This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

Gmail Hacking Tool - A New Way to Hack Gmail


A new Gmail hacking tool that is capable of automatically stealing the Gmail IDs of non-encrypted sessions and breaking into Gmail accounts has been presented at the Defcon hackers’ conference in Las Vegas.


Last week Google introduced a new feature in Gmail that allows users to permanently switch on SSL and use it for every action involving Gmail, and not only, authentication. Users who did not turn it on now have a serious reason to do so as Mike Perry, the reverse engineer from San Francisco who developed this Gmail hacking tool is planning to release the tool in two weeks.


When you log in to Gmail account the website sends a cookie (a text file) containing your session ID to the browser. This file makes it possible for the website to know that you are authenticated and keep you logged in for two weeks, unless you manually click the sign out button. When you click sign out this cookie is cleared.Even though when you log in, Gmail forces the authentication over SSL (Secure Socket Layer), you are not secure because it reverts back to a regular unencrypted connection after the authentication is done.


According to Google this behavior was chosen because of low-bandwidth users, as SLL connections requires high bandwidth.The problem lies with the fact that every time you access anything on Gmail, even an image, your browser also sends your cookie to the website. This makes it possible for a hacker to sniff the traffic on the network to insert an image served from http://mail.google.com and force your browser to send the cookie file, thus getting your session ID. The new Gmail hacking tool is capable of doing this.Once this happens the hacker can log into the account without the need of a password. People checking their e-mail from public wireless hotspots are more likely to get hacked than the ones using secure wired networks.


Perry mentioned that he notified Google about this situation over a year ago and even though eventually it made this option available, he is not happy with the lack of information. “Google did not explain why using this new feature was so important” he said. He continued and explained the implications of not informing the users, “This gives people who routinely log in to Gmail beginning with an https:// session a false sense of security, because they think they’re secure but they’re really not.


“If you are logging in to your Gmail account from different locations and you would like to benefit from this option only when you are using unsecured networks, you can force it by manually typing https://mail.google.com before you log in. This will access the SSL version of Gmail and it will be persistent over your entire session and not only during authentication.

How to Copy Locked Photos from Orkut ?


Recently Orkut updated it’s security feature and disabled Right-click on photos of friend’s album.So this makes it difficult to copy photos from Orkut.It’s a new security update made by Orkut to prevent people from copying photos from Orkut and misusing it.This may be annoying most of you! Then…


How To Copy Locked Photos From Orkut?



Yes it’s still possible to copy the photos from Orkut.Here’s a step-by-step procedure to copy the photo.


1. Login into your Orkut Account.


2. Goto your friend’s album and open the photo that you need to copy.


3. Once the photo is loaded to it’s full size just place the mouse cursor on the photo.


4. Press the left click button and drag and drop the photo onto the ADDRESS BAR.I think this trick is no longer working.So I have a new trick….


Just DRAG and DROP the PHOTO onto the current/new TAB (If you have IE 7). That’s it . This trick is working now!!



4. Now the photo gets displayed seperately on your browser.


5. You can Right-Click and select the Save As option to save the photo onto your PC.


The browser also displays the direct link to the photo.This link can be used to share the Orkut photos with your friends without the need to login to your Orkut account to access photos.


Please express your opinions through comments.Cheer Up..


Happy Orkut Hacking.

How to Enable Telnet Command in Vista ?


Most of you are familiar with the telnet command.It is one of the well known Windows IP Utilities .In fact the telnet command is most important for sending a fake email which i have discussed in my previous post.If you are using Windows XP the telnet command is available by default.But if you use Windows Vista the telnet command is disabled by default.


So when you try to use the telnet command in Windows Vista you get the following error message.


‘telnet’ is not recognized as an internal or external command,operable program or batch file.



You get this error in Vista because unlike XP ,Vista does not support telnet command by default.So, for this you have to manually enable/turn on the telnet feature in Vista.


Here’s the step by step procedure to enable telnet feature (telnet command) in Windows Vista.


1. Goto the Control Panel.


2. Click on the sub heading Uninstall a program under the main heading Programs.


NOTE: IF you are in the Classic View click on Programs and Features.


