IP

• » ƒяєє ѕρソ 4 υ « •: SOME USEFUL TRICKS

• » ƒяєє ѕρソ 4 υ « •: SOME USEFUL TRICKS

SOME USEFUL TRICKS

Set Processes Priority

Follow this tip to increase the priority of active processes, this will result in prioritisation of processes using the CPU.

CTRL-SHIFT-ESC
1.Go to the second tab called Processes, right click on one of the active processes, you will see the Set Priority option

2.For example, your Run your CDwriter program , set the priority higher, and guess what, no crashed CD’s
Shutdown Trick !

Imidiate rapid shut down window
while shutting down window. open task manager(Ctr+Alt+Del),
Select shut down tab. and press ' Ctrl ' key while select Turn Off from dis tab.
Count 5 4 3 2 1 Voila!!! U r window will rapidly shut down.

-: Password Hacking :-

Password cracking is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password.
Most passwords can be cracked by using following techniques :

1) Hashing :- Here we will refer to the one way function (which may be either an encryption function or cryptographic hash) employed as a hash and its output as a hashed password.
If a system uses a reversible function to obscure stored passwords, exploiting that weakness can recover even 'well-chosen' passwords.
One example is the LM hash that Microsoft Windows uses by default to store user passwords that are less than 15 characters in length.
LM hash breaks the password into two 7-character fields which are then hashed separately, allowing each half to be attacked separately.
Hash functions like SHA-512, SHA-1, and MD5 are considered impossible to invert when used correctly.


2) Guessing :- Many passwords can be guessed either by humans or by sophisticated cracking programs armed with dictionaries (dictionary based) and the user's personal information.
Not surprisingly, many users choose weak passwords, usually one related to themselves in some way. Repeated research over some 40 years has demonstrated that around 40% of user-chosen passwords are readily guessable by programs. Examples of insecure choices include:
* blank (none)
* the word "password", "passcode", "admin" and their derivatives
* the user's name or login name
* the name of their significant other or another person (loved one)
* their birthplace or date of birth
* a pet's name
* a dictionary word in any language
* automobile licence plate number
* a row of letters from a standard keyboard layout (eg, the qwerty keyboard -- qwerty itself, asdf, or qwertyuiop)
* a simple modification of one of the preceding, such as suffixing a digit or reversing the order of the letters.
and so on....
In one survery of MySpace passwords which had been phished, 3.8 percent of passwords were a single word found in a dictionary, and another 12 percent were a word plus a final digit; two-thirds of the time that digit was.
A password containing both uppercase & lowercase characters, numbers and special characters too; is a strong password and can never be guessed.

Check Your Password Strength



3) Default Passwords :- A moderately high number of local and online applications have inbuilt default passwords that have been configured by programmers during development stages of software. There are lots of applications running on the internet on which default passwords are enabled. So, it is quite easy for an attacker to enter default password and gain access to sensitive information. A list containing default passwords of some of the most popular applications is available on the internet.
Always disable or change the applications' (both online and offline) default username-password pairs.

4) Brute Force :- If all other techniques failed, then attackers uses brute force password cracking technique. Here an automatic tool is used which tries all possible combinations of available keys on the keyboard. As soon as correct password is reached it displays on the screen.This techniques takes extremely long time to complete, but password will surely cracked.
Long is the password, large is the time taken to brute force it.

5) Phishing :- This is the most effective and easily executable password cracking technique which is generally used to crack the passwords of e-mail accounts, and all those accounts where secret information or sensitive personal information is stored by user such as social networking websites, matrimonial websites, etc.
Phishing is a technique in which the attacker creates the fake login screen and send it to the victim, hoping that the victim gets fooled into entering the account username and password. As soon as victim click on "enter" or "login" login button this information reaches to the attacker using scripts or online form processors while the user(victim) is redirected to home page of e-mail service provider.
Never give reply to the messages which are demanding for your username-password, urging to be e-mail service provider.

It is possible to try to obtain the passwords through other different methods, such as social engineering, wiretapping, keystroke logging, login spoofing, dumpster diving, phishing, shoulder surfing, timing attack, acoustic cryptanalysis, using a Trojan Horse or virus, identity management system attacks (such as abuse of Self-service password reset) and compromising host security.
However, cracking usually designates a guessing attack.

-: Network Hacking :-

Network Hacking is generally means gathering information about domain by using tools like Telnet, NslookUp, Ping, Tracert, Netstat, etc.
It also includes OS Fingerprinting, Port Scaning and Port Surfing using various tools.

Ping :- Ping is part of ICMP (Internet Control Message Protocol) which is used to troubleshoot TCP/IP networks. So, Ping is basically a command that allows you to check whether the host is alive or not.
To ping a particular host the syntax is (at command prompt)--
c:/>ping hostname.com

example:- c:/>ping www.google.com


Various attributes used with 'Ping' command and their usage can be viewed by just typing c:/>ping at the command prompt.


