Saturday, July 23, 2011

Vodafone hack for free GPRS (mobile internet)


This method has been tested on different mobiles and has been confirmed to be working.
Followng are the Settings you require to configure on your Mobile:


Account Name: Vodafone_gprs
Homepage: http://live.vodafone.in
User Name: (no need)
Pass: (no need)


Access Point Settings :-
Proxy: Enabled
Proxy Address: 10.10.1.100
Proxy Port: 9401
Data Bearer: Packet Data


Bearer Settings :-
Packet Data Access Point: portalnmms
Network type: IPV4
Authentication: normal
User Name: (no need)
Password: (no need)


*IF that happen this settings is not working then change the proxy port number to:-


Proxy Port: 9401

Sunday, July 17, 2011

World's greatest hacks


Before hacking, some of us may be amazed to know about the people who first hacked things like telephones, main frames, worm creators, 
hacking came into existance by the hacking telephones, changing their frequencies etc....................................
the world's greatest hacks till date are mentioned below.......
In 1972, John T. Draper discovered he could make free long-distance phone calls using a whistle from a Cap'n Crunch cereal box. The whistle emitted a 2,600-hertz tone that got him into the internal authorization system at the phone company.
With another noisy device known as a blue box, Draper -- soon to be known as "Cap'n Crunch" -- made it possible for many to reach out and touch someone without having to pay for the privilege.
And so was born the modern technology hack. It certainly wasn't the first effort to rig something up to avoid conventional protocols, but it definitely helped trigger a decades-long, sometimes-underground movement to maneuver through security, avoid paying for things, and even cause some malicious damage here and there.
The recent spate of security breaches and e-mail invasions including Monday's news trilogy -- the World Economic Forum hack, the JavaScript email wiretapping scare, and the hole discovered in the protocol that is supposed to secure data transmitted wirelessly -- recalls some of the most infamous exploits of the past.
Here, then, is one observer's list of The Greatest Hacks of All Time.
Captain Zap: Ian Murphy, known to his friends as Captain Zap, was the first cracker to be triedand convicted and tried as felon. Murphy broke into AT&T's computers in 1981and changed  the internal clocks that metered billing rates. People were getting  late-night discount rates when they called at midday.
Of course, the bargain-seekers who waited until midnight to call long distance were hit with high bills.
Murphy, now the chairman of IAM/Secure Data System, was the inspiration for the movie "Sneakers."
The Morris Worm: On nov. 2,1998, Robert Tappan Morris released a worm that brought down one-tenth of the internet -- which back then meant he crippled more than 6,000 computer systems.
Named the Morris Worm, this exploit inspired the founding of a governmental anticyber-terrorism team, CERT (Computer Emergency Response Team), to deal with future Morris worms.
Morris made the mistake of chatting about his worm for months before he actually released it on the Internet, so it didn't take long for the police to track him down.
Morris was one of the first to be tried and convicted under the Computer Fraud and Abuse Act, but he only had to perform community service and pay a fine, since the argument was made that the worm didn't destroy the contents of affected computers.
Morris said it was just a stunt, and added that he truly regretted wreaking $15 million worth of damage. That's what it cost to de-worm the machines his critter had penetrated.
Morris's father, Robert Morris Sr., was at the time a computer security expert with the National Security Agency.
The MOD and LOD Squads: In 1993, the Masters Of Deception (MOD) were the first crackers ever to get busted via wiretaps.
The MOD were mostly Phone Phreaks: folks who had fun with the telephone system. They were famous for figuring out ways to avoid paying for long-distance calls, and could listen in on private conversations, and create huge party lines that allowed many people to chat to each other at one time.
MOD also hacked its way into many a database, including those belonging to the National Security Agency, AT&T, and the Bank of America. They also accessed credit-record reporting agency TRW's computer system, and were able to gain access to credit reports of the rich and famous.
MOD was also famous for the wars they engaged in with the Legion of Doom (LOD), another cracker group that had the reputation of being the headquarters for the most elite hackers.
Due to internal struggles among the members, the infamous cracker Phiber Optik left LOD and formed MOD. The groups then battled each other for the crown of Cracker King for years, until most of them got busted in 1993.
Many say that MOD members would not have gotten caught if they hadn't been competing against LOD; the war made them less cautious than they should have been.
Kevin Mitnick: Snagged by the FBI on Feb. 15, 1995, Kevin Mitnick was the very first person to be convicted of gaining access to an interstate computer network for criminal purposes. He was also the first cracker to have his face appear on an FBI "Most Wanted" poster.
Mitnick was charged with stealing at least $1 million worth of sensitive project data from computer systems, snagging thousands of credit card numbers from online databases, breaking into the California motor vehicles database, and remotely controlling New York and California's telephone switching hubs on various occasions -- and he also possessed the uncanny ability to convince home phones that they were really pay phones.
He has, however, denied cracking the NORAD (North American Air Defense) Command computer, a crack that was widely credited to him, and inspired the movie War Games.
Mitnick was also a champ at what hackers refer to as social engineering, gathering information simply by asking people for it. Many times the passwords he used to enter computer networks were provided by the systems administrators of those networks, who had been convinced that Mitnick had good reasons for needing the passwords.
The Great Bank Robbery: The year 1995 also marked the great Citibank heist, when Vladimir Levin, a graduate of St. Petersburg Tekhnologichesky University, convinced Citibank's computers to transfer $10 million from its customers' accounts to Levin's. Interpol caught up with him at Heathrow Airport and Citibank got most of the money back.
Viruses of destruction: The writers of the two worst e-mail viruses of the 20th century are not heralded as daring crackers. The writers of the LoveBug, which knocked out scores of computer networks last May, were traced to Manila's AMA Computer College, and the investigation sort of fizzled out from there.
Melissa, which stuck in April 1999 -- clobbering 300 companies and affecting more than 100,000 e-mail users within hours of its release -- handily gained a bit of notoriety for its creator, David Smith.
Script Kiddies: Perhaps you need a snappy name to get fame nowadays. In February 2000, a Canadian kid who went by the name MafiaBoy was arrested for launching a denial-of-service attack that brought down many of the Internet's largest sites.
MafiaBoy managed to cripple Amazon, eBay and Yahoo during the week of Feb. 6 and Feb. 14, 2000.
Despite the claims of his lawyer, Yan Romanowski, that "If (MafiaBoy) had used all his powers, he could have done unimaginable damage," it's widely agreed that MafiaBoy was neither ingenious or creative -- he simply ran a computer script that clogged networks full of garbage data.
MafiaBoy gained illegal access to 75 computers in 52 different networks and planted a DoS tool on them which he then activated and used to attack 11 Internet sites by sending up to 10,700 phony information requests in 10 seconds.
The white hats: And lest we forget, for every cracker who rummages around in systems for personal gain or fun, there's also a hacker who rummages in systems and comes back with something cool to share with the world.
Famous white-hat hackers include Richard Stallman, who founded the Free Software Foundation and promoted the idea that software should come complete with its source code; Steve Wozniak, who decided to build a computer because he couldn't afford one, and came up with the first Apple personal computer; and Linus Torvalds, who cobbled together the Linux kernel as a hobby.
personally my inspirations are Kevin mitnick and Robert Pattan Morris, they were caught hacking and inducing worms but they were transformed into a writer and a professor respectively...........................
enjoy the post.......
follow my blog if you like the posts.......................

