This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

mobilecheat codes fr all phones


NOKIA:
CODES DESCRIPTIONS
*3370# Activate Enhanced Full Rate Codec (EFR) - Your phone uses the best sound quality but talk time is reduced my approx. 5%
#3370# Deactivate Enhanced Full Rate Codec (EFR)
*#4720# Activate Half Rate Codec - Your phone uses a lower quality sound but you should gain approx 30% more Talk Time
*#4720# Deactivate Half Rate Codec
*#0000# Displays your phones software version, 1st Line : Software Version, 2nd Line : Software Release Date, 3rd Line : Compression Type
*#9999# Phones software version if *#0000# does not work
*#06# For checking the International Mobile Equipment Identity (IMEI Number)
#pw+1234567890+1# Provider Lock Status. (use the "*" button to obtain the "p,w" and "+" symbols)
#pw+1234567890+2# Network Lock Status. (use the "*" button to obtain the "p,w" and "+" symbols)
#pw+1234567890+3# Country Lock Status. (use the "*" button to obtain the "p,w" and "+" symbols)
#pw+1234567890+4# SIM Card Lock Status. (use the "*" button to obtain the "p,w" and "+" symbols)
*#147# (vodafone) this lets you know who called you last
*#1471# Last call (Only vodofone)
*#21# Allows you to check the number that "All Calls" are diverted to
*#2640# Displays security code in use
*#30# Lets you see the private number
*#43# Allows you to check the "Call Waiting" status of your phone.
*#61# Allows you to check the number that "On No Reply" calls are diverted to
*#62# Allows you to check the number that "Divert If Unreachable (no service)" calls are diverted to
*#67# Allows you to check the number that "On Busy Calls" are diverted to
*#67705646# Removes operator logo on 3310 & 3330
*#73# Reset phone timers and game scores
*#746025625# Displays the SIM Clock status, if your phone supports this power saving feature "SIM Clock Stop Allowed", it means you will get the best standby time possible
*#7760# Manufactures code
*#7780# Restore factory settings
*#8110# Software version for the nokia 8110
*#92702689# Displays - 1.Serial Number, 2.Date Made, 3.Purchase Date, 4.Date of last repair (0000 for no repairs), 5.Transfer User Data. To exit this mode you need to switch your phone off then on again
*#94870345123456789# Deactivate the PWM-Mem
**21*number# Turn on "All Calls" diverting to the phone number entered
**61*number# Turn on "No Reply" diverting to the phone number entered
**67*number# Turn on "On Busy" diverting to the phone number entered
12345 This is the default security code
press and hold # Lets you switch between lines
*#3283# or *#DATE# Date of Manufacture
*#682371158412125# Software Version

__________________________________________________ ________________________

SIEMENS:
MODELS CODES & DESCRIPTIONS
*#0003*(secret code 8 digits)# All Siemens Phones: Service Provider Unlock
Siemens S25/C25
SP unlock *#0003*(secret code 8 digits)#
Show IMEI code: * # 06 #
Resets language to automatic selection : * # 0000 # then Green button
Pin Out
Data Cable schematics
Phone's connector pin-out:
1- GND
2- SB
3- POWER
4- NC
5- TX
6- RX
7- CLOCK
8- DATA
9- GND MIC
10- HF MIC
11- AUDIO
12- GND AUDIO
Siemens S1/S3/S3 Com
To view the software date and else with S3 com, S4, S4Power, Sony cmdx 1000e press with SIM removed *#06# and left softkey.
To view some other stuff with S4Power, Sony cmdx 1000e press with SIM removed *#06# and left softkey twice.
To view the software date with S3 com, S4, S4Power, Sony cmdx 1000e press with SIM installed menu 98 and left softkey twice.
ACTIVATE MONITOR MODE
Siemens S1/S3
Menu, 9 (Phone Options), 7 (Phone Status), Left Display Button (left MENU key), 5553756, Hang-Up Button (Red Handset key)


Siemens S3 COM/S4:

Menu, 9 (Phone Options), 7 (Phone Status - 8 on Some), Left Display Button (left MENU key), 7684666, Hang-Up Button (Red Handset key)
Note: Now Monitor should appear at the bottom of the Network Options menu.
MONITOR MODE
Pressing the right Display Button when in monitor mode will toggle into 1 and 2 modes

Pressing the right Display Button when in monitor mode will show a list of the six cells with the strongest signals.

