Thursday, December 12, 2013

HOW TO TRACE ANY IP ADDRESS AND LOCATION

So, in this post I will show you how to trace any IP address back to it’s source.

In fact, tracing an IP address back to it’s location is a lot simpler than what many people imagine. There exists many online tools using which you can accomplish this job. One of my favorite site is IP2Location.com.
Just go to http://www.ip2location.com and enter the IP address that you want to trace in the dialog box and click on “Find Location”‘. With just a click of a button you can find the following information for any given IP address:

* Country in which the IP is located
* City to which the IP address belongs to
* Latitude/Longitude of the IP’s location
* Zip Code of the region to which the IP belongs to
* Time Zone associated with the IP
* Name of the ISP to which the IP address belong to
* Internet Speed of the computer associated with the IP
* Weather Station associated with the region of the IP
* Domain name associated with the IP address

A sample snapshot of the results from ip2location.com is given below:



You can also visually trace route any IP address back to it’s location. For this, just visit http://www.yougetsignal.com and enter the IP you want to trace in the dialog box and hit the “Proxy Trace” button. Wait for few seconds and the visual trace route tool displays the path Internet packets traverse to reach a specified destination. Hope this helps. Please pass you comments.

How to Become an Ethical Hacker?

What is Ethical Hacking or Ethical Hacker?
Ethical Hacking, also known as Penetration testing, is the process of vulnerability testing or hacking the system with a permission from corresponding vendor. Normally, organization who are in the need of security recruits Ethical Hacker or PenTester for improving their security.

Ok, let us come to the article below.


How to Become an Ethical Hacker?

                                                         ethical hacker



1- Dedication :
Dedication is the main key to become an ethical hacker. Don't plan to become pentester because of money. If you really have interest, then go ahead.

2- Reading :
Be a bookworm. Try to read books related to computer and its architecture. Buy books related to Security and Ethical hacking.

3- Should Know how hackers hack into: 
You can not solve the problem until you know what is behind the problem. So you have to learn method of hackers. How ??! Just read the articles provided in our site.

4- Programming and Scripting: 
Learn Some programming or scripting languages because most of time you will need to write a code to break into a system. Also, you have to know the coding for understanding how a system works,then only you can penetrate into. Ok, which language?! My suggestion is C. I Love C programming. It is one of best,powerful language and easy to learn. Some peoples prefer python. As far as i am concerned, once you learned one language, it is easy for you to learn any other languages. There are are plenty of online programming tutorial sites are out there.

5- Linux: Ok, it is time to switch from Windows to Linux. Learn to work with Linux.

6- BackTrack Linux Distribution:
Backtrack Linux is one of the famous Penetration Testing Linux distribution. This backtrack is funded byOffensive Security. It has almost all penetration testing tools required for security professionals.

7- Get Certification for Ethical Hackers:
 Some organization recruits based on security certification. You can learn and get ethical certification from your nearest center. Search in google for these keywords "CEH","OSCP","security certifications". Anyway, if you have dedication and confidence, you don't need a certificate and get into a firm easily.

8- Th3Hacker:  I will written plenty of articles related to Ethical hacking and penetration testing. Hope it will help you to get some knowledge. Also, you can find the latest ethical hacking techniques here. 

9- Forums: Participate in any Security or ethical Hacking related forums.
 
10- Need help? feel free to contact me

Opportunities for Ethical Hacker
There are plenty of jobs available in government organisations, banks, financial institutions, military establishments and private companies. AL requires more Ethical Hackers.

Instroduction to Computer Hacking

WHAT IS HACKING?

Hacking is the process of taking advantages of weakness in a computer or computer network to accomplish his goal. The person who is engaging in hacking activities called as 'Hacker
'. Hackers may be motivated by a multiple reasons, such as profit, protest, challenge or just for fun.


                                                         computer hacking




CrackersOne who breaks security on a system. Coined ca. 1985 by hackers
in defense against journalistic misuse of hacker (q.v., sense 8). An
earlier attempt to establish ‘worm’ in this sense around 1981–82
on Usenet was largely a failure.

Use of both these neologisms reflects a strong revulsion against
the theft and vandalism perpetrated by cracking rings. While it is
expected that any real hacker will have done some playful cracking
and knows many of the basic techniques, anyone past larval stage
is expected to have outgrown the desire to do so except for immediate,
benign, practical reasons (for example, if it’s necessary to get
around some security in order to get some work done).
Thus, there is far less overlap between hackerdom and crackerdom
than the mundane reader misled by sensationalistic journalism
might expect. Crackers tend to gather in small, tight-knit,
very secretive groups that have little overlap with the huge, open
poly-culture this lexicon describes; though crackers often like to
describe themselves as hackers, most true hackers consider them a
separate and lower form of life.

It’s clear that the term cracker is absolutely meant to be derogatory. One
shouldn’t take the tone too seriously though, as The Jargon File is done with a
sense of humor, and the above is said with a smile. As we can see from the
above, illegal or perhaps immoral activity is viewed with disdain by the “true
hackers,” whomever they may be. It also makes reference to cracker being a
possible intermediate step to hacker, perhaps something to be overcome.


Script Kiddie

The term script kiddie has come into vogue in recent years. The term refers to
crackers who use scripts and programs written by others to perform their intrusions.
If one is labeled a “script kiddie,” then he or she is assumed to be incapable
of producing his or her own tools and exploits, and lacks proper
understanding of exactly how the tools he or she uses work. As will be apparent
by the end of this chapter, skill and knowledge (and secondarily, ethics) are the
essential ingredients to achieving status in the minds of hackers. By definition,
a script kiddie has no skills, no knowledge, and no ethics.


Phreak
A phreak is a hacker variant, or rather, a specific species of hacker. Phreak is
short for phone phreak (freak spelled with a ph, like phone is). Phreaks are
hackers with an interest in telephones and telephone systems. Naturally, there
has been at times a tremendous amount of overlap between traditional hacker
roles and phreaks.


White Hat/Black Hat/Gray Hat
White Hat Hacker:
White Hat hackers are good guys who does the hacking for defensing. They probably work an organization for providing security.


Black Hat Hacker
Black hat hackers are bad guys(the malicious hackers or crackers). They usually steal the other bank information and steal the money.
They use their skills for illegal purposes.
They are creators of viruses,malware,spyware.
They will destroy your pc.