Saturday, July 16, 2011

A best website for learning HTML, XHTML,CSS, SQL, ASP and many other computer languages: w3schools

friends lately i've learned HTML on this website, the website is http://www.w3schools.com,
the website has best view and it provides a try it yourself online editor which is very great to our own examples and the site also provides a lot of examples and it also provides certificates online on paying money

i found this website perfect for learning computer languages online such as 
HTML Tutorials:
Learn HTML
Learn HTML5
Learn XHTML
Learn CSS
Learn CSS3
Learn TCP/IP

Browser Scripting Languages:
Learn JavaScript
Learn HTML DOM
Learn DHTML
Learn VBScript
Learn AJAX
Learn jQuery
Learn E4X

XML Tutorials:
Learn XML
Learn DTD
Learn XML DOM
Learn XSLT
Learn XPath
Learn XQuery
Learn XLink
Learn XPointer
Learn Schema
Learn XSL-FO
Learn XForms

Server Scripting Languages:
Learn SQL
Learn ASP
Learn ADO
Learn PHP
Learn ASP.NET
Learn Razor
Learn .NET Mobile

Web Services:
Learn Web Services
Learn WSDL
Learn SOAP
Learn RSS
Learn RDF

Multimedia:
Learn Media
Learn SMIL
Learn SVG

Web site creations:
Web Building
Web Building
Web Browsers
Web Certification
Web Hosting
Web W3C
Web Quality
Web Semantic

enjoy have fun learning 
the source of the above post is http://www.w3schools.com
follow my blog if you like my stuff

Difference between Computer Virus, Worm and Trojan Horse

Viruses, worms and Trojan Horses are all malicious programs that can cause damage to your computer, but there are differences among the three.