Test Mode Indicators: (* = only available when call in progress )
CH Channel Number

RX Signal Strength (dB)

N NCC (Colour Code)

B BCC (Colour Code)

CI Cell ID (in Hex)

C1+ How long before phone does forced hand over. (see RX and RXAM)

LAI Location Area Identity. Display Network ID code (42F010 = 240.01) and MSC

TXPWR Transmit Power (dB)

RXAM Receive signal strength cut-off point

TS* Time Slot Number

TA* Timing Advance. Distance from tower in Km X 2

PL* Power Level
POWER table
PL: 5 6 7 8 9 10 11 12 13 14 15

dB: 33 31 29 27 25 23 21 19 17 15 13

Watts: 2 1.3 .8 .5 .3 .2 .13 .08 .05 .03 .02
LF* C1 value with continuous transmission from tower

LS* C1 Value with discontinuous transmission from tower

QF* Bit Error Rate with continuous transmission from tower

QS* Bit Error Rate with discontinuous transmission from tower
BER (bit error rate) table
QF/QS register: 0 1 2 3 4 5 6 7

% of bit sent: 0.2 0.8 0.4 1.6 3.2 6.4 12.8 25.6


Siemens S1/S3:
Here's a trick to play Tetris, also known as Klotz on a Siemens S1.
Turn the phone on. Enter PIN. Before the telephone has logged in to the your GSM net do the following steps.
1: Choose F 9 (function settings)
2: Choose send own number and push the right button for choose.
3: Push 9
USE 2 as <> , rotate the klotz with 5 and drop with 4.
[I have just heard from one of the programmers of the phone that Tetris was in the phone during development, but it was removed before it was produced. Apparently someone has the patent on games in mobile phones and Siemens didn't want to pay the licensing fees. It was either in Menu F-9-9 or it's not there at all.]
Siemens S3 Comfort

MONITOR MODE:
The Siemens S3 Com series have a Monitor mode that can be activated directly from the standard user keypad. In order to activate this mode, you must enter the special access code currently programmed into the phone.
TO ACTIVATE MONITOR MODE:
Turn the phone on.
Enter the PIN access code on press OK. (Only if is enabled).
Press Menu. (Left top button).
Press 9. (Phone Options).
Press 8. (Phone Status) (May be button 7 in some phones).
You may see your IMEI Number
Left Display Button (Top left MENU key).
7684666
Hang-Up Button. (Red Handset key).

Note: Monitor should appear now at the bottom of the Network Options menu.
MONITOR MODE

Pressing the right Display Button when in monitor mode will toggle into 1 and 2 modes

Siemens S4/S4 Power:
In phonebook under "Own Phone No." enter +12022243121 (which is the number to the White House) and you'll get a greeting from the people who programmed the phone.
MONITOR MODE

The Siemens S4 series have a Monitor mode that can be activated directly from the standard user keypad. In order to activate this mode, you must enter the special access code currently programmed into the phone.
TO ACTIVATE MONITOR MODE:
Menu, 9 (Phone Options), 7 (Phone Status), Left Display Button (left MENU key), 7684666, Hang-Up Button (Red Handset key)
Now "Monitor" should appear at the bottom of the Network Options menu.
Pressing the right Display Button when in monitor mode will show a list of the six cells with the strongest signals.


Test Mode Indicators: (* = only available when call in progress )


--------------------
CH Channel Number
RX Signal Strength (dB)
N NCC (Color Code)
B BCC (Color Code)
CI Cell ID (in Hex)
C1+ how long before phone does forced hand over. (see RX and RXAM)
LAI Location Area Identity. Display Network ID code (42F010 = 240.01) and MSC
TXPWR Transmit Power (dB)
RXAM Reeceive signal strength cut-off point
TS* Time Slot Number
TA* Timing Advance. Distance from tower in Km X 2
PL* Power Level


Power Table

PL: 5 6 7 8 9 10 11 12 13 14 15
dB: 33 31 29 27 25 23 21 19 17 15 13
Watts: 2 1.3 .8 .5 .3 .2 .13 .08 .05 .03 .02

LF* C1 value with continuous transmission from tower
LS* C1 Value with discontinuous transmission from tower
QF* Bit Error Rate with continuous transmission from tower
QS* Bit Error Rate with discontinuous transmission from tower


BER (bit error rate) table
QF/QS register: 0 1 2 3 4 5 6 7
% of bit sent: 0.2 0.8 0.4 1.6 3.2 6.4 12.8 25.6


Siemens S6/S10:

In Phonebook, store as your own number: +12022243121
Then you get the sun and two palms in the display, also a greeting message of the "MMI-team".
It has been said that the phone number is the number of the Capitol building in Washington, DC (but not sure).

