Showing posts with label Networking. Show all posts
Showing posts with label Networking. Show all posts

Thursday, 9 October 2014

Block Websties Without any Software

To Block any website just follow these steps:

1] Browse C:\WINDOWS\system32\drivers\etc

2] Find the file named "hosts"

3] Open it in notepad

4] Under "127.0.0.1 localhost" Add 127.0.0.2 www.sitenameyouwantblocked.com , and that site will no longer be accessable.

5] Done!


Screenshot

For Example:-

127.0.0.1 localhost

127.0.0.2 www.blockedsite.com


-->www.blockedsite.com is now unaccessable<--


For every site after that you want to add, just add "1" to the last number in the internal ip (127.0.0.2) and then the addy like before.

For Example:-

127.0.0.3 www.blablabla.com

127.0.0.4 www.blablabla.com

127.0.0.5 www.blablabla.com

Saturday, 21 June 2014

Hacker's Dictionary


Hacker's Abbreviations:-
★ DDoS =
Distributed Denial of Service
★ DrDoS =
Distributed Reflected Denial of Service Attack,
uses a list of reflection servers or other methods
such as DNS to spoof an attack to look like it's
coming from multiple ips. Amplification of
power in the attack COULD occur.
★ FTP =
File Transfer Protocol. Used for transferring files
over an FTP server.
★ FUD =
Fully Undetectable
★ Hex =
In computer science, hexadecimal refers to
base-16 numbers. These are numbers that use
digits in the range: 0123456789ABCDEF. In the
C programming language (as well as Java,
JavaScript, C++, and other places), hexadecimal
numbers are prefixed by a 0x. In this manner,
one can tell that the number 0x80 is equivalent
to 128 decimal, not 80 decimal.
★ HTTP =
Hyper Text Transfer Protocol. The foundation of
data communication for the World Wide Web.
★ IRC =
Internet Relay Chat. Transmiting text messages
in real time between online users.
★ JDB =
Java drive-by, a very commonly used web-
based exploit which allows an attacker to
download and execute malicious code locally
on a slave's machine through a widely known
java vulnerability.
★ Malware =
Malicious Software
★ Nix =
Unix based operating system, usually refered to
here when refering to DoS'ing.
★ POP3 =
This is the most popular protocol for picking up
e-mail from a server.
★ R.A.T =
 Remote Administration Tool
★ SDB =
Silent drive-by, using a zero day web-based
exploit to hiddenly and un-detectably download
and execute malicious code on a slave's
system. (similar to a JDB however no
notification or warning is given to the user)
★ SE =
Social Engineering
★ Skid =
Script Kid/Script Kiddie
★ SMTP =
A TCP/IP protocol used in sending and
receiving e-mail.
★ SQL =
Structured Query Language. It's a programming
language, that used to communicate with
databases and DBMS. Can go along with a
word after it, such as "SQL Injection."
★ SSH =
Secure Shell, used to connect to Virtual Private
Servers.
★ TCP =
Transmission Control Protocol, creates
connections and exchanges packets of data.
★ UDP =
User Datagram Protocol, An alternative data
transport to TCP used for DNS, Voice over IP,
and file sharing.
★ VPN =
Virtual Private Network
★ VPS =
Virtual Private Server
★ XSS (CSS) =
Cross Site Scripting


