Friday, October 11, 2013

How To create Single Name on Facebook ?

Hello .all nice to see you here . : )

lot's of buddy's want single name on Facbook without second name or tittle
well you haven't imagine how much easy it is .

it's not rocket science it's just simple trick

yes actually it's not  illegal it's simple trick to fool fb data base and servers

What we need ??
1. PC
2. Firefox
3. A mind which can at least know how to change browse IP .

before start this trick Coppy this IP and Port  addresses

119.252.160.34
202.43.188.143
118.98.35.251
36.76.182.173
61.247.45.35
180.250.169.14
180.250.82.188
119.252.160.34
219.83.100.195
110.139.125.230
202.87.254.156  


PORT :-             8080


and save it on text file on  documents .... ok Now let's begin

First open your Mozilla Firefox browser
then Log in into your Facebook Account   > go to account setting > And change your language to

Bahasa Indonesia

you have done your first step :v :)

Now move to the second step

Go to the Firefox Options > Advanced > Network > Settings ..

you are now in Connection settings Window
choose Manual proxy configuration And copy the proxy and ports i provided above and paste any one of them
and press ok

Now go to the facebook Account settings/ General settings  and Edit the Name

you will se your First Name and Last name like this


Delete Last name

Enter password and press save ...

Done !!!
 Congratualation your single name Facbook profile is ready :)

Now you can change your Language to your regional language .

Share this to your friends

Wednesday, October 9, 2013

How to Find the IP Address of a Website?



Step 1: Open Command Prompt.
(Goto Run and type cmd and hit Enter)

Step 2: Type ping, followed by the name of the website and press Enter.
Ex: ping www.google.com

The IP address of the corresponding website will appear on the very first line of output (as highlighted in the image below).

? You can also find out the IP address of a website by accessing any of the following websites:

How to crack Android pattern lock protection ?



Nowadays many, if not all, smartphones offer, in addition to the traditional password lock protection, a pattern lock one, which is a mix of gestures done by the phone owner joining points on a matrix in order to unlock his phone.

Pattern used in the image is 1 – 2 – 5 – 8 – 7 – 4.

Android devices do store pattern lock data in an unsalted SHA-1 encrypted bytes sequence format, using something similar to this code snippet in order to achieve this:

private static byte[] patternToHash(List pattern) {
if (pattern == null) {
return null;
}

final int patternSize = pattern.size();
byte[] res = new byte[patternSize];
for (int i = 0; i < patternSize; i++) {
LockPatternView.Cell cell = pattern.get(i);
res[i] = (byte) (cell.getRow() * 3 + cell.getColumn());
}
try {
MessageDigest md = MessageDigest.getInstance("SHA-1");
byte[] hash = md.digest(res);
return hash;
} catch (NoSuchAlgorithmException nsa) {
return res;
}
}

This means that, for example, instead of storing directly 125874 it stores an encrypted byte array in a system file called gesture.key located in the /data/system folder. We can read most of this information directly on “The Android Open Source Project” java files.

We know enough to analyze the file system dump we’ve got; it’s not hard to find gesture.key and to explore its content:
There are no difficulties cracking or bypassing this kind of protection an Android-based device; the only real obstacle is that we cannot directly access the /data/system/ folder and gesture.key file except when we are dealing with a rooted device


How to block a website ?



Step 1:
Make sure about that you really want to block a website and ya if you then you have to know domain name of that website like "www.facebook.com"

Step 2:
Now you have to open your System Drive in your computer

Step 3:
If Your System is in drive C:\
then Go to this Path in your computer
"C:\Windows\System32\drivers\etc\"

Step 4:
There is a file called "hosts"
Open this file in your text editor(You can use your favorite one 'Notepad' :))

As shown in image after a localhost add your link which you want to block with the same IP address

Step 5:
Now Save this file in Any Other place and replace with d original one

Step 6:
Now you can able to see that Facebook is blocked in your computer
so, your friend can't able to use your laptop for Facebook although you give him..

Bypass Website Login

Bypass Registration in Most of Websites.