Siemens S15 Secret Menu's

Press * -> # -> 7 -> 4 -> 3 -> 6 -> 3 -> 6 -> 7 -> * -> 8 -> 3 ->
7 -> 8 -> # ,press clear key to clear screen and return to
stand-by mode
press Menu, it will show additional menu
Menu 3.3.4 Band selection,
Menu 3.3.4.1 Automatic band selection,
Menu 3.3.4.2 select GSM 900 only,
Menu 3.3.4.3 select GSM 1800 only,
Menu 10 Engineering,
Menu 10.1 MS info,

Menu 10.2 software detail,
Menu 10.2.1 software version,
Menu 10.2.2 EEPROM version,

Menu 10.3 Test/production details
Menu 10.3.1 Hardware deta
Menu 10.3.2 production deta
Menu 10.3.3 Service deta
Menu 10.3.4 Mechanical deta

Menu 10.1.1 MS info on, then on the screen show these, for example:

FCN RXL C1 C2
642 011+11+91 -> PAGE 1

CID DSC CB
11211 045 000 -> PAGE 2

BCC NCC TN
000 002 00 -> PAGE 3

RXf RXs RQf RQs
00 00 00 00 -> PAGE 4

ATa APa Hn Hf
001 000 05 00 -> PAGE 5

DTU DTD HP CI
+ ? - - -> PAGE 6

MM CC RR
IdNS Nul Idl -> PAGE 7

__________________________________________________ ________________________
PANASONIC:
CODES DESCRIPTIONS
*#06# For checking the International Mobile Equipment Identity (IMEI Number)

__________________________________________________ ________________________

MOTOROLA:
CODES DESCRIPTIONS
*#06# For checking the International Mobile Equipment Identity (IMEI Number)
[][][] 119 [] 1 [] Activate Enhanced Full Rate Codec (EFR) - Your phone uses the best sound quality but talk time is reduced my approx. 5%
[][][] 119 [] 0 [] Deactivate Enhanced Full Rate Codec (EFR)

__________________________________________________ ________________________

ERICSSON:
CODES DESCRIPTIONS
*#06# For checking the International Mobile Equipment Identity (IMEI Number)
Shortcuts:
Save a Missed Call into your phone directory Scroll to "Missed Call", press "Yes" to display the required number. Press any number (i.e. 0 to 9), then press "clear" once to clear that number, then press & hold "<" until you see "Store". Press "Yes"
Hide your number when calling when you don't want the other party to know your number) After dialling the required number & before pressing "Yes", press ">" twice to choose "Hide Id?" & then press "Yes". Also works for pre-programmed & last dialled numbers just press "No" & wait for the number to appear on the screen first then follow same procedure
Check you battery level when phone is off Press "No" quickly one time & wait for the battery meter to show up!
Save a number into your phone memory (not SIM card) Follow normal procedures to store a phone number. When prompted to set a storage position, press "#" once & key in desired location, or press "#" twice for next available position
Call a phone number from SMS message You can call from within a SMS message if the phone number is written in it. Just scroll the message until the phone number appears on the display, then press "Yes" to call.
G and Benq


BenQ mobile codes
Language Menu for BenQ-Siemens mobile
English menu:
*#0001#
Deutsch menu:
*#0049#

Secret Code for BenQ
*#0606# remove sim card before

Unlock Sim:
*#0003*(secret code)#

Bonus Screen:
*12022243121

Factory settings:
Type *#9999# to reset factory settings.

=============
=============

LG Mobile Codes
On the main screen type *#06#

Information you get from the IMEI (International Mobile Equipment Identity)
XXXXXX XX XXXXXX X
TAC FAC SNR SP

TAC = Type approval code of your LG Mobile
FAC = Final assembly code of your cellphone
SNR = Serial number of your LG Phone
SP = Spare

Other secret tricks for LG mobile or cellphone

LG all models test mode:
Type 2945#*# on the main screen.
2945*#01*# Secret menu for LG
IMEI and SW (LG 510): *#07#
Software version (LG B1200): *8375#
Recount cheksum (LG B1200): *6861#
Factory test (B1200): #PWR 668
Simlock menu (LG B1200): 1945#*5101#
Simlock menu (LG 510W, 5200): 2945#*5101#
Simlock menu (LG 7020, 7010): 2945#*70001#
Simlock menu (LG 500, 600): 2947#*

