recovery software cannot recover the data from the installed drive, so i suggest people to install the data recovery softwares on the drive where they don't delete stuff.
however the best data recovery softwares of 2011 are as follows:-
1.DIGITAL RESCUE PREMIUM.


2.ADVANCED DISK RECOVERY.


3.RECOVER MY FILES.


4.DATA RECOVERY WIZARD.


5.TOTAL RECALL.


6.HANDY RECOVERY.


7.WINDOWS DATA RECOVERY.


8.R-STUDIO.


9.QUICK RECOVERY.


10.STELLAR PHOENIX.


All of the above softwares are available at torrentz or one can buy them by googling the data recovery softwares.
the Recuva software, i've mentioned above is a light software, it is available for free at filehippo click the filehippo to go there and download it, it occupies less memory compared to all of the above top 10 data recovery softwares.
SOURCE: Data recovery 2011 
thank you................................

Tuesday, August 23, 2011

How to crack windows password

How to crack Windows 7 password when you forgot password? Creating a password for Windows 7 can be rather simple, but forgetting Windows 7 password will be frustrating and bring you lots of troubles. 
Here are some top Windows 7 password crackers for lost or forgotten Windows 7 password hacking problems.
Crack windows 7 password with Windows Password Breaker
Windows Password Breaker is the most popular commercial Windows password reset tool. It allows you to burn a bootable password reset CD/DVD/USB flash driver to reset forgotten Windows administrator and other user account on Windows 7 under DOS. Compared with other similar applications, this software is better in compatibility and reliability with a smaller file size. 
It can hack Windows 7 password faster than other Windows password cracker tool without any damage to your computer data and settings and its password recovery rate is 100% guaranteed.

How to hack Windows 7 password with Windows Password Breaker? It takes you less than 5 minutes in 5 steps as follows:
Step 1. Download and install Windows Password Breaker.

Step 2. Burn a bootable password reset CD/DVD/USB drive.

Step 3. Boot your locked computer form the CD/DVD/USB.

Step 4. Remove Windows 7 password under DOS.

Step 5. Log on computer without password.

Windows 7 password cracker: Windows Password Unlocker
Windows Password Unlocker is efficient Windows 7 password recovery software available for you. Similar to Windows Password Breaker, it is allows you to burn a bootable password reset CD/DVD/USB flash drive to instantly crack Windows 7 password. But what is different is that this program enables you to reset password under Win PE instead of DOS. It comes with intuitive GUI interface and allows you to complete password hack within a few clicks. So this application is especially favored by those who have little computer knowledge. Of course, its password recovery rate is also 100% guaranteed.

Crack Windows 7 password with Ophcrack:
Ophcrack is a free Windows password cracker that cracks Windows 7 passwords by using LM hashes through rainbow tables. It is a very efficient implementation of rainbow tables done by the inventors of the method. It comes with a Graphical User Interface and runs on multiple platforms. Please note that passwords greater than 14 characters cannot be cracked.
Step 1. Download LiveCD version of Ophcrack for Windows 7

Step 2. Burn the downloaded ISO file to CD.

Step 3. Insert the CD in your locked computer and rebooting 
the computer.

Step 4. When the computer is booting you will need to press the correct key to get you into the Boot Menu. It is usually F10 or Delete.

Step 5. Once in the boot menu select the disk drive that the CD is in. Now follow the on screen directions. After it gets to the menu press the “Crack” button to crack Windows 7 password.

If you are not good at computer, it is not advised to try this to crack your Windows 7 password.
When you happened to forgot Windows 7 password, you can choose one password cracker above for your Windows 7 password hack.