3. Now in the left panel under the Tasks select the option Turn Windows features on or off.



4. Now a new window opens.In the new window select the following


Telnet Client

Telnet Server (optional)


5. After selecting click on OK.


Now wait for few minutes till the telnet feature is installed.Once the telnet feature is installed you can goto the command prompt and use the telnet command.System restart is not required.

Hide IP Address - Real ways to hide your IP


Here in this post I will try to give you every possible information to hide the IP address.If you seriously want to hide your IP address then this post is for you!


One of the most frequently asked questions by the internet users is How To Hide IP Address ?. Many times it becomes necessary to hide the real IP address for the sake of privacy.For this, I have tried many softwares, proxy servers and many such tools that guaranteed to hide my IP address.But still none of them worked for me. I think most of you have the same experience.Are you fed up with these dummy softwares that fails to hide the real IP address? Then is there any working way to hide the IP address?



YES, you can definitely hide your IP .


Now I’ll come to the heart of the post, which contains the answer to your curious question How to Hide the IP address ? The only solution to hide your IP address is by using a Proxy Server.But Wait! The story doesn’t end here.Even though proxy servers are the only way to hide your IP address, there are several ways of connecting your PC to the proxy server.Before setting up the connection with the proxy servers you must know some information about different types of proxy servers and their uses.


1. Transparent Proxy Server

This type of proxy server identifies itself as a proxy server and also makes the original IP address available through the http headers. These are generally used to speedup the web browsing since thay have a very good ability to cache websites.But they do not conceal the IP of it’s users. It is widely known as transparent proxy because it will expose your real IP address to the web.This type of proxy server does not hide your IP address.


2. Anonymous Proxy Server

This type of proxy server identifies itself as a proxy server, but does not make the original IP address available. This type of proxy server is detectable, but provides reasonable anonymity for most users. This type of proxy server will hide your IP address.


3. Distorting Proxy Server

This type of proxy server identifies itself as a proxy server, but make an incorrect original IP address available through the http headers. This type of proxy server will hide your IP address.


4. High Anonymity Proxy Server ( Elite Proxy)

This type of proxy server does not identify itself as a proxy server and does not make available the original IP address. This type of proxy server will hide your IP address.So this is the best way to mask your IP.


Which Proxy Server is the best to Hide My IP ?


I know, you can answer this question better than me.Obviously High Anonymity Proxy or Elite Proxy is the best to hide your IP.But it’s not easy to get a list of working elite proxies.If you search the Google, you will definitely get tons of proxy list.You’ll get a list of proxies in the following format


IP:Port Number

Eg: 221.90.45.67:8080 (221.90.45.67 is the IP of the proxy server and 8080 is the port number)

But most of them don’t work.Here are some of the problems/risks associated with using free proxies that are available on the internet.



  • Most of them do not work since the proxy servers frequently changes it’s IP/Port number.

  • Even if you find a working proxy server it may be too slow.

  • Your privacy is not guaranteed since all your traffic is routed through the proxy server.

  • The administrators of the proxy servers may steal your valuable information such as passwords,SSN (Social security number),Credit Card details etc.


So with all these being the risks then how to find a Working,fast,Highly Anonymous and secured Proxy servers?


Now I will give a list of softwares that will really hide your IP address.I have tried many such softwares and have found only few of them working perfectly.Here is a list of working IP Hiding softwares that you can try.I have listed them in the order of their popularity


1. Hide The IP


Let’s you choose the country,Type and speed of the proxy.Not so popular but personally I recommend this to the users.


2. Hide My IP


3. Hide IP NG


You can get more informations about these products on their respective homepages.


How to ensure that the IP is hidden ?


Before you hide your IP you can check your real IP by visiting the following site.


WhatIsMyIPAddress.Com


Once you get your real IP, switch on your IP hiding software.Now once again visit the above site and check your IP address.If you see a new IP then this means that your software is doing the right job.Also the above site(Whatismyipaddress.com) is capable of detecting many proxies.If you see the words such as “Suspected proxy server or network sharing device” or similar words then it means that the proxy you are using is not an Elite Proxy.