        One common mistake that people make when the topic of a computer virus arises is to refer to a worm or Trojan horse as a virus. While the words Trojan, worm and virus are often used interchangeably, they are not exactly the same thing. 

     Viruses, worms and Trojan Horses are all malicious programs that can cause damage to your computer, but there are differences among the three, and knowing those differences can help you better protect your computer from their often damaging effects.

What Is a Virus?
A computer virus attaches itself to a program or file enabling it to spread from one computer to another, leaving infections as it travels. Like a human virus, a computer virus can range in severity: some may cause only mildly annoying effects while others can damage your hardware, software or files. Almost all viruses are attached to an executable file, which means the virus may exist on your computer but it actually cannot infect your computer unless you run or open the malicious program. It is important to note that a virus cannot be spread without a human action, (such as running an infected program) to keep it going. Because a virus is spread by human action people will unknowingly continue the spread of a computer virus by sharing infecting files or sending emails with viruses as attachments in the email.

What Is a Worm?
A worm is similar to a virus by design and is considered to be a sub-class of a virus. Worms spread from computer to computer, but unlike a virus, it has the capability to travel without any human action. A worm takes advantage of file or information transport features on your system, which is what allows it to travel unaided.
The biggest danger with a worm is its capability to replicate itself on your system, so rather than your computer sending out a single worm, it could send out hundreds or thousands of copies of itself, creating a huge devastating effect. One example would be for a worm to send a copy of itself to everyone listed in your e-mail address book. Then, the worm replicates and sends itself out to everyone listed in each of the receiver's address book, and the manifest continues on down the line. 
Due to the copying nature of a worm and its capability to travel across networks the end result in most cases is that the worm consumes too much system memory (or network bandwidth), causing Web servers, network servers and individual computers to stop responding. In recent worm attacks such as the much-talked-about Blaster Worm, the worm has been designed to tunnel into your system and allow malicious users to control your computer remotely.

What Is a Trojan horse?
A Trojan Horse is full of as much trickery as the mythological Trojan Horse it was named after. The Trojan Horse, at first glance will appear to be useful software but will actually do damage once installed or run on your computer.  Those on the receiving end of a Trojan Horse are usually tricked into opening them because they appear to be receiving legitimate software or files from a legitimate source.  When a Trojan is activated on your computer, the results can vary. Some Trojans are designed to be more annoying than malicious (like changing your desktop, adding silly active desktop icons) or they can cause serious damage by deleting files and destroying information on your system. Trojans are also known to create a backdoor on your computer that gives malicious users access to your system, possibly allowing confidential or personal information to be compromised. Unlike viruses and worms, Trojans do not reproduce by infecting other files nor do they self-replicate.

Tuesday, July 12, 2011

The Google+ project

After all the google targeted the facebook it's active competitor right now. After the fall of the greatest Orkut which ruled till 2010, the Google has been in search of it's profits, it produced the famous Android software in the market which is a greatest hit till date, till date Google earned 700 patents in just 4 months, which tells their determination.


About the famous Google's google+ project:
Google+ (also known as Google Plus) is a social networking service operated by Google Inc. The service launched on June 28, 2011 in an invite-only testing phase. The following day, existing users were allowed to invite friends, who are above 18 years of age, to the service to create their own accounts. However, this was quickly suspended a day after there was "insane demand" for accounts.
Google+ integrates social services such as Google Profiles and Google Buzz, and introduces new services Circles, Hangouts, Sparks, and Huddles. Google+ will also be available as a desktop application and as a mobile application, but only on Android and iOS operating systems. Sources such as The New York Times have declared it Google's biggest attempt to rival the social network Facebook, which had over 750 million users in 2011.
The very new features of the Google+:

Many features of Google+ are similar to those of other social networking sites such as Facebook and LinkedIn[citation needed]. The way Google+ displays notifications, unread notifications, and links to posts is also similar to Facebook Notifications[citation needed].
"Circles" enables users to organize contacts into groups for sharing, across various Google products and services. Although other users can view a list of people in a user's collection of circles, they cannot view the names of those circles. The privacy settings also allows users to hide the users in their circles as well as who has them in their circle. Organization is done through a drag-and-drop interface. This system replaces the typical friends list function used by sites such as Facebook.
"Huddle" is a feature available to Android, iPhone, and SMS devices for communicating through instant messaging within circles.
"Hangouts" are places used to facilitate group video chat (with a maximum of 10 people participating in a single Hangout at any point of time). However, anyone on the web could potentially join the 'Hangout' if they happen to possess the unique URL of the Hangout.
"Instant Upload" is specific to Android mobile devices; it stores photos or video in a private album for sharing later.
"Sparks" is a front-end to Google Search, enabling user to identify topics they might be interested in sharing with others; "featured interests" sparks are also available, based on topics others globally are finding interesting.
Through "Streams," users see updates from those in their circles, updates similar to Facebook's news feed. The input box allows users to enter a status update or use icons to upload and share photo and videos.
"+1" button similar to 'like' button in facebook