Monday, August 15, 2011

INDIAN INDEPENDENCE

From the bhargav's ultimate blog happy independence day to all and here comes the indian national anthem 

Jana gaṇa mana adhināyaka jaya he
Bhārata bhāgya bidhātā
Pañjāba Sindhu Gujarāṭa Marāṭhā
Drāviḍa Utkala Baṅga
Bindhya Himācala Yamunā Gaṅgā
Ucchala jaladhi taraṅga
Taba śubha nāme jāge
Taba śubha āśiṣa māge
Gāhe taba jaya gāthā
Jana gaṇa maṅgala dāyaka jaya he
Bhārata bhāgya bidhāta
Jaya he jaya he jaya he
Jaya jaya jaya jaya he!
to all the Indians
in brief Indians fought alot for the independence from the British who ruled us nearly 200 years, one man made it possible and unified all Indians towards the Indian independence he is none other than father of India MAHATMA GANDHI a salute to him, Indians are today everywhere in every field, but the politics of India is ever deteriorating in terms of scams apart from that India is great many foriegn companies depend on Indians.
a small video for all indians 
here it goes

i for sure can assure that you feel great about this video


Sunday, August 14, 2011

Fastest android phones


In the early days of Android, most devices featured the same 528 MHz ARM11 Qualcomm processor and their performance levels were pretty comparable. It was not until Verizon launched the Motorola Droid that we began to see the next generation of chipsets being used, which offered new features like enhanced graphics processors.

Fast forward to today and we now have three major chipsets being used in high-end Android phones. HTC is using the Qualcomm Snapdragon, while Motorola has chosen the Texas Instruments OMAP, and Samsung has designed their own Hummingbird chipset.

All of these processors are based off a similar ARM Cortex-A8 architecture, but each one has been tweaked to offer unique features.

The Qualcomm Snapdragon was the first chipset to bring 1 GHz speeds to Android, but it has the slowest GPU of the three. We have measured this in graphics benchmarks and it has the lowest performance in 3D games (when compared to other 1 GHz chipsets). Qualcomm is hard at work producing a dual-CPU Snapdragon, but no products that use the new chipset have been announced.

Samsung and Texas Instruments have a step up on Qualcomm because they just released their own 1 GHz processors which are based on a 45nm process and utilize faster PowerVR graphics processors from Imagination Technology.

To summarize, the three high-end chipsets being used in Android phones are:

Qualcomm: 1 GHz 65nm Cortex-A8 + Adreno GPU
Texas Instruments: 1 GHz 45nm Cortex-A8 + PowerVR SGX530
Samsung: 1 GHz 45nm Cortex-A8 + PowerVR SGX540
So which Android phones perform the fastest? I wish there was a simple answer, but it depends on a variety of factors including display resolutions, memory, and the version of Android that is installed.

To get a better idea of how the different phones stack up, one turn to Quadrant Professional from Aurora Softworks. A free version of this benchmark was available on the Android Market, but the new versions are only found at alternative app-store SlideME.

The phones that have the software today include:

HTC Magic (CM6 RC1) – 528 MHz Qualcomm MSM7200
Motorola Droid – 550 MHz OMAP3430
HTC EVO – 1 GHz Snapdragon QSD8650
HTC Nexus One (Android 2.2) – 1 GHz Snapdragon QSD8250
Samsung Captivate – 1 GHz Hummingbird S5PC110
Motorola Droid X – 1 GHz OMAP3640
All phones are running unmodified versions of the firmware, except for the HTC Magic which has CyanogenMod 6 installed
cpu test: 

memory test:



i/o tests:
graphics test:
final comparisions/scores:
conclusions:
nexus one is at its top unbeatable, so it is the best android one can buy.

Thursday, August 11, 2011

The most famous ways of attacking computers


-: Privacy Attacks :-


Here attacker uses various automated tools which are freely available on the internet. Some of them are as follows:


1) Trojan :- Trojan is a Remote Administration Tool (RAT) which enable attacker to execute various software and hardware instructions on the target system.


Most trojans consist of two parts -
a) The Server Part :- It has to be installed on the the victim's computer.
b) The Client Part :- It is installed on attacker's system. This part gives attacker complete control over target computer.


Netbus, Girlfriend, sub7, Beast, Back Orifice are some of the popular trojans.


2) Keylogger :- Keyloggers are the tools which enable attacker to record all the keystrokes made by victim and send it's logs secretly to the attacker's e-mail address which is previously set by him.


Almost all the Trojans have keylogging function.


Use of latest updated antirus-firewall, detect the presence of trojan and remove it permanently.


