This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

Using Gmail account to monitor and handle all your separate email accounts

I use Gmail account as one of my main accounts to handle most of my important and personal email . I use multiple Gmail accounts as well apart from using domain based accounts. So I use Gmail's feature of handling multiple accounts for "Send As" feature and mail forwarding feature.

So what do we need as solution?

A single mail account where all the mail from multiple email accounts are forwarded, in which mail messages can be filtered in separate labels and mail messages can be replied from the email address it was sent to

Solution:-

1. 1 Gmail account
2. Multiple Gmail or hosted domain accounts which can be forwarded to your mail Gmail account
3. Mail forwarding and "Accounts" feature within Gmail
4. Creating labels in Gmail based on "Email Account" that the message comes from

Using three simple steps you can manage all from email accounts from a single account and use the base account as a email backup account for the respective email addresses.

The exact steps are detailed on Google Tutor Post.

I have to tell that this has been functioning very well for me for quite some time now. I only wish that I can easily forward my Hotmail email messages to Gmail .

USB to Nokia Safe Charger


This simple project shows you how to make a USB powered Nokia cell phone charger. The advantage is that it weighs much less than the bulky AC adaptor, and can be used wherever you have a computer or a laptop. I use this thing all the time now!

What do I mean by “safe charger”? Honestly I’m not sure. I’m just going on what I was able to infer from what I read off my multimeter. What I found was that the voltage across the nokia charge pins was rapidly fluctuating from Vdd to about 4 volts above Vdd. It would not do to have ~9 volts injected into a 5 volt bus! Thankfully, all you need to do is stick a diode in there and that’s that. So the diode might not be needed, but it’s safe! Thus, “Safe Charger”.



So far, it charges my phone just fine, but slightly slower than the wall wart that came with it. I think so, anyway.

Step one: strip off the shielding and insulation on an inch or so of the usb cable. Clip the white and green cables to uneven lengths so they can’t conduct into each other or either of the power lines. Hopefully you should be left with a black wire and a red wire.

Step two: Clip off a length of the nokia chargers phone-side plug. You won’t be needing the wall wart part anymore. Strip off the insulation from the nokia plug wire. Hopefully you should have a red wire and a black one. the red wire should be connected to the inner barrel of the plug, and the black one should be connected to the outer barrel.

Step three: Attach a normal silicon diode (not a zener diode) with the line part towards the nokia plug. It should go between the red wires from both cables . Attach the black wires from each cable together.

I suggest staggering the lengths of the wires so that the solder joints have less chance of coming into contact.

Check all the wires with a multimeter to make sure they are really the right ones! The colors might not be standard...









Step four: cover that baby in hot glue! Yeah!




Step five: Cover that nogoodnick cable in electrical tape!

That’s it!

USB BackTrack Linux installation

BackTrack is a Live Linux distribution based on SLAX that is focused purely on penetration testing. Distributed by remote-exploit.org, BackTrack is the successor to Auditor. It comes prepackaged with security tools including network analyzers, password crackers, wireless tools and fuzzers. Although originally designed to Boot from a CD or DVD, BackTrack contains USB installation scripts that make portable installation to a USB device a snap. In the following tutorial, we cover the process of installing BackTrack to a USB flash drive from within a working Windows environment.

BackTrack running from USB Screenshot:

BackTrack in action running from USB

How to install BackTrack to a USB device:

1. Download the (Portable Backtrack) USB BackTrack version
2. Extract the Boot and BT3 folders to the root of your USB device
3. Navigate to the Boot folder on your "USB device" and click bootinst.bat (click continue if the following error appears)

BackTrack Error
4. Follow the onscreen instructions to make the device bootable
5. Once the USB install script has finished, reboot your computer and set your BIOS or Boot Menu to boot from the USB device

Enjoy!

UNLOCK PASSWORD PROTECTED MEMORY CARD

Well its quite simple but most of the people do not know it.

Please note the fact that it only works if the password to the MMC Card was set in ur own mobile,where u want it to be unlocked.

This method works well for nokia cells with symbian operating system.Never tried on other cells.use any software like FXplorer that can browse files in ur cell.