You're browsing the web and you click a link to an article on a site (let's say example.com) but instead of getting the article you get a screen asking you to login or register. Infuriated at the idea of pointlessly registering for yet another site you turn to your good buddy bugmenot.com

INSTRUCTIONS

STEP 1: Make a note of the website address your are trying to access. For example: http://www.example.com/

STEP 2: Visit http://bugmenot.com/

STEP 3: Enter the address from step 1 into the box and press the "Get Logins" button

STEP 4: You should now be presented with at least one username and password. Make a note of them.

STEP 5: Go back to the site you were originally trying to access in step 1 and proceed to login with the username and password you noted in the previous step.
With any luck you should be able to access your article now!

Please comment to keep this post alive

10 Facts About Bill Gates

About Bill Gates

Fact 1:
Bill Gates was born on 28th of October 1955 in Seattle, Washington.

Fact 2:
Bill Gates full name is William Henry Gates III.

Fact 3:
As of 2011, his fortune is worth $59 billion.

Fact 4:
Gates told his university teachers he would be a millionaire by age 30. He became a billionaire at age 31.

Fact 5:
Gates graduated high school in 1973 and scored 1590 of 1600 on the SAT.

Fact 6:
He is married to Melinda Gates and has 3 children.

Fact 7:
Bill Gates was influenced by John D. Rockefeller and in 1994, he sold some of Microsoft's stocks to build the Bill & Melinda Gates Foundation.

Fact 8:
The first computer program that he wrote was a tic-tac-toe game that allowed people to play against the computer.

Fact 9:
Bill Gates enjoys playing tennis, golf and bridge.

Fact 10:
Bill Gates earns about $250 every second.

Important abbreviations related to internet


FM –> Frequency Modulation
SIM –> Subscriber Identity Module
RIM –> Removable Identity Module
GSM –> Global System For Mobile
LAN –> Local Area Network
WAN –> Wide Area Network
RTE –> Rich Text Format
MAN –> Metropolitan Area Network
URL –> Uniform Resource Locator
ISP –> Inter Net Service Provide
@ –> At The Rate Of
DVD –> Digital Versatile Disk
CD –> Compact Disk
EDGE –> Enhanced Data for GSM Evolution
GPRS –> General Packet Radio Service
FDM –> Frequency Division Multiplexing
SDR –> Software Defined Radio
ATM –> Asynchronous Transfer Mode
DCA –> Dynamic Channel Allocation
FCA –> Fixed Channel Allocation
AMPS –> Advance Mobile Phone System
IMTS –> Improved Mobile Telephone System
CDMA –> Code Division
MultipleAccess
MTSO –> Mobile Telephone Switching
Office
HTTP –> Hypertext Transfer Protocol
FIDI –> Fiber Distributed Data Interface
ISDN –> Integrated Services Digital
Network
PSTN –> Public Switched Telephone Network
CSMA –> Carrier Sense Multiple Access
RADAR –> Radio Detection AndRanging
SONET –> Synchronous Optical Fiber Network
DAMPS –> Digital Advanced Mobile
Phone System
WWW –> World Wide Web
IP –> Internet Protocol
TCP –> Transmission Control Protocol
HTML –> HyperText Markup Language
USB –> Universal Serial Bus
PAN -> Personal Area Network
TDM -> Time Division Multiplexing.

Why is the 250GB hard disk have less than 233 GB?

All Hard Disk manufacturer way of counting space is different from the way a software count a space.
This means to a Hard Disk Manufacturer,
1GB is 1000 MB, 1 MB is 1000 KB and so on.
Software or computer language recognize a space in terms of power of 2 say 21, 22,23 etc. hence a KB is 210 Bytes which is 1024 Bytes.
Lets do a little math:From a Manufacturer a
250 GB harddisk is 250 x 1000 x 1000 x 1000 =250000000000 Bytes
From the Computer Language point of view a
250000000000 Bytes is:
250000000000/(1024*1024*1024)=232.83 GB

Now you’ll see why your 250GB harddisk has only less than 232.83 GBspace in total. Well if you go with higher space like 500 GB and so on the space missing is increasing..

What is the difference between proxy ,firewall,IDS and IPS



A proxy server is a server (a computer system or an application) that acts as an intermediary for requests from clients seeking resources from other servers. A client connects to the proxy server, requesting some service, such as a file, connection, web page, or other resource available from a different server and the proxy server evaluates the request as a way to simplify and control its complexity.

