This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

Download Windows 7 Build 7127 ONLY 300mb WORKING TESTED

Windows 7 includes a number of new features, such as advances in touch, speech, and handwriting recognition, support for virtual hard disks, improved performance on multi-core processors, improved boot performance, and kernel improvements.



Windows 7 adds support for systems using multiple heterogeneous graphics cards from different vendors, a new version of Windows Media Center, Gadgets being integrated into Windows Explorer, a Gadget for Windows Media Center, the ability to visually pin and unpin items from the Start Menu and Taskbar, improved media features, the XPS Essentials Pack being integrated, Windows PowerShell Integrated Scripting Environment (ISE), and a redesigned Calculator with multiline capabilities including Programmer and Statistics modes along with unit conversion.



Many new items have been added to the Control Panel including: ClearType Text Tuner, Display Color Calibration Wizard, Gadgets, Recovery, Troubleshooting, Workspaces Center, Location and Other Sensors, Credential Manager, Biometric Devices, System Icons, Action Center, and Display. Windows Security Center has been renamed the Windows Action Center (Windows Health Center and Windows Solution Center in earlier builds) which encompasses both security and maintenance of the computer.



The taskbar has seen the biggest visual changes, where the Quick Launch toolbar has been merged with the task buttons to create an enhanced taskbar or what Microsoft internally refers to as the "Superbar". This enhanced taskbar also enables the Jump Lists feature to allow easy access to common tasks.[28] The revamped taskbar also allows the reordering of taskbar buttons.



Screenshots have appeared demonstrating a new feature called 'Peek'. Peek is a quick way of making all visible windows transparent for a quick look at the desktop. A Microsoft spokesman said that "this will be useful for users who want a quick look at the news" in reference to RSS gadgets on the desktop.



For developers, Windows 7 includes a new networking API with support for building SOAP based web services in native code (as opposed to .NET based WCF web services),new features to shorten application install times, reduced UAC prompts, simplified development of installation packages, and improved globalization support through a new Extended Linguistic Services API.



OS: Microsoft Windows 7 Original

Type of File: WinRaR

Size: 2.14 GB AFTER EXTRACTING!



How to Install:

1. Extract the rar archive....

2. Burn on a DVD

3. Now Boot and Install Just like Vista



Minimum recommended specs call for:

1. 1 GHz 32-bit or 64-bit processor

2. 1 GB of system memory

3. 16 GB of available disk space

4. Support for DirectX 9 graphics with 128 MB memory (to enable the Aero theme)

5. DVD-R/W Drive

6. Internet access to get updates



Features of Windows 7

Easier

Windows 7 will make it easier for users to find and use information. Local, network and Internet search functionality will converge.

More Secure

Windows 7 will include improved security and legislative compliance functionality.

Better Connected

Windows 7 will further enable the mobile workforce. It will deliver anywhere, anytime, any device access to data and applications

Lower Cost

Windows 7 will help businesses optimize their desktop infrastructure. It will enable seamless OS, application and data migration, and simplified PC provisioning and upgrading.





Download Window 7 Part 1



Download Window 7 Part 2



Download Window 7 Part 3

how to track a mobile no

We all know that Orkut currently with gaining popularity are introducing new features in it which can also be called as Orkut apps. One of these apps that i came around is Mobile number tracker. Orkut has come up with the application where you can enter your mobile number and you will get its details. Check out this pic.



 
  1. Login to orkut

  2. search for the app Mobile Tracker (Trace Mobile Location)

  3. Or you can also click here to add the application

  4. Enter the mobile number of which you want the details.

  5. In the same screen below you will get the results.

Orkut has developed this application for the purpose of safe and emergency use.



Save Windows XP Updates on PC

You often have to download windows updates again and again if your computers gets formatted .So,here is a tut to help you save you Windows XP Updates so that you don't have to download it each and every time you format you computer



Hack-Genius

1.Go to the Windows Update web site.



http://update.microsoft.com



2.In the left pane, under Other Options,select “Personalize Windows Update”.



3.Under “Set Options for Windows Update”, select the check box for “Display the Link to Windows Update Catalog under ‘See Also’”, then click “Save Settings”.



4.Go back to the Windows Update web site.



5.In the left pane, under “See Also”, select “Windows Update Catalog”.



6.Select “Find Updates for Microsoft Operating Systems”.



7.Select the operating system and language of your choice.



8.Select “Critical Updates and Service Packs”.



9.Select all of the patches you’d like to download, then click on “Go to download basket” to download them.

5000+ genuine serials of all the Microsoft Products

Here are more than 5000 serials of all the products of the Microsoft Corporation !Including Windows 7 serials too !These all serials are genuine and will give you the Microsoft Corporation's WINDOWS GENUINE ADVANTAGE !!





Hack-Genius

FEATURES:

1.More than 5000 serials

2.Not in the blacklist (totally genuine)

3.Enables you to update your computer through automatic updates

4.Helps to gain Windows Genuine Advantage

5.Genuine Advantage helps in removing malicious and unwanted software !!



WHAT is the Windows Genuine Advantage Program?

Microsoft Genuine Advantage programs, including Windows Genuine Advantage, help you determine whether or not your copy of Windows is genuine. Genuine Windows software is published by Microsoft, properly licensed, and supported by Microsoft or an authorized partner, giving you full capabilities, access to all the latest updates, and confidence that you are getting the experience you expect. Microsoft continues to invest in education, engineering, and enforcement in order to more effectively combat software piracy. It’s part of Microsoft’s commitment to help protect its intellectual property and to help you avoid problems before they happen.