Netstat :- It displays protocol statistics and current TCP/IP network connections. i.e. local address, remote address, port number, etc.
It's syntax is (at command prompt)--
c:/>netstat -n




Telnet :- Telnet is a program which runs on TCP/IP. Using it we can connect to the remote computer on particular port. When connected it grabs the daemon running on that port.
The basic syntax of Telnet is (at command prompt)--
c:/>telnet hostname.com

By default telnet connects to port 23 of remote computer.
So, the complete syntax is-
c:/>telnet www.hostname.com port

example:- c:/>telnet www.yahoo.com 21 or c:/>telnet 192.168.0.5 21


Tracert :- It is used to trace out the route taken by the certain information i.e. data packets from source to destination.
It's syntax is (at command prompt)--
c:/>tracert www.hostname.com
example:- c:/>tracert www.insecure.in



Here "* * * Request timed out." indicates that firewall installed on that system block the request and hence we can't obtain it's IP address.

various attributes used with tracert command and their usage can be viewed by just typing c:/>tracert at the command prompt.

The information obtained by using tracert command can be further used to find out exact operating system running on target system.

TOP 10 FACEBOOK TIPS

Top 10 Facebook tips
Below is a listing of our top 10 tips for the popular social networking website Facebook.

Hide users, games, polls, etc.

It quickly gets annoying seeing some users posts, game invites, polls, etc. Hovering your mouse to the right of the post and clicking the Hide button as shown below can hide any post. Once this button is pressed you'll be prompted with the option to hide that user or in the case of a Facebook application the option to hide that application from ever showing up on your profile.

Hide Facebook users, games, polls, etc.

To unhide someone or unblock an application click the Edit Options link in the bottom right corner of the news feed as shown below.

Facebook unhide friends

Greasemonkey and FB Purity

Although Facebook does not allow the ability to hide friends getting new friends messages, friends becoming fans of something, and some application messages they can still be hidden with browser add-ons. If you're running Mozilla Firefox, Chrome, Opera, or Safari we suggest installing the Facebook Purity add-on.

Update your privacy settings

Click Account in the top right corner of the Facebook window and then click Privacy settings to adjust who is capable of seeing what on your Facebook profile. We highly recommend going through all the privacy settings to verify your privacy is properly protected.

Anything that is not set to friends only or friends of friends can be seen by anyone searching on the Internet. Below is a few things we recommend for most users.

1. Under Search in Privacy settings uncheck Public Search Results. This will prevent users from finding your account and profile picture in search results such as Google
2. Under Application settings, make sure you're only allowing applications you want to have access to your information. Applications that you grant rights to can have access to your Facebook profile information.

* If you're curious to see how a program or web page connect to the Facebook API can see your profile see Tip135.

Use the Facebook top bar for navigation

Facebook navigation

Knowing how to properly navigate is vital if you want to get the most out of Facebook. Below is a brief description of each of the available options in the top bar as shown above.

Home (facebook logo) - Clicking this logo will take you to your wall (News Feed) that shows all friends recent posts.

Friend requests - If any friend requests are waiting to be approved this icon will show a notification of how many friends are waiting for approval. This icon can also be clicked when you want to view any friend recommendations or search for friends on Facebook.

Messages - This section allows you to send and receive private messages between one or more people you're friends with.

Notifications - Any time a friend or Facebook application creates a new post you'll be notified in this section. Clicking this icon will show all recent notifications. If you wish to change what is capable of sending you notifications including any Facebook applications or games click the See All Notifications link at the bottom and check or uncheck what you want to be notified on.

Search - Finally, the search box in Facebook can be a powerful tool that can be used to quickly find any current friends or people on Facebook. In addition searching for terms such as a company name, product, sports team, music band, etc. will find fan pages and groups that can be joined.

Modify your account notifications

Keep your e-mail and/or your cell phone clean by updating or eliminate Facebook notifications or keep more up-to-date by adding new notifications. Facebook notifications can be added and removed by clicking Account link in the top right corner, then Account Settings, and then clicking the Notifications tab.

Top News and Most Recent

Facebook News and most Recent

By default Facebook will display your wall postings in the News format, which means it only displays posts it believes are most relevant to you. These results are based on your past interaction with your friends. If you want to see every post made by all your friends that are not hidden click the Most recent link in the upper right section of your news feed as shown in the above picture example.

If you want to adjust who shows up manually click the Edit Options in the bottom right corner of your news feed.

Facebook unhide friends

View High School work friends

If you've added your High School and/or previous Work locations to your profile, quickly see all classmates and co-workers on Facebook by clicking the link in your Info tab under your profile.

Quickly change profile picture

Your profile picture can be quickly changed to any other picture by visiting your profile, hovering the mouse over your current profile picture, and clicking the Change Picture link that appears in the top right corner of the picture.

Don't post private information on friend's walls on in comments

When you make a post on a friend's wall or in any of their comments realize that any of their friends are going to be able to see that post. If you wish for something to remain only between you and a friend send them a Facebook message instead.

Suggestions and random friend invites

As you get more friends on Facebook it will begin making friend, groups, and fan suggestions. These are suggestions made by Facebook and not your friends. Unless these are something you're interested in they can be ignored.

This same rule can be applied to people who may want to be your friend that you don't know. If you don't know someone don't accept his or her friend invite. Once someone becomes your friend they'll have access to any information your friends are capable of seeing.

Tag your Facebook friends in your photos

Always make sure to tag any of your Facebook friends that are in pictures you upload. However, never tag someone who is not in the picture. When someone is tagged in a photo that picture is automatically added to that persons profile and is a great way to share pictures with all friends.