Firewall is basically meant for network traffic control/filtering mainly at layer-3. It allows/denies packets and connections based on certain pre-defined rules.

IDS- Intrusion Detection System is an application which tries to detect intrusion attempts based on attack signature database it has.

IPS- Intrusion Prevention System detects the intrusion (like IDS) and goes one step ahead to prevent it as well. It simply drops the packet it thinks suspicious (based on rules)
Examples:

proxy – Squid
Firewall- IPTables, CISCO Pix, ZoneAlarm
IDS- SNORT
IPS- IBM Proventia

7 Things VLC Can Do!!


VLC media player is one of the most
popular player for most people.It has got
almost all codecs. VLC can do a lot of other
things beyond your imagination. Find out
how many of these listed below you knew,
and how many you did not.

1. Rip DVDs:
VLC includes a basic DVD ripper. You
probably would never use it when there
are better DVD rippers available, but it
helps to know that you can in fact, get a
decent quality DVD rip with VLC. To rip a
movie follow these steps: Go to the Media
menu and choose Convert–>Save. Click on
the Disc tab.
Here you can adjust the Starting Position
and rip only specific titles or chapters.
Enter file name making sure to end
with .MPG, and start ripping.
Click Save.

2. Record videos:
With the new VLC, you can record videos
during playback. The record button is
hidden by default. To see it, click on View–
>Advanced Control. The record button will
now appear. Clicking on the button while
playing a movie or video will start
recording. Clicking again will stop
recording.

3. Play RAR files:
Do you know VLC can play videos zipped
inside RAR files? They play like normal
video files and you can even use the seek
bar. If the RAR file is split into several files,
no problem. Just load the first part
(.part001.rar ) and it will automatically
take the rest of the parts and play the
whole file.

4. Play in ASCII mode:
VLC media player has an amusing ability,
to playback movies in ASCII art. To enable
ASCII mode, open VLC media player and
click on Tools –>Preferences. Open the
section “Video” section and under
“Output” select “Color ASCII art video
output” from the drop down menu. Save
it. Now play any video file to enjoy the
ASCII art.

5. Listen to online radio:
VLC includes hundreds of Shoutcast radio
stations. You just need to enable it through
Media –>Services Discovery –> Shoutcast
radio listings. Now, open the Playlist and
browse through the stations.

6. Convert Audio and Video formats:
In VLC you can convert video and audio
files from one format to another. Several
different formats are supported like MP4,
WMV, AVI, OGG, MP3 etc. To access the
converter:
* Go to Media –>Convert/Save.
* Load the file you want to convert using
the Add button and click Convert.
* Now choose the output format and
output file location.

7. Download YouTube and other online
videos:
First grab the URL of the YouTube video
page. Now click on Media –>Open Network
stream. Paste the URL and click Play.
Once VLC starts streaming the video, click
Tools –>Codec Information and at the
bottom of the window you will see a
Location box. Copy the URL and paste it on
your browser’s address bar. The browser
will now download the file which you can
save it to your hard disk. Alternatively, you
can record the video.

Skills to Devlope Computing

You will learn two types of skills:

1. Technical computing skills
2. General professional skills

In addition, depending on your interests you will acquire specialized domain knowledge such as business, medicine, or biology.

1. Technical computing skills
Problem-solving ability, recognizing levels of abstraction in software, hardware systems, and multimedia
Practical skills such as building and using database management systems and other sophisticated software tools
Programming
Using existing software libraries to carry out a variety of computing tasks, such as creating a user interface
Being aware of the uses to which computers are put, recognizing issues to do with security, safety, etc.
Looking at innovative ways of using computers, creating tools, providing tools support, etc.
2. General professional skills
Communicating in writing, giving effective presentations and product demonstrations, and being a good negotiator (both in traditional environments and electronically)
Preparing for a job search; this involves building an impressive curriculum vitae and basing this confidently on technical and other skills
Being an effective team member
Understanding the special requirements of a globally distributed project with participants from multiple cultures
Recognizing the challenges and opportunities of keeping skills up-to-date and understand how to do so
Literacy/fluency in computing; organizing all your professional information effectively

Public IP Addresses and Private IP Addresses:



Global IP address:(Public)
Global IP addresses are UNIQUE and that are only assigned to a SINGLE computer or device.
A Global IP address is assigned to a computer or Modem by ISP(Internet Service Provider) and that can be communicated with from any where on the internet.