Gray Hat Hackers
Grey hats are hackers who may work offensively or defensively, depending on the situation.
This is the dividing line between hacker and cracker. Both are powerful forces on the Internet,
and both will remain permanently. And some individuals qualify for both categories. The
existence of such individuals further clouds the division between these two groups of people.
In addition to these groups, there are self-proclaimed ethical hackers, who are interested in
hacker tools mostly from a curiosity standpoint. They may want to highlight security problems
in a system or educate victims so they secure their systems properly. These hackers are
doing their “victims” a favor. For instance, if a weakness is discovered in a service offered by
an investment bank, the hacker is doing the bank a favor by giving the bank a chance to rectify
the vulnerability.

NETWORK SECURITY HACKS, 2ND EDITION

In the fast-moving world of computers, things are always changing. Since the first edition of this strong-selling book appeared two years ago, network security techniques and tools have evolved rapidly to meet new and more sophisticated threats that pop up with alarming regularity. The second edition offers both new and thoroughly updated hacks for Linux, Windows, OpenBSD, and Mac OS X servers that not only enable readers to secure TCP/IP-based services, but helps them implement a good deal of clever host-based security techniques as well. This second edition of Network Security Hacks offers 125 concise and practical hacks, including more information for Windows administrators, hacks for wireless networking (such as setting up a captive portal and securing against rogue hotspots), and techniques to ensure privacy and anonymity, including ways to evade network traffic analysis, encrypt email and files, and protect against phishing attacks. System administrators looking for reliable answers will also find concise examples of applied encryption, intrusion detection, logging, trending and incident response. In fact, this “roll up your sleeves and get busy” security book features updated tips, tricks & techniques across the board to ensure that it provides the most current information for all of the major server software packages. These hacks are quick, clever, and devilishly effective.


DOWNLOAD LINK:           LINK 1

MICROSOFT ASKS FOR UBUNTU 8.10 REMOVAL FROM HOSTING SERVICE CLAIMING COPYRIGHT INFRINGEMENT

Microsoft has been made responsible for the removal of an Ubuntu image from a Polish file hosting service.


Most of the legit file hosting services try to discourage people from uploading illegal files, such as pirated Windows 8 images or games, but they rarely dispute the claims made by the parties involved.

This seems to be the case with the Polish file hosting website Chomikuj.pl, which received a copyright infringement letter from Microsoft regarding one of the files hosted on their servers, ubuntu-8.10-desktop-i386.iso.

According to di.com.pl, the hosting website immediately removed the files, leaving its owner wondering what he had done wrong.

Most likely, the files have been discovered by a search algorithm, which can look at several factors. The name, which in this case contains 8.10, might have been a trigger, which is also the most likely explanation.

On the other hand, it might have been an illegal copy of Windows 8.1 renamed to Ubuntu 8.10, and the search algorithm just looked at the size and hash sum.

In any case, it would be interesting to see how far these Microsoft infringement letters can go. Is everything with 8.10 in the name now in danger if it's hosted in the cloud?

Check out the Google translated link.

Sunday, December 8, 2013

Used memory sticks being sold online contains sensitive Government data


Selling an used memory sticks often pose an information security risk- We might be thinking that we completely erased the data from it, but it is possible to recover the files that are not properly deleted with the help of some tools.
A recent study found that "old memory sticks" being sold online contain sensitive Australian Government data.

The research paper which is to be presented at a cyber security conference in Perth reveals how researchers discovered the confidential Government data while they are researching the used memory sticks, The Australian news reports.

The study found that sellers are sending memory cards without properly erasing the data. The recovered data not only contains a personal info but also appears to be information belong to Australian government.

"It is evident that actions must be taken by second hand auction sites, and the media to raise awareness and educate end-users on how to dispose of data in an appropriate manner," the study says.

Get Free Credits for SMS Global (SMS SPOOFING) !



I will tell you a Trick How to increase Crack credits Of Sms Global,Worlds Best Sms spoofing Website

SO just follow these intructions & you will GEt 125 Free Credits.


1) For this go to a website which help you click here
Register yourself on SMSglobal but before register, The Trick lies Here: go to link for Sign Up

SMSglobal allow only 25 instant credits for free user means you only send 25 SMS but i will tell you a trick by which you will gain 125 credits means 125 free SMS for send globally. When you fill the registration foam,you see a blank space for PROMO CODE here you write the "WPRESS " like given below...



You only fill the:-

1: Username
2: Account type---> Personal
3: Complete Contact Information:: Please write right Mobile Number because Website send you password of the account.Do not add personal address.
4: Write Promo Code "WPRESS".Accept terms and condition and fill Verification Code.
You will get 125 free SMS for send Globally by any Number.

INSIDE CYBER WARFARE: MAPPING THE CYBER UNDERWORLD

The necessary handbook for the 21st century.

--Lewis Shepherd, Chief Tech Officer and Senior Fellow, Microsoft Institute for Advanced Technology in Governments

"A must-read for policy makers and leaders who need to understand the big-picture landscape of cyber war."

--Jim Stogdill, CTO, Mission Services Accenture

You may have heard about "cyber warfare" in the news, but do you really know what it is? This book provides fascinating and disturbing details on how nations, groups, and individuals throughout the world are using the Internet as an attack platform to gain military, political, and economic advantages over their adversaries. You'll learn how sophisticated hackers working on behalf of states or organized crime patiently play a high-stakes game that could target anyone, regardless of affiliation or nationality.

Inside Cyber Warfare goes beyond the headlines of attention-grabbing DDoS attacks and takes a deep look inside multiple cyber-conflicts that occurred from 2002 through summer 2009.

Learn how cyber attacks are waged in open conflicts, including recent hostilities between Russia and Georgia, and Israel and Palestine
Discover why Twitter, Facebook, LiveJournal, Vkontakte, and other sites on the social web are mined by the intelligence services of many nations
Read about China's commitment to penetrate the networks of its technologically superior adversaries as a matter of national survival
Find out why many attacks originate from servers in the United States, and who's responsible
Learn how hackers are "weaponizing" malware to attack vulnerabilities at the application level

DOWNLOAD LINK:    LINK 1

Android Phone's Secret Codes to Check Details !

Hey friends see here some of the tricks on your Android Operating System/ android OS cellphone.
Please note: Some codes mentioned here can be dangerous.




