Spiga
Tuesday, December 4, 2007 at 10:59 PM Posted by SONU MISHRA
Labels: HACKING TOOLS 0 comments
Wednesday, November 7, 2007 at 10:56 AM Posted by SONU MISHRA
Labels: HACKING TOOLS 0 comments
Saturday, October 27, 2007 at 8:51 AM Posted by SONU MISHRA
Labels: MOBILE 2 comments
Tuesday, October 16, 2007 at 12:36 PM Posted by SONU MISHRA
Labels: MOBILE 1 comments
Saturday, October 13, 2007 at 1:54 PM Posted by SONU MISHRA
Labels: MOBILE 0 comments
Sunday, October 7, 2007 at 9:50 AM Posted by SONU MISHRA
FIREWALL
A firewall is a hardware or software device which is configured to permit, deny, or proxy data through a computer network which has different levels of trust. The most common boundary where firewalls are applied is between an organization’s internal network and the interne t. This report will provide readers with a resource for understanding firewall design principles used in network security.
Labels: FIREWALL 1 comments
Friday, September 14, 2007 at 12:16 PM Posted by SONU MISHRA
Labels: DOS ATTACK 2 comments
Friday, August 31, 2007 at 10:46 AM Posted by SONU MISHRA
Ms Dos And Batch File Programming Tricks And Tips
DOS is basically a file caled command.com .It is this file which handles all DOS commands that we give at DOS prompt-such as copy,dir,del,etc.
Batch file programming is nothing but the windows version of unix shell programming.To perform a bulk set of commands over and over again,batch files are used.
Some Important And Hidden Dos Command
1>ANSI.SYS - Defines functions that change display graphics, control cursor movement, and
reassign keys.
2>ARP - Displays, adds, and removes arp information from network devices
3>AT - Schedule a time to execute commands or programs.
4>COLOR - Easily change the foreground and background color of the MS-DOS window.
5>CONTROL - Open control panel icons from the MS-DOS prompt.
6>CTTY - Change the computers input/output devices.
7>EMM386 - Load extended Memory Manager.
8>IFSHLP.SYS - 32-bit file manager.
9>SWITCHES - Remove add functions from MS-DOS.
10>SYS - Transfer system files to disk drive.
Redirection Of OUTPUT:
Send the output of the dos prompt to a file on disk.This can be done using the Redirection operator,> .
Example: c:\windows>net>xyz.txt
c:\windows>help>>xyz.txt
This command will execute the net command and will store the results in the
text file ,xyz.txt.
To print the results: c:\windows>dir*.*>prn
Redirection of Input:
we can also redirect input ,from .txt file to DOS prompt.
Example: c:\windows> more <>
BATCH PROGRAM TO DELETE FILES:
@ECHO OFF
ECHO.
ECHO I am going to delete the following files:
ECHO %1 %2
ECHO.
ECHO CTRL+C to Abort Process
PAUSE
FOR %%A IN (%1 %2) DO DEL %%a
ECHO Killed files.Mission Accomplished By Sonu Mishra.
Labels: DOS ATTACK 0 comments
Sunday, August 26, 2007 at 1:21 PM Posted by SONU MISHRA
Labels: Hacking history 0 comments
Wednesday, August 15, 2007 at 3:21 PM Posted by SONU MISHRA
Wednesday, August 8, 2007 at 11:51 AM Posted by SONU MISHRA
BLOCK UNWANTED SITE ON YOUR COMPUTER
Hey Friends,want to block any site from opening on your computer.If you want to block some site in windows O.S. to be browse from your computer.
Then do following steps.........
open the location..
C:\WINDOWS\system32\drivers\etc
you will find a hosts file.First backup the hosts file.
Open hosts file there, from the notepad.
At the end of the line you can see as per below.
127.0.0.1 localhost
Append the following line at the end
127.0.0.1 BlockSitename.com Replace the BlockSitename.com with the site name that you want to block.
example......
If you want to restrict http://www.yahoo.com/ then in the hosts file do this....
127.0.0.1 http://www.yahoo.com/
or
0.0.0.0 http://www.yahoo.com/
as ip 0.0.0.0 means nothing.
Then go to Start->Run-> type: ipconfig /flushdns to restart the network.
Note: That will only stop the domain name to go to the website but if you know the IP address of the site from the gnsstuff or whois then you can brose your site.
Labels: Hacking 0 comments
Sunday, August 5, 2007 at 10:47 PM Posted by SONU MISHRA
Labels: Atm 0 comments
Saturday, July 28, 2007 at 9:09 PM Posted by SONU MISHRA
Know E-mail Sender's Detail
Friends, after reading this article you'll be able to know,who is sending you the message or the forge mail.
Where Email Comes From
Superficially, it appears that email is passed directly from the sender's machine to the recipient's. Normally, this isn't true; a typical piece of email passes through at least four computers during its lifetime.
This happens because most organizations have a dedicated machine to handle mail, called a "mail server"; it's normally not the same machine that users are looking at when they read their mail. In the common case of an ISP whose users dial in from their home computers, the "client" computer is the user's home machine, and the "server" is some machine that belongs to the ISP. When a user sends mail, she normally composes the message on her own computer, then sends it off to her ISP's mail server. At this point her computer is finished with the job, but the mail server still has to deliver the message. It does this by finding the recipient's mail server, talking to that server and delivering the message. It then sits on that second mail server until the recipient comes along to read his mail, when he retrieves it onto his own computer, normally deleting it from the mail server in the process.
How to know email headers
Steps to open headers for various email clients and services like Outlook, Hotmail, Yahoo, AOL,...
Yahoo Mail
• Log into your Yahoo! Mail account.
• Click the "Options" link on the navigation bar.
• Click the "General Preferences" link.
• Go to the paragraph titled Messages and Locate the Show Headers heading and select "All."
• Click the "Save" button to put your new settings into effect.
Hotmail
• Log into Hotmail.
• Click on "Options" tab on the top navigation bar.• Click on the "Mail" link on the navigation bar on the left.
• Click on the "Mail Display Settings" link.
• Change the "Message Headers" option to "Full".
• Click the "OK" button.
AOL Mail
If the email is sent from anywhere OTHER then AOL, and you are receiving it in AOL, then open the email you want to trace, or have your client open the email, and look for the link Details. This link is usually just below the To:email in the email message. If the email is sent from an AOL user to another AOL user then our Reverse AOL Screenname search can get you the sender's information.
Outlook Express 4, 5 and 6The Importance of Received: Headers
In the above examples ,we've seen that the Received: headers provide a detailed log of a message's history, and so make it possible to draw some conclusions about the origin of a piece of email even when other headers have been forged. This section explores some details associated with these singularly important headers, and in particular how to circumvent common forgery techniques.
Unquestionably, the single most valuable forgery protection in the Received: headers is the information logged by the receiving host from the sender. Recall that the sender can lie about its identity (by putting garbage in its HELO command to the receiver); fortunately, modern mail transfer programs are able to detect such false information and correct it.
Labels: Hacking 0 comments
Thursday, June 14, 2007 at 12:09 PM Posted by SONU MISHRA
Labels: Linux 2 comments
Thursday, June 7, 2007 at 5:13 PM Posted by SONU MISHRA
Labels: Hacking 0 comments
Monday, May 7, 2007 at 6:10 PM Posted by SONU MISHRA
Labels: Machine Language 1 comments