Wednesday, February 16, 2011

How to Protect Your Web Server From Hackers.?

 http://www.hackingtrick.com/wp-content/uploads/2010/10/computer-hackers-300x236.jpg

 http://www.port80software.com/images/S_diag_servermask.gif

 http://www.lisisoft.com/imglisi2/1/6/16861-real-hide-ip.jpg

Good Evening Friends.....
I know creating a website is not simply about putting some pages and information online.
Ensuring the security of your website is a bigger and highly crucial task.
Most websites these days have a dedicated web server that gives them the leverage to grow and develop further. Basically the websites with a high volume of web traffic, a heavy database and complex application specifications require an exclusive web server. It is extremely important to hack proof your web server in order to protect your website and business.
There are a great number of hackers out there in the web world who are looking for opportunities to exploit your web server and cause serious damage. These hackers look to deface the websites with malicious content, use the scripts on the server to send out spam or phish out the personal sensitive information of the website users. Such attacks also attempt to tamper with parameters and gain access to confidential files or cross-site scripting or cookie poisoning to alter the customer data. These kinds of invasions can prove to be fatal for e-commerce and finance based websites. To prevent your web server from falling prey to such web attacks, here are some important recommendations and anti hacking tips.You need to follow a two-pronged approach to safeguard your web server from any hackers.
The first layer is a firewall that exists to block any unwarranted unused Internet ports. A good firewall will use a rule based access system to allow only the legitimate users to enter and filter out as well as obstruct any malicious traffic from accessing the server. Also create strong passwords that use a combination of characters, numbers and special characters in order to keep the password hackers at bay.
The second element is to put in place an intrusion protection service. This is a more sophisticated approach to deal with hackers wherein you stop the illegitimate entry of users at the source itself. If a firewall works on the front line, an intrusion protection system works on the back end to deal with the enemies. This involves putting all the compromised hosts in the quarantine section and letting the genuine users move through efficiently. But setting up such an anti-hacking arrangement is only the first step. The hackers are moving fast and ahead with newer techniques to break into and sabotage the web servers. So, you need to continually update and monitor the filters, blacklists and all other aspects.

How to Solve Blue Screen of Death Problems

good evening friends...
today i am posting about a very serious problem of windows, that is BSOD
Blue Screen of Death is a very common error that occurs in all the versions of the Windows OS, be it Win XP, or Win Vista or Windows 7.
Blue Screen Of Death (also known as BSoD or bluescreen), known officially as a Stop Error. A lot of major as well as minor hardware and software related issues can lead to Blue Screen of Death (BSOD). However, many times the BSOD screen won’t allow you to reach the desktop or even if you have reached the desktop, the BSOD screen can appear all of a sudden while you are doing something important on your PC.



BSODs appear when Windows encounters a serious problem and stalls the operating system. You can easily fix BSOD issues by examining all the factors that has triggered it. Here are some things you should do when you encounter a BSOD:
1. Some BSODs are so bad that you may end up installing fresh copy of Windows on your system. If you are not able to access your data after the occurrence of BSOD, you may also end up losing all your precious data. So, you need try your best to reach the desktop. You can try the ‘Last Known Good Configuration’ option or by going into the Safe Mode. You can try both of these options by pressing the F8 key before the appearance of the Windows loading screen. If you do it correctly, you will see the ‘Windows Advanced Options Menu’ screen where you will see options like Safe Mode, Safe Mode with Networking and Last Known Good Configuration.

2. When you see the BSOD, you should read the message that appears on it carefully. Usually, the error screen contains a ‘STOP ERROR’ code that consists of numbers and alphabets. The code varies depending on the problems that have caused the respective BSOD error. So, the first thing you need to do is make a note of the error code.

3. If your system is displaying the BSOD screen after recent installation of hardware or software, you can try uninstalling the hardware or software and see if that resolves the issue. After uninstalling the software that caused the problem, you can perform virus scan on your system. Repairing registry errors by making use of registry applications can help in getting rid of BSODs that are caused by software. Alternatively, you can also try the System Restore option to go back to a date when your system was working perfectly fine.

4. The next thing you need to is to find out what has caused the BSOD by researching on the internet. You can do this on your secondary PC. All you need to do is type the STOP ERROR code on Google and find out what solutions are available. A very good way to find solution for all kinds of BSOD errors is to visit the Microsoft Support website. At Microsoft Support, you will get all the possible solutions that you can try to get rid of the BSOD screen.

TOP 10 Hacking Tools

HELLO FRIENDS!!!
MY 5TH SEMESTER IS OVER NOW....
NOW I AM ENJOYING MY VACATIONS AT HOME.
SO TODAY I AM POSTING ABOUT TOP 10 HACKING TOOLS
1)Nessus
In computer security, Nessus is a proprietary comprehensive vulnerability scanning program. It is free of charge for personal use in a non-enterprise environment. Its goal is to detect potential vulnerabilities on the tested systems.


