Skip to main content

Posts

Showing posts from January 14, 2009

RATS

What? Rats? Those pesky black things that always cause damage in the house. Very cute to look still very destructive all the same. This is supposed to be a site on Internet Security not household and pest management. So why all this here? Put your thoughts aside for a while and let me continue. I am not talking about the above rats. This is in continuation on what the uninitiated call as Trojans which I had hinted upon in my earlier article and what the refined call as Remote Administrative Tools or RATS. Trojans can be very destructive if you're not careful. So tighten your seat belts as we gear up for take-off. To define Trojans, we refresh our knowledge of a virus. A virus is a self-replicating piece of code designed to cause damage or irritation. Trojans assume much greater risk proportions. As the name RATS suggest, they allow a remote user to operate your PC sitting thousands of miles away via the Internet. Surprised? No need to be. The Internet today imparts such power that

Bluetooth

Well to begin with, Bluetooth is a new technology named after the 10th century Danish king Harald Bluetooth Blatand who ruled part of Scandinavia in 960 AD .He helped unite his part of the world. As the name implies that Bluetooth would be the technology to unite the mobile world. Bluetooth device is the revolutionary device launched by L.M Ericsson, to integrate its phone with all Internet enabled devices. Two L.M Ericsson telephone employees, the Swedish born Sve Mattison and his Dutch colleague, Jaap Haartsen, originally designed Bluetooth technology in 1994. The term Bluetooth refers to an open specification governed by the Bluetooth special interest group (SIG) for wireless personal area networks (PANs). This technology provides a way to connect and exchange information between devices like personal digital assistants (PDAs), mobile phones, laptops, PCs, printers and digital cameras via a secure, low cost, globally available short-range radio frequency. Lets look at some examples

Computer Network – Basics

An internet work is a collection of individual networks, connected by intermediate networking devices, that functions as a single large network. The networking devices are the vital tools for communication. Whenever you have a set of computers or networking devices to be connected, you make the connections, depending on the physical layout and your requirements Depending on the physical layout or topology of the network, there are three types of networks. LAN LAN stands for Local Area Network. These networks evolved around the PC revolution. LANs enabled multiple users in a relatively small geographical area to exchange files and messages, as well as access shared resources such as file servers. WAN WAN stands for Wide Area Network. The interconnection of various LAN’s through telephone network, which unites geographically distributed users is achieved through WAN. In short when we log on to the internet, we become a part of a WAN. MAN MAN stands for Metropolitan Area Network. It is u

Backtracking EMAIL Messages

Tracking email back to its source: Twisted Evil cause i hate spammers... Evil or Very Mad Ask most people how they determine who sent them an email message and the response is almost universally, "By the From line." Unfortunately this symptomatic of the current confusion among internet users as to where particular messages come from and who is spreading spam and viruses. The "From" header is little more than a courtesy to the person receiving the message. People spreading spam and viruses are rarely courteous. In short, if there is any question about where a particular email message came from the safe bet is to assume the "From" header is forged. So how do you determine where a message actually came from? You have to understand how email messages are put together in order to backtrack an email message. SMTP is a text based protocol for transferring messages across the internet. A series of headers are placed in front of the data portion of the message. By

Auto End Tasks to Enable a Proper Shutdown

This reg file automatically ends tasks and timeouts that prevent programs from shutting down and clears the Paging File on Exit. 1. Copy the following (everything in the box) into notepad. QUOTE Windows Registry Editor Version 5.00 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management] "ClearPageFileAtShutdown"=dword:00000001 [HKEY_USERS\.DEFAULT\Control Panel\Desktop] "AutoEndTasks"="1" [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control] "WaitToKillServiceTimeout"="1000" 2. Save the file as shutdown.reg 3. Double click the file to import into your registry. NOTE: If your anti-virus software warns you of a "malicious" script, this is normal if you have "Script Safe" or similar technology enabled.

Anti Leech Hacking Tutorial

I was just asking to know if there is some audiance before here is my methode for hacking anti leech we gona use a soft calde proxo mitron proxomitron is an anti bull script web proxy it' works buy applying some rules to elliuminte pop up and many other thing but for our cas we need to desactive all this filtring first goto w-w.proxomitron.info download a copy of the soft then you need to unselect all the option of the soft and clik on log window no go to a anti leech web site use the plug in and not netpumper in the plugin add a proxy you must put this proxy adress 127.0.0.1 8080 for http the same for ftp now select the file to download a click download watch in proximitron log winodws you will see many internal forwarding if the file are located in a ftp server proximitron dont handel them and you will find an error in a ftp adress if it's a http adress you will find some thing like get /blablalma/bla/file site tr.com and you have foudn the adress it' tr.com/blabla/file

Know Spyware

There are a lot of PC users that know little about "Spyware", "Mal-ware", "hijackers", "Dialers" & many more. This will help you avoid pop-ups, spammers and all those baddies. What is spy-ware? Spy-ware is Internet jargon for Advertising Supported software (Ad-ware). It is a way for shareware authors to make money from a product, other than by selling it to the users. There are several large media companies that offer them to place banner ads in their products in exchange for a portion of the revenue from banner sales. This way, you don't have to pay for the software and the developers are still getting paid. If you find the banners annoying, there is usually an option to remove them, by paying the regular licensing fee. Known spywares There are thousands out there, new ones are added to the list everyday. But here are a few: Alexa, Aureate/Radiate, BargainBuddy, ClickTillUWin, Conducent Timesink, Cydoor, Comet Cursor, eZula/KaZaa Toptext