LG-U81XX SPECIAL CODES
Code to read phone version :
- Phone without SIM
- Enter 277634#*# or 47328545454#
- Select 'SW Ver.info'
Code to reset phone :
- Phone without SIM

- Enter 277634#*# or 47328545454#
- Select 'Factory Reset'

Code to enter UNLOCK MENU :
- Phone wit SIM inside
- Enter 2945#*88110#
Test Menu 8330 : 637664#*#
Test Menu 8180 V10a: 49857465454#
Test Menu 8180 V11a: 492662464663#
Test Menu 8130-8138: 47328545454#
Test Menu 8110-8120: 277634#*
samsung.....

*#1111# S/W Version
*#1234# Firmware Version
*#2222# H/W Version
*#8999*8376263# All Versions Together



*#8999*8378# Test Menu
*#4777*8665# GPSR Tool
*#8999*523# LCD Brightness
*#8999*377# Error Menu
*#8999*327# EEP Menu
*#8999*3825523# Don't Know.
*#8999*667# Debug Mode
*#92782# PhoneModel (Wap)
#*5737425# JAVA Mode
*#2255# Call List
*#232337# Bluetooth MAC Adress
*#5282837# Java Version




#*4773# Incremental Redundancy
#*7752# 8 PSK uplink capability bit
#*7785# Reset wakeup & RTK timer cariables/variables
#*1200# ?
#*7200# Tone Generator Mute
#*3888# BLUETOOTH Test mode
#*#8999*324# ??
#*7828# Task screen
#*5111# ??
#*#8377466# S/W Version & H/W Version
#*2562# Restarts Phone
#*2565# No Blocking? General Defense.
#*3353# General Defense, Code Erased.
#*3837# Phone Hangs on White screen
#*3849# Restarts Phone
#*3851# Restarts Phone
#*3876# Restarts Phone
#*7222# Operation Typ: (Class C GSM)
#*7224# !!! ERROR !!!
#*7252# Operation Typ: (Class B GPRS)
#*7271# CMD: (Not Available)
#*7274# CMD: (Not Available)
#*7337# Restarts Phone (Resets Wap Settings)
#*2787# CRTP ON/OFF
#*2886# AutoAnswer ON/OFF




#*3737# L1 AFC
#*5133# L1 HO Data
#*7288# GPRS Detached/Attached
#*7287# GPRS Attached
#*7666# White Screen
#*7693# Sleep Deactivate/Activate
#*7284# L1 HO Data
#*2256# Calibration info? (For CMD set DEBUGAUTONOMY in cihard.opt)
#*2286# Databattery
#*2527# GPRS switching set to (Class 4, 8, 9, 10)
#*2679# Copycat feature Activa/Deactivate
#*3940# External looptest 9600 bps
#*4263# Handsfree mode Activate/Deactivate
#*4700# Please use function 2637
#*7352# BVMC Reg value (LOW_SWTOFF, NOMINAL_SWTOFF)
#*2558# Time ON
#*3370# Same as 4700
#*3941# External looptest 115200 bps
#*5176# L1 Sleep
#*7462# SIM Phase
#*7983# Voltage/Freq
#*7986# Voltage
#*8466# Old Time
#*2255# Call Failed
#*5187# L1C2G trace Activate/Deactivate
#*5376# DELETE ALL SMS!!!!
#*6837# Official Software Version: (0003000016000702)
#*7524# KCGPRS: (FF FF FF FF FF FF FF FF 07)
#*7562# LOCI GPRS: (FF FF FF FF FF FF FF FF FF FF FF FE FF 01)
#*2337# Permanent Registration Beep