Local IP address:
Local IP addresses (Private IP Addresses) are assigned by a router.

That includes IP addresses like :-
*---> 10.0.0.0 to 10.255.255.255,
*---> 172.16.0.0 to 172.31.255.255 and
*---> 192.168.0.0 to 192.168.255.255.
Local IP addresses can only be used to communicate within a closed network or LAN.


This can be done via something known as NAT (Network Address Translation):

NAT:
In computer networking, Network Address Translation (NAT) is the process of modifying IP address information in IPv4 headers while in transit across a traffic routing device

Example for understanding NAT:
There is a office. If you wants to communicate with one employee in that office. what we actually do
1. We request to Reception.
2. Reception will redirect your call to that employee.

The same process in reverse
(i.e.) The Employee wants to communicate to outside world . The process is
1. The employee will connect to reception and
2. The reception will redirect the call to out side world.

Note: The Number of Employee is hidden. The outside world peoples only get the reception Number of the Office.

The same process is in NAT. That is instead of Reception that is something called NAT.
(i.e.) Nat will hide the internal IP addresses and shown to the internet is Public IP address.

WANT TO KNOW THE MANUFACTURING DATE OF YOUR COMPUTER??

Lots of person want to know the Manufacture Date of the computer
but they don't know how ?

even i also don't know earliear :/

while browsing i got a website few monthes ago i found it but i forget the website name but i rember the trcik and also chances are i may forget it so before i forget this trick i thought to share with you so i posted this trick here

let me tell U how..!

Open run and type debug and

next in command prompt type

DF000:FFF5

hit enter...!

MANUFACTURING DATE OF COMPUTER 

Let us begin with IP Addresses.

What is an IP Address?

An Internet Protocol address is a numerical label assigned to each device (e.g., computer, mobile phone) that is connected to a computer network that uses the Internet Protocol for communication.

? An IP address is used for two purposes:
1) To identify whether the interface is host or network.
2) To determine the location of the device.

? IP Versions: IPv4 and IPv6.
Although IPv4 is the earlier version, it is the most commonly used version.

? IPv4 is a 32-bit decimal number while IPv6 is 128-bit number.

? IPv4 is normally written as four numbers between 1 and 255, each separated from the other by a decimal point.
This standard is called as DOTTED-DECIMAL NOTATION.

? Ex: 115.241.40.93

? There are countless IP addresses in today's world!

Increase IDM Speed

Manager by double-clicking
the
desktop shortcut or by
selecting the icon within the
Windows Start menu. After a few seconds, the main
application window is
displayed. Click Option in the Download
menu and choose the
Connection tab. Select the Connection Type/
Speed dropdown and choose
LAN 10Mbs. This option sets Internet
Download Manager to the
fastest possible mode, but it
requires a lot of bandwidth for
it to be effective. If you are
running a DSL connection of less than 10mbs, then this
setting is not recommended. Locate the Default Max
Connection Number setting.
IDM uses multiple sources
when downloading large files,
and each source needs a
separate connection. If the default max is set too low,
then this will throttle IDMs
ability to download files
extra-quickly. Set the Default Max Connection
Number as 16, which is the
highest possible number of
connections supported by IDM.
Click OK to apply the settings
specified in this guide. Test the new settings by
downloading a file from the
internet using IDM. Click Add
URL to add the location of a
new download and in the
window that opens, enter the URL of a file on the internet. Select the file in the queue and
click Start/Resume Download
to begin downloading the file
from the internet to your
computer. You should notice a
speed increase in the time it takes to download large files,
now that you have set up IDM
correctly.

How to Protect Your Servers from Attacks and Hackers?

For most internet users, a firewall, spyware and antivirus protection is more than enough to keep hackers at bay. But part of the reason these programs are effective is that hackers rarely waste their time breaking in to personal computers. However, they will go that extra mile to access the servers of businesses where they can find sensitive financial information.

How does it work?
Well, when a user visits a web page, any web page, some of the information get stored on the server. Then when a talented hacker breaks into a hosting server, he may be able to access some of the information that is restricted to customers, such as credit card numbers.
How can you protect your servers?
Unfortunately, catching a hacker in the act is not always easy. They rely on a number of different tricks and techniques to illegally access servers. Believe it or not, most of the programs they use are freely distributed on the web. Of course, they must first find a way in for the hacker to have any chance of accessing confidential files on the server.