1. Open one of above software you have.
2. Browse through the directory, C:\system
3. Rename the file mmcstore to mmcstore.txt
4. Open the file - The file will open in Notes.
5. You will find your password in that file. That file would also contain much more data which you do not understand,so you need to go through the file to get the password!

When ur cell is connected to pc by means of data cable or bluetooth,u can see the password by simply opening the file mmcstore with notepad. Laughing

The Next Generation Of Online Fraud Protection

Today's online world is one fraught with danger. At every turn internet users are faced with phishers, hackers, fraud and the threat of identity theft. This creates an atmosphere where users are not comfortable purchasing things online and merchants are being taken advantage of on a regular basis.

The Cybersource 8th Annual Online Fraud Report estimates that over $3 billion in online revenues was lost due to online fraud. The Internet Crime Complaint Center or IC3, which is a partnership of the FBI and the National White Collar Crime Center, stated in its annual report that there was $198.44 million lost by consumers in the fraud cases that they referred to law enforcement agencies in 2006. The average loss per complaint was just over $2500.00. Both buyers and sellers lose when online businesses are vulnerable to ill intentioned web users.

There are generally 2 types of fraudulent orders that are placed online. First there is an order that is being placed merely to check the validity of the stolen credit card information. A criminal will go to a website where he knows that the credit card is going to be billed immediately for products and services. They will place an order for something that is usually about $100.00 or less. Once the order goes through and the credit card is successfully billed, they know the stolen information is valid. Then they are free to place the second kind of order where they are actually looking to receive the products that they purchase with the stolen credit card information.

Currently, some of the most popular online fraud protection solutions include address verification, card verification number (CVC2, CVV2, CID depending on the card issuer), and IP geolocation. The downside to these solutions is that the address and card verification number can both be stolen along with the credit card number and IP addresses can be masked. 81% of online merchants also use manual order verification. Besides the increased costs associated with the extra time and staff that it takes to manually review the orders, it also slows down the order process and extends delivery times.

Traditional solutions allow the fraudulent order to be placed and then attempt to weed them out afterwards. The next generation of automated online fraud protection solutions deter the perpetrator from placing the fraudulent order in the first place. Taking the crook completely out of the equation allows online merchants to focus resources on fulfilling genuine orders and servicing current customers.

One of these next generation fraud protection solutions that is gaining popularity among online merchants is televerification. Televerification works like this: When the customer goes to place an order, they are asked for their telephone number. An automated telephone call is then placed to the customer and they are given a unique security code, either through automated message or SMS. They then enter that unique code into the appropriate place on the web site in order to proceed with their business. The process is quick and easy, yet the protection it affords businesses and their customers is extremely effective.

Requiring the confirmation of a workable, traceable telephone number lessens the attractiveness of that particular online business to ill intentioned users. Criminals are leery about providing a legitimate phone number that can be traced back to them. The benefits that are inherent to implementing any automated fraud protection solution for online merchants still apply: reduced chargeback costs, reduced manual verification costs and increased user confidence. The difference with televerification is that instead of catching the fraudulent order after it has come in, it stops them at the door.

An additional benefit of televerification is the ease of which it can be integrated into an online merchant's existing website. All it takes is adding a few lines of code to an existing site that will allow it to interact with a televerification provider's server. Most applications can be up and running within hours, not days or weeks like some solutions.

With eCommerce growing 20% or more each year, fraud protection for merchants and customers becomes an ever increasingly vital issue for the entire online community. Billions of dollars are lost every year due to criminals taking advantage of the anonymity that the Internet offers. Previously, online merchants could only try to weed the fraudulent orders out from the good ones as they came in. The next generation of fraud protection allows online merchants the opportunity to stop the fraudulent orders from ever being placed.

telnet hacking part--1

******************************************************
In this Article you will learn how to:
* Use telnet from Windows
* Download web pages via telnet
* Get finger information via telnet
* Telnet from the DOS command-line
* Use netcat
* Break into Windows Computers from the Internet
Protecting Yourself
What can they do
The command-line approach
The GUI approach
Final Words (Rahul)
************************************************************

