Skip to main content

Posts

Showing posts with the label Network

The New LG Rolly Keyboard, Foldable Which runs From AAA Battery

The LG Rolly will be powered by  AAA battery and will be able to connect to 2 devices at the same time using Bluetooth 3.0. Freshly LG Electronics has announced a new, full-size roll able keyboard called LG Rolly. LG has claimed that it's the industry’s first solid roll able keyboard, and it will be launched at the upcoming IFA event in Berlin scheduled to start next week. The keyboard folds along four rows and can then be carried easily. The keyboard will work with smartphones as well as tablets. The keyboard is made using of ABS plastic and durable poly carbonate which is impact-resistant. The keyboard has 17mm key pitch, which is the horizontal spacing between keys. LG has also claimed that its roll able keyboard gives a tactile feel to users that can’t be found in other flexible silicon keyboards. The LG Rolly keyboard comes with Bluetooth 3.0 that allows it to connect with two devices at same time. It also comes with a tog...

How to Download File from SFTP Server to Local Machine

How to Download File from SFTP Server to Local Machine File Transfer Protocol (FTP) is a popular method of transferring files between two remote systems. SFTP, which stands for Secure File Transfer Protocol, or SSH File Transfer Protocol, is a separate protocol packaged with SSH that works in a similar way over a secure connection. SFTP encrypt commands and data both, preventing passwords and sensitive information from being transmitted in the clear over a network. The advantage is the ability to leverage a secure connection to transfer files and traverse the filesystem on both the local and remote system. In almost all cases, SFTP is preferable to FTP because of its underlying security features and ability to piggy-back on an SSH connection. FTP is an insecure protocol that should only be used in limited cases or on networks you trust. Although SFTP is integrated into many graphical tools, this guide will demonstrate how to use it through its interactive command line interface. A down...

Mac WMV to iPod Converter - Convert WMV to iPod on Mac

Mac WMV to iPod Converter - Convert WMV to iPod on Mac Mac WMV to iPod Converter is a full-featured, easy and time-saving program for you to convert WMV to video formats that the iPod accepts.      When you choose a Mac WMV to iPod converter, you may have several requirements of it, such as format and device support, easy-to use, time-saving features, etc. We have made a detailed analysis for a video converter, and like to recommend it to you, check if it fits your needs. WMV to iPod Converter for Mac  provides you with the best solution of how to play WMV files on your iPod. With this powerful Mac WMV to iPod Converter, you can convert WMV to iPod on Mac OS easily. Below is an introduction of this tool from three aspects: Supported formats and devices: Convert all video formats (HD video, AVI, MPEG, WMV, MP4, 3GP, MOV, VOB, ASF, RMVB, FLV, MKV, RM) to iPod formats. Support all types of iPod (iPod nano, iPod touch, iPod classic, iPod Shuffle). Support iPhone, iPad, A...

Convert ARF to MP4, WMV, MP3 with ARF Converter

Convert ARF to MP4, WMV, MP3 with ARF Converter Need to convert ARF to MP4, convert ARF to WMV, MP3? ARF Converter can help easily convert ARF files. Get your ARF File Converter to open and play ARF files now. ARF, standing for “advanced recording file”, is a file extension for a WebEx advanced recording file from a network-based recording. An ARF file contains the video data, a table of contents, an attendee list, and other information on separate panels. The ARF file extension is for recordings downloaded by the user. The ARF file extension is also used for automatic response files. The *.arf files are WebEx recordings directly downloaded by the user. However, we often meet problems when open or play ARF files. Why? Because the incompatibility of ARF file is not so good. To solve the compatibility and open or play ARF files with zone problems, it is nice to convert ARF to MP4, convert ARF to WMV, MP3 or other common video and audio formats. What Kind of ARF Converter or ARF Player Ca...

Wearable Tech - The Future of Skiing

A booking in a great catered chalet and some of the new hi-tech equipment are all you need for the ultimate ski adventure! Ask any veteran skier if they have any tips for the perfect ski holiday and they’ll tell you two things: be sure to book an excellent catered chalet and treat yourself to some of the best ski equipment available. A Winter Home from Home Booking a catered chalet is a no-brainer; you’ll need a cosy and convenient home base if you’re going to fully enjoy your holiday. Many are located just a short distance from ski lifts or pick-up stations, so you won’t have to waste time travelling to and from the slopes - therefore maximising your skiing time. And, after a hard day on the slopes, you’re going to want a warm and comfortable place to recover and prepare for the next day. When you book a fully catered chalet, you don’t even have to worry about preparing meals as it's all done for you. The Best Equipment Having the best (read hi-tech) equipment is also crucial. In ...