*#*#4636#*#* - Phone / Battery / USage information
*#*#7780#*#* - factory data reset
*2767*3855# - factory format
*#*#34971539#*#* - information about phone camera
*#*#7594#*#* - End Call / Power
*#*#273283*255*663282*#*#* - File copy / backup
*#*#197328640#*#* - Service mode.

WLAN, GPS and Bluetooth Test Codes:

*#*#232339#*#* OR *#*#526#*#* OR *#*#528#*#* - WLAN test (Use "Menu" button to start various tests)
*#*#232338#*#* - Shows WiFi MAC address
*#*#1472365#*#* - GPS test
*#*#1575#*#* - Another GPS test
*#*#232331#*#* - Bluetooth test
*#*#232337#*# - Shows Bluetooth device address
*#*#8255#*#* - This code can be used to launch GTalk Service Monitor.

GET FIRMWARE VERSION INFORMATION:

*#*#4986*2650468#*#* - PDA, Phone, H/W, RFCallDate
*#*#1234#*#* - PDA and Phone
*#*#1111#*#* - FTA SW Version
*#*#2222#*#* - FTA HW Version
*#*#44336#*#* - PDA, Phone, CSC, Build Time, Changelist number

CODES TO LAUNCH VARIOUS FACTORY TESTS:

*#*#0283#*#* - Packet Loopback
*#*#0*#*#* - LCD test
*#*#0673#*#* OR *#*#0289#*#* - Melody test
*#*#0842#*#* - Device test (Vibration test and BackLight test)
*#*#2663#*#* - Touch screen version
*#*#2664#*#* - Touch screen test
*#*#0588#*#* - Proximity sensor test
*#*#3264#*#* - RAM version
Have fun with these secrets codes .....:)
Stay tune for next tutorial on Android OS rooting and Binding android and Ubuntu (Linux) Together

PRIVATE CLOUD COMPUTING: CONSOLIDATION, VIRTUALIZATION, AND SERVICE-ORIENTED INFRASTRUCTURE

Private cloud computing enables you to consolidate diverse enterprise systems into one that is cloud-based and can be accessed by end-users seamlessly, regardless of their location or changes in overall demand. Expert authors Steve Smoot and Nam K. Tan distill their years of networking experience to describe how to build enterprise networks to create a private cloud. With their techniques you'll create cost-saving designs and increase the flexibility of your enterprise, while maintaining the security and control of an internal network. Private Cloud Computing offers a complete cloud architecture for enterprise networking by synthesizing WAN optimization, next-generation data centers, and virtualization in a network-friendly way, tying them together into a complete solution that can be progressively migrated to as time and resources permit.


Describes next-generation data center architectures such as the virtual access-layer, the unified data center fabric and the "rack-and-roll" deployment model
Provides an overview of cloud security and cloud management from the server virtualization perspective
Presents real-world case studies, configuration and examples that allow you to easily apply practical know-how to your existing enterprise environment
Offers effective private cloud computing solutions to simplify the costly and problematic challenge of enterprise networking and branch server consolidation.

DOWNLOAD LINK:      LINK 1

Thursday, December 5, 2013

How to Install Skype on Ubuntu Linux !

Many People feel unsecured while chatting on Skype in windows platform due to the FUD (Fully Undetectable Viruses) threat. Hence today in this tutorial i will tell you how you can run Skype in Linux Platform which is almost 98% secure from RAT and other malicious viruses.

Here we Have two methods of installing Skype in Ubuntu Linux

1. Through Ubuntu Software Center
2. Manual Method

Skype Through Ubuntu Software Center
For this just go to Ubuntu Software Center and in search type Skype , Ubuntu 11.10 Support Skype 2.0 Version for Linux. Click on install and in few minutes you are ready to use the Skype.

Installing Skype Through Manual MethodThis is the easiest method to install from the command line. There are three commands that you must use to install Skype correctly.

Open your terminal and copy paste this commands 

sudo apt-get install libqt4-gui
wget -c -O /tmp/skype.deb http://www.skype.com/go/getskype-linux-ubuntu

sudo dpkg -i /tmp/skype.deb



Now you can see the Skype on your menu bar and you are ready to use Skype no need to worry about RAT and other trojan.

Google to Businesses: Don't Use Google+ (Yet) !

Twitter isn't just about tweeting what you had for lunch, and there's more to Facebook than 'poking' your friends and growing your farm. If you're a business owner, social networking is a great tool for promoting your brand, and at some point, Google+ will join the fray. For the time being, however, Google is asking businesses, universities, and other organizations not to bother with its social networking service.
"Right now we're very much focused on optimizing for the consumer experience, but we have a great team of engineers building a similarly optimized business experience for Google+," Christian Oestlien, product manager for Google+, said in a YouTube video. "We are very excited about it and we hope to roll it out later this year."
Oestlien said the business version will include things like rich analytics and the ability to connect a business profile to other parts of Google, such as AdWords.
"We will be doing some testing," Oestlien said. "We're going to take a small group of brands, businesses, and other entities and create profiles for them and see how users interact with them via circles, through the stream, and even how they communicate through hangouts."
In the meantime, Oestlien asked businesses to refrain from creating consumer accounts, warning that Google+'s policy team will actively work with profile owners to shut down non-user profiles.

How to Improve Your System's Overall Speed | Amit Khajuria





I knw you all are very good in computers but why i am writing this post is because, what i found is when every i got any pc of a B.Tech student(BookWorm Especially) or a Business Man. The worst thing i found is that their systems are full of unwanted software and adding charm on that they have not formatted computer from last 3 or 4 years. That means from the day of purchasing a new laptop they are using the same windows from last 3 years.


And at last they will say in Hindi ( Yaar dekhna iski speed badi slow ho gyi hai, In my heart i reply :- Abey speed to kam hogi hi bachee ki jaan lega 3 saal se to). Anyways so if you are from one of these which i think no one will be accepting ha ha then please read the below tips and make your PC run like a Firebullet :).

1.Let your PC boot up completely before opening any applications.

2.Refresh the desktop after closing any application. This will remove any unused files from the RAM.

3.Do not set very large file size images as your wallpaper. Do not keep a wallpaper at all if your PC is low on RAM.

4.Do not clutter your Desktop with a lot of shortcuts. Each shortcut on the desktop uses up to 500 bytes of RAM

5.Empty the recycle bin regularly. The files are not really deleted from your hard drive until you empty the recycle bin.