#*2474# Charging Duration
#*2834# Audio Path (Handsfree)
#*3270# DCS Support Activate/Deactivate
#*3282# Data Activate/Deactivate
#*3476# EGSM Activate/Deactivate
#*3676# FORMAT FLASH VOLUME!!!
#*4760# GSM Activate/Deactivate
#*4864# White Screen
#*5171# L1P1
#*5172# L1P2
#*5173# L1P3
#*7326# Accessory
#*7683# Sleep variable
#*8465# Time in L1
#*2252# Current CAL
#*2836# AVDDSS Management Activate/Deactivate
#*3877# Dump of SPY trace
#*7728# RSAV
#*2677# Same as 4700
#*3797# Blinks 3D030300 in RED
#*3728# Time 2 Decod
#*3725# B4 last off
#*7372# Resetting the time to DPB variables
#*7732# Packet flow context bit Activate/Deactivate
#*6833# New uplink establishment Activate/Deactivate
#*3273# EGPRS multislot (Class 4, 8, 9, 10)
#*7722# RLC bitmap compression Activate/Deactivate
#*2351# Blinks 1347E201 in RED
#*4472# Hysteresis of serving cell: 3 dB
#*2775# Switch to 2 inner speaker
#*9270# Force WBS
#*7878# FirstStartup (0=NO, 1=YES)
#*3757# DSL UART speed set to (LOW, HIGH)
#*8726# Switches USBACM to Normal
#*8724# Switches USBACM to Generator mode
#*8727# Switches USBACM to Slink mode
#*8725# Switches USBACM to Loop-back mode
#*3838# Blinks 3D030300 in RED
#*2077# GPRS Switch
#*2027# GPRS Switch
#*0227# GPRS Switch
#*0277# GPRS Switch
#*22671# AMR REC START
#*22672# Stop AMR REC (File name: /a/multimedia/sounds/voice list/ENGMODE.amr)
#*22673# Pause REC




#*22674# Resume REC
#*22675# AMR Playback
#*22676# AMR Stop Play
#*22677# Pause Play
#*22678# Resume Play
#*77261# PCM Rec Req
#*77262# Stop PCM Rec
#*77263# PCM Playback
#*77264# PCM Stop Play
#*2872# CNT
*#8999*283#
#*22679# AMR Get Time
*288666#
*2886633#
*#8999*364# Watchdog ON/OFF
#*8370# Tfs4.0 Test 0
#*8371# Tfs4.0 Test 1
#*8372# Tfs4.0 Test 2
#*8373# Tfs4.0 Test 3
#*8374# Tfs4.0 Test 4
#*8375# Tfs4.0 Test 5
#*8376# Tfs4.0 Test 6
#*8377# Tfs4.0 Test 7
#*8378# Tfs4.0 Test 8
#*8379# Tfs4.0 Test 9
#837837# error=...




#*36245# Turns Email TestMenu on.

*2767*22236245# Email EPP set (....)!
*2767*837836245# Email Test Account!
*2767*29536245# Email Test2 Account!
*2767*036245# Email EPP reset!
*2767*136245# Email EPP set (1)!
*2767*736245# Email EPP set (7)!
*2767*3036245# Email...
*2767*3136245# Email...
*2767*3336245# Email...
*2767*3436245# Email...
*2767*3936245# Email...
*2767*4136245# Email...
*2767*4336245# Email...
*2767*4436245# Email...
*2767*4536245# Email...
*2767*4636245# Email...
*2767*4936245# Email...
*2767*6036245# Email...
*2767*6136245# Email...
*2767*6236245# Email...
*2767*6336245# Email...
*2767*6536245# Email...
*2767*6636245# Email...
*2767*8636245# Email...
*2767*85236245# Email...




*2767*3855# = E2P Full Reset
*2767*2878# = E2P Custom Reset
*2767*927# = E2P Wap Reset
*2767*226372# = E2P Camera Reset
*2767*688# Reset Mobile TV
#7263867# = RAM Dump (On or Off)
*2767*49927# = Germany WAP Settings
*2767*44927# = UK WAP Settings
*2767*31927# = Netherlands WAP Settings
*2767*420927# = Czech WAP Settings
*2767*43927# = Austria WAP Settings
*2767*39927# = Italy WAP Settings
*2767*33927# = France WAP Settings
*2767*351927# = Portugal WAP Settings
*2767*34927# = Spain WAP Settings
*2767*46927# = Sweden WAP Settings
*2767*380927# = Ukraine WAP Settings
*2767*7927# = Russia WAP Settings
*2767*30927# = GREECE WAP Settings
*2767*73738927# = WAP Settings Reset
*2767*49667# = Germany MMS Settings
*2767*44667# = UK MMS Settings
*2767*31667# = Netherlands MMS Settings
*2767*420667# = Czech MMS Settings
*2767*43667# = Austria MMS Settings
*2767*39667# = Italy MMS Settings
*2767*33667# = France MMS Settings
*2767*351667# = Portugal MMS Settings
*2767*34667# = Spain MMS Settings
*2767*46667# = Sweden MMS Settings
*2767*380667# = Ukraine MMS Settings
*2767*7667#. = Russia MMS Settings
*2767*30667# = GREECE MMS Settings



AddThis Social Bookmark Button


unblock removeble disk in school


Sorry if this is a bit obvious and easy but i thought id post it anyway.