The “Nessus” Project aims to provide to the internet community a free, powerful, up-to-date and easy to use remote security scanner for Linux, BSD, Solaris, and other flavors of Unix.
2)Ethereal
Ethereal is a free network protocol analyzer for Unix and Windows. Ethereal has several powerful features, including a rich display filter language and the ability to view the reconstructed stream of a TCP session.
3)Snort
A free lightweight network intrusion detection system for UNIX and Windows.
Snort is an open source network intrusion detection system, capable of performing real-time traffic analysis and packet logging on IP networks.
4)Netcat
Netcat is a computer networking service for reading from and writing network connections using TCP or UDP.
Netcat has been dubbed the network swiss army knife. It is a simple Unix utility which reads and writes data across network connections, using TCP or UDP protocol
5)Hping Hping is a command-line oriented TCP/IP packet assembler/analyzer, kind of like the “ping” program (but with a lot of extensions).
6)DNSiff
DNSiff is a collection of tools for network auditing and penetration testing. dsniff, filesnarf, mailsnarf, msgsnarf, urlsnarf, and webspy passively monitor a network for interesting data (passwords, e-mail, files, etc.).
7)GFI LANguard
GFI LANguard Network Security Scanner (N.S.S.) automatically scans your entire network, IP by IP, and plays the devil’s advocate alerting you to security vulnerabilities.
8)John the Ripper John the Ripper is a fast password cracker, currently available for many flavors of Unix.
9)OpenSSH
OpenSSH (OpenBSD Secure Shell) is a set of computer programs providing encrypted communication sessions over a computer network using the ssh protocol. It was created as an open source alternative to the proprietary Secure Shell software suite offered by SSH Communications Security.
OpenSSH is a FREE version of the SSH protocol suite of network connectivity tools, which encrypts all traffic (including passwords) to effectively eliminate eavesdropping, connection hijacking, and other network-level attacks.
10)TripWire
Tripwire is a tool that can be used for data and program integrity assurance.
     

Monday, February 14, 2011

Microsoft Mathematics 4.0 for Office 2007 and Office 2010

good news for windows user.....
Microsoft Mathematics 4.0 is now available for free download.Microsoft Mathematics provides a set of mathematical tools that helps both college and school students to solve complex calculation quickly and easily. icon smile Microsoft Mathematics 4.0 for Office 2007 and Office 2010
This tool is very useful for doing math and science studies.

Brief Description


Microsoft Mathematics provides a graphing calculator that plots in 2D and 3D, step-by-step equation solving, and useful tools to help students with math and science studies.
 

Few months back Microsoft relea Free Chemistry Add-in For Office Word 2007 & 2010.Now the latest release of Mathematics 4.0 makes students work simple.Students can understand the concepts  faster  ;)
With Microsoft Mathematics, students can learn to solve equations step-by-step while gaining a better understanding of fundamental concepts in pre-algebra, algebra, trigonometry, physics, chemistry, and calculus.
“Microsoft Mathematics includes a full-featured graphing calculator that’s designed to work just like a handheld calculator. Additional math tools help you evaluate triangles, convert from one system of units to another, and solve systems of equations”.
It comes with cool Graphical user Interface and very user friendly icon smile Microsoft Mathematics 4.0 for Office 2007 and Office 2010

Download:


Microsoft Mathematics 4.0

Sunday, February 13, 2011

Secret Items In Windows 7 Send To Menu | send to menu extended

today i have a amazing trick for send to menu
How To View the Secret Items
1. When you right-click on a file you will find only few default items in Send To Menu.
2. Hold down the Shift key while right-clicking on the file, and see the Send To menu…you can find all sorts of extra options!


3. If you want any of those to show up normally without holding down the Shift key, you can create shortcuts in the Send To folder.Just type the following into the Address bar,
shell:sendto

4. And then drag shortcuts to your preferred folders into this folder.

Saturday, February 12, 2011

how to hide text in notepad | Trick To Hide Text

happy weekend
today's post is so simple and funny....
A Superb Trick To Hide Text In Notepad
Here is a small trick to hide text inside your windows default text editor i.e Notepad using command prompt, but this trick works only on NTFS file system.

Steps to hide text in a Notepad
1. Open your command prompt Start–>Run and Type cmd
2. Type cd.. to move to C:\> drive or Type cd desktop to move to your desktop.
Trick+To+Hide+Text+In+Notepad Trick To Hide Text In Notepad
3. Type the below code in your command prompt
notepad filename.txt:hidden
4. Write some data and save(Ctrl+S) the file.
5. Browse to the file location and Open filename.txt you cannot see any data in the file.
6. To retrieve the hidden data open command prompt and type the same command.
notepad filename.txt:hidden

Friday, February 11, 2011

Watch Cricket World Cup 2011 Live | online cricket match

Watch Cricket World Cup 2011 Live
IN INDIA CRICKET IS VERY POPULAR, AND IT IS MY FAVORITE GAME.

ICC Cricket World Cup 2011,starts on 19th Feb 2010. 14 countries are participating in ICC Cricket World Cup 2011. The Cricket World Cup 2011 final will be played on Apr 2 at Wankhede Stadium, Mumbai.