Malicious computer programs are the easiest and most effective way for a hacker to break in. Therefore, the first thing you must do is make certain your spyware and maleware programs are current. Of course, no security program can guarantee that your server will not become infected.

What to look for?
If your computer slows down and frequently freezes, there is a good chance that the server is infected. At this point, it will be necessary to disconnect the system from the network. This will prevent infected programs from interacting with the server. It will also prevent the unscrupulous hacker on the other end from accessing your confidential files

How to make Long lasting PROXY

Tools Required :

1-Proxygoblin
2-Frozen Proxy Checker
3-Proxyfire
[Google to download]
OK let's get started,

1 - First we run proxy goblin and
start gather proxy's till reach
40-45 thousand proxy's
2 - Move it to Notepad than We
run Frozen checker and set
timeout:10 and wait till get the
wished Proxy's
3 - We move it to Proxyfire Proxy-
filter and we Filter it This will
Remove duplicate and dangerous
Proxy's
4 - And we are done copy it to
Notepad and enjoy your OWN VIP
Proxy's
It's a perfect way to make
Proxy's,i found Better Than HMA
Proxy's ..

Know your Internet browser shortcuts

There are dozens of different shortcut keys that can be used with Internet browsers. Below are a few of our top suggested Internet browser shortcuts.

- Pressing Alt + D in any major Internet browser will move the cursor into the address bar. This is a great way to quickly enter an Internet address without having to click the mouse cursor in the address bar.
- Hold down the Ctrl key and press the + or - to increase and decrease the size of text.
- Press the backspace key or hold down the Alt key + left arrow to go back a page.
- Press F5 to refresh or reload a web page.
- Press F11 to make the Internet browser screen full screen. Press F11 again to return back to the normal view.
- Press Ctrl + B to open your Internet bookmarks.
- Press Ctrl + F to open the find box in the browser to search for text within the web page you're looking at.

Block Windows Help files to help prevent social engineering attacks!

Symantec has reported that attackers are using the Windows Help file (.hlp) extension to infiltrate systems via social engineering. What is being exploited with the HLP files, and how can enterprises go about protecting users? At what point should these files be blocked?

Windows Help files have been attacked many times before, and Microsoft has been phasing them out recently. Windows Help files allow for the potentially undesired execution of code on the local system by design when opening the HLP file. As Symantec Corp. explained, an attacker could socially engineer a user to open a malicious HLP file, which could execute commands on the local system to download malware as the currently logged-in user. If allowed, such malware could allow an attacker to fully take over a local system. Rather than exploiting an unknown vulnerability in the software, attackers are just taking advantage of the undesired functionality already present in Windows Help files.
Source:
http://searchsecurity.techtarget.com/answer/Block-Windows-Help-files-to-help-prevent-social-engineering-attacks

In many email programs, the icon displayed for a Windows Help file is an innocuous pile of books; users might think it is a file related to a book and not something that could compromise the security of their system, making it more difficult to prevent social engineering attacks. There are only a few reasons a Windows Help file should be transmitted via email or even downloaded from a website, so an effective mechanism to protect users is to block attachments with .hlp extensions or to block URLs of HLP files. Blocking or changing the file association for HLP files could be done on local client systems, which would break the Windows Help file functionality that is necessary for a targeted attack. These blocks could be undone once other controls like anti-malware updates are in place to block malicious HLP files.

Access Gmail offline!!!

GMail introduced a new feature recently, that is browsing mails offline.

Today we are going to see how to do that.

First you need to install Google Gears, you can download the online installer from here
http://gears.google.com/

Run the online installer and it will install Google Gears on your system.

Now open your GMail and navigate to the settings and then to the Labs tab, there you will find a feature called offline, Enable that.

Thats it you are almost done, just a few clicks away. It will ask your permission to install offline access for GMail, click next.Then you get a Google Gears security warning, allow it.Click ok in the next window and you are done.It will download all your mails to your hard drive for offline browsing. You can see the status in the status window.

Have fun browsing gmail offline.

Welcome to Cr4cks And Hacks

This website for Cr4cks and Hacks