3) Spyware :- Spyware utilities are the malicious programs that spy on the activities of victim, and covertly pass on the recorded information to the attacker without the victim's consent. Most spyware utilities monitor and record the victim's internet-surfing habits. Typically, a spyware tool is built into a host .exe file or utility. If a victim downloads and executes an infected .exe file, then the spyware becomes active on the victim's system.
Spyware tools can be hidden both in .exe files an even ordinary cookie files.
Most spyware tools are created and released on the internet with the aim of collecting useful information about a large number of Internet users for marketing and advertising purposes. On many occasions, attacker also use spyware tools for corporate espionage and spying purposes.


4) Sniffer :- Sniffers were originally developed as a tool for debugging/troubleshooting network problems.
The Ethernet based sniffer works with network interface card (NIC) to capture interprete and save the data packets sent across the network.
Sniffer can turn out to be quite dangerous. If an attacker manages to install a sniffer on your system or the router of your network, then all data including passwords, private messages, company secrets, etc. get captured.


Recommended  Tools
Snort       http://www.snort.org


Ethereal        http://www.ethereal.com






Tuesday, August 2, 2011

4-D film


4-D film (sometimes written as 4D film) is a marketing term that describes an entertainment presentation system combining a 3-D film with physical effects in the theatre, which occur in synchronization with the film (note that 4-D films are not actually 4-dimensional). Because the physical effects can be expensive to install, 4-D films are usually presented only at special venues such as theme parks and amusement parks. However, in Mexico, Nepal, South Korea and India, some movie theatres also have the ability to present a 4-D film and the film Avatar was one of 10 films that have received the treatment, starting with Journey to the Center of the Earth.[1] Some of the effects simulated in 4-D films include rain, wind, strobe lights, and vibration. The use of water sprays and air jets is also common. A 4-D film is not shown in a motion simulator, although some seats in 4-D venues vibrate or may move a few inches during the presentation.
Due to the fast growth of movies, video, and the entertainment industry, 3D Theatres have been enhanced by the addition of special simulations. The combination of 3D movies with chair movement (vibration, sway, tilt, drop, wave motion, or movement in any direction) and other chair effects such as wind blowing, water spraying, leg and back ticklers is usually considered a 4D experience. Using additional hall effects such as smoke, rain, lightning, air bubbles and special smells (for example fireworks smell at the London Eye's Experience and gassy smells when the stinkbug sprays it at It's Tough to be a bug) is often regarded by many as 5D. However, since there is no standard for using these terms, each company uses its own terminology and it is often confusing. It is important to disregard the marketing slogans (4-5-6-7D) used by different companies and check what is exactly offered for both the visual and sensory experience. .
Films and places that showed 4-d films:

  • The Sensorium (1984), at Six Flags Power Plant, Baltimore, MD (the first 4-D film)
  • Captain EO (1986), at Epcot, Disneyland, Disneyland Paris and Tokyo Disneyland
  • Jim Henson's Muppet*Vision 3D (1991), at Disney's Hollywood Studios and Disney's California Adventure
  • Honey, I Shrunk the Audience (1994), at Epcot, Disneyland, Disneyland Paris, Warner Bros. Movie World and Tokyo Disneyland, where it is known as MicroAdventure
  • Terminator 2 3D: Battle Across Time (1996), at Universal Studios Florida, Universal Studios Hollywood and Universal Studios Japan
  • It's Tough To Be A Bug (1998), at Disney's Animal Kingdom and Disney's California Adventure
  • PandaDroom (2002), at the Efteling, Netherlands
  • Mickey's PhilharMagic (2003), at Magic Kingdom and Hong Kong Disneyland and Tokyo Disneyland
  • Pirates 4D (1999), at Busch Gardens Africa, SeaWorld San Antonio, Thorpe Park in the UK, Enchanted Kingdom in the Philippines, Sentosa Singapore and Phantasialand
  • Haunted Lighthouse (2003), (aka R.L. Stine's Haunted Lighthouse 4-D) at Flamingo Land Theme Park and Zoo
  • Shrek 4-D (2003), at Universal Studios Florida, Universal Studios Hollywood, Warner Bros. Movie World, Universal Studios Japan, and Universal Studios Singapore
  • SpongeBob SquarePants 4-D (2002, 2006), at Six Flags over Texas, Moody Gardens, Shedd Aquarium, Adventure Dome, Six Flags Great Adventure, Movie Park Germany, Adventure Aquarium, Kings Dominion, Noah's Ark Waterpark (formerly at Paramount Parks),Pier 39, and Indianapolis Zoo
  • Fly Me to the Moon (2008), at Six Flags over Texas
  • Journey to the Center of the Earth in 4-D (2008), at Stone Mountain Park and Dollywood
  • Pokemon 4-D: Pikachu's Ocean Adventure (2008) at Jordan's in Avon, Massachusetts
  • Avatar in 4-D (2009), in South Korea
  • London Eye 4D Experience (2009), at London Eye
  • Pirates of the Caribbean: On Stranger Tides (2011) Cinépolis 4DX Theater, Mexico City, Guadalajara, Monterrey
  • Kung Fu Panda 2 (2011) Cinépolis 4DX Theater, Mexico City, Guadalajara, Monterrey
  • Transformers: Dark of the Moon (2011) Cinépolis 4DX Theater, Mexico City, Guadalajara, Monterrey, and South Korea
  • Star Tours II (2011) at Disneyland and Disney's Hollywood Studios
  • Shalem, a 3000-year-old guide to Jerusalem's history at the Jerusalem Time Elevator, Jerusalem[2]
  • Spy Kids: All the Time in the World (2011)
source:Wikipedia, the free encyclopedia