6.Delete the temporary internet files regularly.


7.Defragment your hard drive once every two months. This will free up a lot of space on your hard drive and rearrange the files so that your applications run faster.


8.Always make two partitions in your hard drive. Install all large Softwares (like PSP, Photoshop, 3DS Max etc) in the second partition. Windows uses all the available empty space in C drive as virtual memory when your Computer RAM is full. Keep the C Drive as empty as possible.


9.When installing new Software disable the option of having a tray icon. The tray icons use up available RAM, and also slow down the booting of your PC. Also disable the option of starting the application automatically when the PC boots. You can disable these options later on also from the Tools or preferences menu in your application.


10. Protect your PC from dust. Dust causes the CPU cooling fan to jam and slow down thereby gradually heating your CPU and affecting the processing speed. Use compressed air to blow out any dust from the CPU. Never use vacuum.

Google Plus invite or Facebook video calling: What do you prefer !

What would you prefer, Google Plus invite or Facebook video calling? If you ask this question to anyone, the unequal response is known to us all. It will be Google+

It has not been launched yet. Nonetheless it is being talked about in very positive words and everyone seems to be smitten by it. So are we closer to yet another great product from Google, the search and advertising czar.

Google started off as a search engine. Initially it tried to find ways to satisfy its investors about its viability and its ability to generate fund and make profit. But when it discovered the moneymaking ability through its small adds on every other page on the internet, everything else fell in line.

Now it is the biggest advertisement agency along with being the largest search engine with close to sixty five percent of the search engine market across the world.

For the last two years there has been increased talk of Facebook overtaking Google not just in its reach but business as well. Facebook at one point of time was increasing its membership at menacing speed.

But now things are changing. Even before Google Plus became a talking point, there were reports that Facebook membership in its key markets in Europe and USA was declining. In the last few months alone Facebook lost close to 16 million users in the US market. And mind you, US market is financially most important market in websphere followed by Europe.

Now with Google Plus, facebook is now facing an existential threat from the internet giant that has killed many big time players in websphere. Yahoo, Hotmail, MSN just to name a few were among the top players. But they don’t remain at the same level any more.

So is it the turn of Facebook to face the onslaught from Google with Google Plus? During the more than a week it seems that everyone has been smitten by Google plus and its affiliates including Hangouts, circles besides other Google Plus adages.

Nmap 5.59 BETA1 - 40 new NSE scripts & improved IPv6 !

Nmap 5.59 BETA1 - 40 
New NSE scripts & improved IPv6

Official Change Log:

o [NSE] Added 40 scripts, bringing the total to 217! You can learn
more about any of them at http://nmap.org/nsedoc/. Here are the new
ones (authors listed in brackets):

+ afp-ls: Lists files and their attributes from Apple Filing
Protocol (AFP) volumes. [Patrik Karlsson]

+ backorifice-brute: Performs brute force password auditing against
the BackOrifice remote administration (trojan) service. [Gorjan
Petrovski]

+ backorifice-info: Connects to a BackOrifice service and gathers
information about the host and the BackOrifice service
itself. [Gorjan Petrovski]

+ broadcast-avahi-dos: Attempts to discover hosts in the local
network using the DNS Service Discovery protocol, then tests
whether each host is vulnerable to the Avahi NULL UDP packet
denial of service bug (CVE-2011-1002). [Djalal Harouni]

+ broadcast-netbios-master-browser: Attempts to discover master
browsers and the Windows domains they manage. [Patrik Karlsson]

+ broadcast-novell-locate: Attempts to use the Service Location
Protocol to discover Novell NetWare Core Protocol (NCP)
servers. [Patrik Karlsson]

+ creds-summary: Lists all discovered credentials (e.g. from brute
force and default password checking scripts) at end of scan.
[Patrik Karlsson]

+ dns-brute: Attempts to enumerate DNS hostnames by brute force
guessing of common subdomains. [Cirrus]

+ dns-nsec-enum: Attempts to discover target hosts' services using
the DNS Service Discovery protocol. [Patrik Karlsson]

+ dpap-brute: Performs brute force password auditing against an
iPhoto Library. [Patrik Karlsson]

+ epmd-info: Connects to Erlang Port Mapper Daemon (epmd) and
retrieves a list of nodes with their respective port
numbers. [Toni Ruottu]





Linked In Confirms Data Breach, Here's What You Can Do !

Phishers are coming out of the woodwork trying to bait panicked or otherwise unsuspecting LinkedIn users into supposedly 'confirming' their account, but what they're really doing is hijacking login credentials. They're also compounding the situation, whereby LinkedIn has now confirmed it suffered a data breach in which encrypted user passwords were compromised. Here's what you should do.
First and foremost, log into LinkedIn by typing the site's address directly into your browser and change your password. Don't click on any links in emails, even if they appear to be legit, which some of them do. It's unclear whether or not LinkedIn has begun notifying its members of the data breach via email, but according to security firm ESET, plenty of legitimate looking phishing emails are making the rounds.

The next thing you should do is change your password on any other site that uses the same login credentials. You should be using different passwords for different sites anyway, but if not, now's a great time to get into the habit of separating your online accounts.
According to reports, around 6.5 million LinkedIn passwords fell into malicious hands, so there's a good chance yours is one of them. If you want to know for sure, LastPass has an online tool that will compare the SHA-1 hash of your password with those that have been compromised. But is it safe to fork over your LinkedIn password to LastPass?


"The above tool asks you to enter your LinkedIn password, and then computes its SHA-1 hash and sends the result to LastPass.com to search the list of 6.5 million leaked password hashes. A hash is a mathematical function that is simple to perform in one direction, but very difficult to reverse. Meaning, the tool will convert your password into a series of characters in such a way that it will be very difficult to re-construct your original password," LastPass explains.
LastPass says that only the hash of your password is sent to LastPass.com's servers, not your actual password. And according to Mashable, LastPass doesn't store your hash on its servers. Still, if you're feeling uneasy, go ahead and change your LinkedIn password regardless.

World IPv6 Launch Gives Crowded Internet Much Needed Breathing Room !