ICC Cricket World Cup 2011 Group A Teams – Australia, Sri Lanka, Zimbabwe,Pakistan, New Zealand,  Canada and Kenya.
ICC Cricket World Cup 2011 Group B Teams – India, England, Bangladesh, South Africa, West Indies, Netherlands and Ireland.

There are many websites from where you can watch world cup cricket live streaming online for free.Check the below lists of websites
Crictime.com One of the most trusted website to watch cricket online for free. Serves many live streaming for world cup 2011 matches.
http://www.ustream.tv/discovery/live/sports-cricket World cup cricket on the net
Justin.tv Search for the appropriate channel to watch ICC world cup 2011 live online for free.
Freedocast.com: You can search here for ICC world cup 2011 live matches online. There are number of live streaming channels available to watch world cup 2011 live online for free.
Webcric.com: Just like the above two websites, it provides many live streaming channels to watch world cup 2011 cricket matches online
enjoy cricket........

Thursday, February 10, 2011

how to open blocked sites

every time in college, school and in organizations access denied message  appears when we open a blocked site.....
it really sucks!!!!
but every problem have a solution, so for this a solution is here....

1. Go to Google
2.Type transparent free proxy address free
3.Click on the transparent proxy fresh transparent proxy list
4.Look for a proxy address with port 8080
5.Now go to tools menu of internet explorer
6.Go to internet options
7.connections tab
8.click Activate use a proxy server for ur LAN options
9.Put that number that you found in the website with 8080 port and hit Ok
10.Again Ok Now open any websites.

Tuesday, February 8, 2011

The PlayStation Phone now comming soon

Sony PlayStation Phone: Release Date Update – March?

It's hard to believe that what we're looking at is real -- but we assure you, the picture above is in fact the PlayStation Phone you've long been waiting for.

the device you see is headed into the market soon, likely boasting Android 3.0 (aka Gingerbread), along with a custom Sony Marketplace which will allow you to purchase and download games designed for the new platform. The device snapped up top (and in our gallery below) is sporting a 1GHz Qualcomm MSM8655 (a chip similar to the one found in the G2, but 200MHz faster), 512MB of RAM, 1GB of ROM, and the screen is in the range of 3.7 to 4.1 inches. Looking almost identical to the mockup we hit you with this summer, the handset does indeed have a long touchpad in the center which is apparently multitouch, and you can see in the photos that it's still bearing those familiar PlayStation shoulder buttons. For Sony buffs, you'll be interested to know that there's no Memory Stick slot here, but there is support for microSD cards.

What’s odd is the fact in the engadget leak about this story there is little mention of Sony Ericsson, in fact none. But they didn’t need to say anything. This product is a result of Sony getting two major divisions to work together to create something, which has always been so difficult in the past.
In some ways, the PlayStation Phone almost seems like the successor to the PSP, otherwise known as the PSP 2. With so many differences between this and what we have now, this seems like the platform and hardware the PSP 2 will run on. So what kind of games could you expect on the PlayStation Phone? It’s hard to tell. PlayStation 2 quality? Higher?
I’ also have a feeling that Sony may play a phone and a non-phone and similar specs. Seems logical for maximum impact.

 

Thursday, February 3, 2011

how to Delete friends in Facebook

Facebook is by far the best social networking website I have ever been on.
but some time we want to delete friends...

What should i do?

Simpe, Remove them from the friend list.


How do i delete them from my friends list?

Follow the Steps:
1 : Go to your friends wall
2: Scroll Down to Bottom
3: On the left hand side, just below the friends list
4: You will find the  link called Unfriend : (Check image in the left of this article)
5:Click on that & that friend will no longer remain a friend

Tuesday, February 1, 2011

what is alexa rank and how to improve alexa ranking

Alexa is a web company that collects data on websites and publishes the ranking of website...


Where do they get there data from?

They have several million users that use the Alexa toolbar. The toolbar sends data back to Alexa each time a user visits a website. Several million users sounds impressive which has led many to put a lot of credibility to the Alexa rankings, but is it really that credible? No its not. The several million users are
biased population.
They tend to be more technologically savvy than the average web user (only those who are technologically savvy will likely download and install the toolbar), so the Alexa results will be heavily biased toward the web site that the technologically savvy tend to visit. Also anyone with a website can install the toolbar (and get a few buddies to do the same thing) and visit their own website several times a day, just to inflate the Alexa ranking of their own website!

Increase Alexa Ranking


I’ve summarized the 6 strategies that I’ve discovered and applied to my own website to increase my Alexa ranking. Apply these strategies to your own website and see your ranking climb towards the top.

1.Download Alexa toolbar free use it every day to visit your own website. Alexa even gives you the ability to co-brand the toolbar with your own logo and give it away. You can download the toolbar here: http://pages.alexa.com/prod_serv/associatetoolbar.html

2. Encourage your website visitors to add their positive testimonials on Alexa’s detailed listings page for your website. This can be done by placing a link to the appropriate Alexa page on your website and asking visitors to “Click here to rate this website”.