Right-click on the bar at the bottom (right of the start button) and select Toolbars>New Toolbar
In the box type "D:\" (make sure the slash is "\" not "/")
Click on the small arrows and there you have it, your flash drive with hackin programs on it Grin

PS If D:\ doesnt work, try E:\



AddThis Social Bookmark Button


Types of Attacks on Web Servers


Types of Attacks on Web Servers
By Najmi

Newspapers Internet magazines came with cover stories when Denial of service (DoS) attacks assaulted a number of large and very successful companies' websites last year. Those who claim to provide security tools were under attack. If Yahoo, Amazon, CNN and Microsoft feel victim to DoS attacks, can any site-owner feel safe?

In this article we'll try to make site owners understand the "In and Outs" of DoS andDDoS attack methods, vulnerabilities, and potential solutions to these problems. Webmasters are usually seen searching for solutions to new security threats and ways of patching-up before it is too late.
DoS:
In a Denial of Service (DoS) attack, the attacker sends a stream of requests to a service on the server machine in the hope of exhausting all resources like "memory" or consuming all processor capacity.

DoS Attacks Involve:
Jamming Networks
Flooding Service Ports
Misconfiguring Routers
Flooding Mail Servers
DDoS:
In Distributed DoS (DDoS) attack, a hacker installs an agent or daemon on numerous hosts. The hacker sends a command to the master, which resides in any of the many hosts. The master communicates with the agents residing in other servers to commence the attack. DDoS are harder to combat because blocking a single IP address or network will not stop them. The traffic can derive from hundred or even thousands of individual systems and sometimes the users are not even aware that their computers are part of the attack.

DDoS Attacks Involve:
FTP Bounce Attacks
Port Scanning Attack
Ping Flooding Attack
Smurf Attack
SYN Flooding Attack
IP Fragmentation/Overlapping Fragment Attack
IP Sequence Prediction Attack
DNS Cache Poisoning
SNMP Attack
Send Mail Attack

Some of the more popular attack methods are described below.

FTP Bounce Attack

FTP (File Transfer Protocol) is used to transfer documents and data anonymously from local machine to the server and vice versa. All administrators of FTP servers should understand how this attack works. The FTP bounce attack is used to slip past application-based firewalls.

In a bounce attack, the hacker uploads a file to the FTP server and then requests this file be sent to an internal server. The file can contain malicious software or a simple script that occupies the internal server and uses up all the memory and CPU resources.

To avoid these attacks, the FTP daemon on the Web servers should be updated regularly. The site FTP should me monitored regularly to check whether any unknown file is transferred to the Web server. Firewalls also help by filtering content and commands. Some firewalls block certain file extensions, a technique that can help block the upload of malicious software.

Port Scanning Attack

A port scan is when someone is using software tosystematically scan the entry points on other person’s machine. There arelegitimate uses for this software in managing a network.

Mosthackers enter another’s computer to leave unidentifiable harassing messages,capture passwords or change the set-up configuration. The defense for this isthrough, consistent network monitoring. There are free tools that monitor forport scans and related activity.

Ping Flooding Attack

Pinging involves one computer sending a signal to anothercomputer expecting a response back. Responsible use of pinging providesinformation on the availability of a particular service. Ping Flooding is theextreme of sending thousands or millions of pings per second. Ping Flooding cancripple a system or even shut down an entire site.

APing Flooding Attack floods the victim’s network or machine with IP Pingpackets. At least 18 operating systems are vulnerable to this attack, but themajority can be patched. There are also numerous routers and printers that arevulnerable. Patches cannot currently be applied throughout a global networkeasily.

Smurf Attack

A Smurf Attack is modification of the "ping attack"and instead of sending pings directly to the attacked system, they are sent to abroadcast address with the victim’s return address. A range of IP addressesfrom the intermediate system will send pings to the victim, bombarding thevictim machine or system with hundreds or thousands of pings.

One solution is to prevent the Web server from being usedas a broadcast. Routers must be configured to deny IP-Directed broadcasts fromother networks into the network. Another helpful measure is to configure therouter to block IP spoofing from the network to be saved. Routers configured assuch will block any packets that donor originate in the Network.To be effective this must be done to all routers on the network.

