Sunday, July 5, 2009

More Quotes

Fools say the known things in an unknown way but the wise say the unknown things in a known way.

You love someone till you find a reason to hate them, and you hate someone till you find a reason to love them

If you wan to increase your success rate, double your failure rate.

Vision without action is a daydream. Action without vision is a nightmare.

Defeat is not defeat unless accepted as a reality in your own mind

The height you attain depends on the depth of your roots.

One lie .,,,

One lie is enough to break trust.

One sentence is enough to break a heart.

One second is enough to lose a battle.

One smile is enough to fall in love.

One mistake is enough to lose a job.

One touch is enough to heal a wounded heart.

But whatever our pains and struggle are,

One GOD is more than enough.

Wednesday, April 15, 2009

Remove USB Worm Manually From Your Computer

Follow these step by step to remove USB virus from ur computer

1) Goto Start -> Run
2) Type “gpedit.msc” (This is the group policies editor)
3) Click “Administrative Templates” under Computer Configuration
4) Then click “System”
5) Select “Turn off Autoplay”
6) Set it to “Enable” and choose to “Turn off Autoplay on All Drives”

Hope u enjoyed. Coontact if not working.

Have nice time

IP spoofing

Internet Protocol i.e IP addresses are unique and used for digital data communication for internet. Any mailing system or website technology works on the same principle of digital communication.

IP Spoofing

IP Spoofing

Every computer connected to Network have its unique IP address.

When Person A sends an email to Person B, The mail is assigned with the header which contains the IP’s of sender and Reciver so that mail can go to the same Person B and not to some one else.

Now in a private network for security reasons limited mails are accpeted from reserved IP’s.

In Simple word only internal communication can be worked. Person from outside can’t send mail in that network.

So if attacker wants send the mail inside, He will spoof the IP.

He first will sniffs the data packets in the internal communication adn steal some internal email.

Then he will perform changing in header of the mail. he will change content of the mail and send this mail to network again.

System cant provide security against this because it have internal fake IP.

This is how fake IP is created and attack of spoofing is done.

Steganography

Steganography is method of hiding files in image files.

This is used mostly on a network so that files can be stored secretly. This method is very harmful for those where source codes of viruses and and programs can be stored. Also some secret file can also be stored and it can be any information about sytem and system weaknesses.

Following are the softwares used for setganography:

Steganography

1. Image Hide

2. Snow: Fioles are sored in white or blank spaces of any text files.

3. MP3stegno: Used for storing files in MP3 file format which is almost undetectable.

Prevention Measures Against Steganography:

We can use softwares for setecting such files and we can also tranck the stored content for the security of the system.

Stegdetect: This simple software detects such files stored on system or network.

Stegbreak: Used to crack the password of such files by Dictionary attack.

Port scanning

Port scanning determines which ports are listening to the active connections on the subjected host. These ports represent potential communication channels. With the help of port scanning we get close to the network communication scenario. We get to know more about victim’s network which is useful for further attacks. Internet does not exclusively rely on TCP port 80, used by hypertext transfer protocol (HTTP). Any surfer surfing any website can gain the same level of proficiency as your average casual surfer. Port scanning can be efficiently done to reveal the secret’s about the host.

Automated port scanners are necessary to perform such scanning, which are available in the market for very small cost.

Port scanning is done so as to gather information passively about the victim. This help’s intruder to eavesdrop into Victim’s Network.

Such scanning also helps in gathering information so as to form a network map. Network map are useful to get to know the victim network architecture or hierarchy.

There are thousands of ports available for communication on a network some well known are FTP, HTTP, SMTP etc., Which ports remains open or close depends on the network’s requirement. Like any web server will always have an FTP port open.

Every port has its unique number which is targeted after the successful port scanning. Various bugs, backdoors are installed on these ports and tested whether the system is vulnerable.

And this is how a successful attack through port scanning is done.

Hope you have enjoyed this informative article about port scanning.

Saturday, March 21, 2009

What life is all about!!!!

LIFE

Life isn't about keeping score.
It's not about how many friends you have
Or how accepted you are.
Not about if you have plans this weekend or if you're alone.
It isn't about who you're dating, who you used to date, how many people you've dated, 
or if you haven't been with anyone at all.
It isn't about who you have kissed, 
It's not about sex. 
It isn't about who your family is or how much money they have.
Or what kind of car you drive.
Or where you are sent to school.
It's not about how beautiful or ugly you are.
Or what clothes you wear, what shoes you have on, or what kind of music you listen to. 
It's not about if your hair is blonde, red, black, or brown 
Or if your skin is too light or too dark. 
Not about what grades you get, how smart you are, how smart everybody else thinks you are, 
or how smart standardized tests say you are.
It's not about what clubs you're in or how good you are at "your" sport.
It's not about representing your whole being on a piece of paper and seeing who will "accept the written you." 

LIFE JUST ISN'T.

But, life is about who you love and who you hurt. 
It's about who you make happy or unhappy purposefully. 
It's about keeping or betraying trust.
It's about friendship, used as a sanctity or a weapon. 
It's about what you say and mean, maybe hurtful, maybe heartening.
About starting rumors and contributing to petty gossip. 
It's about what judgments you pass and why. And who your judgments are spread to. 
It's about who you've ignored with full control and intention.
It's about jealousy, fear, ignorance, and revenge. 
It's about carrying inner hate and love, letting it grow, and spreading it.
But most of all, it's about using your life to touch or poison other people's hearts in such a way 
that could have never occurred alone. 
Only you choose the way those hearts are affected, and those choices are what life's all about.