WHY you should care that your computer is running genuine Windows?

In today’s world, you rely on your computer to work for you and to run your business. You store thousands of photos, music collections, and important documents; you make purchases, enter personal information, and search the Web. Imagine what it would be like to lose all your favorite family photos, or have your financial data stolen as a result of malicious or unwanted software running on your computer. Market research firm IDC reported in a recent study (English only) that obtaining and using pirated software can pose a serious security threat to organizations and individuals. Often, counterfeit software is bundled with malicious and unwanted software that can lead to a corrupted system, a loss of data, and even identity theft. The risk of running counterfeit software is real. Windows is the operating system and the brain behind everything you do on your computer; you can help protect your data by installing only genuine Windows.



Download 5000+ genuine serials of all the Microsoft Products



via:downarchive

Intrusion Attack Through Port Scanning

Port scanning determines which ports are listening to the active connections on the subjected host. These ports represent potential communication channels. With the help of port scanning we get close to the network communication scenario. We get to know more about victim’s network which is useful for further attacks. Internet does not exclusively rely on TCP port 80, used by hypertext transfer protocol (HTTP). Any surfer surfing any website can gain the same level of proficiency as your average casual surfer. Port scanning can be efficiently done to reveal the secret’s about the host.



Automated port scanners are necessary to perform such scanning, which are available in the market for very small cost.



Port scanning is done so as to gather information passively about the victim. This help’s intruder to eavesdrop into Victim’s Network.



Such scanning also helps in gathering information so as to form a network map. Network map are useful to get to know the victim network architecture or hierarchy.



There are thousands of ports available for communication on a network some well known are FTP, HTTP, SMTP etc., Which ports remains open or close depends on the network’s requirement. Like any web server will always have an FTP port open.



Every port has its unique number which is targeted after the successful port scanning. Various bugs, backdoors are installed on these ports and tested whether the system is vulnerable.



And this is how a successful attack through port scanning is done.



Hope you have enjoyed this informative article about port scanning. We are covering requirements of a good port scanner

Reqiurement For Good Port Scanners

Dynamic delay time calculations: Delay time is necessary for some scanners to send the data chunks. So you need to check whether it is working properly or not with ping, which gives replies to every execution. But that is some time cumbersome, so you can use connect ( ) to a closed port on target. Which can gives you an initial delay time you’re your scanner. Simple, isn’t it!!!



Parallel Port Scanning: Scanners generally scans orts linearly and one by one till total ports are reached, but this old technique only works better with TCP on a faster network. So you need to test whether your port scanner has parallel port scanning or not because we have to scan over larger area or wide area network.

Port Scanners



Port Scanners



Flexible Port Specification: Can you believe we need to scan all 65535 ports. It will be slow and tiresome process. Also, the scanners which only allow you to scan ports 1 - N often fall short of an intruder’s need. Test whether your scanner has ranges option available which can allow you to scan the ports in better manner.



Flexible target specification: On a larger network you may surely want to scan more than one or two hosts. So you should have flexible target specification available on your port scanner.



Retransmission: Sending chunks and collecting for response is a way old technique for scanners. But this can lead to false positives or negatives in the case where packets are dropped. So, check whether your scanner have automated retransmission available.



So these are some of the primary facts of considerations. Some secondary consideration includes Down Host Detection, Own IP detector, and IP scanner etc.

Hiding secret messages in internet traffic

Researchers have demonstrated a new way to hide secret messages in internet traffic that can elude even vigilant network operators.



The process is a network application of steganography, which is the ancient science and art of hiding messages in documents, pictures and other media in a way that can be easily detected by the intended recipient, but not by third parties. The researchers from the Warsaw University of Technology have found a way to apply the principle to network traffic by exploiting design weaknesses in TCP, or transmission control protocol.



RSTEG, short for Retransmission Steganography, works by manipulating the back-and-forth sequence and messages exchanged each time an internet packet is sent. Typically, a computer on the receiving end sends a confirmation each time one is successfully transmitted. RSTEG works by deliberately withholding the acknowledgment, which then prompts the packet to be resent.





"In the context of RSTEG, a sender replaces original payload with a steganogram instead of sending the same packet again," the paper, authored by Wojciech Mazurczyk, MiƂosz Smolarczyk, and Krzysztof Szczypiorski, states. "When the retransmitted packet reaches the receiver, he/she can then extract hidden information."

The technique has important implications for network security because it can be used by attackers to conceal the leakage of confidential information, the paper warns. It goes on to detail four scenarios in which the attack can be used, including one that requires no control of intermediate nodes. The other three are harder to pull off, but they are also harder to detect by third parties.

"No real-world steganographic method is perfect; whatever the method, the hidden information can be potentially discovered," the researchers write. "In general, the more hidden information is inserted into the data stream, the greater the chance that it will be detected, for example, by scanning the data flow or by some other seganalysis methods."

To evade detection, those using the technique must limit the number of retransmissions to non-suspicious levels.

Steganography dates back to the Fifth Century BC at least, when Greek messengers buried messages on wax tablets before sealing them with beeswax. In more recent times, it's been used to sneak data into all kinds of electronic media, including digital photographs and executable files. The same Polish researchers who described RSTEG also developed a similar technique targeting voice over IP traffic.

While RSTEG works only with TCP, the principle can be applied to other protocols as well, including those for wireless networks. A PDF of the paper is available here