3. Write your own site reviews on the top 100 rated Alexa sites and include your redirect URL. The top 500 domains, according to Alexa can be found at http://www.alexa.com/site/ds/top_500 When you write a review, be sure to use the redirection URL we discussed in number 2 above specifically for your website

4. Download the Alexa ranking button, traffic history graph, info links, and other traffic counters onto the page of your website that receives the most traffic.

5. Get listed on as many search engines as possible by placing a free listing in DMOZ. This is the largest human edited directory on the web and is co-branded among hundreds of thousands of sites. Be patient though, it often takes up to 5 months before you see your website listed after submission. Even though it takes longer than it should, you have little say in the matter because it’s so widely used across the Internet.

6. Write content related to webmasters. This is because most of the webmasters use Alexa toolbar. You may write and post articles related to SEO, webmaster tools. Webmasters always look for new tools and may revisit your website to gain access to the tools. Promote your articles on webmaster forums and social networking sites.

7. Write about Alexa and post in your blog. Bloggers love to know about different ways of increasing their Alexa rank. This may eventually increase traffic and your rank.

Sunday, January 30, 2011

how to remove virus form pendrive | remove recycler.exe

hackers001.blogspot.com
You know Recycler.exe virus mainly spreads through Pen drives and other removable media devices. Each time you insert your Pen Drive in any infected computer it copies itself to the Pen Drive. It also opens a backdoor and secretly downloads some potentially unwanted and malicious files to your computer.

How to Remove recycler.exe virus from pen drive??

  • Download Flash Disinfector and save it on your desktop.
  • Run the app, it will ask you to insert Pen Drive.Insert your Pen Drive and click OK.
  • It will remove autorun.inf file from your Pen Drive. Now open your pendrive and delete unwanted files(recycle.exe, recycler.exe etc.) from it.

Download Flash Disinfector

Friday, January 28, 2011

how to change windows logon screen

happy weekend to all of you!!
today i will tell you how you can change windows logon screen...
softwares make human life easy!!
so i have a software for it also...
you can easily change logon screen and hard-disk's icon...
here is the link
http://www.4shared.com/file/tNjEOZXY/WinBubble.html

Wednesday, January 26, 2011

KEYLOGGER | HOW KEYLOGGER WORKS

hackers001.blogspot.com
keystroke logging (often called key-logging) is the action of tracking (or logging) the keys struck on a keyboard, typically in a covert manner so that the person using the keyboard is unaware that their actions are being monitored.

How Keyloggers Work

The way keyloggers work varies enormously. However, there are two main types of keyloggers.

External Keyloggers (hardware):

They can be connected directly to the keyboard's cable. The spy does not need actual access to the computer nor to turn it on, he just needs to be physically there. Anyone with access to your computer may install such devices secretly and it's very hard to notice them. The main downside is that the spy can be caught if anyone finds out, for he needs to be physically there to both install and retrieve the keylogger. However, if successfully installed, this keylogger won't be detected by any antivirus your computer may have. It will log every single keystroke and save it to its enormous database where everything you type, including passwords and credit card numbers shall be later viewed.

Internal Keyloggers (software):

The most common type of keyloggers. If anyone has physical access to your computer, then it's a "piece of cake" to install a keylogger with a CD. That's the easier way, for if he is knowledgeable, he can also disable a given antivirus for that keylogger . Remote keylogging is very popular despite the numerous anti-virus programs out there that block them. There are many programs that do not only send you a report of the keystrokes, but they do it in real-time. A spy can see exactly what his victim is typing as he or she is doing it. More advanced keyloggers such as SubSeven may go as far as being able to turn on a person's microphone, control his or her mouse and even shut down the computer - just as if the spy were the one in front of it.

Remote Keylogger - Monitor ANY computer through the Internet!

 

RealTime Spy offers users the ability to remotely monitor a computer via a web browser, without even having physical access to the PC. It will allows you to remotely install the monitoring system through an email attachment without the PC user recognizing the installation! And you can access the activity logs from anywhere via you favorite web browser!
No remembering long IP addresses or directly connecting to the remote PC - all you need to do is point your browser to the Remote Keylogger website to view logs of any machines you deploy Remote Keylogger on! All logs are password protected and securely stored for your eyes only - and no worrying about waiting for the remote machine to sign-on to retrieve its IP address to monitor it.
Keylogger Software Full



Main Features:

Remote Keylogger Records...
  • Online Conversations

  • Keystrokes typed

  • Website Visits

  • Applications Ran

  • Documents Viewed

  • Windows opened

  • System Login Activity

  • Key Features...
  • Remotely Installable/Uninstallable!

  • Monitor a PC from Anywhere

  • Secure online log storage

  • Monitor from anywhere

  • Check logs at any time

  • Remote log deleting

  • Log search

  • How Remote Keylogger works

    • Remote Keylogger comes with a configuration program that allows you to create a remote install module that you e-mail to the remote PC you wish to monitor. You must attach this file you create to an email, and then send it to the remote PC. From there the user must download and run the attached file to install Remote Keylogger. You can choose to enable or disable the 'alert user' option that Remote Keylogger has. Once the user runs the file, their activities will be stored on our servers, so you can view them from any location - securely, of course. To aid the install process, you can give any name to the install module you create - such as CoolPictures.exe or FunGame.exe (it must always end with the .exe extension to run).

