Flipkart Deals

Hacker"s Search Box

Google
Showing posts with label Featured Articles. Show all posts
Showing posts with label Featured Articles. Show all posts

Saturday, January 9, 2010

Best Websites for Teens to Earn Money Online

The following article has been taken as it is from www.makeuseof.com.
The article has some very useful resources which earlier were not known much.....I mean many of such schemes which we used to come across the internet were mostly fraud or unfeasible. But the following sites are purely exceptions to what i claimed above. The sites seems to be very much genuine and useful. Try your hands on it if you wish to make money out of internet.

---------->Start ------------>

As the end of the school year approaches, many high school and college students find themselves scrambling for summer jobs so that they can save up some spending money.

Unfortunately, there aren’t many decent paying jobs available for teens, especially in a rough economic climate. However, there are a number of websites that offer very easy money for teens online. For a teenager who is disciplined and responsible, online jobs are the easiest way to earn a significant wad of cash this summer.

Websites That Offer Easy Money for Teens

Teenagers today typically have an assortment of skills that are useful and valuable on the Internet. For teens who are skilled writers, earning money will be that much simpler. Additionally, there are also well paying jobs available for teenagers who know how to write web pages, write high-volume blogs or forum posts, or program in different Internet or desktop programming languages. However, finding those opportunities often involves wading through a mountain of garbage and scams. This article will provide teens with a guideline for the best opportunities on the web that offer easy money for teens.

1. Easy Income for Teens Who Can Write Articles

For any teen that has excellent writing skills, the Internet offers an abundance of cash just sitting there for the taking. Yes, it may take a full eight hours a day of good solid writing work – but what could be better than rolling out of bed at ten in the morning and going to work at home, in your pajamas? Sound too good to be true? Well put on your pajamas and check out these opportunities.

Associated Content

Associated Content is one of the most popular “user-generated content” sites that offers articles on just about every topic under the sun.

At Associated Content, you can either “claim” topics from the assignment desk, or you can submit topics of your choosing. You can earn both upfront payments, as well as monthly payments based on traffic to your articles. Starting out, you might only earn $3 to $4 per article you write, plus $1 to $2 for traffic – but if you wrote 5 articles a day, that’s $400 a month, plus additional monthly royalty payments.

Not only does writing for a site like AC establish you as a writer, but if your writing is exceptional, AC will even consider you as a preferred content producer, and their clients may ofter you writing gigs that pay $20 and up for an article.

Helium

Helium is another user-generated content forum that pays you both upfront fees as well as traffic royalties.

Helium is unfortunately a bit cheaper with their payments, and they’ve established a bunch of loopholes you need to jump through. You can earn about $1 per article plus traffic payments. However, to earn those payments you have to spend time “rating” articles – a painful and tedious process of comparing two articles and picking the one that’s better. But with Helium, the real money is in the “marketplace” section, where you can compete on client writing gigs worth anywhere from $5 to $100 or more.

Triond

Triond is another content site that accepts your articles and pays you royalties for traffic.

Triond is one of the few sites known for actually sending authors the payouts they’ve earned, so it deserves mention here. However, if you want to use Triond to add an income stream to your summer writing, you’ll need to submit a very large quantity of articles that are well written with SEO in mind, and can attract a very large stream of readers from the search engines. If you can accomplish that, then yes – you can earn money from Triond.

2. Make Money Writing Reviews or Writing Letters

One of the most popular reasons many people use the Internet is to research products before buying them. This has turned “reviews” into one of the most popular types of content online. If you like writing up product reviews, then there are countless opportunities to earn income from your written opinions.

I’ve written for Shared Reviews (the image above) before, because they do legitimately pay their authors. However, I’ve also heard that Epinions is another great review site to earn money from.

Have your friends ever told you that you’re amazing at writing letters? Then consider spending your summer creating custom letters at Letter Rep. Yes, the website isn’t exactly the prettiest site in the world – but by submitting letters to custom letter requests that visitors submit to the site, you stand to earn $10 per letter. Not only that, future visitors to the site can also purchase your letters, making your pile of work a wonderful source of residual income, not only throughout the summer, but even throughout the school year.

3. Quick Money for Teen Programmers

If you are an ace programmer with any programming language, you could spend your summer doing programming freelance jobs for some real cash. However, when it comes to finding freelance work, you have to be very careful what websites you visit – as most of them are useless or flat out scams.

Scriptlance is about as far from a scam as you can get. At the beginning of my online writing career, I spent months sifting through the latest project postings there (there are dozens per hour), and bidding on the ones that matched my skill set. There’s writing work, but the bulk of Scriptlance is programming work. If you post a professionally written proposal to the person who posted the project, your chance of landing the gig will be excellent. Just working on scriptlance projects alone, you could easily earn several thousand dollars by the end of the summer.

Other legitimate freelancing sites (although none quite as big as Scriptlance), include Rent A Ghost Writer, Elance, and iFreelance. Be sure to watch for new updates often, and be the first to post a bid.

Work Hard, Be Persistent, and Rake in the Dough!

The key for teens to successfully earn a small fortune during summer break through online work is by staying persistent, even when it looks like you’ll never land that first gig. Keep posting your daily articles to the royalty paying websites, and bid on freelance projects constantly. Soon, you’ll find that you have more work than you know what to do with. If you can discipline yourself to work for at least eight hours straight for every weekday during the summer – you’ll save far more money than any of your friends could earn waiting tables or mowing lawns!

Have you ever earned money from any of the sites listed in this article? Are there any good opportunities missing? Share your opinion in the comments section below.

Thursday, January 7, 2010

Annonymously downloading Torrent

Anomos is a BitTorrent client that uses cryptography and lets you share files anonymously. It is currently in beta, and it just works.

Download Anomos

It’s a very barebones anonymous BitTorrent client –it doesn’t even show the number of seeds/peers. Nobody except the central tracker will be able to know who’s downloading what. That is exactly what an anonymous torrent client should provide, and that’s what Anomos does well.