If you're reading this, you must be online, and if you're online, let us say 'Welcome to a larger Internet.' Today kicks off theWorld IPv6 Launch event organized by the Internet Society and intended to bring major internet service providers (ISPs), home networking equipment manufacturers, and web companies around the world together to enable and embrace the IPv6 protocol for their products and services.
Count Google among them. As the sultan of search points out, few could have imagined that the Internet today would serve nearly 2.5 billion people and 11 billion devices when it was launched operationally back in 1983. But that's what happened, and suddenly the Internet is running out of addresses.
As constructed, there's room for around 4.3 billion addresses. Internet Protocol version 6 expands that number exponentially, to "about 340 trillion, trillion, trillion!," Google says.
"Today's World IPv6 Launch, coordinated by the Internet Society, marks the day that participating websites, Internet Service Providers (ISP), and network hardware manufacturers switch on IPv6 permanently in parallel with IPv4," Google said in a blog post. "We’re proud to be one of the founding participants; virtually all Google’s services have been available over IPv6 for a while, but IPv6 access was only available to networks participating in the 'Google over IPv6' program. From now on, they will be made available to any IPv6 network on the Internet (well, almost any).
IPv6 still has a ways to go in terms of widespread adoption. Most ISPs haven't embraced the new standard yet, and the same is true for many websites. Not all home network equipment supports IPv6 either, though some can be upgraded with a relatively simple firmware updates. Others will need to be replaced entirely.
Are you ready? If you want to test your setup and infrastructure, head here.

Dell Launches Inspiron 14z Ultrabook, 'Fashionable' Inspiron 15R and 17R Laptops !

The very last thing in the world students heading out into summer vacation want to think about right now is the fact they'll have to go back to school in a few months. Parents, however, know the back-to-school season is coming, and they're the ones Dell is pitching its "tailored line-up of Inspiron laptops" to, including Dell's first Inspiron Ultrabook model, the 14z.

Dell's 14z rolls off the lot with a Core i3 processor, though you can upgrade to a Core i5 or Core i7 Ivy Bridge processor before driving it home. It's only Dell's second Ultrabook model, joining the XPS 13, and it sports a brushed aluminum finish in Moon Silver or (later this summer) Fire Red. A baseline build weighs 4.12 pounds and measures 0.83 inches at its chunkiest point. And if that's too big, Dell also announced a 13-inch version (13z) that weighs 3.81 pounds. Pricing starts at $700 for the 14z and $600 for the 13z.

In addition to Ultrabooks, Dell today rolled out new Inspiron 15R and 17R laptops with high definition displays and a variety of processor, memory, and storage options. They also feature optional color SWITCH lids, Intel Wireless Display technology, and Waves MaxxAudio 3 sound processing. Special Edition versions up the ante with Full HD displays, Blu-ray options, Skullcandy speakers, and Nvidia graphics options (17R). Pricing starts at $550 for the 15R ($900 for the Special Edition) and $600 for the 17R ($1,300 for Special Edition).
Image Credit: Dell

Wednesday, December 4, 2013

Get 5000 Free Backlinks For Your Website Or Blog Instantly !

I am here with new trick to getfree backlinks for your blog or website. Backlinks play very important role to get " High PR ranking " and " Alexa High Ranking " for free.

Yes, its true that if you have a website or blog and not having " Enough Traffic" and want to get " Good PR ranking " and " Alexa High Ranking" then this method will work for you easily and that too free also. By using this method you will see change in " Alexa Ranking " easily with in four days.


It is true that the back bone of a websites rank is ‘ Backlinks ’. If you have good backlinks then your blog is expected to do good in SEO.The problem is that backlinks are not easy as making oatmeal, it can take you forever to make ton of backlinks So you have to be patient while doing this. There are many ways to get backlinks, such as: Social bookmarking, Blog commenting, Forum posting and article submission.

Get Free Backlink For Website Instantly


I have applied all the below listed methods to " Get Premium Backlinks " for free . So don't worry! this all methods are working very fine


Generate automatic Backlinks – There are several sites which allow free auto backlinks service. Some of them are


1. Freesitescripts.com – About 1000 Premium Backlinks For Free
2. IMTalk – About 2500 Premium Backlinks For Free
3. Webmasterdeck – 500 Premium Backlinks For Free

I hope you like this methods though some tells that this " BlackHat SEO Method To Get High Ranking " but according to me this is Ethical method to " Get Free Backlinks "


Thankyou for reading this article and don't forget to comment..


keywords:-
search engine optimization, backlinks, get free backlinks, free backlinks, how to get free backlinks for website, seo, blackhat seo,whitehat seo.

10 Killer Ways To Boost Your Alexa Ranking | SEO Tricks !

Hi friends I hope you all are fine, After my previous post for " How To Recover Lost Data With Recuva For Computer " . I am here as promised with " new tricks " . This trick is related to SEO . Today I am going to post a review about alexa and " How To Increase Alexa Ranking " . This all methods are provened by webmaster and also checked by me

Alexa is a service that ranks websites based on information gathered from the web. For webmasters, it is very important to improve Alexa Ranking. I am presenting a list of 10 easy tips to improve position(rank) on Alexa.
As Per Alexa Notice
Alexa’s traffic rankings are based on the usage patterns of Alexa Toolbar users and data collected from other, diverse sources over a rolling 3 month period. A site’s ranking is based on a combined measure of reach and pageviews. Reach is determined by the number of unique Alexa users who visit a site on a given day. Pageviews are the total number of Alexa user URL requests for a site
Follow These Killer Tips To Increase Alexa Rank



1- Download And Install Alexa Toolbar
2-Put an Alexa rank widget on your blog/ website.
3- Install Alexa Redirect Plugin for WordPress.
4- Visit to the Alexa website and claim your website to get maximum authority
5- Write an article about Alexa in your blog with a link to their site.
6- Get Dugg or Stumbled. This will bring a numbers of visitors to your blog
7- Set your Blog as home page in your default web browser
8- Get your blog / website listed in as many number of blog directories as possible.
9- Popular webmaster forums are great promotion tools
10- Encourage or ask some of your friends or visitors to install Alexa toolbar So follow all above steps 11- which will definitely help you to increase your Alexa traffic ranking and thus the value of your blog in the eyes of a advertisers. Please add any other ways to increase the Alexa Rank if you feel I have missed something.

Monday, December 2, 2013

The Art of Deception {TOP HACKING BOOK EVER} MUST DOWNLOAD !