Saturday, July 23, 2011

Vodafone hack for free GPRS (mobile internet)


This method has been tested on different mobiles and has been confirmed to be working.
Followng are the Settings you require to configure on your Mobile:


Account Name: Vodafone_gprs
Homepage: http://live.vodafone.in
User Name: (no need)
Pass: (no need)


Access Point Settings :-
Proxy: Enabled
Proxy Address: 10.10.1.100
Proxy Port: 9401
Data Bearer: Packet Data


Bearer Settings :-
Packet Data Access Point: portalnmms
Network type: IPV4
Authentication: normal
User Name: (no need)
Password: (no need)


*IF that happen this settings is not working then change the proxy port number to:-


Proxy Port: 9401

Sunday, July 17, 2011

World's greatest hacks


Before hacking, some of us may be amazed to know about the people who first hacked things like telephones, main frames, worm creators, 
hacking came into existance by the hacking telephones, changing their frequencies etc....................................
the world's greatest hacks till date are mentioned below.......
In 1972, John T. Draper discovered he could make free long-distance phone calls using a whistle from a Cap'n Crunch cereal box. The whistle emitted a 2,600-hertz tone that got him into the internal authorization system at the phone company.
With another noisy device known as a blue box, Draper -- soon to be known as "Cap'n Crunch" -- made it possible for many to reach out and touch someone without having to pay for the privilege.
And so was born the modern technology hack. It certainly wasn't the first effort to rig something up to avoid conventional protocols, but it definitely helped trigger a decades-long, sometimes-underground movement to maneuver through security, avoid paying for things, and even cause some malicious damage here and there.
The recent spate of security breaches and e-mail invasions including Monday's news trilogy -- the World Economic Forum hack, the JavaScript email wiretapping scare, and the hole discovered in the protocol that is supposed to secure data transmitted wirelessly -- recalls some of the most infamous exploits of the past.
Here, then, is one observer's list of The Greatest Hacks of All Time.
Captain Zap: Ian Murphy, known to his friends as Captain Zap, was the first cracker to be triedand convicted and tried as felon. Murphy broke into AT&T's computers in 1981and changed  the internal clocks that metered billing rates. People were getting  late-night discount rates when they called at midday.
Of course, the bargain-seekers who waited until midnight to call long distance were hit with high bills.
Murphy, now the chairman of IAM/Secure Data System, was the inspiration for the movie "Sneakers."
The Morris Worm: On nov. 2,1998, Robert Tappan Morris released a worm that brought down one-tenth of the internet -- which back then meant he crippled more than 6,000 computer systems.
Named the Morris Worm, this exploit inspired the founding of a governmental anticyber-terrorism team, CERT (Computer Emergency Response Team), to deal with future Morris worms.
Morris made the mistake of chatting about his worm for months before he actually released it on the Internet, so it didn't take long for the police to track him down.
Morris was one of the first to be tried and convicted under the Computer Fraud and Abuse Act, but he only had to perform community service and pay a fine, since the argument was made that the worm didn't destroy the contents of affected computers.
Morris said it was just a stunt, and added that he truly regretted wreaking $15 million worth of damage. That's what it cost to de-worm the machines his critter had penetrated.
Morris's father, Robert Morris Sr., was at the time a computer security expert with the National Security Agency.
The MOD and LOD Squads: In 1993, the Masters Of Deception (MOD) were the first crackers ever to get busted via wiretaps.
The MOD were mostly Phone Phreaks: folks who had fun with the telephone system. They were famous for figuring out ways to avoid paying for long-distance calls, and could listen in on private conversations, and create huge party lines that allowed many people to chat to each other at one time.
MOD also hacked its way into many a database, including those belonging to the National Security Agency, AT&T, and the Bank of America. They also accessed credit-record reporting agency TRW's computer system, and were able to gain access to credit reports of the rich and famous.