The developers are constantly working on it to make it better. Download Anomos from here. It’s currently available for Linux and Windows.

What the developers claim is down here ---

Anomos
is a pseudonymous, encrypted multi-peer-to-peer file distribution protocol. It is based on the peer/tracker concept of BitTorrent in combination with an onion routing anonymization layer, with the added benefit of end-to-end encryption. By combining these technologies, we have created a platform where by no party outside of the trusted tracker will have any information about who a peer is or what they are downloading.
smwhite
Anomos is designed to be easy to use – you won’t even be aware of the security that it provides. Anybody who is already familiar with BitTorrent won’t have to do anything differently.
smwhite
A more technical introduction is avaliable in this blog post. It’s a bit outdated, as the final protocol is still under active development. Soon, we’ll be releasing a complete guide to the Anomos protocol. The FAQ may provide some answers to any questions you may have.
smwhite
The source code is available in our Git repository, and regularly updated source code documentation is available here. Downloads of releases are available on the downloads page.

Thursday, December 10, 2009

Ultra-Productive Gmail Configuration

Minimalist Gmail: How to Get Rid of the Non-Essentials


My new minimalist Gmail inbox.

I’ve been running a Minimalist Gmail setup lately, stripped of nearly everything but, you know, emails … and I’m in love with its simplicity.

There’s something pure about having nothing but the essentials.

Now, some of you will recall a couple of other posts I did, and let’s quickly review them for background:

1. Not long ago, I did a post on How to Make Gmail Your Ultimate Productivity Center. This was Gmail fully loaded, with gadgets for Google Calendar, Google Docs, delicious, Twitter, and much more. This was good, and I still recommend it to most people who want one place for everything they do.

2. Even less ago, I boldly announced I was Killing Email and ditching my inbox. A dramatic announcement, I know, from someone who has been such a Gmail fanboy for at least a few years.

So, two things: one, I haven’t completely killed email. I still use Gmail, though not as often. I have moved most of my communication to Twitter, Google Docs, a wiki, and Basecamp. But I still do email, a little. It’s a hard thing to kill, but maybe drastically reduced email usage is OK with me. It’s certainly less stressful.

Two, when I do use Gmail, lately, I am bothered by all the clutter. I removed all the gadgets, and still too much. Google is known for its simplicity, but I really wanted to strip out not only ads but chat and the navigation menus at the top and more. So I did.

I’ve used Greasemonkey for Firefox and some great user scripts, listed below, to achieve this. I thought of rewriting Gmail’s CSS, but user scripts are much easier. It didn’t take long — just Googled every little thing I wanted to do, and found others had already solved the problems, one at a time.

Here’s how I’ve made Gmail into a minimalist inbox:

1. Fire and Grease. First, be sure you’re running Firefox with Greasemonkey installed. I love the minimalism of Google Chrome — been running both the dev version and latest Chromium builds — but unfortunately it can’t do what Greasemonkey can, at the moment. So I mostly just use Firefox for Gmail now.

2. Remove gadgets. First thing I removed was gadgets — go to Settings, then Gadgets, and remove any you have installed. I had Twitter and Delicious. Then I went to Labs under Settings, and disabled “Multiple Inboxes” and the Google Docs and Google Calendar gadgets, as well as the option to move the Chat box to the right side of Gmail. Things were starting to get cleaned up!

3. Hide labels, chat, footer. I really wanted to remove chat but couldn’t figure it out. Also, the clutter in Gmail’s footer was bothering me. So I found this brilliant user script: Gmail 3: Hide Labels, Chat and Footer. Install it in a click, and voila! Lovely.

4. Remove ads. Ads on the right side of email messages also bothered me. Found a script to do this: Gmail Ad Remover. Added benefit of maximizing your screen space for messages.

5. Remove stars. It’s a minor thing, but the stars are unnecessary for me. I don’t use them for task management (did at one time), so what’s the point? Gmail Remove Stars to the rescue.

6. Gmail logo and searchbar. Found Gmail toggle searchbar area script. Cleans things up nicely. You can always toggle the search area back on if you need it, but most of the time when I’m processing email, responding, I don’t need this.

7. Menu navigation bar. This was the most annoying. I couldn’t figure out how to remove the navigation menus that run across the top of Gmail. Then found the Gmail Real Estate script. It actually toggles not only the navigation menus, but the search area too. This somewhat duplicates the logo and searchbar script’s function above, but I’ve found they actually work nicely together, allowing you to show just a minimal navigation bar if you like, or whatever you feel like showing at the moment. I normally have everything minimized.

Updated: 8. Clean up rows and remove the “inbox is empty” message! Matt Constantine responded to this post by writing two excellent Greasemonkey scripts. The first, called Gmail Clean Rows, removes the lines and other clutter from your inbox’s list of emails. The second is called Gmail Empty is Empty, and removed a small annoyance of mine — the message that shows up when your inbox is empty that says “No new mail! Want to read updates from your favorite sites? Try Google Reader”. Now the empty inbox is really empty, which is lovely lovely.

Updated: 9. Remove extraneous buttons. Matt Constantine took it a step further, at my request, and wrote Gmail Inbox with Less Buttons, removing all the buttons above and below the inbox, except archive, report spam and delete. This is perfect, because I don’t have a need for the move-to, label or more actions drop-down buttons, or the refresh link, or the Select links below all the buttons. Your needs may vary.

And that’s it. It might sound complicated, but basically it’s turning off some options in Gmail’s settings, and then installing a few user scripts. It should just take a few minutes. See the before and after pics below.

How I Use Gmail, the Minimalist Way
Now that everything is stripped down — no gadgets, no chat, no labels or stars — I just process and reply to email, and empty my inbox. Here’s how:

1. Use keyboard shortcuts. See this list if you don’t already know them. Pressing a key such as “c” or “r” or “a” to do email messages, or “j” or “k” or “x” or “y” to navigate and select and archive, is much faster than using the mouse. I can process very quickly using shortcuts.