Kevin Mitnick's exploits as a cyber-desperado and fugitive from one of the most exhaustive FBI manhunts in history have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison in 2000, Mitnick has turned his life around and established himself as one of the most sought-after computer security experts worldwide. Now, in The Art Of Deception, the world's most famous hacker gives new meaning to the old adage, "It takes a thief to catch a thief."



Inviting you into the complex mind of the hacker, Mitnick provides realistic scenarios of cons, swindles, and social engineering attacks on business - and the consequences. Focusing on the human factors involved with information security, Mitnick explains why all the firewalls and encryption protocols in the world will never be enough to stop a savvy grifter intent on rifling a corporate database or an irate employee determined to crash a system. He illustrates just how susceptible even the most locked-down information systems are to a determined con artist impersonating an IRS agent or any other seemingly innocent character. Narrated from the points of view of both the attacker and the victim,

The Art Of Deception explores why each attack was so successful - and how it could have been averted - in an engaging and highly readable manner reminiscent of a true-crime novel.

Most importantly, Mitnick redeems his former life of crime by providing specific guidelines for developing protocols, training programs, and manuals to ensure that a company's sophisticated technical security investment will not be for naught. He shares his advice for preventing security vulnerability in the hope that people will be mindfully on guard for an attack from the gravest risk of all - human nature.



Download:          LINK 1

Mozilla Firefox 13 Hits Release Channel, Brings New Homepage and Tabs !


The latest and greatest version of Mozilla's Firefox web browser -- Firefox 13 -- doesn't alter the browser scene with earth shaking innovation or groundbreaking feature additions, nor have we come to expect such gargantuan leaps in browser development since Mozilla swithced to a rapid release schedule. That said, there is a new version of Firefox on the Release channel, and here's what it brings to the table.
First and foremost, Firefox's new default homepage offers quicker access to bookmarks, history, settings, and more. The other notable change has to do with tabs. When opening a new tab, Firefox presents users with their most visited pages.
Other than those two additions, Mozilla mainly just sprinkled in a few changes to how the browser behaves and resolved a bunch of bugs, as it usually does with each new Firefox release. Restored background tabs are no longer loaded by default, a move intended to speed up the startup process, and smooth scrolling is now enabled by default. On the developer side, Mozilla said it made 72 total improvements to Page Inspector, HTML panel, Style Inspector, Scratchpad, and Style Editor.
The complete list of changes is here, and you can download the latest Firefox release here.



How to get your website ranked on search engines | Amit Khajuria


There are many factors involved in getting your website ranking on search engines. Below are some key things to take into consideration, and we hope that it will help you to increase traffic on your blog website or forum :)

Anchor text
The anchor text of inbound links coming to your website is very important as search engines use this to determine what your site is about and what it should rank well for. Your anchor text should be your keywords that you want your website to rank for. For example, instead of using your company name or your website URL for inbound links, consider using keywords as your anchor text.



Use keywords in your title tag and other meta tags
Meta tags still have an impact on where your website will rank on search engines. The weight of the meta tags may be minimal, but it is still recommended that you choose keywords relevant to each webpage. It is an effective way for search engines to categorise your webpages and gives search engine spiders an idea of what your webpage is about.



Links to your website
The largest factor that influences search engine rankings is the number and quality of links that are pointing to your website. The more quality links that you have coming to your website, search engines will think your website has authority.
Keyword use in the root domain
Although it's possible to use subdomain or dedicated pages to get your keywords in a URL, nothing beats having your keywords in your domain name. For example, goldcoastaccommodation.com.au.
Apply the proper tags to your page
This means using H1, H2, and H3 tags in your headings and sub-headings.



Include a html sitemap and an xml sitemap on your website
Including a sitemap on your website makes it easy for search engine spiders to access all your webpages and index your site accordingly.



Make sure all images have an ALT text
Your image alt text is read by search engine spiders, so make sure you include keywords in your alt text. Label your images properly too, for example, instead of calling it bedroom.jpg, call it melbourne-accommodation-1-bedroom-apartments.jpg.


Source

Free Domain Names | Get Professional Domains For Free With All Features !

Below are the websites which provides " Free Domain Hosting " for your blog. This all listed below website provides the features and benefits which a professional .com domain hosting website provides . So watch carefully these website and have your register their for free.

CC.CC


CC.CC offers simple, memorable custom domain for Google Apps, Blogger, etc..
This site provides the domain name registration tools and DNS setup wizard.
You can configure your .cc.cc Domain for Blogger, Gmail, Google sites, Tumblr, Bandcamp, Hotmail, Facebook, Twitter, Myspace, etc.. The service is provided at no cost, no ads. Enjoy our free service!

CO.CC

CO.CC offers simple, memorable custom domain for Google Apps, Blogger, etc.. This site provides the domain name registration tools and DNS setup wizard.

You can configure your .cc.cc Domain for Blogger, Gmail, Google sites, Tumblr, Bandcamp, Hotmail, Facebook, Twitter, Myspace, etc.. The service is provided at no cost, no ads. Enjoy our free service!

CZ.CC

CZ.CC provides free domain regsitration service. You can register all available domain names instantly. They offers free or paid dynamic dns service with full MX, CNAME, A and SOA records. The service they provide is exactly same as .co.cc. Register on .cz.cc

CO.TV

co.tv is strong yet free domain registration service provider. You are limited upto 3 domains with single user account. Like .co.cc, .co.tv also supports full MX, CNAME, A and SOA records. Register on co.tv




CO.NR

co.nr has free domain name package was designed to provide domain name free, subdomain services mainly for advanced internet users, who have some basic knowledge about the DNS (Domain Name
System) and process of setting up name serversas well as other DNS records (NS, A, MX, CNAME, TXT, etc.) for the domain name to work properly. Also it provides subdomain hosting, i.e. subdomain.domain.co.nr

SmartDots.com

Smartdots.com is one of them who provide variety of domain names. One of the famous domain people owns from smartdots is .net.tc. Besides these you can have other domain names listed in their
website. They supports variety of features, like meta tag generator, automatic search engine submission, etc. To know more about their features visit them.

CyDots.com

CyDots.com is one of them who provide variety of domain names. One of the famous domainpeople owns from smartdots is .net.tc. Besides these you can have other domain names listed in their website. They supports variety of features, like meta tag generator, automatic search engine submission, etc. To know more about their features visit them.

How to Use Google Search Via SMS in India !