How to run 'c' on Ubuntu Linux

How to run 'c' on Ubuntu Linux (By- Jatin Bhutani) This document explain how to run your your 'c' programs on Ubuntu Linux what do u all need 1. A system running Ubuntu. 2. Your knowledge of programming of c   so lets do it!!!! STEP 1:-  open terminal  You can do this by searching terminal in the Ubuntu menu, or using a keyword 'Alt + Ctrl + T '    A terminal window will pop up like this. open terminal     And  you can always lock anything to the launcher if you need it very fast. lock terminal STEP 2:- use text editor for creating and editing a source file   Type in terminal “ gedit hello.c” what it will do :- It will create a file ,name as 'hello.c'  *tip:- the source file for c are save as .c extension.  pop up window of gedit will open, type your test code in the following format                                       ...

How to Watch 18+ Videos On You-tube Without Signing In?

Sometime its annoying when youtube ask you to sign in for your age verification to watch 18+ videos. So i will make it easy for you by showing you a simple youtube trick to watch adult or 18+ youtube videos without signing In. This trick is 100% working as of 2013. So lets get started. Here are the steps:- 1. First get the Url of video you want to watch. As shown below. http://www.youtube.com/ watch?v= 4Xkh6j7RMqk 2. Then cop y the Video Id. For above link video Id is 4Xkh6j7RMqk 3. Now paste the Video Id in the link given below. http://www.youtube.com/v/ VideoId ?fs=1 Replace VideoId with the Id you copied in Step 2 4. Now the url will become as shown below. http://www.youtube.com/ v/4Xkh6j7RMqk ?fs=1 5. Done.

Maximum RAM that your OS can support :

Windows 8 64 bit Enterprise,Prof essional : 512 GB Windows 8 64 bit :128 GB Windows 8 32 bit : 4 GB Windows 7 64 bit Ultimate, Enterprise & Professional :192 GB Windows 7 64 bit Home Premium:16 GB Windows 7 64 bit Home Basic : 8 GB Windows 7 32 bit (all editions except Starter) :4 GB Windows 7 32 bit Starter : 2 GB Windows Vista 64 bit Ultimate, Enterprise & Business: 128 GB Windows Vista 64 bit Home Premium :16GB Windows Vista 64 bit Home Basic : 8GB Windows Vista 32 bit (all editions except Starter) : 4 GB Windows 7 32 bit Starter :1 GB Windows XP 64 bit : 128 GB Windows XP 32 bit : 4 GB Mac OS X 64 bit :96 GB Linux 64 bit :1 TB Linux 32 bit :4 GB Linux 32 bit (with PAE) :64 GB

XRumer

XRumer is a search engine optimization program, created by BotmasterLabs, that is able to successfully register and post to forums (forum spam ) with the aim of boosting search engine rankings. The program is able to bypass security techniques commonly used by many forums and blogs to deter automated spam, such as account registration, client detection, many forms of CAPTCHAs , and e-mail activation before posting. The program utilises SOCKS and HTTP proxies in an attempt to make it more difficult for administrators to block posts by source IP and features a proxy checking tool to verify the integrity and anonymity of the proxies used. In addition, the software can avoid the suspicions of forum administrators by first registering to make a post in the form of a question which mentions the spam product ("Where can I get...?"), before registering another account to post a spam link which mentions the product. The side effect of these innocent-looking posts is that helpful foru...

What is VoIP ?

Voice over Internet Protocol (VoIP) is a form of communication that allows you to make phone calls over a broadband internet connection instead of typical analog telephone lines. Basic VoIP access usually allows you to call others who are also receiving calls over the internet. Interconnected VoIP services also allow you to make and receive calls to and from traditional landline numbers, usually for a service fee. Some VoIP services require a computer or a dedicated VoIP phone, while others allow you to use your landline phone to place VoIP calls through a special adapter. VoIP is becoming an attractive communications option for consumers. Given the trend towards lower fees for basic broadband service and the brisk adoption of even faster internet offerings, VoIP usage should only gain popularity with time. However, as VoIP usage increases, so will the potential threats to the typical user. While VoIP vulnerabilities are typically similar to the ones users face on the internet, new thr...