2. Remove all unnecessary incoming email streams. Very important. Unsubscribe from all newsletters, all ads sent to you from businesses, all notifications from other services you use. Filter out messages from people who just forward jokes or chain mail. I no longer publish my email address, and give people other options for getting the info they want, so only my closest friends or business partners email me. Leaves the inbox relatively uncluttered.

3. Process quickly. Just run through your inbox, processing like lightning. Each email requires instant action: archive or trash, reply then archive, put on your task list (see next item) and archive. Or just do the task now, and archive. Those are the only options. Should take 10 minutes tops.

4. Tasks. I use a separate task list these days (Anxiety, a very simple Mac app) to make a quick note of any tasks, so that I can archive an email without needing it in the inbox as a reminder. Gmail Tasks is another good option — I don’t use it these days because I keep my email closed most of the time, and want my small task list open when I need it without having to open Gmail.

5. Short messages. Keep things short, and it doesn’t take long to reply. I try to do it in 3-5 sentences. I rarely go over this.

Before and After Pics
Took some screenshots to illustrate the changes. Click the thumbnails to see full images. Update: I’ve changed the “after” screenshot to illustrate the new scripts noted above by Matt Constantine.

Edit: The Firefox theme you see in the screenshots is Chromifox Basic, modeled after Google Chrome. I didn’t mention this above, but I removed most of the toolbars and icons from Firefox awhile back, to make Firefox as minimalist as I can. You can do this in the View->Toolbars menu, unselecting toolbars and removing icons as you please.

Before:

After:

Source:Zenhabits

Wednesday, December 2, 2009

16 Outstanding Web Design sites

We all hope that their site is pretty special, in fact, its design is something of your favorite website is, I think we on the basic code is available, but from an excellent site designer there is still a distance, It does not matter, as long as a good guide, good Let's website can also design their own. http://sixrevisions.com/ Jacob Gube in his blog readers to seek the views, summed up the http://sixrevisions.com/web_design/16_sites_web_design_inspiratio/ 16个excellent site design Site . For all foreigners may not like something, but it is undeniable that some things they really deserve Let's study.
Following is the profile of the 16 sites, we hope to help:


1, http://www.thebestdesigns.com/ The Best Designs

The Best Designs is a ready-made high-quality XHTML view of the excellent design and Flash web site, the site marking and design of each of the keywords (such as bold, and color, or with a better CSS) To give readers more easily get their wish to search things.
2, http://cssremix.com/ CSS Remix

CSS Remix is a (according to their own profile) Web 2.0 Best Design Nongchao Er. Of course, the site also includes some non-Web 2.0 theme design. CSS Remix of readers more than 14,000 subscribers, where a designer can access the design work of other designers, depth exchanges, is a Need for exchange platform.
3, http://cssmania.com/ CSS Mania

CSS Mania is a collection of CSS-based page design a website to collect good after they have carried out regularly updated. Up to now, has collected 10,000 designer's works. May be due to excessive collection of works because of uneven quality of works, many people grasp the handle.
4, http://screenfluent.com/ screenfluent

screenfluent is a beautiful page on the site, is special about a modal window preview, to give readers visual effects experience. Has collected 7,000 selected design, has rich connotations.
5, http://www.screenalicious.com/ Screenalicio.us

Screenalicio.us has more than 9,800 reference design, but also points readers to the function, divided into five out, so readers can also design a selective refer to the score.
6, http://www.oswd.org/ Open Source Web Design

Open Source Web Design a shared community, members can upload your own design code-sharing to the public. Downloading code is not unlimited free, 1 OSWD (do not know the meaning of this unit) following the design of the download is free. Members can download this site's design code, look.
7, http://onepagelove.com/ One Page Love

One Page Love is a basic page design of the exhibition hall to display the contents include: the beautiful, creative Web sites and applications. Categories including business, moderate, news, etc., etc., including integrated relatively miscellaneous.
8, http://www.fullsingle.com/ FullSingle

FullSingle and One Page Love , is on the single-page design of the site, the site of each page will appear as outstanding works selected profile, to tell you about these designs What, what good such.
9, http://onepagefolios.com/ One Page Folios

One Page Folios is also on the design of the single-page, single-page summary is a combination of site design and development of the site, the inside has been more than 800 groups in the portfolio for reference.
10, http://wel
ovewp.com/
We Love WP

Wordpress for the use of the blogger, this site is worthy of collection. We Love WP will share some of the top wordpress designs, of course, also shared some pretty wordpress theme.
11, http://cssdivine.com/ CSS Divine

CSS Divine is a paradise based on the design of CSS, CSS kinds of design complete, the right Sidebar useful in various colors make the Tag, click on the search based on the color you want the CSS design. Categories include arts, business, clean and business.
12, http://www.designsnack.com/ Design Snack

Design Snack since the superscript: You can control the design architect. Like The Best Designs , this is also a XHTML and Flash on the excellent site design, in this site, you can customize the way to display all kinds of design, a design for a vote, or Color is a tab to browse the design.
13, http://www.strangefruits.nl/ SF art & design portal

SF art & design portal is a portal on the web site design, unique, innovative and artistic temperament of the design features of this site. You can by category, style, color, national or even visit the design.
14, http://designshack.co.uk/gallery/all/ Design Shack

Design Shack is exclusively designed to provide top quality based on the CSS website, come to the fore the works is they're looking for. The site also provides tutorials and design of the lessons learned.
15, http://www.cssloaf.com/ CSSloaf

Others collected a good thing, CSSloaf collect once, it collected 35 of the good things website design, so we do not need to read elsewhere. The site features is the extraordinary display of maps, make clear at a glance.
16, http://www.edustyle.net/ eduStyle

Edu see in the know that this site is devoted to educational institutions which exist, it focuses on higher education for the design of the site, showing the best design.