SYN Flooding Attack

This attack exploits vulnerability in the TCP/IPcommunications protocol. This attack keeps the victim machine responding back toa non-existent system. The victim is sent packets and asked to response to asystem or machine with an incorrect IP address. As it responds, it is floodedwith the requests. The requests wait for a response until the packets begin totime out and are dropped. During the waiting period, the victim system isconsumed by the request and cannot respond to legitimate requests.

When a normal TCP connection starts, a destination hostreceives a SYN (synchronize/start) packet from a source host and sends back aSYN ACK (synchronize acknowledge) response. The destination host must the hearan acknowledgement, or ACK packet, of the SYN ACK before the connection isestablished. This is referred as the "TCP three-way handshake”.

Decreasingthe time-out waiting period for the three way handshake can help to reduce therisk of SYN flooding attacks, as will increasing the size of the connectionqueue (the SYN ACK queue). Applying service packs to upgrade older operatingsystems is also a good countermeasure. More recent operating systems areresistant to these attacks.

IPFragmentation/Overlapping Fragment Attack

To facilitate IP transmission over comparatively congestednetworks. IP packets can be reduced in size or broken into smaller packets. Bymaking the packets very small, routers and intrusion detection systems cannotidentify the packets contents and will let them pass through without anyexamination. When a packet is reassembled at the other end, it overflows thebuffer. The machine will hang, reboot or may exhibit no effect at all.

Inan Overlapping Fragment Attack, the reassembled packet starts in the middle ofanother packet. As the operating system receives these invalid packets, itallocates memory to hold them. This eventually uses all the memory resources andcauses the machine to reboot or hang.

IPSequence Prediction Attack

Usingthe SYN Flood method, a hacker can establish connection with a victim machineand obtain the IP packet sequence number in an IP Sequence Prediction Attack.With this number, the hacker can control the victim machine and fool it intobelieving it’s communicating with another network machines. The victim machinewill provide requested services. Most operating systems now randomize theirsequence numbers to reduce the possibility of prediction.

DNSCache Poisoning

DNS provides distributed host information used for mappingdomain names and IP addresses. To improve productivity, the DNS server cachesthe most recent data for quick retrieval. This cache can be attacked and theinformation spoofed to redirect a network connection or block access to the Web sites),a devious tactic called DNS cache poisoning.

The best defense against problems such as DNS cachepoisoning is to run the latest version of the DNS software for the operatingsystem in use. New versions track pending and serialize them to help preventspoofing.

SNMP Attack

Most network devices support SNMP because it is active bydefault. An SNMP Attack can result in the network being mapped, and traffic canbe monitored and redirected.

The best defense against this attack is upgrading toSNMP3, which encrypts passwords and messages. SinceSNMP resides on almost all network devices, routers, hubs, switches, Servers andprinters, the task of upgrading is huge. Some vendors now offer an SNMP Managementtool that includes upgrade distribution for global networks.

UDP Flood Attack

AUDP Flood Attacks links two unsuspecting systems. By Spoofing, the UDP floodhooks up one system’s UDP service (which for testing purposes generates aseries of characters for each packet it receives) with another system’s UDPecho service (which echoes any character it receives in an attempt to testnetwork programs). As a result a non-stop flood of useless data passes betweentwo systems.

Send Mail Attack

In this attack, hundreds of thousands ofmessages are sent in a short period of time; a normal load might only be 100 or1000 messages per hour. Attacks against Send Mail might not make the front page,but downtime on major websites will.

For companies whose reputation dependson the reliability and accuracy of their Web-Based transactions, a DoS attackcan be a major embarrassment and a serious threat to business.

Conclusion

Frequent denial-of-service attacks and achange in strategy by "Black-Hat Hackers" are prompting enterprises todemand technology that proactively blocks malicious traffic.

Tools and services that reflectapproaches to combat such DoS attacks have been introduced with time. These arenormally upgrades to what was produced before. No solution is ever said to be anultimate solution to defend DoS attacks. Despite the new technology coming everyday, the attacks are likely to continue.

Source :- http://www.techiwarehouse.com/cms/engine.php?page_id=21b0d480



AddThis Social Bookmark Button


Hacking a website


Hacking a website or its member section
First of all,why you want to hack a webpage?Is it a certain webpage or any site at all? There are many reasons to hack a website, or a webmaster.Maybe you want to take a revenge or maybe you want to have fun or just learn how to do it ! You can deface the website which means replace the original index with a new one or you can gain access to the member area of the site which might be easier.