MOD was also famous for the wars they engaged in with the Legion of Doom (LOD), another cracker group that had the reputation of being the headquarters for the most elite hackers.
Due to internal struggles among the members, the infamous cracker Phiber Optik left LOD and formed MOD. The groups then battled each other for the crown of Cracker King for years, until most of them got busted in 1993.
Many say that MOD members would not have gotten caught if they hadn't been competing against LOD; the war made them less cautious than they should have been.
Kevin Mitnick: Snagged by the FBI on Feb. 15, 1995, Kevin Mitnick was the very first person to be convicted of gaining access to an interstate computer network for criminal purposes. He was also the first cracker to have his face appear on an FBI "Most Wanted" poster.
Mitnick was charged with stealing at least $1 million worth of sensitive project data from computer systems, snagging thousands of credit card numbers from online databases, breaking into the California motor vehicles database, and remotely controlling New York and California's telephone switching hubs on various occasions -- and he also possessed the uncanny ability to convince home phones that they were really pay phones.
He has, however, denied cracking the NORAD (North American Air Defense) Command computer, a crack that was widely credited to him, and inspired the movie War Games.
Mitnick was also a champ at what hackers refer to as social engineering, gathering information simply by asking people for it. Many times the passwords he used to enter computer networks were provided by the systems administrators of those networks, who had been convinced that Mitnick had good reasons for needing the passwords.
The Great Bank Robbery: The year 1995 also marked the great Citibank heist, when Vladimir Levin, a graduate of St. Petersburg Tekhnologichesky University, convinced Citibank's computers to transfer $10 million from its customers' accounts to Levin's. Interpol caught up with him at Heathrow Airport and Citibank got most of the money back.
Viruses of destruction: The writers of the two worst e-mail viruses of the 20th century are not heralded as daring crackers. The writers of the LoveBug, which knocked out scores of computer networks last May, were traced to Manila's AMA Computer College, and the investigation sort of fizzled out from there.
Melissa, which stuck in April 1999 -- clobbering 300 companies and affecting more than 100,000 e-mail users within hours of its release -- handily gained a bit of notoriety for its creator, David Smith.
Script Kiddies: Perhaps you need a snappy name to get fame nowadays. In February 2000, a Canadian kid who went by the name MafiaBoy was arrested for launching a denial-of-service attack that brought down many of the Internet's largest sites.
MafiaBoy managed to cripple Amazon, eBay and Yahoo during the week of Feb. 6 and Feb. 14, 2000.
Despite the claims of his lawyer, Yan Romanowski, that "If (MafiaBoy) had used all his powers, he could have done unimaginable damage," it's widely agreed that MafiaBoy was neither ingenious or creative -- he simply ran a computer script that clogged networks full of garbage data.
MafiaBoy gained illegal access to 75 computers in 52 different networks and planted a DoS tool on them which he then activated and used to attack 11 Internet sites by sending up to 10,700 phony information requests in 10 seconds.
The white hats: And lest we forget, for every cracker who rummages around in systems for personal gain or fun, there's also a hacker who rummages in systems and comes back with something cool to share with the world.
Famous white-hat hackers include Richard Stallman, who founded the Free Software Foundation and promoted the idea that software should come complete with its source code; Steve Wozniak, who decided to build a computer because he couldn't afford one, and came up with the first Apple personal computer; and Linus Torvalds, who cobbled together the Linux kernel as a hobby.
personally my inspirations are Kevin mitnick and Robert Pattan Morris, they were caught hacking and inducing worms but they were transformed into a writer and a professor respectively...........................
enjoy the post.......
follow my blog if you like the posts.......................