Source:
loserblog.cn
Tags:16 Outstanding/Mindblowing/Outstanding/Amazing/Great Web Design sites,web designing,

Monday, November 30, 2009

How to Ruggedize Your Own Gadgets (With Video!)

waterlaptop-470-0909

Popular Mechanics has a detailed how-to on diy ruggedization of common portable electronics such as laptops, cameras, and cellphones. There is video of a laptop surviving an eight foot fall due to the tennis balls, pipe insulation, and weather stripping they’ve added. Its not just shock resistant, they’ve used a two-part compound marketed for making custom molded earplugs to make the laptop water resistant

Wednesday, November 25, 2009

Guide - Removing Malwares

If someone says that he never encountered a malware infection on his PC, probably he is lying. What ever antivirus you use, at some point of time, you will face this occasion that PC gets infected and your antivirus never detected it. Modern day heuristics enabled antivirus have reduced such chances, but most of the time its not so. The strangest thing about malware is that you feel their presence without any diagnostics! May be that’s because of the resonance that we develop with our PCs over time…!

Let’s first learn what malware are…

Types of malware:

  1. Virus: A virus is a malicious program that can replicate itself and affect normal operations of a system without knowledge or permission of the user. It attaches itself to executable code and runs every time the code is run, making multiple copies of itself. It corrupts the files, denies access to data and hence renders data useless.
  2. Worm: Unlike a virus, a worm is independent and doesn’t attach itself to any file or code. It is capable of spreading without need of any host file. It replicates by copying itself through network. Worms prominently attack only networks, sending its copies to all users in your address book, causing DoS (Denial of service) attack and affecting your internet functionality.
  3. Trojans: As the name goes, it hides inside a seemingly legitimate program and runs malicious code from there. Once run, the host computer gets infected and it starts replicating. It performs various activities like sending your data to its creator, or logging what you type (your passwords, bank account details) and sending them to its creator without your consent. It can even cause damage to your data by simply deleting it. Trojans have capability to change their code to trick the antivirus programs into not detecting them. Some are even scheduled to strike at preset dates.
  4. Spyware: Very similar to Trojans, these applications are solely designed to steal your data. But unlike Trojans, they don’t have the capability to replicate themselves.
  5. Cloaked malware: These are the new generation malware that are becoming a nightmare in computing sector. Cloaked malware are Rootkits that are invisible to windows explorer and hence to antivirus. They run hidden from task manager making it difficult to mark its presence. Its files are hidden on system and thus antivirus doesn’t detect them.

So, these are malware. Once executed by us, they go active in system memory, multiplying and applying constrains to privileges and adding entries to registry to make sure that are run at least once when system starts. They add malicious entries to registry to make sure that they are masked by disabling task manager, registry editor and folder options. They make files that enable them to be executed when drives are opened and continuously monitors ours system to gain chance to spread. But how do we identify their presence in our systems? These are the symptoms….

Identification:

i. Unrecognised processes and files: The presence of unrecognised processes running in task manager or presence of unrecognised files on drives marks presence of malware.

The key to identifying the presence is to keep vigil on the processes that run in back ground. This begins from day you install a software, see what process it runs. Also remember what all files you have present on your hard drive. Any new file or folder with .exe extension, anything with provocative name or cute icon can potentially be a result of infection. In event of task manager being disabled, process explorer by sis internals can be used to analyse processes running.

ii. File and system behaviour: If you ever notice that drives open in new windows, system taking more time during startup, CPU showing excessive activity even on no load or files or folders reappearing even after deleting them or not getting deleted at all, there is a high probability that your system is infected.

Files in pendrive disappearing and being replaced by smaller folders (with .exe extension if noticed) very clearly indicated presence of malicious code.

File activity can be detected by using the application filemon. An expert view on file activity can easily uncover malicious activity.

iii. Network activity: If you get complaints that some of your friends are getting strange e-mails from you, with links to unknown sites or strange file attachments, this could be a worm at work.

Increased network activity noticed in portmon etc also implies presence of network worms.

iv. Reduced privileges: Getting error messages of “ ….disabled by administrator….” on running RUN , Task manager or accessing Registry editor etc plainly implies your system is infected and malicious entries made in registry.

v. Malicious entries in registry: Same implies when you get errors on startup like file not found etc. This is because of malicious programs making entries in registry to auto start at system startup. This can also be analysed by using the application autoruns from sis internals suit. Or simply run MSCONFIG in run menu and check startup applications.

These symptoms confirm presence of malware in your PC. Now that you know that you two aren’t alone, how do you zero in on the culprit, keeping in mind that your loyal antivirus let it in? Here under is a step by step procedure to catch the culprit and to kick it out. Stop all other applications and disconnect the internet. Keep your weapons handy…….. War has begun!

Eradication of malware:

i. Identification of process in memory: Once executed, the conventional malware tend to be active in system memory, running a process that carries out the task the malware was designed to do. Nowadays it is common that malware alters registry to disable task manager, Run and registry editor, hence use process explorer to view active processes in memory. Tips to identification includes-

a. Usually a few malware are easily identified by very high CPU usage even when you aren’t running any CPU consuming application.

b. Many carry names that are suspicious to even laymen. Some include Khatarnak.exe, khatra.exe, music.exe, new folder.exe, soundmix.exe, etc. Most of them run under the explorer section in process explorer.

c. Smart viruses today carry names that are spoofs of windows processes. Like Regsvr32.exe is a windows application, but virus carry name Regsvr.exe. Similarly a malware spoofs the name of windows service host svchost.exe and run a process svcshost.exe. In such cases identification becomes tough and depends more on your experience and logical approach. Obviously a process Regsvr.exe isn’t expected to run always in your system. And a service host with odd spelling that runs under explorer is suspicious. Assistance can always be taken on-line regarding any suspicious process.

d. Repetitive processes of same name present in memory, when just one or no such application is running, also points out that the process is malicious code. But svchost.exe is one exception, with 5 such processes running at a time.

e. Reverse analysis can be made by identifying all legitimate processes and their triggering applications to identify the left out applications as suspicious.

f. Cloaked malware aren’t easily identified since they run hidden from explorer. Their files and memory residency isn’t visible. Hence, their presence is hard to verify. The sis internals tool Rootkit revealer does a good job in detecting Rootkits. It scans registry and file system for discrepancies and lets us know possible Rootkits that are actually present but not mentioned in windows API. Extreme caution should be taken while taking any action based on its result, since it just gives a probable result and not certain.