How to Use Telnet on a Windows Computer


Telnet is great little program for doing a couple of interesting things. In fact, if you want to call yourself a hacker, you absolutely MUST be able to telnet! In this lesson you will find out a few of the cool things a hacker can do with telnet.
If you are using Win95, you can find telnet in the c:\windows directory, and on NT, in the c:\winnt\system32 directory. There isn't a lot of online help concerning the usage of the program, so my goal is to provide some information for new users.
First off, telnet isn't so much an application as it is a protocol. Telnet is protocol that runs over TCP/IP, and was used for connecting to remote computers. It provides a login interface, and you can run command-line programs by typing the commands on your keyboard, and the programs use the resources of the remote machine. The results are displayed in the terminal window on your machine, but the memory and CPU cycles consumed by the program are located on the remote machine. Therefore, telnet functions as a terminal emulation program, emulating a terminal on the remote machine.
Now, telnet runs on your Win95 box as a GUI application...that is to say that you can type "telnet" at the command prompt (in Windows 95 this is the MS-DOS prompt), and assuming that your PATH is set correctly, a window titled "telnet" will open. This differs from your ftp program in that all commands are entered in the DOS window.
Let's begin by opening telnet. Simply open a DOS window by clicking "start", then "programs", then "MS-DOS", and at the command prompt, type:
c:\telnet
The window for telnet will open, and you can browse the features of the program from the menu bar.


***************************************************
NEWBIE NOTE: In this text file, I am referring only to the telnet
program that ships with Win95/NT. If you type "telnet" at the
command prompt and you don't get the telnet window, make sure
that the program is on your hard drive using the Start -> Find ->
Files or Folders command. Also make sure that your path statement includes the Windows directory. There are many other programs available that provide similar functionality, with a lot of other bells and whistles, from any number of software sites.
*************************************************


To learn a bit more about telnet, choose Help -> Contents, or
Help -> Search for help on... from the menu bar. Read through
the files in order to find more detailed explanations of things
you may wish to do. For example, in this explanation, I will
primarily be covering how to use the application and what it can
be used for, but now how to customize the colors for the application.
Now, if you choose Connect -> Remote System, you will be presented with a dialog window that will ask you for the remote host, the port and the terminal type.
****************************************************
NEWBIE NOTE: For most purposes, you can leave the terminal type on
VT100.
****************************************************
In the Connect dialog box, you can enter in the host to which
you wish to connect, and there is a list box of several ports
you can connect to:
daytime: May give you the current time on the server.
echo: May echo back whatever you type in, and will tell you that the computer you have connected to is alive nd running on the Internet. qotd: May provide you with a quote of the day.
chargen: May display a continuous stream of characters, useful for spotting network problems, but may crash your telnet program.
telnet: May present you with a login screen.
These will only work if the server to which you are trying to connect is running these services. However, you are not limited to just those ports...you can type in any port number you wish. (For more on fun ports, see the GTMHH, "Port Surf's Up.") You will only successfully connect to the port if the service in question is available. What occurs after you connect depends upon the protocol for that particular service.
When you are using telnet to connect to the telnet service on a server, you will (in most cases) be presented with a banner and a login prompt.
[Note from Carolyn Meinel: Many people have written saying their telnet program fails to connect no matter what host they try to reach. Here's a way to fix your problem. First -- make sure you are already connected to the Internet. If your telnet program still cannot connect to anything, here's how to fix your problem. Click "start" then "settings" then "control panel." Then click "Internet" then "connection." This screen will have two boxes that may or may not be checked. The top one says "connect to the Internet as needed." If that box is checked, uncheck it -- but only uncheck it if you already have been having problems connecting. The bottom box says "connect through a proxy server." If that box is checked, you probably are on a local area network and your systems administrator doesn't allow you to use telnet.]
*********************************************