Yeah, now you can also search anything, anytime, anywhere on Google without a internet connection. Google on your mobile either it’s a Smartphone or low cost phone it will help you with his SMS service. You don’t need to buy a expensive phone’s out of your budget to just surf for internet on the go.

Please follow the following step:-

1. You have to just type your keywords (You want to search) in your phone message box (create message).


2.Then add receipt send it to 9773300000. And it will comeback you the answer within a few seconds.

3. You will feel like you are surfing Google on the Internet.

It helps me when I went to Delhi with friends at late night and we have to search for movie Showtime’s. Then I messaged on that number movie Delhi. And I stunned, got minimum 12-13 messages about movies Showtime’s or ratings of the movies. At different theater.

Note: Charge May Apply.

Sunday, December 1, 2013

How to create Prepaid Virtual Credit Cards (VCCs) instantly

This Virtual Credit Card creation method is for Indians who does not have a valid credit card and wants to make online transactions where credit card is mandatory.

What is a Virtual Credit Card?

Virtual Credit Card (VVC) is a one-time usable credit card with a preloaded amount and comes with few months of validity. It is the safest way to pay online.

How to get these VVCs?
For this method, you need to have an HDFC Banksavings account with International Debit Card. If you have a normal debit card, apply for an International Debit Card. Visit an HDFC Bank branch nearest to you and submit a simple application for International Debit Card, which takes around a week or two to get your card. If you have not opted for online banking facility, go and get it.

You can create unlimited virtual credit cards using NetSafe by HDFC Bank. Go to thehomepage of HDFC Bank and select “NetSafe/ Verified by Visa/ MasterCard SecureCode” from the different account logins available on the homepage. It pops up a window where you can register for NetSafe using your International Debit Card.

Once you registered, login into your account and it will show your balance and option to create a virtual credit with a specified amount. Fill the amount and click “GO.” It will create a virtual credit card with expiry date, CVV, and the amount you have chosen.

Don’ts:
Do not use this virtual credit card where physical goods are delivered at your doorstep upon presentation of the card to the delivery boy.
Do not use this card where recurrent payments are made because it expires in a month or so.
Except the above, you can now use the virtual card for online payments safely.

The Benefits of Using a Virtual Card
The temporary account number you generate and use for a one time or one vendor purchase is useless to hackers. Even if a hacker obtains the account number it will not be useful to him as it cannot be used again.

Because the virtual card will have a spending limit that reflect the purchase you intend to make, your real account and full credit line are not at risk when you buy online. The temporary number does not lead to your real credit card number no matter what a hacker does.
Using a virtual card for online purchases does not expose you to the risk of identity theft that is a rising problem in the marketplace today. Identity theft relies on the ability of the thief to match various pieces of information that you have placed online. If a hacker is unable to find information that leads to your credit file or your bank account, he is unlikely to be able to use your identity.

Email Accounts Hacking Method - How To Hack Email Accounts

The Basic level Hacking is Email Account Hacking. Everyone like to do first email account hacking only. So here is the tutorial for budding hackers about email Hacking.

There are different types of Email Account Hacking . Here is some of them :

  1.  Social Engineering
  2.  Phishing
  3.  Brute Force Attack
  4.  Keylogger
  5.  Guessing the Answer for the Security Question


Social Engineering:

Social engineering takes advantage of the weakest link in any organization’s
information security defenses: people. Social engineering is
“people hacking” and involves maliciously exploiting the trusting nature of
human beings to obtain information that can be used for personal gain.

Social engineering is one of the toughest hacks to perpetrate because it takes
great skill to come across as trustworthy to a stranger. It’s also by far the
toughest hack to protect against because people are involved.

Social Engineering is different from Physical Security exploits . In social engineering hackers will analyze about
victim. Hackers will send mail to victim. The contents will be related to the victim.

Eg:

✓ False support personnel claim that they need to install a patch or new
version of software on a user’s computer, talk the user into downloading
the software, and obtain remote control of the system.
✓ False vendors claim to need to update the organization’s accounting
package or phone system, ask for the administrator password, and
obtain full access.
✓ Phishing e-mails sent by external attackers gather user IDs and passwords
of unsuspecting recipients. Hackers then use those passwords to
gain access to bank accounts and more. A related attack exploits crosssite
scripting on Web forms.
✓ False employees notify the security desk that they have lost their keys
to the computer room, receive a set of keys from security, and obtain
unauthorized access to physical and electronic information.

Phishing WebPage:



It is a fake webpage which looks similar to the original page of the website. Using this WebPage we can easily get the Password of victims. The process involved in creating Phishing webpage are,
✓ First Visit the Website which is associated with the email id. Copy the Source code.
✓ Edit the the Source code such that it will store the password for you.
✓ Upload the Webpage to any free webhosting sites. (don't select a famous hosting site,they will find that
your page is fake). Try uploading through the proxy server.



Guessing the Answer for Security Question:




Do you remember that the mail sites will ask for the security questions to retrieve the mail account? You can hack the mail account simply guessing the answer. If the victim is your friend ,then it may very easy to hack.



Brute Force Attack:

                                  
A famous and traditional attacking method . In this method ,the password will be found by trying all possible passwords with any program or software.



Keyloggers:

It is one of the spyware which will capture what you type in the keyboard. so whenever you type the username and password ,it will simply capture.

It is software program which will be attached with any softwares and send to victim. While victim install the software ,the keylogger also start to work.
 

NINJA HACKING UNCONVENTIONAL PENETRATION TESTING TACTICS AND TECHNIQUES (FREE DOWNLOAD)

Ninja Hacking Unconventional Penetration Testing Tactics and Techniques


                                                              About book

Ninja Hacking, the new book by Thomas Wilhelm and Jason Andress, is not a typical book about hacking andpenetration testing. Experienced penetration testers who want to learn cutting-edge penetration techniques will find few references to little-known penetration tools or techniques presented in bland technical format. The book doesn’t rely on pun-filled humor, either.


Ninja Hacking is targeted at individuals who have an interest in the warriors of feudal Japan and want a serious philosophical exploration on how those warrior’s techniques map into modern cyber-warfare. For penetration testers who want to know how to be Ninjas, Ninja Hacking creates a framework for becoming a feudal Japanesewarrior in cyberspace. Each chapter discusses a new piece of the puzzle, and, while you won’t achieve mastery from this book alone, the building blocks are laid that should allow an inspired reader to know what additional areas need to be researched.