18 Extensions For Turning Firefox Into a Penetration Testing Tool

Firefox is a popular web browser from Mozilla. Popularity of Firefox is not only because it’s a good web browser, it also supports add-ons to enhance the functionality. Mozilla has a website add-on section that has thousands of useful add-ons in different categories. Some of these add-ons are useful for penetration testers and security analysts. These penetration testing add-ons helps in performing different kinds of attacks, and modify request headers direct from the browser. This way, it reduces the use of a separate tool for most of the penetration testing related tasks. In this brief post, we are listing a few popular and interesting Firefox add-ons that are useful for penetration testers. These add-ons vary from information gathering tools to attacking tools. Use what you think helpful. All these add-ons are available for free and you can download from the Mozilla add-on website. There are some premium add-ons like Dominator pro which is also available for purchase from offic...

Free unlimited calling for 14 days

1. This trick is based upon the new calling website fuzebox.com. 2. Call unlimited from mobile 2 mobile without any application. 3. Fuzebox also available on Ipad and Android. 4. You can also make video calls from your PC 5. You can share File like Pdfs , images etc 6. You can Make Multi Conferencing calls. Steps To Make Free Calls Using Fuzebox: Step:-1) First you need to registeron fuzebox.com Step:-2) Now check your mail.(Which you give while registration) You'll gettwo pins, 1. Audio Conference Moderator Pin 2. Audio Conference Attendee Pin Step:-3) After that dial0008000016688 (Tollfree number) Step:-4) After that enter your Moderator Pin. Step:-5) Then tell yourfriend to dial 0008000016688 and give him Attendee Pinand tell him/her to enter Attendee Pin. Step:-6) Once you connected you can talk to your friend unlimited. NOTE:- This is 14 days trial , after that you can register with another email idto make free calls.

SQL Injection step by step (for Begginers)

SQL Injection step by step (for Begginers) ------------------------------­---------------------------------- SQL Injection attacks are code injections that exploit the database layer of the application. This is most commonly the MySQL database, but there are techniques to carry out this attack in other databases such as Oracle. In this tutorial i will be showing you the steps to carry out the attack on a MySQL Database. Step 1: --------- When testing a website for SQL Injection vulnerabilities, you need to find a page that looks like this: www.site.com/page=1 or www.site.com/id=5 Basically the site needs to have an = then a number or a string, but most commonly a number. Once you have found a page like this, we test for vulnerability by simply entering a ' after the number in the url. For example: www.site.com/page=1' If the database is vulnerable, the page will spit out a MySQL error such as; Warning: mysql_num_rows(): supplied argument is not a valid MySQL result res...

All UBUNTU keyboard Shortcuts

All UBUNTU keyboard Shortcuts UBUNTU is one of the popular operating system based on LINUX. It has a good number of users after fedora. I have already posted keyboard shortcuts for different web browsers and operating system. Today i am posting keyboard shortcuts for UBUNTU which will help you to work faster. Ctrl + A = Select all Ctrl + C = Copy the highlighted content to clipboard Ctrl + V = Paste the clipboard content Ctrl + N = New (Create a new document, not in terminal) Ctrl + O = Open a document Ctrl + S = Save the current document Ctrl + P = Print the current document Ctrl + W = Close the close document Ctrl + Q = Quit the current applicationKeyb­oard shortcuts for GNOME desktopCtrl + Alt + F1 = Switch to the first virtual terminal Ctrl + Alt + F2(F3)(F4)(F5)(F6) = Select the different virtual terminals Ctrl + Alt + F7 = Restore back to the current terminal session with X Ctrl + Alt + Backspace = Restart GNOME Alt + Tab = Switch between open programs Ctrl + ...