    • Some e-mail systems may block executable attachments - do not worry, however, as this can be avoided. To bypass executable blocking by the remote e-mail server, you can drag and drop the Remote Spy module into a WORDPAD or Microsoft Works document. From there you can email this doc file with the embedded executable to the remote user - if they open the doc, and double click the executable - then Remote Keylogger will be installed. Zipping the file with software like Winzip also works.

    • If the remote user does not download the Remote Keylogger module and run it, then the software will not work - you will have to physically install the software. We are not responsible for getting the user to execute the logging module that you send them, nor will refunds be granted if they refuse to run it - as you can still physically install the software.


    Sunday, January 23, 2011

    how to activate windows7 | make windows7 genuine

    Good Evening Friends!!!!

    today i will tell you how can you make windows 7 geniune
    i have a software with the help of it you can easily make any windows7 original within a second....



    INTERESTING!!!! 

    hmmmmmmm.....
    so now here is the link....

    http://www.4shared.com/file/4E5EPgXI/w7a.html


    step1: extract the file

    step2: first read read me file

    step3: now click on exe file

    Thursday, January 20, 2011

    HOW TO PASSWORD PROTECT YOUR GOOGLE CHROME

    good evening guys!!!
    now you can set password on chrome....
    Simple Startup Password is an addon for Google Chrome browser that blocks unauthorized people from using your browser.  Just go to the extensions gallery of Google Chrome and install the Simple Startup Password add-on for your browser.


    hackers001.blogspot.com


    After installing the add-on go to Settings -> Tools ->Extensions. There look for Simple Startup Password and click on Options. Set a password for your browser and done. Now every time you start your Google Chrome browser it will ask you for the password and if you fail to give the correct password your browser will be closed.
    You can get this add on from Google Chrome’s extensions gallery.

    Link : Simple Startup Password for Google Chrome

    In case you forget your password there is no option to recover it. You will have to reinstall the browser.


    Google Sites and Chrome For DummiesGoogle Sites and Chrome For Dummies
    Panasonic BL-C230A Wireless Internet Security CameraPanasonic BL-C230A Wireless Internet Security Camera
    Web Geek's Guide to Google ChromeWeb Geek's Guide to Google Chrome

    Tuesday, January 18, 2011

    windows is better then linux | why linux is not popular

    Today when i was reading a linux book then i thought that why linux is not popular like windows!!!!
    Even linux have all the things and it is free for all then why it is so far......
    Windows still owns over 88% of all the desktops according to leading research.
    I am also a red-hat certified engineer and i also use windows 7 because there are many things that are not in linux.
    First of all, Linux won't necessarily crush Windows 7, it is true that Linux will one day crush Windows, but the key words here are "one day." I doubt that it will be in Windows 7's lifetime. It might not be in the lifetime of Windows 8 either, if any of the rumors I've heard about Windows 8's features are true. 
    Some changes that are necessary in red-hat are given below and some fundamental issues to why Windows 7 dominating....!!!!!



    1) INSTALLATION 
    Windows 7 installs easier, has simpler configuration of user settings, greater availability of software, support (you could argue that all support is awful, which is probably true) Windows support is easier to get when you need help. Gaming, MP3’s,… I could go on and on.
    2) GUI
    linux is command based but now these days GUI is also available in linux, but it is not comparable with windows.
    command line interface is useful when we know all the commands, but for a new user it creates only problem and problems. a new user dont wanna see all the time a black screen. plz change it, make it user friendly!!!
    3)DRIVERS
    In windows7 there is no problem of drivers all are automatically installed when windows is installed, but in RHEL it sucks man!!!
    packages are required in RHEL, we cant play songs, movies etc. without it.
    4)SERVERS
    In RHEL we can make all the servers easily, it is best for it according to my experience but Windows DNS is the best internal DNS server. 
    This server is very important it is good in linux but best in windows....
    5) FEATURE AND FEATURES
    Windows 7 has solved a long-standing thorn in Microsoft’s side, How to deliver a feature rich OS without killing resources?
    Windows 7 has made improvements to the Aero feature, installs as a VHD (making it truly portable) and has moved beyond the need for mouse and keyboard. The touch screen as well as the speech and handwriting recognition improvements makes it hard to ignore Windows 7. DirectAcess, Bitlocker to Go, Applocker and the new easier to use UAC ( yes I am not letting up on this one) makes Windows 7 secure but yet easy to administrate.
    The list of features goes on, and the speed of Windows 7 without the resource drain…rocks!