Having identified the malicious process in memory, the next task is to know where it is executing from. This can easily be verified from process explorer.

ii. Stopping the malicious code execution: The next step is to stop the execution of malicious code. The malicious code as long as active in memory can keep multiplying, and monitors system to maintain its malicious action and keeps vigil on registry, not allowing it to be rectified. This task can simply be done by task manager/ process explorer or may even need a boot from secondary device.

Note: Now on, don’t open any drives by double clicking on them, since this can trigger drive autorun which is usually linked to auto running malicious code using an autorun.inf file. Open drives by address bar or explore instead. Do not open any new folders etc, since they can probably be masked Trojans having folder icon!

a. The basic step is to end task the identified malware to stop its execution. This can be done directly by process explorer .In case a new malicious process pops up on termination of the first process, probably its running from another location. End task that process too. Preferably end task the process tree, but be sure you have noted down where from it is executing.

b. In case the process keeps on starting again and again, it probably got another file backing it up. In that case, using killbox, end process and delete the file. To use killbox, it is required to know the location of the file, which is obtained from process explorer.

Note: Even if file was end tasked in step a. , it has to deleted using killbox. The reason killbox isn’t given priority to end explorer shell is that while deleting the file with ending explorer shell, it restarts the windows explorer, which is often accompanied by malicious code executing again. The best way is to end task the process using process explorer, delete it using killbox. If file is in use, unlock it using the tool Unlocker, and then delete it.

c. Some smart malware can’t be deleted even using killbox, sighting privileges issues. Then it is required to boot from a secondary device, preferably Bart’s PE live CD and delete the malicious files.

d. Rootkits once identified can be deleted the same way as above using killbox or by boot through a secondary device. Since the process they run is hidden, it becomes tough verifying if the malware execution has stopped or not. Rely on your instincts to see if every thing is ok or assume at this stage that malware is not active in memory now.

iii. Regaining authority: Malware usually limits our privileges to make sure it is hidden or cant be detected. These include disabling task manager, Run, registry editor or disabling registry import etc. The next step is to regain control of our system.

a. Using Windows group policy editor (Found in system32 directory), Go to User configuration- Administrative templates- Start menu and task bar. Go to remove Run menu from start menu and disable it. This enables Run command. Now on, group policy editor is accessible by typing gpedit.msc in run menu.

Group policy editor can be used to modify user privileges, and can undo them too. But taking simplicity of other procedure into account, we prefer the other ways.

Note: gpedit isn’t available in windows XP home edition. The stand alone module to modify group policy can be downloaded.

b. In run type,

REG add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableRegistryTools /t REG_DWORD /d 0 /f

And run the command. This removes the entry in registry that had disabled registry editing. Now registry editing is allowed, though windows registry editor may still be disabled.

Note: Type the above command in a notepad and store it. Change extension to .bat , you get your own registry editing enabler tool!

c. Download the windows registry defaults entries from downloads section and add them to registry. This enables registry editor, task manager, folder options.

At this stage if you realise that restored defaults are altered once again to impose restrictions, this means malware is still active in memory. Repeat the identification and stop its execution.

iv. Removing supporting restart mechanisms: Now that malicious code isn’t active in memory, the next step is to remove its supporting mechanisms. Every malware once executed, makes sure that it is executed at least once on every system start up. This is achieved by entries in registry or modifying autoexec.bat or config.sys etc. Entries in registry are the most preferred option by malware, and we will go by it.

a. Many malware leave behind triggering files in drives that restarts the malware in full force once the drives are double clicked. They work by making a autorun.inf file linked to triggering malware file such that every time drive is autorun, the malware is triggered again. Our first priority is to remove such kind of start mechanisms.

Open my computer, go to folder options and enable view hidden files and folder, un-tick hide extensions of known file types & hide protected operating system files. Upon un-ticking hide protected operating system files, a confirmation is asked, confirm positive. Once finished, apply the settings. Now enter C: drive by address bar or by right clicking and explore. You will now see many files that were hidden earlier.

Check presence of any autorun.inf file. Open it by double clicking it (it wont hurt!!) and if readable, check what file was meant to be auto run.

Caution: There are many system files visible that are responsible for booting your system. Do not go on a random deletion spree, lest your system doesn’t boot again!! Some of the system files and folder are:

Autoexec.bat, config.sys, hiberfil.sys, pagefile.sys, IO.sys, MSDOS.SYS, boot.ini, NTDETECT.COM, ntldr and config.sys folder, system volume information folder, recycler folder etc.

Delete the file mentioned in autorun.inf file and also the autorun.inf file itself. Also delete anything like a folder of any name with an .exe extension. Also delete any other .BAT or .COM file other than those mentioned above. Repeat the process for all drives, opening each of them without double clicking them. In event of confusion, take help online, preferably on another system.

  1. Entries at registry are made to make sure that malware executes at every system startup and stays in memory. Use the tool autoruns from sys internals to check start-up keys in registry. It lists all processes and files scheduled to be autorun at startup, but mixed up with windows applications. A few not so smart malware make entries that are visible in startup of MSCONFIG (Run MSCONFIG in run menu). A much useful tool is HijackThis from trend micro. This tool lists all non windows processes starting at startup making it possible to have a clear picture of scenario. It has a tool called ADS scanner that can be used to detect Rootkits as well. All such malicious entries are to be simply deleted.

v. Finishing with cleaning all scrap: By this time you will know what had struck you. Search on net for more details regarding the infection and delete its sister files as well. Had there been any entries that were left ignored by you, delete them too, verifying them from net.

Clean all temporary files, type temp, %temp%, prefetch in run command (one at a time!) and open the locations. Delete all files stored in them. Use Unlocker to unlock any locked files. Delete all cookies and other files in download folders. Go for a manual hunt in documents and settings folder and delete any last traces of infection.

