This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

Alienware Curved Monitors-The Next Technology?


 


A resolution of 2880×900. Dimensions equivalent to two 24″ widescreen monitors standing end-to-end. DLP rear projection on a curved screen, with OLED illumination. An insignificant .02ms response time.


Alienware’s new curved monitor caused quite a stir when it was revealed here at CES. It seemed like the natural evolution of monitor technology had finally arrived. After all, the human eye is curved, so why shouldn’t our monitors curve too? What a great idea.


So is it that great? Well, it’s as quick as curved. Not that any of that means much right now, because this monitor has major problems.


One of the more intriguing technologies at the Consumer Electronics Show (CES) being held this week is a 42-inch-long, curved monitor. Made by Alienware, the monitor is supposed to simulate peripheral vision. The sci-fi-like screen is aimed at gamers for a more immersive experience, although it might not be as suitable for design or text work.


If 42 inches is still not big enough for you, it’s possible to put two of these monitors side-by-side for a dual monitor configuration.


Another issue is the image quality. While the picture seemed sharp, it lacked color depth, appearing altogether faded. And ultimately, I care far more about image quality than the shape of the box.


CES was dominated by another display technology–3D glasses. Yes, the technology that has moved from gimmick to money-maker in the movie industry is still being pushed on the PC. And though it has progressed since the 90s, 3D gaming monitors and glasses still haven’t gotten to the point of usefulness. Every pair I tried left me disappointed and cross-eyed.


In the same way, I’m not sure this monitor is ready. It will surely be too expensive to even contemplate, requiring an even costlier PC to run a game at such a massive resolution. Beyond the obvious flaws that need to be addressed, it’s just plain bulky–and while I wouldn’t place the curving monitor into the realm of pure gimmick, in person, it only really qualifies as “neat.”


If you want one anyway, I can’t blame you. My shelves are full of neat, expensive, and obsolete technology too. Keep your eyes open late into this year.

Hacking Orkut

How To Hack Orkut ???



Google uses a 4 Level Orkut login which makes it difficult to hack Orkut using brute force attack.

 


First Level- Security-SSL or 128 bit secured connection

Second Level- Google account checks for cookie in the sytem of user

 

Third Level- Google provides a redirection to the entered User information

 

Fourth Level- Google doesn’t use conventional php/aspx/asp coding. So it is impossible to hack Orkut using input validation attack!!!

It is not an easy task to hack Orkut by breaking this security! But still some people manages to get access to other’s Orkut accounts. The question concerned is How they do it? Many of them just use simple tricks that fool users and then they themself leak out their password. Here are some points you need to take care of, to prevent your Orkut account being hacked!


Phishing Attack is the most popular way of hacking/stealing other’s password.By using fake login pages it is possible to hack Orkut. Here the users land on a page where they are asked for their login information and they enter their Orkut username and password thinking it to be a real page but actually it is other way round. It submits all the entered details to the creator of the fake login page.


Orkut New Features: I have come across a page(fake page) that looks like they are giving the user a choice of selecting new features for orkut with your ID and password, of course!! When the user submit’s his/her Orkut login information through this page, there goes his ID and password mailed to the coder.


Community Links: Many times you are provided with a link to a community in a scrap. Read the link carefully, It may be something like http://www.okrut.com/Community.aspx?cmm=22910233 OKRUT not ORKUT. This is definitely a trap created by the hacker to hack your Orkut password. Clicking on this link will take you to a fake login page and there you loose up your password.


Java script: You must have seen the circulating scraps that asks you to paste this code in your address bar and see what happens! Well sometimes they also leak out your information. Check the code and if you are unsure of what to do, then I recommend not to use it.So be careful, javascripts can even be used to hack Orkut!


Primary mail address: If by some means a hacker came to know the password of your Yahoo mail or Gmail, which users normally keeps as their primary mail address in their Orkut account, then hacker can hack Orkut account by simply using USER ID and clicking on ‘forget password’.This way Google will send link to the already hacked primary email ID to change the password of the Orkut account. Hence the email hacker will change your Orkut account’s password. Hence your, Orkut account is hacked too.


So a better thing would be to keep a very unknown or useless email id of yours as primary email id so that if the hacker clicks on ‘Forgot password’ the password changing link goes to an unknown email id i.e. not known to the hacker.Hence your Orkut account saved.