The very introduction of the Google+:
The introduction of Google+ has had an impact on the design of Google's web search service, due to the graphical redesign (mistakenly attributed to Andy Hertzfeld).
There have been refinements alongside speculation of a much wider impact once Google+ is fully rolled-out, including some redesign of Google Maps, Google Mail and Google Calendar.
In particular, there are changes to Picasa Web Albums:
After tagging someone, they receive a notification and can see the photo and the related album.
For new albums, anyone an album is shared with can see who else it is shared with.
Albums someone shared can be tagged and re-shared by others.
Photos up to 2048×2048 pixels and videos up to 15 minutes won't count towards the 1 GB storage quota for Google+ users (it's 800×800 pixels for non-Google+ users), creating "virtually unlimited" storage for mobile users
The very countries that blocked the Google+:
Within a day of the website's launch, various news agencies reported that Google+ was blocked by People's Republic of China.[10] This is part of a wider policy of censorship in Mainland China. The Iranian government has also blocked access to Google+ from 11 July 2011.
read the stuff enjoy.......
follow my blog if you like the stuff

Sound barriers

In aerodynamics, the sound barrier usually refers to the point at which an aircraft moves from transonic to supersonic speed. The term came into use during World War II when a number of aircraft started to encounter the effects of compressibility, a collection of several unrelated aerodynamic effects that "struck" their planes like an impediment to further acceleration. By the 1950s, new aircraft designs started to routinely "break" the sound barrier.
This is the image of a jet travelling past a sound barrier, actually a sound barrier occurs when the aircraft (or) so called flight travels beyond the speed of the sound. Generally the MACH flights undergo this sound barrier effect.
More pictures for the sake of your understanding below.....




In the past:

Some common whips such as the bullwhip or sparewhip are able to move faster than sound: the tip of the whip breaks the sound barrier and causes a sharp crack—literally a sonic boom. Firearms since the 19th century have generally had a supersonic muzzle velocity.
The sound barrier may have been first breached in nature some 150 million years ago. Some paleobiologists report that, based on computer models of their biomechanical capabilities, certain long-tailed dinosaurs such as apatosaurus and diplodocus may have possessed the ability to flick their tails at supersonic velocities, possibly used to generate an intimidating booming sound. This finding is theoretical and disputed by others in the field.

The early problems related to sound barriers:

The tip of the propeller on many early aircraft may reach supersonic speeds, producing a noticeable buzz that differentiates such aircraft. This is particularly noticeable on the Stearman, and noticeable on the T-6 Texan when it enters a sharp-breaking turn. This is undesirable, as the transonic air movement creates disruptive shock waves and turbulence. It is due to these effects that propellers are known to suffer from dramatically decreased performance as they approach the speed of sound. It is easy to demonstrate that the power needed to improve performance is so great that the weight of the required engine grows faster than the power output of the propeller. This problem was one of the issues that led to early research into jet engines, notably by Frank Whittle in England and Hans von Ohain in Germany, who were led to their research specifically in order to avoid these problems in high-speed flight.
Propeller aircraft were, nevertheless, able to approach the speed of sound in a dive. This led to numerous crashes for a variety of reasons. These included the rapidly increasing forces on the various control surfaces, which led to the aircraft becoming difficult to control to the point where many suffered from powered flight into terrain when the pilot was unable to overcome the force on the control stick. The Mitsubishi Zero was infamous for this[citation needed] problem, and several attempts to fix it only made the problem worse. In the case of the Supermarine Spitfire, the wings suffered from low torsional stiffness, and when ailerons were moved the wing tended to flex such that they counteracted the control input, leading to a condition known as control reversal. This was solved in later models with changes to the wing. The P-38 Lightning suffered from a particularly dangerous interaction of the airflow between the wings and tail surfaces in the dive that made it difficult to "pull out", a problem that was later solved with the addition of a "dive flap" that upset the airflow under these circumstances. Flutter due to the formation of shock waves on curved surfaces was another major problem, which led most famously to the breakup of de Havilland Swallow and death of its pilot, Geoffrey de Havilland, Jr.
All of these effects, although unrelated in most ways, led to the concept of a "barrier" that makes it difficult for an aircraft to break the speed of sound.
the post is for all the lovers of physics go enjoy reading the stuff....................

Comments

blog comments powered by Disqus