Some Trojans mask themselves with folder icons, go to search and search the system, including hidden files, for all files with .exe extension. Type *.exe in search tab. A lot of applications will appear in search results, delete those with icon of a folder. You can also search for “new folder.exe “in search.

Delete all previous system restore points, since they may be hiding infection. Keep an antivirus handy. Restart your system now. Check startup time, verify task manager is working and check processes running in it. If all things work fine, congrats!! You just won the battle!!

Any cryptic error messages like file not found means start up entries for malicious code are still present though code is not. Simply run HijackThis again and delete the entries. Install a good antivirus and update it. Preferably re-install the web browser too.

Now that your system is malware free, make a commitment to her that now on you play clean, play safe. Keep updating your antivirus and be cautious online, avoid dirty sites, install an antivirus with site advisor, be extra cautious with removable media.

Hope you live happily hereafter!!

Note: A case study- Remove System security fake antivirus.

Due to popular demand noticed, I have posted the specific procedure to remove system security malware manually.

Kill processes:
Open Process explorer and kill the process named 1632575944.exe . It may also carry some other number as name. Kill it, after you note the location it is executing from.

Delete registry values:

Open registry editor and delete the value. You may need to restore defaults using my restore default tool to enable registry editing and other defaults( Go to home page and download it from downloads section).
%UserProfile%HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run “1632575944″

Else you can use the autoruns tool and delete this key from logon tab.

Delete files:

Search and delete the following files. You can use windows search too.
1632575944.exe, config.udb, init.udb, English.lng, German.lng, Spanish.lng, System Security.lnk

Delete directories:
c:\Documents and Settings\All Users\Application Data\538654387
c:\Documents and Settings\All Users\Application Data\538654387\Languages
C:\Documents and settings\All Users\Start Menu\Programs\System Security

Reboot and check if every thing is ok.

Source: PC Gyan

Sunday, November 15, 2009

Hiding Passwords - the most unexpected way !

floppy_password

[Wehrdo] has posted a guide with an extremely low-tech solution to password management. He literally put the passwords on a floppy disk in the form of paper glued to the magnetic film. For those that still have some floppy disks around, this is a zero cost hack. We wouldn’t recommend this for state secrets, but for those prolific forum registrations it’s a great idea.

Friday, May 23, 2008

Orkut Social Application - An Alert Script trouble !

As been described here

" When one of my friends told this, I didn t take it very seriously. Because, what he told was not happening for me. What he told was  Hey G, whenever I come to your profile, a alert box appears with the name askoppal. Do you know who it is

Well, askoppal is my friend and is in my friends list, but nothing of that sort happened, because I was using opera then and scripts were blocked. But the interesting happened today morning when I used firefox, yes a alert box was indeed appearing when I visited my profile.

Primary Investigations showed me that there wasn t anything in the source that could be causing this. Then I went to askoppal s profile page and found that his profile name was
alert( askoppal )

and hence an alert box was appearing even in his profile page. But why in mine?

So what I did was I changed my title to a similar one.
alert( Jithin K.Rajeev )
And then I observed that even my name too was displayed in the alert box, but two times it appeared and then askoppal s name.

Now the question was, is there any possibility of compromising your account using this bug. If yes, has anyone already started exploiting this bug? I posted my thoughts at Hacker s Library. And Vipul responded back in my scrapbook. (I don t think I can recreate the conversation here as he keeps his scrap book empty.L.) Anyway let me see.

These are Vipul s perspective about how this bug can be exploited.

You can successfully make an XSS attack using the TypeRacer app s bug.

How about a link to an external script.
Actually name field has limited letters, so you can simply so is we can connect it via external scripts. But still, it s not good to have such a flaw!

The basic of XSS is if you re able to execute scripts on a remote machine using a bug from a live site.
We can just publish that malicious scripts can be executed in orkut can cause a  Man in Middle attack.

How are we able to execute script?
In what ways, one way is by typing in the First Name - Last name fields.

It s just working with profile name, nothing else.
Actually the profile name flashes in the TypeRacer app, that s why!

Then I tried using document.cookie in the script (javascript:alert( document.cookie ) when executed in your address bar displays the cookies set.) But the outcome was a blank alert box. This means that document.cookie did not carry any value. It was null, when executed via TypeRacer app.

To this Vipul replied

How about the spammers?
They can make fake accounts and add themselves in typeracer and then they put the redirection script to advertisement sites and can gain profits. A script hosted on a different server which contains the bunch of those click fraud URLs.

Then after some profile surfing, I found that it was irritating at times to have a bunch of alerts, in profile having TypeRacer app. It seems that JavaApplet can be executed via similar scripting. In a community discussion, I found the code which claimed to be  a orkut trojan

http://f4.filecrunch.com/files/20080512/cd347c7536557e269ff599fb5756fd9a/hi3.js

What this code does shall be discussed later. It basically mails your cookies and transfers your communities. But using latest firefox and ie7 avoids session and cookie hijacks and for transferring communities, the password is now required. So there isn t any possibility of account and community hijack. Only some irritating scripts might run. Well, use firefox with NoScript addon installed, to avoid all problems.

Best Solution : Remove TypeRacer App at least till the problem is resolved by the brains behind the application. And do use Firefox with NoScript addon."

Monday, May 19, 2008

ALL ABOUT NETSTAT - A TUTORIAL

Note- This tutorial may bear a resemblance to tutorials written by other authors. I have acknowledged to tutorials or articles that I referred before writing this tutorial. It is possible that there may be other tutorials I have not referred and are similar to my tutorial. It is not possible for me to give acknowledgment to such tutorials and hence there must be no copyright or legal issues regarding this tutorial.