One Final Word before you leave! Even though Elite proxies are almost undetectable this doesn’t mean that you can escape from online crimes by hiding your IP.There are many proxy detecting services available which detect almost any proxy.So if you involve in any cyber crimes then you will definitely be behind the bars.Using proxy will not help you in this case.


One More thing, It is unsafe to use proxy during e-commerce transactions such as Online banking,Online Credit Card payment etc.So please avoid proxies during these circumstances.

How to Hack an Email using Hardware Keylogger ?

Top Reasons why you shouldn’t buy an iphone

Are you planning to buy an iphone ? If so then this post is a must read for you.The much hyped iPhone 3G was launched in India a few weeks back and we have seen many issues and open security flaws in the new iPhone.Here I have some of the top reasons for which you shouldn’t buy an iphone.



 



  • The worst thing is that you cannot forward a SMS message!! Don’t think that I am foolish, but really your iPhone 3G can’t forward a simple SMS. You’ll have to retype the SMS and forward it.

  • There is NO copy / paste functionality. So you need to remember the texts and type again as you go.

  • Bluetooth functionality is only limited to headset use. You can’t do any file transfer over Bluetooth.So if you are planning to share your songs or photos with your friends then forget about it!

  • Absolutely no camera settings - it’s just like some ancient digital camera which does only point and shoot functionality.No Flash,No Zoom functionality.

  • Photos taken in a VGA camera is better than that of iphone!

  • The iPhone 3G is simply overpriced in India (Costs almost twice the price as in US)

  • It’s in built Safari web browser does not support Flash as well as Java.

  • There is No office document editor. Most Nokia’s come with inbuilt editor’s for Word / Excel.

  • The iPhone doesn’t has AD2P on the Bluetooth - which means you can’t get stereo sound via Blue Tooth headphones, that’s a big disappointment for the music fans.

  • The iPhone doesn’t has a Removable battery. Yes - you cannot change the battery yourself. Apple expects you to send the phone to an Apple Outlet to replace the battery. Now if you travel too much - what are you gonna do? Look for an Apple Store to interchange the travel battery?

  • iPhone doesn’t has an option to send MMS. Forget about MMS.

  • Though you can’t sent MMS - You can’t receive MMS messages too!

  • You can’t set your personal songs as ring tones!

  • The iPhone’s screen is not Finger Print Resistant. Since the iPhone is a touch screen phone so it is bound to get your finger print’s each time you touch so it gets dirty very easily.

  • THE BIGGEST ONE - ONCE YOU ARE ON 3G NETWORK(Which I suppose will happen in a year in India), YOU CANNOT MAKE CALLS TO A PHONE ON 2G NETWORK. SO IF YOU WANT TO CALL A PERSON WHO IS NOT HAVING A 3G PHONE. SORRY, YOU’LL HAVE TO FIND A PCO and a 1RUPEE!!!


These are some of the top reasons that shows iphone’s incapability.But there are many more such reasons for you to stop buying an iphone.If you still want to buy the iphone then definitely you must be crazy?!

Is your Nokia Cell Phone Original ?


Nokia is one of the largest selling phones across the globe.Most of us own a Nokia phone but are unaware of it’s originality.Are you keen to know whether your Nokia mobile phone is original or not? Then you are in the right place and this information is specially meant for you. Your phones IMEI (International Mobile Equipment Identity) number confirms your phone’s originality.


Press the following on your mobile *#06# to see your Phone’s IMEI number(serial number).


Then check the 7th and 8th numbers


Phone serial no. x x x x x x ? ? x x x x x x x



IF the Seventh & Eighth digits of your cell phone are 02 or 20 this means your cell phone was assembled in Emirates which is very Bad quality


IF the Seventh & Eighth digits of your cell phone are 08 or 80 this means your cell phone was manufactured in Germany which is fair quality


IF the Seventh & Eighth digits of your cell phone are 01 or 10 this means your cell phone was manufactured in Finland which is very Good


IF the Seventh & Eighth digits of your cell phone are 00 this means your cell phone was manufactured in original factory which is the best Mobile Quality


IF the Seventh & Eighth digits of your cell phone are 13 this means your cell phone was assembled in Azerbaijan which is very Bad quality and also dangerous for your health.