    I DONT WANNA SEE END OF PENGUIN, I REALLY LOVE LINUX. I WANNA SEE IMPROVEMENT IN LINUX....
    HOPE FOR BEST
    GOOD LUCK LINUX
      
     

    Sunday, January 16, 2011

    What Is Cross-site scripting

    Cross-site scripting or XSS is a threat to a website's security. It is the most common and popular hacking a websiteto gain access information from a user on a website. There are hackers with malicious objectives that utilize this to attack certain websites on the Internet. But mostly good hackers do this to find security holes for websites and help them find solutions.
    Cross-site scripting is a security loophole on a website that is hard to detect and stop, making the site vulnerable to attacks from malicious hackers. This security threat leaves the site and its users open to identity theft, financial theft and data theft. It would be advantageous for website owners to understand how cross-site scripting works and how it can affect them and their users so they could place the necessary security systems to block cross-site scripting on their website.

    XSS is a hacking technique in which a malicious user enters a short snippet of JavaScript into a textbox so that this script will be saved in the database and when a user retrieves and displays this later, the browser will execute the script.





    Cross-site scripting holes are web-application vulnerabilities which allow attackers to bypass client-side security mechanisms normally imposed on web content by modern browsers. By finding ways of injecting malicious scripts into web pages, an attacker can gain elevated access privileges to sensitive page-content, session cookies, and a variety of other information maintained by the browser on behalf of the user. Cross-site scripting attacks are therefore a special case of code injection.

    The expression "cross-site scripting" originally referred to the act of loading the attacked, third-party web application from an unrelated attack site, in a manner that executes a fragment of JavaScript prepared by the attacker in the security context of the targeted domain (a reflected or non-persistent XSS vulnerability). The definition gradually expanded to encompass other modes of code injection, including persistent and non-JavaScript vectors (including Java, ActiveX, VBScript, Flash, or even pure HTML), causing some 

    Prominent sites affected in the past include the social-networking sites Twitter,Facebook, MySpace, and Orkut.In recent years, cross-site scripting flaws surpassed buffer overflows to become the most common publicly-reported security vulnerability,with some researchers viewing as many as 68% of websites as likely open to XSS attacks.

    Wednesday, January 12, 2011

    secret tricks to make blog popular

    today my friend ask me how can i make my blog popular!!!!

    then i just smiled and said read the today's damn post!!!
    every webmaster or blogger want to make blog popular....

    so here is some secret tricks to make it popular....

    1)Add Your Blog to Blog Communities
    Blog communities are really popular for blogs. There are tons of other bloggers and web enthusiasts constantly checking out these communities for blogs and information. There are many communities you can deal with but it’s better to stick with the ones which are popular and have a decent Google PR.
    Some good ones would be Blogged, FuelmyBlog, MyBlogLog, BlogCatalog, NetworkedBlogs etc. Try to Google and you will find a lot.
    When you follow a blog, you are basically increasing your visibility in the community. A lot of people will check you out and also subscribe to your blog if you are good. Always try to participate in a network and engage in conversations.

    2)Be a Guest Author on Popular Blogs
    Most blogs you will come across these days accept guest posts. Popular blogs like problogger, shoemoney, johnchow just to name a few; they give all the new bloggers some space on their blog to get noticed. Now this is a great opportunity and shouldn’t be missed. You can’t just post anything you like but it should be related to the niche and you have to prove your worth.
    Writing guest posts is a truly amazing way to get noticed and drive traffic to your blog. Of course you don’t get paid for it unless you are a big shot but this is a great and a free way to get traffic.
    To start with, you are most welcome to make a guest post on this site :)

    3)Give Something to Download for Free
    I love free stuffs and so do you. A good way to gain readers and make your blog popular is to give free stuffs to the public. It can be almost anything; an eBook, a wordpress theme, some popular tools or even free online class.

    how to increase speed of internet

    ARE YOU SUCKING FROM LOW INTERNET SPEED!!!!
    NOW SOLUTION IS HERE JUST FOLLOW THE SIMPLE STEPS THEN GOT HIGH SPEED.....
    Here are a few tips to Increase the Speed of Your Internet Connection

    (1) Connecting Port

    This may seem obvious, but you should connect to the internet though an ethernet port, rather than a serial, parallel or USB port. If ethernet is not an option, it may be advisable to update your hardware.

    (2) Enough RAM

    Make sure your system memory can handle the load! If you want to browse fast, you will need to close other applications in case your RAM is maxed out.

    (3) Fast Browser

    I ALWAYS USE MOZILLA, IT IS MY FAVOURITE BROWSER.
    Mozilla based browsers generally are among the fastest browsers, while still being comfortable to use. Whichever open source browser you pick, make sure you don’t overload it with extensions or addons, those will just slow your browser down dramatically. On the other hand, if speed and RAM are not an issue, go for the luxury!

    (4) Increase Speed under Windows XP Pro

    Windows XP Professional reserves 20% of your bandwidth for services like updates or spyware checks. If you would like to exploit this reserve, do the following:
      If you want to tap into this locked speed then make the following changes:
      1. Go to Start-> Run-> and type gpedit.msc
      2. Expand the Administrative Templates branch
      3. Expand the Network tab
      4. Highlight QoS Packet Scheduler
      5. Click on Limit Reservable Bandwidth and check the enabled box
      6. Then Change the Bandwidth limit % to 0 %
      Once you have done this click apply and restart your PC. After rebooting you should see a noticeable improvement in your net speed.