Black Hat Hacker Logo

Hacker's Words:-
Algorithm =
A series of steps specifying which actions to
take in which order.
ANSI Bomb =
ANSI.SYS key-remapping commands consist of
cryptic-looking text that specifies, using ansi
numeric codes to redefine keys.
Back Door =
Something a hacker leaves behind on a system
in order to be able to get back in at a later
time.
Binary =
A numbering system in which there are only two
possible values for each digit: 0 and 1.
Black Hat =
A hacker who performs illegal actions to do
with hacking online. (Bad guy, per se)
Blue Hat =
A blue hat hacker is someone outside computer
security consulting firms who is used to bug
test a system prior to its launch, looking for
exploits so they can be closed. Microsoft also
uses the term BlueHat to represent a series of
security briefing events.
Bot =
A piece of malware that connects computer to
an attacker commonly using the HTTP or IRC
protocal to await malicous instructions.
Botnet =
Computers infected by worms or Trojans and
taken over by hackers and brought into
networks to send spam, more viruses, or launch
denial of service attacks.
Buffer Overflow =
A classic exploit that sends more data than a
programmer expects to receive. Buffer overflows
are one of the most common programming
errors, and the ones most likely to slip through
quality assurance testing.
Cracker =
A specific type of hacker who decrypts
passwords or breaks software copy protection
schemes.
DDoS =
Distributed denial of service. Flooding someones
connection with packets. Servers or web-hosted
shells can send packets to a connection on a
website usually from a booter.
Deface =
A website deface is an attack on a site that
changes the appearance of the site or a certain
webpage on the site.
Dictionary Attack =
A dictionary attack is an attack in which a
cyber criminal can attempt to gain your account
password. The attack uses a dictionary file, a
simple list of possible passwords, and a
program which fills them in. The program just
fills in every single possible password on the
list, untill it has found the correct one.
Dictionary files usually contain the most
common used passwords.
DOX =
Personal information about someone on the
Internet usualy contains real name, address,
phone number, SSN, credit card number, etc.
E-Whore =
A person who manipulates other people to
believe that he/she is a beautiful girl doing cam
shows or selling sexual pictures to make
money.
Encryption = 
In cryptography, encryption applies
mathematical operations to data in order to
render it incomprehensible. The only way to
read the data is apply the reverse mathematical
operations. In technical speak, encryption is
applies mathematical algorithms with a key
that converts plaintext to ciphertext. Only
someone in possession of the key can decrypt
the message.
Exploit =
A way of breaking into a system. An exploit
takes advantage of a weakness in a system in
order to hack it.
FUD =
Fully undetectable, can be used in many terms.
Generally in combination with crypters, or when
trying to infect someone.
Grey Hat =
A grey hat hacker is a combination of a Black
Hat and a White Hat Hacker. A Grey Hat Hacker
may surf the internet and hack into a computer
system for the sole purpose of notifying the
administrator that their system has been
hacked, for example. Then they may offer to
repair their system for a small fee.
Hacker (definition is widely disputed among
people...) = A hacker is someone who is able to
manipulate the inner workings of computers,
information, and technology to work in his/her
favor.
Hacktivist =
A hacktivist is a hacker who utilizes technology
to announce a social, ideological, religious, or
political message. In general, most hacktivism
involves website defacement or denial-of-servi
ce attacks.
IP Address =
On the Internet, your IP address is the unique
number that others use to send you traffic.
IP Grabber =
A link that grabs someone's IP when they visit
it.
Keylogger =
A software program that records all keystrokes
on a computer's keyboard, used as a
surveillance tool or covertly as spyware.
Leach = 
A cultural term in the warez community
referring to people who download lots of stuff
but never give back to the community.
LOIC/HOIC =
Tool(s) used by many anonymous members to
conduct DDoS attacks. It is not recommended to
use these under any circumstances.
Malware =
Software designed to do all kinds of evil stuff
like stealing identity information, running DDoS
attacks, or soliciting money from the slave.
Neophyte =
A neophyte, "n00b", or "newbie" is someone who
is new to hacking or phreaking and has almost
no knowledge or experience of the workings of
technology, and hacking.
smith =
Somebody new to a forum/game.
OldFag =
Somebody who's been around a forum/game for
a long time.
Packet =
Data that is sent across the Internet is broken
up into packets, sent individually across the
network, and reassembled back into the original
data at the other end.
Phreak =
Phone Freaks. Hackers who hack cell phones for
free calling. Free Long distance calling. Etc.
Phreaking =
The art and science of cracking the phone
network.
Proxy =
A proxy is something that acts as a server, but
when given requests from clients, acts itself as
a client to the real servers.
Rainbow Table =
A rainbow table is a table of possible
passwords and their hashes. It is way faster to
crack a password using rainbow tables then
using a dictionary attack (Bruteforce).
Remote Administration Tool =
A tool which is used to remotely control
(an)other machine(s). These can be used for
monitoring user actions, but often misused by
cyber criminals as malware, to get their hands
on valuable information, such as log in
credentials.
Resolver =
Software created to get an IP address through
IM (instant messenger, like Skype/MSN)
programs.
Reverse Engineering =
A technique whereby the hacker attempts to
discover secrets about a program. Often used
by crackers, and in direct modifications to a
process/application.
Root =
Highest permission level on a computer, able to
modify anything on the system without
restriction.
Rootkit (ring3 ring0) =
A powerful exploit used by malware to conceal
all traces that it exists. Ring3 - Can be
removed easily without booting in safemode.
Ring0 - Very hard to remove and very rare in
the wild, these can require you to format, it's
very hard to remove certain ring0 rootkits
without safemode.
Script Kiddie =
A script kid, or skid is a term used to describe
those who use scripts created by others to hack
computer systems and websites. Used as an
insult, meaning that they know nothing about
hacking.
Shell =
The common meaning here is a hacked web
server with a DoS script uploaded to conduct
DDoS attacks via a booter. OR A shell is an
script-executing unit - Something you'd stick
somewhere in order to execute commands of
your choice.
Social Engineer =
Social engineering is a form of hacking that
targets people's minds rather than their
computers. A typical example is sending out
snail mail marketing materials with the words
"You may already have won" emblazoned
across the outside of the letter. As you can see,
social engineering is not unique to hackers; it's
main practitioners are the marketing
departments of corporations.
Spoof =
The word spoof generally means the act of
forging your identity. More specifically, it refers
to forging the sender's IP address (IP spoofing).
(Spoofing an extension for a RAT to change it
from .exe to .jpg, etc.)
SQL Injection =
An SQL injection is a method often used to
hack SQL databases via a website, and gain
admin control (sometimes) of the site. You can
attack programs with SQLi too.
Trojan =
A Trojan is a type of malware that masquerades
as a legitimate file or helpful program with the
ultimate purpose of granting a hacker
unauthorized access to a computer.
VPS =
The term is used for emphasizing that the
virtual machine, although running in software
on the same physical computer as other
customers' virtual machines, is in many
respects functionally
equivalent to a separate physical computer, is
dedicated to the individual customer's needs,
has the privacy of a separate physical
computer, and can be configured to run server
software.
Warez =
Software piracy
White Hat =
A "white hat" refers to an ethical hacker, or a
computer security expert, who specializes in
penetration testing and in other testing methods
to ensure the security of a businesses
information systems. (Good guy, per se)
Worm =
Software designed to spread malware with little
to no human interaction.
Zero Day Exploit =
An attack that exploits a previously unknown
vulnerability in a computer application, meaning
that the attack occurs on "day zero" of
awareness of the vulnerability. This means that
the developers have had zero days to address
and patch the vulnerability.