Defacing
You can deface the site through telnet or your browser by running remote commands on an old or misconfigured server, the hard thing to do is find an old server , maybe a network of a school or university would do,get a CGI BUG searcher.This program will scan ranges of IPs for web-servers and will scan them for known bugs in their cgis or other bugs and holes.You can learn how to exploite a certain hole by adding in yahoo the name of the bug/hole and the word exploit,search for " cmd.exe exploit".There are more than 700 holes that many servers might have! You can also deface a website by finding the ftp password and just browse through the sites ftp and replace the index.htm.You do that with the : Brute force
To do that you need a brute forcer or brute force attacker and some word lists,the brute forcer sends multiple user/pass requests of words that picks up from namelists and tries to hack the account untill it does! So lets say imagine a porn site that asks for a password , you go there you copy their address , you add the address in a program called brute forcer and then from the brute forcer you choose a text file with names to be used as usernames and a text with names to be used as passwords,the brute forcer will try untill it finds a correct user/pass This should be easier for the newbies than exploiting cgi bugs , many of the newbies havent even heard of it i hope i didnt confuse you with this tutorial there might be more tuts about web hacking and cgi bugs and such.Till then try to find the way to cgi bugs yourself with the cgi scanners in the Web Hacks section or download a brute forcer to crack accounts.



AddThis Social Bookmark Button


DiskGo - 32 GB Flash Drive


EDGE-Tech-Corp-32-GB-Flash-Drive

Edge Tech Corp added a new product to its diskGo Series. A Flash Drive with 32 GB Storage space. The flash drive is incredibly small and light-weight. The drive is capable of storing 21000 pictures, 32 hr of video, 8000 songs, or 320,000 documents. The transfer rate of the drive is 480 Mb/sec. The drive comes with a CryptArchiever encryption software which encrypts the data at 128bit AES Conversion.

Price: 399 USD



AddThis Social Bookmark Button


Master Chief is back


Master Chief is back

Master Chief USB Flash Drive

He may have died in the Halo 3 game but he is back In the form of USB flash drive. USB drives have become more than a simple storage solution off lately. They are coming in different forms and shapes. The latest in the queue are the characters from Halo 3 game( Master Chief, Red Spartan, Blue Spartan).

These are available solely for pre-order and will start shipping from October onwards.




AddThis Social Bookmark Button


Cowon iAudio7


Recent advances in technology allow the compression of enormous amounts of data into tiny packages, and the Cowon iAudio7 is testimony to the fact. Yes, here's a robust little player with a lot of storage space.

But does the iAudio7 provide you all that you desire from an MP3 / PMP / data storage device? That’s what I decided to find out.


Form Factor
Don’t let the pictures fool you. (They did fool me, by the way.) When I first saw the iAudio7 I was under the impression that it was a PMP, since it played movie files. So naturally, my first impression was that it would have a decently large screen.

Of course, when I read the specs I realized that wasn't so. The iAudio7 has only a small 1.3 inch screen with a resolution of 160x128 pixels sporting 256k colors. While clear enough, this is not good enough to watch movies – you’ll need a magnifying glass. Honestly, I’m not sure why they even included the feature.


The iAudio7 is extremely lightweight at just 60 grams. It’s also small enough with dimensions of 35.6 x 76.1 x 19 mm, so you carry it around quite easily. It has a 3.5mm earphone socket, so you can use your own earphones (not that you’ll need to). Alongside is a Line-In socket.

On the top are the mic, hold/slider for power, a menu key, and the volume keys. On the right is a flap that hides the USB port and reset key. The iAudio7 may look like a pudgy little player but it’s actually quite sleek, lightweight, and easy to use.

Features
The player is a compact bundle of audio, video, radio, and recording. Packed with options to record from the integrated FM radio or through the built-in mic, the device can be used as a dictaphone as well. There are plenty of settings to please music connoisseurs as well.

EQ presets and a customizable 5-band graphic EQ are evident, as also 3D Surround, Mac 3 Bass options, panning and even an MP3 Enhance mode that really does enhance the sound quality.


Apart from viewing JPEGs to watching videos and listening to the FM radio and podcasts and even recording conversations, the iAudio7 lets you read documents via its .TXT reader. It reads MP3, OGG, WMA, ASF, FLAC, and WAV formats, and MPEG4 for video playback.



AddThis Social Bookmark Button