      (5) Tweak Tools

      There are a number of programs that promise to increase your internet speed. They may work, they may not. They all apply a number of changes to optimize your network settings. Whether or not they will really improve your internet speed or which one will work the best for you greatly depends on your system, hence it’s difficult to recommend an application.
      For further reading I will refer you to a set of articles found on About.com. Start with DSL and Cable Broadband Speed Tweaks and work your way through the links at the bottom.
      Which tools and tweaks worked best for you?
       

      Monday, January 10, 2011

      Download Opera 11 for Windows and Linux

      hello friends The final version of Opera 11 just came out with many new features and enhancements. Improved address bar, Mouse gestures, Tab grouping, Pinned tab, Automatic updates are few of the most noticeable features in the new Opera 11.


      One more important feature is its ability to run on external devices. While installing the browser you can select to install it on external devices. Which makes it a portable browser and you can carry it in your Pen Drive with you. Just click on the options button while installing and select install for external device in the next screen.



      You can read more about the new features of Opera 11 over here.
      Or just
      you can download it directly from here

      Download Opera 11 for Windows (7.1 MB)

      or Download Opera 11 for Linux

      Saturday, January 8, 2011

      HOW TO WRITE HTML CODE IN BLOG POST

      hello friends!!!
      every time a normal problem is occur, when you write plain html code in blogger post in Edit Html or compose section, you see it did not appear as it is as you like, there is so many ways to write plain java script or html code inside the blogger post, i told your here very simple way...

       


      1. Just visit... http://centricle.com/tools/html-entities/
       

      2. Paste your html code
       

      3. click decode, if the script already in decode form, so just click encode.
       

      4. Now paste the script in your blogger post.

      Download Norton 360 Version 4.0 2011 For Free

      Wanna Norton...
      well now you can download 90 days free pack of Norton.
      yes!! it is not a joke. Norton is giving away its Norton360 Version 4.0   and norton antivirus 2011 for 90 days free trial i.e 3 months.This is a special promotional offer.This is an OEM setup installer that has been released by norton in conjunction with microsoft.

      If you will directly go to the norton website you will not be able to benefit from this offer instead you will get only a 30-day trial version only after entering your credit card details.But if you use the link that I am giving at the end of this post you will get a 90 day trial and doesnot require to enter your credit card details.
      So dont waste your time and try the best antivirus solution as the new norton 2011
      • Provides excellent protection against viruses,spywares.
      • Its lightweight and uses less system resources.
      • Specially Designed for windows 7
      Click the link below to download Norton 360 Version 4.0  Or antivirus 2011 for free
      Download Norton360 Version 4.0 2011 for free

      Wednesday, January 5, 2011

      how to make your blog popular

      Blogging TipsThe success of your blog mostly depends on the amount of traffic it gets. This is especially more important if you want your blog to generate some kind of revenue. i will tell you some points how to make your blog popular for SEO


      •  Start a controversy. Just remember not to cross the line.
      • Start a contest. Make sure to end it too.
      • Give away free goodies. People love them.
      • Write about other bloggers to interest their visitors to read your blog. Keep it positive.
      • Dress up your blog often (By dress-up I mean tweaking the design)
      • Interview other bloggers and post the interview.
      • Write about your personal life sometimes.
      • Ask questions to your visitors.
      • Share some secrets.
      • Celebrate your birthday with your visitors. Think of innovative ways for doing this.
      • Celebrate your blog’s birthday too.
      • Write something funny or disgusting. (Don’t make it a habit)
      • Make a bumper sticker with your blog’s name and stick it on your car. (Just make sure you drive often)
      • Write an e-book and distribute it to your visitors for free.
      • Introduce a commission based affiliate program.
      • Tell your visitors about your latest fad or obsession.
      • Post interesting pictures of your pets.
      • Congratulate the top commentators occasionally.
      • Encourage sharing of opinions.
      • Donate for a cause or become a volunteer for a non-profit organization. Ask your visitors to join you.
      • Put your blog’s ad in the local newspaper or the yellow pages.
      • Hold blog competitions.
      • Create polls.
      • Hold an auction and let people bid for something useful (For example, advertising space on your blog).
      • Write about your blog achievements.
      • Share your hopes and aspirations about your blog.
      • Start an award distribution system.
      • Make contact with your local visitors and hold a get-together or a bloggers’ meet.
      • Start a blog comic strip.
      • Dig up some old article that you wrote on your blog which became famous and start a discussion.
      • Try and get a photograph clicked with a real celebrity and post it on your blog. (Hold on Tiger..don’t rush to that Photoshop button!)
      • Post videos that will help your visitors learn something new. Also submit them to video sharing websites like YouTube.com.
      • Write about your hobbies and interests. (For example, if you like cooking, post a new recipe)
      • Post about one of the weirdest thing that you ever did.
      • Get featured in a print magazine.
      • Buy a paid review from any famous blogger(s).
      • Brand your blog with a catch phrase along with a logo.
      • Distribute T-shirts or merchandise with your blog name on it.
      • Join Yahoo! Answers and put a link on your website to your answers.
      • Keep a track of websites that pick up your articles or press releases. Offer them exclusive news or content.
      • Start a newsletter.
      • Podcasting is another good way to make your blog popular.
      • Publicize your blog to your friends and relatives and let them do some work for you.
      • Be active in Social Bookmarking websites.
      • Share Link Love and you will get it back.
      • People like to read about Web 2.0. Write about it.
      • Write about something that’s already famous.
      • Last but not the least, be yourself.