Saturday, July 16, 2011

A best website for learning HTML, XHTML,CSS, SQL, ASP and many other computer languages: w3schools

friends lately i've learned HTML on this website, the website is http://www.w3schools.com,
the website has best view and it provides a try it yourself online editor which is very great to our own examples and the site also provides a lot of examples and it also provides certificates online on paying money

i found this website perfect for learning computer languages online such as 
HTML Tutorials:
Learn HTML
Learn HTML5
Learn XHTML
Learn CSS
Learn CSS3
Learn TCP/IP

Browser Scripting Languages:
Learn JavaScript
Learn HTML DOM
Learn DHTML
Learn VBScript
Learn AJAX
Learn jQuery
Learn E4X

XML Tutorials:
Learn XML
Learn DTD
Learn XML DOM
Learn XSLT
Learn XPath
Learn XQuery
Learn XLink
Learn XPointer
Learn Schema
Learn XSL-FO
Learn XForms

Server Scripting Languages:
Learn SQL
Learn ASP
Learn ADO
Learn PHP
Learn ASP.NET
Learn Razor
Learn .NET Mobile

Web Services:
Learn Web Services
Learn WSDL
Learn SOAP
Learn RSS
Learn RDF

Multimedia:
Learn Media
Learn SMIL
Learn SVG

Web site creations:
Web Building
Web Building
Web Browsers
Web Certification
Web Hosting
Web W3C
Web Quality
Web Semantic

enjoy have fun learning 
the source of the above post is http://www.w3schools.com
follow my blog if you like my stuff

Difference between Computer Virus, Worm and Trojan Horse

Viruses, worms and Trojan Horses are all malicious programs that can cause damage to your computer, but there are differences among the three.

        One common mistake that people make when the topic of a computer virus arises is to refer to a worm or Trojan horse as a virus. While the words Trojan, worm and virus are often used interchangeably, they are not exactly the same thing. 

     Viruses, worms and Trojan Horses are all malicious programs that can cause damage to your computer, but there are differences among the three, and knowing those differences can help you better protect your computer from their often damaging effects.

What Is a Virus?
A computer virus attaches itself to a program or file enabling it to spread from one computer to another, leaving infections as it travels. Like a human virus, a computer virus can range in severity: some may cause only mildly annoying effects while others can damage your hardware, software or files. Almost all viruses are attached to an executable file, which means the virus may exist on your computer but it actually cannot infect your computer unless you run or open the malicious program. It is important to note that a virus cannot be spread without a human action, (such as running an infected program) to keep it going. Because a virus is spread by human action people will unknowingly continue the spread of a computer virus by sharing infecting files or sending emails with viruses as attachments in the email.

What Is a Worm?
A worm is similar to a virus by design and is considered to be a sub-class of a virus. Worms spread from computer to computer, but unlike a virus, it has the capability to travel without any human action. A worm takes advantage of file or information transport features on your system, which is what allows it to travel unaided.
The biggest danger with a worm is its capability to replicate itself on your system, so rather than your computer sending out a single worm, it could send out hundreds or thousands of copies of itself, creating a huge devastating effect. One example would be for a worm to send a copy of itself to everyone listed in your e-mail address book. Then, the worm replicates and sends itself out to everyone listed in each of the receiver's address book, and the manifest continues on down the line. 
Due to the copying nature of a worm and its capability to travel across networks the end result in most cases is that the worm consumes too much system memory (or network bandwidth), causing Web servers, network servers and individual computers to stop responding. In recent worm attacks such as the much-talked-about Blaster Worm, the worm has been designed to tunnel into your system and allow malicious users to control your computer remotely.