Dear reader

In this tutorial I am going teach how to use a very useful command netstat. By using netstat you will be able to find out the ip address of your computer and of the remote computer connected to your computer and most importantly you will be able to know what ports are open on our computer - this will help you know if your computer is infected by a Trojan. Let us see how to launch netstat command. netstat is a MS-DOS based command, you can not use mouse to interact with this utility. To launch this command simply run MS-DOS prompt. To do this just click on 'Run...' after clicking on Start button and then type command and press enter key. Alternatively you can select MS-DOS prompt from Start menu if you are using windows 98 or from accessories if you are using windows NT,2000 or XP. After launching command prompt you will get

C:\windows>

or

C:\>

To launch netstat type netstat -a and press enter key.

C:\windows>netstat -a

This will give output similar to this.

Active Connections

Proto Local Address Foreign Address State

TCP gaurav:1753 www.ethicalhackers.tk:http ESTABLISHED

TCP gaurav:1081 ftp.mycgiserver.com:ftp ESTABLISHED

TCP gaurav:1036 ftp.mycgiserver.com:ftp-data TIME_WAIT

TCP gaurav:1145 mail.sec33.com:pop3 ESTABLISHED

Let us try to understand this output in some detail.

Proto Its full name is Protocol. A protocol is simply a set of rules that your computer follows to communicate to other computers.

The TCP shown under the heading Proto shows that our computer is using the TCP (Transfer Control Protocol ) to communicate to the other computer. An other type of protocol is UDP

Local Address This is the address of our computer. Under this heading we can see gauarv:1081. gaurav is the name of our computer. This is the name asked by windows setup during installation.1081 is our local port number and is randomly generated. A port is simply a virtual 'road' on which internet data 'travels'

Foreign Address This is very important for us. Under this heading we can see ftp.mycgiserver.com This shows that our computer is connected to computer having name ftp.mycgiserver.com

State This tells about the state of our connection. Following table will help you in understanding these.

STATE WHAT DOES IT MEAN
CLOSED There is no connection between your computer and remote host.
CLOSING Your computer and remote computer have both agreed to close connection.
CLOSE WAIT The remote computer has initiated to close the connection
ESTABLISHED There is a connection.
FIN WAIT 1 The software using connection (like msn messenger) has finished using the connection
FIN WAIT 2 The remote computer has agreed to close connection.
LAST ACK The connection is waiting for all the data packets to destroy.
LISTEN Your computer is listening for incoming connection
SYN RCVD Remote computer is sending a request for connection
SYN SENT Your computer has initiated to open a connection
TIMED WAIT same as LAST ACK

Now let us see some other options available with the netstat command. If you want to know the options available you can pass /? as an argument to the netstat command i.e.


c:\windows>netstat /?

We will get the following output.

Displays protocol statistics and current TCP/IP network connections.

NETSTAT [-a] [-e] [-n] [-s] [-p proto] [-r] [interval]

-a Displays all connections and listening ports. (Server-side connections are normally not shown).

-e Displays Ethernet statistics. This may be combined with the -s option.

-n Displays addresses and port numbers in numerical form.

-p proto Shows connections for the protocol specified by proto; proto may be tcp or udp. If used with the

-s option to display per-protocol statistics, proto may be tcp, udp, or ip.

-r Displays the contents of the routing table.

-s Displays per-protocol statistics. By default, statistics are shown for TCP, UDP and IP; the -p

option may be used to specify a subset of the default.

interval Redisplays selected statistics, pausing interval seconds between each display. Press CTRL+C to

stop redisplaying statistics. If omitted, netstat will print the current configuration information

once.


Before we explore all the options let us apply the knowledge we have just gathered. Let suppose we want to find out if our computer is infected with a Trojan. For those who don't know about Trojans I would like to tell them that Trojans malicious programs that may have come in form of a email attachment or in the form of infected software. These Trojans generally listen on some port for connections and after accepting the connection the remote computer user may execute any command on your computer. The most popular trojan is Back Orifice

So if you want to check out whether your computer is infected with Back Orifice you will run command netstat -a and if it shows that your computer is listening on port 31337 you must download some Trojan removal software. Please note that these Trojans have options that allow the remote attacker allow to change default port for accepting connections. For example a remote attacker may have changed the default port from 31337 to 54871. So you must look for suspicious ports. Click here to get a list of such Trojans and the default ports on which they accept connections.

Now let us explore all the options available with the netstat command. We have already used -a option that shows all the connections and listening ports. Let use explore -n option.

The netstat -n command will display the numbers in place of the names i.e. instead of name of our computer we will get the ip address of our computer. This option is helpful if we want to know the ip address of our computer and of the remote computer connected to our computer.

The netstat -p command is used to get information related to a particular protocol. Suppose we want to know only about the connections using UDP we will use command netstat -p udp and netstat -p tcp for connections using tcp. Please note that we can combine options. For example the command netstat -a -p udp and this will give us information about all the connections using UDP.

The netstat -s and netstat -e command are used to display detailed statistics about the different protocols. These commands are generally to correcting network problems.

The netstat -r is used to display routing tables. We need not go in details but I would like to tell you that routing table is used by computers to figure out by which route they should pass on the data. If a computer can not find out a suitable route it will discard the data packet.

Now before I end this tutorial let us see the use of interval option. If you specify a number in place of interval the netstat command will run again and again after that period of seconds. e.g. netstat -a 1 To exit from the command you will have to press CTRL+C.

NETBIOS BASED HACKING TUTORIAL - For Edu. purpose only ~

Note- This tutorial may bear a resemblance to tutorials written by other authors. I have acknowledged to tutorials or articles that I referred before writing this tutorial. It is possible that there may be other tutorials I have not referred and are similar to my tutorial. It is not possible for me to give acknowledgment to such tutorials and hence there must be no copyright or legal issues regarding thistutorial.

Preface

Dear reader I have written this tutorial keeping in mind that readers having only the basic knowledge will also be able to know how hackers hack using NetBIOS. Using NetBIOS for hacking is the probably the easiest way to hack remotely. I strongly oppose hacking but not ethical hacking. An ethical hacker is one that hacks computer networks not for anti social reasons but to let the network administrators know about the security holes so that they can prevent their computers from hacking.

Contents-

A brief lesson on NetBIOS

The NBTSTAT command

What you need to hack ?