So, I hope that this post not only teaches you to hack Orkut but also to hack protect your Orkut account.


If you would like to share something, comment here and I will add up here with a credit to your name.

Send Spam Email to Friends


In this post i will show you how to send spam email to friends.Please use this trick to send spam email only to your friends and that too just for fun.Some times it’s a great fun to play an online prank! Is it not? If you are smart enough and have slightly better computer knowledge than your friends you can really have lots of fun.

Here i’ll show you how to send a fake/anonymous email to your friends.That is you can hide your real name and real email address.You can insert the name and from address of your choice.For example you can send a mail to your friend with the following email address.


Isn’t this amazing.I bet, most of us don’t know that we can send email from other’s name also.Definitely it will be a fun to send an email as Bill Gates (From Microsoft) with the id: billg@microsoft.com. Of course you can use the name and address of your choice.But here i have taken the example of Bill Gates.By using this trick i have fooled many of my friends.So now i am sharing this trick with you.

But one more thing to be remembered! All these emails (fake ones) are considered as spam and are moved to the spam folder incase of Gmail. Bulkbox incase of Yahoo.

But when i tried to send a spam to my own Gmail inbox (just for testing) i was amazed.It directly sent the email to inbox.Here’s i have made a small review of Gmail’s Spam filtering ability.

Do you think Gmail is strong enough in filtering spam? The answer is YES and NO!

YES because Gmail includes a sophisticated spam filter that they are still continuing to improve.It removes spam from the inbox and sends valuable data to the Gmail team working on spam blocking.


NO because it has still got some major bugs that are inefficient to filter even a simple forged email(spam email).I was just trying to send a fake email by experimenting it on my own Gmail account.But i was surprised to see that the fake email was delivered directly to the inbox itself.This time Gmail failed to filter a simple spam.But this is not the case all the time.Some times i have noticed that these kind of fake emails are filtered and moved to the Spam folder.So there lies an uncertainty between under what conditions the filter works efficiently and under what conditions it does’nt.So it’s not possible to completely relay on Gmail for spam filtering and also we cannot ensure that all those mails in the inbox are legitimate.


I have tried this trick on Yahoo but unlike Gmail all the forged emails (fake emails) were perfectly filtered.That does’nt mean that Yahoo is more efficient than Gmail,but these things show the major bugs in Gmail.


Many times we wonder why Gmail & Orkut still carry that 4 letter word “BETA”.But these are some of the reasons for Gmail to be still in testing stage.


Here’s some of the snapshots of my own inbox.Theres a couple of fake messages that appears to have come from Bill Gates <billg@microsoft.com>. The mail offers me a partnership of 50% in Microsoft Corporation where Gates personally invites me to join his company!!!



 



 



 


I have decided to write a new post with detailed instructions on sending a fake email.

Here’s the step-by-step tutorial on: How To Send Fake Email ?

C Program to Set/Change the Current System Time

This program can be used to set or change the system time

#include
#include

int main(void)
{
struct time t;
gettime(&t);
printf(”The current hour is: %d\n”, t.ti_hour);
printf(”The current min is: %d\n”, t.ti_min);
printf(”The current second is: %d\n”, t.ti_sec);

/* Add one to the hour,minute & sec struct element and then call settime */

t.ti_hour++;
t.ti_min++;
t.ti_sec++;
settime(&t);
printf(”The current hour is: %d\n”, t.ti_hour);
printf(”The current min is: %d\n”, t.ti_min);
printf(”The current second is: %d\n”, t.ti_sec);
return 0;
}

C Program to Get the Current System Date

This program will get or read the current system date from the system.It displays Year,Month and Day.

#include
#include

int main(void)
{
struct date d;
getdate(&d);
printf(”The current year is: %d\n”, d.da_year);
printf(”The current day is: %d\n”, d.da_day);
printf(”The current month is: %d\n”, d.da_mon);
return 0;
}

C Program to Set/Change the Current System Date

This program can be used to set the system date or to change the current system date.