DOWNLOAD LINK:       LINK 1

POSTGRESQL UP AND RUNNING

PostgreSQL up and Running



If you’re thinking about migrating to the PostgreSQL open source database system, this guide provides a concise overview to help you quickly understand and use PostgreSQL’s unique features. Not only will you learn about the enterprise class features in the 9.2 release, you’ll also discover that PostgeSQL is more than just a database system—it’s also an impressive application platform.

With numerous examples throughout this book, you’ll learn how to achieve tasks that are difficult or impossible in other databases. If you’re an existing PostgreSQL user, you’ll pick up gems you may have missed along the way.


Learn basic administration tasks, such as role management, database creation, backup, and restore
Apply the psql command-line utility and the pgAdmin graphical administration tool
Explore PostgreSQL tables, constraints, and indexes
Learn powerful SQL constructs not generally found in other databases
Use several different languages to write database functions
Tune your queries to run as fast as your hardware will allow
Query external and variegated data sources with Foreign Data Wrappers
Learn how to replicate data, using built-in replication features.


DOWNLOAD LINK:    LINK 1

STEAL THIS COMPUTER BOOK 4.0 (WHAT THEY WON'T TELL YOU ABOUT THE INTERNET)



If you thought hacking was just about mischief-makers hunched over computers in the basement, think again. As seasoned author Wallace Wang explains, hacking can also mean questioning the status quo, looking for your own truths, and never accepting at face value anything authorities say or do.


The completely revised fourth edition of this offbeat, non-technical book examines what hackers do, how they do it, and how you can protect yourself. Written in the same informative, irreverent, and entertaining style that made the first three editions hugely successful, Steal This Computer Book 4.0 will expand your mind and raise your eyebrows. New chapters discuss the hacker mentality, social engineering and lock picking, exploiting P2P file-sharing networks, and how people manipulate search engines and pop-up ads to obtain and use personal information. Wang also takes issue with the media for "hacking" the news and presenting the public with self-serving stories of questionable accuracy. Inside, you'll discover:

How to manage and fight spam and spyware How Trojan horse programs and rootkits work, and how to defend against them How hackers steal software and defeat copy-protection mechanisms How to tell if your machine is being attacked and what you can do to protect it Where the hackers are, how they probe a target and sneak into a computer, and what they do once they get inside How corporations use hacker techniques to infect your computer and invade your privacy How you can lock down your computer to protect your data and your personal information using free programs.



DOWNLOAD LINK:      LINK 1

HACKING AND SECURING IOS APPLICATIONS



If you’re an app developer with a solid foundation in Objective-C, this book is an absolute must—chances are very high that your company’s iOS applications are vulnerable to attack. That’s because malicious attackers now use an arsenal of tools to reverse-engineer, trace, and manipulate applications in ways that most programmers aren’t aware of.


This guide illustrates several types of iOS attacks, as well as the tools and techniques that hackers use. You’ll learn best practices to help protect your applications, and discover how important it is to understand and strategize like your adversary.

Examine subtle vulnerabilities in real-world applications—and avoid the same problems in your apps
Learn how attackers infect apps with malware through code injection
Discover how attackers defeat iOS keychain and data-protection encryption
Use a debugger and custom code injection to manipulate the runtime Objective-C environment
Prevent attackers from hijacking SSL sessions and stealing traffic
Securely delete files and design your apps to prevent forensic data leakage
Avoid debugging abuse, validate the integrity of run-time classes, and make your code harder to trace



DOWNLOAD LINK:       LINK 1

JAVA IN 60 MINUTES A DAY BOOK

Java in 60 Minutes A Day book



Java is a programming language and computing platform first released by Sun Micro systems in 1995. There are lots of applications and websites that will not work unless you have Java installed, and more are created every day. Java is fast, secure, and reliable. From laptops to data centers, game consoles to scientific supercomputers, cell phones to the Internet, Java is everywhere!


Author: Rich Raposa
Features: A revolutionary virtual classroom
Book Name: Java in 60 minutes a day

Introduction:

Chapter 1: Getting Started with Java.

Chapter 2: Java Fundamentals.

Chapter 3: Control Structures.

Chapter 4: Classes and Objects.

Chapter 5: Methods.

Chapter 6: Understanding Inheritance.

Chapter 7: Advanced Java Language Concepts.

Chapter 8: Polymorphism and Abstraction.

Chapter 9: Collections.

Chapter 10: Interfaces.

Chapter 11: Exception Handling.

Chapter 12: An Introduction to GUI Programming.

Chapter 13: GUI Components and Event Handling.

Chapter 14: Applets.

Chapter 15: Threads.

Chapter 16: Input and Output.

Chapter 17: Network Programming.

Chapter 18: Database Programming.

Chapter 19: JavaBeans.

Appendix:
About the 60 Minutes Web Site.

Index.

DOWNLOAD LINK:         LINK 1

ANDROID SECURITY: ATTACKS AND DEFENSES



Android Security: Attacks and Defenses is for anyone interested in learning about the strengths and weaknesses of the Android platform from a security perspective. Starting with an introduction to Android OS architecture and application programming, it will help readers get up to speed on the basics of the Android platform and its security issues.


Explaining the Android security model and architecture, the book describes Android permissions, including Manifest permissions, to help readers analyze applications and understand permission requirements. It also rates the Android permissions based on security implications and covers JEB Decompiler.

The authors describe how to write Android bots in JAVA and how to use reversing tools to decompile any Android application. They also cover the Android file system, including import directories and files, so readers can perform basic forensic analysis on file system and SD cards. The book includes access to a wealth of resources on its website:www.androidinsecurity.com. It explains how to crack SecureApp.apk discussed in the text and also makes the application available on its site.

The book includes coverage of advanced topics such as reverse engineering and forensics, mobile device pen-testing methodology, malware analysis, secure coding, and hardening guidelines for Android. It also explains how to analyze security implications for Android mobile devices/applications and incorporate them into enterprise SDLC processes.

The book’s site includes a resource section where readers can access downloads for applications, tools created by users, and sample applications created by the authors under the Resource section. Readers can easily download the files and use them in conjunction with the text, wherever needed. Visit www.androidinsecurity.com for more information.



DOWNLOAD LINK:     LINK 1