NEWBIE NOTE: It's not a good idea to connect to a host on which you don't have a valid account. In your attempts to guess a username and password, all you will do is fill the log files on that host. From there, you can very easily be traced, and your online service provider will probably cancel your account.
**********************************************
Now, you can also use telnet to connect to other ports, such as
ftp (21), smtp (25), pop3 (110), and even http (80). When you
connect to ftp, smtp, and pop3, you will be presented with a
banner, or a line of text that displays some information about the
service. This will give you a clue as to the operating system
running on the host computer, or it may come right out and tell
you what the operating system is...for instance, AIX, Linux,
Solaris, or NT. If you successfully connect to port 80, you will
see a blank screen. This indicates, again, that you have successfully completed the TCP negotiation and you have a connection.
Now, what you do from there is up to you. You can simply disconnect with the knowledge that, yes, there is a service running on port 80, or you can use your knowledge of the HTTP protocol to retrieve the HTML source for web pages on the server.
How to Download Web Pages Via Telnet
To retrieve a web page for a server using telnet, you need to connect to that server on port 80, generally. Some servers may use a different port number, such as 8080, but most web servers run on port 80. The first thing you need to do is click on Terminal -> Preferences and make sure that there is a check in the Local Echo box. Then, since most web pages will generally take up more than a single screen, enable logging by clicking Terminal -> Start Logging... and select a location and filename. Keep in mind that as long as logging is on, and the same file is being logged to, all new information will be appended to the file, rather than overwriting the
original file. This is useful if you want to record several sessions, and edit out the extraneous information using Notepad.
Now, connect the remote host, and if your connection is successful, type in:
GET / HTTP/1.0
and hit enter twice.
**************************************************
NEWBIE NOTE: Make sure that you hit enter twice...this is part
of the HTTP protocol. The single / after GET tells the server
to return the default index file, which is generally "index.html".
However, you can enter other filenames, as well.
*************************************************

telnet hacking part ---2

The blank screen indicates that the finger daemon is waiting for input. If you have a particular user that you are interested in, type in the username and hit enter. A response will be provided, and the daemon will disconnect the client. If you don't know a particular username, you can start by simply hitting enter. In some cases, you may get a response such as "No one logged on." Or you may get information of all currently logged on users. It all depends on whether or not the sysadmin has chosen to enable certain features of the daemon. You can also try other names, such as "root", "daemon", "ftp", "bin", etc.
Another neat trick to try out is something that I have seen referred to as "finger forwarding". To try this out, you need two hosts that run finger. Connect to the first host, host1.com, and enter the username that you are interested in. Then go to the second host, and enter:
user@host1.com
Now, if you want to show your friends that you a "real man" because "real men don't need no stinkin' GUIs", well just open up a DOS window and type:
c:\>telnet
and the program will automatically attempt to connect to the host
on the designated port for you.
Using Netcat
Let me start by giving a mighty big thanks to Weld Pond from L0pht for producing the netcat program for Windows NT. To get a copy of this program, which comes with source code, simply go to:
http://www.l0pht.com/~weld
NOTE: The first character of "l0pht: is the letter "l". The second character is a zero, not an "o".
I know that the program is supposed to run on NT, but I have
seen it run on Win95. It's a great little program that can be used
to do some of the same things as telnet. However, there are
advantages to using netcat...for one, it's a command-line program,
and it can be included in a batch file. In fact, you can automate
multiple calls to netcat in a batch file, saving the results to
a text file.
**************************************************
Before using netcat, take a look at the readme.txt file provided in
the zipped archive you downloaded. It goes over the instructions
on how to download web pages using netcat, similar to what I
described earlier using telnet.
There are two ways to go about getting finger information using
netcat. The first is in interactive mode. Simply type:
c:\>nc 79
If the daemon is running, you won't get a command prompt back. If this is the case, type in the username and hit enter. Or use the automatic mode by first creating a text file containing the username of interest. For example, I typed:
c:\>edit root
and entered the username "root", without the quotes. Then from
the command prompt, type:
c:\>nc 79 < root
and the response will appear on your screen. You can save the
output to a file by adding the appropriate redirection operator
to the end of the file:
c:\>nc 79 <> nc.log
to create the file nc.log, or:
c:\>nc 79 <>> nc.log
to append the response to the end of nc.log. NOTE: Make sure
that you use spaces between the redirection operators.