      What is FUD Crypter?

      What Is FUD Crypter?
      FUD is acronym for fully undetectable.It is a software that can be used to encrypt your exe files.
      What is the use of FUD Crypter?
      FUD crypters can be used to encrypt viruses,RAT,keyloggers,spywares etc to make them undetectable from antiviruses.When these exe files are encrypted with Fud crypters they become undetectable with antiviruses

      How Does FUD Crypter Work?
      The Basic Working Of FUD Crypter is explained below
      The Crypter takes the original binary file of you exe and applies many encryption on it and stores on the end of file(EOF).So a new crypted executable file is created.
      Original Exe Crypted Exe
      001————- 010                                      101————-110
      100|Original File|000->  Cryptor  ->010|Original File|110
      010————- 111                                        110————-010
      The new exe is not detected by antiviruses because its code is scrambled by the crypter.When executed the new .exe file decrypts the binary file into small the data small pieces at a time and injects them into another already existing process or a new empty one, OR it drops the code into multiple chunks in alternative data streams(not scanned by most a/v) then executes it as a .txt or .mp3 file.
      Why Most FUD Crypters Donot Work?
      As a FUD crypter becomes popular it also get the eyes of antivirus companies.The antivirus companies update their software and employ detection mechanism that detect the encryption’s by the crypter.So, most of the popular FUD crypter are easily detected by antiviruses.
      Where can I test Whether my Crypter is FUD or not?
      To test you crypter encrypt any virus with it and test it on http://scanner.novirusthanks.org and make sure you check the box Do not distribute the sample .

      Monday, January 3, 2011

      How to show a banner at each startup in Windows

      hello friends...
      you know There is a hidden feature in Windows and not many users know anything about it. You can setup a banner with a message in it. Each time your Windows boots up the same banner will pop up. The message can be anything from a welcome message to some important information. You can use it in the way you want. Follow the simple steps given below to setup a banner for your Windows system :

      • First of all, go to “start” –> “run”.
      • Type “regedit” and hit Enter.
      • A new window will open named “registry editor”. In the left panal of the “registry editor”, go to the key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\ system
      • Now right click on the right panel, choose “new”,Select “string value”. A new “string value” will be created.
      • Right click on it and choose “rename”. Type “LegalNoticeCaption” .
      • Right click on that “string value” and choose “modify”. On the “value data:” area, type the text or value that you want to see in the title bar of the banner.
      • Now create yet another new “string value” in the right panel and “rename” it to “LegalNoticeText”.
      • Right click on that “string value” and choose “modify”. On the “value data:” part, type the message you want to display each time windows boots.
      • Now, close the “registry editor”.
      • Restart your computer.
      Now, after the “boot screen” and just before the “welcome screen” a new banner will pop up which contains your message and an “OK” button. The users have to click on the “OK” button to proceed.

      Saturday, January 1, 2011

      how to make torrent fast new trick

      hi friends,
      today i am again posting a new trick for torrent
      after frustrating and spending more and more time with torrent finally again a found a new way to make its speed high. its is working on my laptop perfectly.....
      try it and get high speed



      here is step by step tutorial:
      step1: open your u-torrent or bit torrent
      and go to settings, as shown in highlighted part of picture

      step 2: now go to bandwidth and make the setting same as i make here

      step 3: after that go to next option bitTorrent and make protocol encryption outgoing enable

      step 4: now go to scheduler and enable it

       now all these steps are enough to make speed high
      enjoy!!!

      how to break winrar password

      GOOD EVENING TO ALL OF YOU
      today's post is about how to crack password of winrar
      In order to protect your winrar files frm others reading, you set the password with your files. After a long time, you forgot the password. Is there any way to break passwords in winrar?

      WinRARis a powerful tool allows you to create, manage and control archive files. It consistently makes smaller archives than the competition, saving disk space and transmission costs. Winrar itself can not break password for you. You need another tool which is Rar Paswrd Recovery to find your winrar password back.


      here is all the step to do this:

      Step 1: Download Rar Password Recovery , then install it on your computer.
      Step 2: Double click on Rar Password Recovery icon, make sure it is running.
      break password
      Step 3: Click the Open button on the top of Rar Password Revovery main windows.
      Step 4: Select the rar file which you forgot the password to open it.
      Step 5: Click Start button in the right of Open button on the top of main window.
      After you finished the steps above mentioned, Rar Password Revovery start to find the password of your rar file. You also can use rar password cracker to break rar password. If your file format is not rar, but is zip, your can use Zip Password Recovery to find your password back.