Friday, 6 June 2014

Speed up Mozilla FireFox


To Speed up Mozilla Firefox use the following steps:-
--------------------------------------------------------------------------------


Firefox Logo

1. Type "about :config" in the adress field.
2. Set the value of network.http.pipelining to "true".
3. Set the value of network.http.pipelining.maxrequests to "100".
4. Set the value of network.http.proxy.pipelining to "true"
5. Set the value of nglayout.initialpaint.delay to "0" (not availible in newer versions)

>>www.moneysrofficial.blogspot.com

How To Set Up Proxies In Your Browser

By setting the proxies you can surf internet anonymously and no one can catch you. Use these ways for setting proxies in different browser:
===================================
In Internet Explorer
===================================
Click "Tools", then "Internet Options", the in the "connections" Tab, click the "LAN Setup" Button in the bottom. There is a "Proxy Servers", tick the "Use a proxy....." and then enter the proxy in the bigger textbox and the port (the part that comes after the ":") in the smaller textbox. Hit okay, and then go to
CODE
www.whatismyip.com
to see if the proxy is now your IP.

===================================
In OPERA
===================================
Click "Files", then "Preferences", then "Network", then click the button "Proxy Servers", tick "HTTP", fill in with the proxy:port, click okay and that's it! Don't forget to check with
CODE
www.whatismyip.com

===================================
In Firefox
===================================
Tools -> Options
Then click the General Icon
Then the "Connection Settings..." button
Then click the "manually configure proxies" radio button, and enter the proxy address and port in the HTTP Proxy area.
Don't forget to check with
CODE
www.whatismyip.com


Proxy Settings in Firefox

You can also surf internet by using these proxies:
www.proxy4free.com
www.safeproxy.org
www.megaproxy.com
www.guardster.com
www.silenter.com
www.anonymizer.com

Happy Anonymous surfing!