How to Break into a Windows machine Connected to the Internet

Protecting Yourself
First, the method of protecting yourself needs to be made perfectly clear. DON'T SHARE FILES!! I can't stress that enough. If you are a home user, and you are connecting a Win computer to the Internet via some dial-up method, disable sharing. If you must share, use a strong password...8 characters minimum, a mix of upper and lower case letters and numbers, change the password every now and again. If you need to transmit the
password to someone, do so over the phone or by written letter. To disable sharing, click on My Computer -> Control Panel -> Network -> File and Print Sharing. In the dialog box that appears, uncheck both boxes. It's that easy.

** The command-line approach **
Okay, now for the part that should probably be titled "How they do it". All that is needed is the IP address of the remote machine. Now open up a DOS window, and at the command prompt, type:
c:\>nbtstat -A [ip_addr]
If the remote machine is connected to the Internet and the ports used for sharing are not blocked, you should see something like:
NetBIOS Remote Machine Name Table
Name Type Status
---------------------------------------------
NAME <00> UNIQUE Registered
DOMAIN <00> GROUP Registered
NAME <03> UNIQUE Registered
USERNAME <03> UNIQUE Registered
MAC Address = 00-00-00-00-00-00
This machine name table shows the machine and domain names, a logged-on username, and the address of the Ethernet adapter (the information has been obfuscated for instructional purposes).
**Note: This machine, if unpatched and not protected with a firewall or packet-filter router, may be vulnerable to a range of denial of service attacks, which seem to be fairly popular, largely because they require no skill or knowledge to perpetrate.
The key piece of information that you are looking for is in the Type column. A machine that has sharing enabled will have a hex code of "<20>".
If you find a machine with sharing enabled, the next thing to do is type the following command:
c:\>net view \\[ip_addr]
Now, your response may be varied. You may find that there are no shares on the list, or that there are several shares available. Choose which share you would like to connect to, and type the command:
c:\>net use g: \\[ip_addr]\[share_name]
You will likely get a response that the command was completed successfully. If that is the case, type:
c:\>cd g:
or which ever device name you decided to use. You can now view what exists on that share using the dir commands, etc.
Now, you may be presented with a password prompt when you ssue the above command. If that is the case, typical "hacker" (I shudder at that term) methods may be used.
c:\windows\lmhosts.sam
Read over the file, and then open create another file in Notepad, called simply "Lmhosts", without an extension. The file should contain the IP address of the host, the NetBIOS name of the host (from the nbtstat command), and #PRE, separated by tabs. Once you have added this information, save it, and minimize the window. In the DOS command window, type:
c:\>nbtstat -R
This command reloads the cache from the Lmhosts file you just created.
Now, click on Start -> Find -> Computer, and type in the NetBIOS name of the computer...the same one you added to the lmhosts file. If your attempt to connect to the machine is successful, you should be presented with a window containing the available shares. You may be presented with a password prompt window, but again, typical "hacker" (again, that term grates on me like fingernails on a chalk board, but today, it seems that it's all folks understand) techniques may be used to break the password.
************************************************
You friend can learn his or her IP address by going to the DOS prompt while online and giving the command "netstat -r". Something like this should show up:
C:\WINDOWS>netstat -r
Route Table
Active Routes:
Network Address Netmask Gateway Address Interface Metric
0.0.0.0 0.0.0.0 198.999.176.84 198.999.176.84 1
127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 1
198.999.176.0 255.255.255.0 198.999.176.84 198.999.176.84 1
198.999.176.84 255.255.255.255 127.0.0.1 127.0.0.1 1
198.999.176.255 255.255.255.255 198.999.176.84 198.999.176.84 1
224.0.0.0 224.0.0.0 198.999.176.84 198.999.176.84 1
255.255.255.255 255.255.255.255 198.999.176.84 0.0.0.0 1
Your friend's IP address should be under "Gateway Address." Ignore the 127.0.0.1 as this will show up for everyone and simply means "locahost" or "my own computer." If in doubt, break the Internet connection and then get online again. The number that changes is the IP address of your friend's computer.