Types of attacks

Searching for a victim

Lets Hack - Part 1 Remotely reading/writing to a victim's computer

Cracking "Share "passwords

Using IPC$ to hack Windows NT

Penetrating in to the victim's computer

Lets Hack - Part 2 Denial of service attack

How to protect yourself

Thanks You and our readers.


Sunday, February 3, 2008

Search Engine Optimization | Increse Website Traffic | Attract more Visitors to your Site

I have tried to convey every fact regarding Search Engine Optimiztaion for any Website and all the methods on how to get more visitors to your website.The following Ebook is categorised in the following way and every part briefly described.

About This Book
Foolish Assumptions
How This Book Is Organized
Part I: Search Engine Basics
Part II: Building Search-Engine-Friendly Sites
Part III: Adding Your Site to the Indexes and Directories
Part IV: After You’ve Submitted
Part V: The Part of Tens
Part VI: Appendix
Icons Used in This Book


Download

* This ebook is founded on interent and we are not responsible for any © policy.

Related Resource:

Free online advertising

Tuesday, January 15, 2008

Getting Geographical Information using an IP Address

"Getting the Internet Protocol or the IP Address of a remote system is said to the most important step in hacking of a system. Sometimes, however we get an IP in order to get more information on someone or some host. But, how can an IP Address be used to get more information on the location etc of a system? Well, this manual is aimed at answering just this question.

Actually, the IP address (Actually the entire TCP/IP Protocol) is structured or designed such that one cannot tell as to in which country a system having the given IP is situated, by simply looking at it. An IP Address has no fields, which tell you the country in which the computer using it resides in. So, all myths like ‘The Second or the third field of an IP stands for the country in which the system using it resides’ are definitely false and untrue."
- Ankit Fadia

To read the whole tutorial click HERE.
Size:58 KB FileType: .doc
*We have just found that file on net and we do not take any responsibility for any © violations.

Thursday, December 27, 2007

Key Loggers - Latest And Free !!!!

KeyLoggers, like the name suggests, are programs that record keystrokes from the computer keyboard and either logs it to the computer or sends it to its maker through a built in e-mail engine. Key logging allows a prospective hacker to gain access to the user name, passwords, and even id numbersentered into sensitive online bank accounts or passwords to remote control programs. Listed below are the top 9 key loggers :


  • Family Keylogger - 995kb
  • Golden Keylogger - 976kb
  • Personal Inspector - 970kb
  • Give Me Too - 1MB
  • AIM Logger - 1.65MB
  • ICQ Logger - 1.65 MB
  • Yahoo Logger - 1.65 MB
  • IRC Logger - 1.70 MB
  • Desktop-Spy - 700kb

  • Wednesday, December 26, 2007

    The Windows Genuine Advantage Disadvantage

    Windows Genuine Advantage Disadvantage

    Could Windows Genuine Advantage cause problems after I upgrade my hard drive?

    It’s possible. Naming this legal spyware an “Advantage” is a bit like calling the official Soviet newspaper Pravda (“Truth”) — putting a word in the title doesn’t make it so. Windows Genuine Advantage checks your Windows installation to confirm that its license key matches your hardware. If the key turns out to be registered for a different computer, WGA objects and generally makes your life miserable.

    In theory, WGA can distinguish between a new hard drive and a new PC. In reality, though, it sometimes gets confused and asks you to reactivate Windows— usually a painless chore. If reactivation fails, call Microsoft’s Activation hotline at 888-571-2048. To speak with a human being, say “agent” when asked which option you want, and don’t waver when the automated phone system attempts to convince you that you would be better off talking to a machine.

    The hotline is open around the clock. Matters grow complicated if your copy of Windows came with your PC and if WGA thinks your new hard drive is a new computer. An “OEM” copy of Windows isn’t supposed to be transferred to a new PC. If you had multiple partitions on your old drive, create the same partitions, in the same order, on the new one. If that doesn’t work, call the vendor’s technical support. And don’t blame WGA if your computer won’t boot after a hard-drive up grade; your BIOS probably can’t recognize the new drive. See Techlog on page 15 for more on WGA.

    CONNECTION MENACE

    I recently tried to connect to the Internet by using Smart Link 56K Voice modem. The connection attempt failed and is showing errors. I’ve even tried to replace the modem but was unsuccessful. What should I do?

    First, check to make sure that you are using the correct dial-up number. This error can also occur if you have installed your modem with an incorrect driver. Identify your modem chipset, PCI ID, manufacturer, and make sure you are using the correct driver. To do this, you can take out the modem and look at it. Somewhere on the largest chip, you’ll Do you hear the modem dial, connect and try to handshake? This is a pretty common issue with the onboard modems that come with most computers. Double check to make sure you have the correct drivers installed. Try using an external modem, if you can find one.

    VIDEO WOES

    I recently installed a new graphics card and I am able to play all high graphics game but not able to play any of my video files. My system hangs whenever I try to open any of the video files?

    Try using the VLC Player. This is included in this month’s DVD, as part of the PC World SuperSuite. If your computer still hangs, you may need to uninstall all video codecs and video players, and try installing VLC after a restart.

    SPEED IT UP!

    How many times can Vista and XP be re installed and how can I speed up Vista which is slower in comparison with XP?

    As long as your keep the hardware constant, Vista and XP can be installed any number of times. In case you have an OEM copy of the OS, you may run into an error with activation after 10 times, but all you need to do is call up Microsoft and explain the situation. They do not, in most cases, have a problem. Of course, all this assumes that you are using licensed copies of the OS. In case you are using a pirated version, this advice may not be valid.

    On a powerful system, and as long as you have all the latest drivers and updates installed, Vista should run quite well. It is a fact that many people feel that Vista is slower than XP on the same hardware, so if it really bothers you, you can try turning off the Aero effects. But do remember that Vista is a much larger, and more complex OS than XP, and some amount of slowdown will be inevitable. The situation ought to improve as hardware manufacturers release updated drivers, and Microsoft releases updates, but as of now, there’s really nothing much you can do.