Wednesday, 11 September 2013

Improve Dial Up Modem Performance

You can't assume that just because you connected at a speed like 48.3KBps that you will stay there. Today's modems automatically fall back to a lower speed if the line noise is too high to maintain a faster connection, but sometimes they fall back too soon or too far.


Dial Up Screen


Here's how to do it:
  1. Click Start the button.
  2. Select Settings.
  3. Click Control Panel.
  4. Double-click on the Modems icon.
  5. Select your modem.
  6. Click the Properties button.
  7. Click the Connections tab.
  8. Click the Advanced button.
  9. In the "Extra settings" field, type S36=7
  10. Click OK to save your settings.

This will force your modem to try to stay connected at high speeds in two different ways before dropping back to an asynchronous mode with auto speed buffering.

Thursday, 11 April 2013

Ehernet Cable Instructions

Ethernet Cable Instructions:
  • Pull the cable off the reel to the desired length and cut. If you are pulling cables through holes, its easier to attach the RJ-45 plugs after the cable is pulled. The total length of wire segments between a PC and a hub or between two PC's cannot exceed 100 Meters (328 feet) for 100BASE-TX and 300 Meters for 10BASE-T.
  • Start on one end and strip the cable jacket off (about 1") using a stripper or a knife. Be extra careful not to nick the wires, otherwise you will need to start over.
Ethernet Cables
  • Spread, untwist the pairs, and arrange the wires in the order of the desired cable end. Flatten the end between your thumb and forefinger. Trim the ends of the wires so they are even with one another, leaving only 1/2" in wire length. If it is longer than 1/2" it will be out-of-spec and susceptible to crosstalk. Flatten and insure there are no spaces between wires.
  • Hold the RJ-45 plug with the clip facing down or away from you. Push the wires firmly into the plug. Inspect each wire is flat even at the front of the plug. Check the order of the wires. Double check again. Check that the jacket is fitted right against the stop of the plug. Carefully hold the wire and firmly crimp the RJ-45 with the crimper.
  • Check the color orientation, check that the crimped connection is not about to come apart, and check to see if the wires are flat against the front of the plug. If even one of these are incorrect, you will have to start over. Test the Ethernet cable.

Color Coding of Ethernet Cable

T-568A Straight - Through Ethernet Cable


T-568 Straight - Through Ethernet Cable


RJ45 Crossover Ethernet Cable




MTNL Connection Checkup

1. Verify physical connectivity

Connect all Peripherals as per instructions. Do not connect any device on telephone line before the splitter box for proper working of broadband service.



2. Verify the LAN and Wireless settings

a). For LAN go to Network Connections and check local area connection is enable and TCP/IP Properties settings in PC, use the following IP address 192.168.1.2 to 254 and Gateway 192.168.1.1 (In case of Using USB Cable with UT-300R2UTKD Modem, IP address 192.168.1.3 to 34 Gateway 192.168.1.2) and DNS Server Address as: Preferred DNS (Primary) 59.179.243.70 and Alternate DNS (Secondary): 203.94.243.70

b). For Wireless go to Network Connections check Wireless connection is enable and view wireless network check network SSID connect, TCP/IP Properties settings in wireless card, use obtain an IP address automatically and DNS Server Address as: Preferred DNS (Primary) 59.179.243.70 and Alternate DNS (Secondary): 203.94.243.70

3. Verify Connectivity between PC and ADSL CPE - Perform the following PING test

In the command prompt, type ‘ping 192.168.1.1’ and press Enter. Confirm that you are getting reply from 192.168.1.1.If the reply is not received, it indicates connectivity problem between PC and ADSL CPE.

4. Verify connectivity Internet Network – Perform the following PING test

In the command prompt, type ‘ping 59.179.243.70’ and press Enter. If the reply is received, connectivity is ok otherwise check CPE setting.

Tuesday, 26 February 2013

Renew your IP address

Apps-Blogger+ readers..you can renew your IP Address by these simple commands:


  • Goto Start -> Run or press Windows+R
  • Open command prompt by typing cmd and press enter
  • Now type following commands and press Enter after each command
ipconfig/flushdns
ipconfig/release
ipconfig/renew
exit
  • Now, clear your cookies and check Your IP, you can see that your PC is assigned with new IP address.