XSSF (Cross-Site Scripting Framework )

-- - --------------------------­------------------- The Cross-Site Scripting Framework (XSSF) is a security tool designed to turn the XSS vulnerability exploitation task into a much easier work. The XSSF project aims to demonstrate the real dangers of XSS vulnerabilities, vulgarizing their exploitation. This project is created solely for education, penetration testing and lawful research purposes. XSSF allows creating a communication channel with the targeted browser (from a XSS vulnerability) in order to perform further attacks. Users are free to select existing modules (a module = an attack) in order to target specific browsers. XSSF provides a powerfull documented API, which facilitates development of modules and attacks. In addition, its integration into the Metasploit Framework allows users to launch MSF browser based exploit easilly from an XSS vulnerability. In addition, an interesting though exploiting an XSS inside a victim’s browser could be to browse website on...

Boost Download/Browsing Speed in Firefox

Boost Download/Browsing Speed in Firefox ------------------------------­---------------------- Type "about:config" in the address bar. Hit Enter. Click on the "I'll be careful, I promise" button. Type "network.http.pipelining" in the filter bar. Press Enter. Double-click the line to set the value to "True." Type "network.http.pipelining.maxre­quests" in the filter bar. Press Enter. Double click this line and set the value of this to "202" Type "network.http.proxy.pipelining" in the filter bar. Press Enter. Double-click the line to set the value to "True." Type "network.dns.disableIPv6" in the filter bar. Press Enter. Double-click the line to set the value to "True." Right-click anywhere in the about:config window and select "New" then "Boolean." Type "content.interrupt.parsing" in the box provided and click "OK." Choose "True...

BSNL OFFICIAL BALANCE TRANSFER TRICK UPDATED

BSNL OFFICIAL BALANCE TRANSFER TRICK UPDATED BSNL has recently changed their portal numbers so that we can’t access some services as we previously use. As a result their official balance transfer trick has also changed. So today I’m going to explain how to transfer balance in BSNL mobile easily. Register for PTOP. STEP 1 - Register for PTOP by sending “register ptop” to 54455. STEP 2 - After registering you will get a password. STEP 3 - For balance transfer you have to send GIFT(space)friends no.(space)amount(space)passward to 54455 EXAMPLE – GIFT 9400082099 25 9 99990 to 54455 STEP 4 - Now you will receive a SMSconfirmation of the transfer. For help send “help” to 54455 NOTE : 1. For each Successful Transaction Rs. 2/- will be charged 2. Gift should Range Between Rs. 10/- to Rs. 50/- 3. Gift amount should be multiple of 10. 4. Minimum Balance Should be: Rs. 200/- in your phone 5. Gift can be send in samecircle like Rajasthan to Rajasthan, Punja...

Chrome OS : Ways to Bypass Kernel protections

Chrome OS : Ways to Bypass Kernel protections *First Protection to Bypass : NX (Never eXecute)* Programs usually don't need to put their code on stack, so, it's logical to prevent them from doing it and executing content from there. NX is a protection option coming from processor used to control execution rights from some pages and used by Linux kernel. In this way, the operating system can use this facility to define what pages will have code and what others will have data. So, with this protection, we still can store our shellcode in the stack, but, we can't execute it. How to check it ? We need to ask for the CPU features of our current machine though 'flags' and founf that >NX< flag is active, it means NX protection is on. We can bypass this protection using something called ret2libc only if another protection called ASLR (Address Space Layout Randomization) is not used (ASLR works as like sharm on 64bits processors and not so good on 32bits). A more exten...

Bypass Phone Verification

Bypass Phone Verification ------------------------------------ Description --------------- This tutorial will help you bypass phone verification on any website, this can be useful when you need to use a phone number to sign up to a site and do not feel comfortable giving your real phone number, or if you want to make multiple accounts. Step-by-Step Tutorial ----------------------------- 1) Sign up to Tpad at the following link: https://secure.tpad.com/signup/ 2) You will then receive an email with your Tpad number and your email verification link. It will say "Your Tpad number is 1752xxx.". Verify your email and save your Tpad number. 3) You must now download the Tpad program, you can download it using this link: http://www.tpad.com/downloads/ninja-dl.php 4) You must now go to ipkall.com and register with the following details: Select all Choose your account type: SIP Choose Area Code for your IPKall Number: 253 SIP username: Your Tpad number Hostname or IP address: sipx.tpad...