What Is a Trojan horse?
A Trojan Horse is full of as much trickery as the mythological Trojan Horse it was named after. The Trojan Horse, at first glance will appear to be useful software but will actually do damage once installed or run on your computer.  Those on the receiving end of a Trojan Horse are usually tricked into opening them because they appear to be receiving legitimate software or files from a legitimate source.  When a Trojan is activated on your computer, the results can vary. Some Trojans are designed to be more annoying than malicious (like changing your desktop, adding silly active desktop icons) or they can cause serious damage by deleting files and destroying information on your system. Trojans are also known to create a backdoor on your computer that gives malicious users access to your system, possibly allowing confidential or personal information to be compromised. Unlike viruses and worms, Trojans do not reproduce by infecting other files nor do they self-replicate.

Tuesday, July 12, 2011

The Google+ project

After all the google targeted the facebook it's active competitor right now. After the fall of the greatest Orkut which ruled till 2010, the Google has been in search of it's profits, it produced the famous Android software in the market which is a greatest hit till date, till date Google earned 700 patents in just 4 months, which tells their determination.


About the famous Google's google+ project:
Google+ (also known as Google Plus) is a social networking service operated by Google Inc. The service launched on June 28, 2011 in an invite-only testing phase. The following day, existing users were allowed to invite friends, who are above 18 years of age, to the service to create their own accounts. However, this was quickly suspended a day after there was "insane demand" for accounts.
Google+ integrates social services such as Google Profiles and Google Buzz, and introduces new services Circles, Hangouts, Sparks, and Huddles. Google+ will also be available as a desktop application and as a mobile application, but only on Android and iOS operating systems. Sources such as The New York Times have declared it Google's biggest attempt to rival the social network Facebook, which had over 750 million users in 2011.
The very new features of the Google+:

Many features of Google+ are similar to those of other social networking sites such as Facebook and LinkedIn[citation needed]. The way Google+ displays notifications, unread notifications, and links to posts is also similar to Facebook Notifications[citation needed].
"Circles" enables users to organize contacts into groups for sharing, across various Google products and services. Although other users can view a list of people in a user's collection of circles, they cannot view the names of those circles. The privacy settings also allows users to hide the users in their circles as well as who has them in their circle. Organization is done through a drag-and-drop interface. This system replaces the typical friends list function used by sites such as Facebook.
"Huddle" is a feature available to Android, iPhone, and SMS devices for communicating through instant messaging within circles.
"Hangouts" are places used to facilitate group video chat (with a maximum of 10 people participating in a single Hangout at any point of time). However, anyone on the web could potentially join the 'Hangout' if they happen to possess the unique URL of the Hangout.
"Instant Upload" is specific to Android mobile devices; it stores photos or video in a private album for sharing later.
"Sparks" is a front-end to Google Search, enabling user to identify topics they might be interested in sharing with others; "featured interests" sparks are also available, based on topics others globally are finding interesting.
Through "Streams," users see updates from those in their circles, updates similar to Facebook's news feed. The input box allows users to enter a status update or use icons to upload and share photo and videos.
"+1" button similar to 'like' button in facebook

The very introduction of the Google+:
The introduction of Google+ has had an impact on the design of Google's web search service, due to the graphical redesign (mistakenly attributed to Andy Hertzfeld).
There have been refinements alongside speculation of a much wider impact once Google+ is fully rolled-out, including some redesign of Google Maps, Google Mail and Google Calendar.
In particular, there are changes to Picasa Web Albums:
After tagging someone, they receive a notification and can see the photo and the related album.
For new albums, anyone an album is shared with can see who else it is shared with.
Albums someone shared can be tagged and re-shared by others.
Photos up to 2048×2048 pixels and videos up to 15 minutes won't count towards the 1 GB storage quota for Google+ users (it's 800×800 pixels for non-Google+ users), creating "virtually unlimited" storage for mobile users
The very countries that blocked the Google+:
Within a day of the website's launch, various news agencies reported that Google+ was blocked by People's Republic of China.[10] This is part of a wider policy of censorship in Mainland China. The Iranian government has also blocked access to Google+ from 11 July 2011.
read the stuff enjoy.......
follow my blog if you like the stuff

Comments

blog comments powered by Disqus