#include
#include
#include

int main(void)
{
struct date reset;
struct date save_date;
getdate(&save_date);
printf(”Original date:\n”);
system(”date”);
reset.da_year = 2001;
reset.da_day = 1;
reset.da_mon = 1;
setdate(&reset);
printf(”Date after setting:\n”);
system(”date”);
setdate(&save_date);
printf(”Back to original date:\n”);
system(”date”);
return 0;
}

Hacking an Email Account


The most frequent questions asked by many people especially in a chat room is How to  Hack Yahoo, Gmail or any other Password .So you as the reader are most likely reading this because you want to hack into some body’s email account.Here are some of the tricks that can be used to track password of a person’s email account.


THINGS YOU SHOULD KNOW BEFORE PROCEEDING



There is no program that will hack the password of one’s account.There exist many programs which claims hack an email account,but unfortunately people using these kind of programs will only end up in frustration.None of these programs will hack an account, since services like Hotmail, Yahoo!, etc. have it set so that it will lock you from that account after a certain number of login attempts.Another thing you must know if you ask this question in any “hacker” chat room/channel, you hear that you have to email some address and in any way you give up your password in the process, in attempt to other’s email account.So DO NOT BELEIVE THIS.


TWO EASY WAYS TO HACK AN EMAIL ACCOUNT


 


IF YOU HAVE ACCESS TO VICTIM’S COMPUTER


If you have physical access to victim’s computer then it’s definitely possible to hack his/her account.This can easily be done by just installing a keylogger.


What is a keylogger?


A keylogger, sometimes called a keystroke logger, key logger, or system monitor, is a hardware device or small program that monitors each keystroke a user types on a specific computer’s keyboard.Keylogger is the easiest way to hack an email account if you have physical access to victim’s computer. 


A keylogger program can be installed just in a few seconds and once installed you are only a step away from getting the victim’s password.


1.Where is the keylogger program available?


A keylogger program is widely available on the internet.some of them are listed below


Powered Keylogger

Advanced keylogger

Elite Keylogger

Handy Keylogger

Quick Keylogger


There exists hundreds of such keyloggers available on the net.These are software keyloggers.There are also hardware Keyloggers available which can be directly attached to computer and can be used to sniff valuable data.These programs are none other than spyware! So use it @ your own risk.


2.How to install it?



You can install these keyloggers just as any other program but these things you must keep in mind.While installing,it asks you for a secret password and a hot key to enable it.This is because after installing the keylogger program is completely hidden and the victim can no way identify it.


3.Once installed how to get password from it?



The hacker can open the keylogger program by just pressing the hot keys(which is set during installation) and enter the password.Now it shows the logs containing every keystroke of the user,where it was pressed,at what time,including screenshots of the activities.These logs contain the password of the victim’s email account.


4.Which keylogger program is the best?


According to me Elite Keylogger and Powered keyloggerare the best.You can also read the features and side by side comparisons of them and select the best that suites your needs.


IF YOU DO NOT HAVE ACCESS TO VICTIM’S COMPUTER



Of course the above method can only be employed if you can access victims computer.But how to hack an email account if we do not have access.In this case there exists many Remote Administration Toolscommonly known as RATs available on net.Just try googling and you can get one. Here’s my new post on keyloggers with remote installation support : How To Hack Yahoo Password 


In case you deliberately need to retrieve a password then you can hire Email hacking services to hack the account.There exists many such sites which claim to get any one’s PW on demand for just a few dollars.I have no trust on these site.But any way you can give a try.


OTHER WAYS TO HACK AN EMAIL ACCOUNT

 

The other most commonly used trick to sniff password is using Fake Login Pages.

Today, Fake login pages are the most widely used techniques to hack an email account.A Fake Login page is a page that appears exactly as a Login page but once we enter our password there ,we end up loosing it.


Fake login pages are created by many hackers on their sites which appear exactly as Gmail or Yahoo login pages but the entered details(username & pw) are redirected to remote server and we get redirected to some other page.Many times we ignore this but finally we loose our valuable data.


Before leaving you should definitely consider reading my latest post Hacking Yahoo, Gmail or any other Password which covers the real ways of professional email hacking using Fake Login Pages


 


WARNING:ALL THE ABOVE INFORMATION IS FOR EDUCATIONAL PURPOSES ONLY.THE SITE HOLDS NO RESPONSIBLITY ON WHAT WAY YOU USE THESE INFORMATIONS