Things you should know before you begin:

-You NEED a computer
-You NEED a friend’s computer
-You NEED a pencil/pen and paper or a really good memory
-This only works if both computers are on the SAME network (i.e. computer labs at school)
HOW TO REMOTELY SHUTDOWN OTHER’S COMPUTERS

Before I start I want to make sure that anyone reading this guide understands that you MUST be on the same network as the computer you are trying to shutdown. This means that you can’t do it to a friend who lives next door, and most of the time it wont even work on to a computer in your house. However you may be able do this to computers on an office floor, or in a computer room/lab at school or the library.

Step 1:

First off, you will need to find the computer name of your targeted computer (this is the person you will be turning off).

To do this, you need to get to their computer somehow (sorry I don’t have a guide on sucking up or invisibility). I suggest you wait until they go to the restroom or look away for a second (you'll only need to be on their computer for about 15 seconds or less). After you get on their computer you need to click ‘start,’ then right click on ‘my computer.’ Here you will see a little list, of which at the bottom will be ‘properties.’ Click ‘properties.’





After clicking ‘properties,’ look on the ‘computer name’ tab for the ‘full computer name.’ WRITE IT DOWN (another smart idea to shorten the time you're on their computer is to take a picture of it using your cell phone). Generally it will be something with some numbers and the word ‘YOUR’ in it. That’s always the default computer name and remains unchanged for most computers.












Now you're all done on their computer. Make sure you put the screen back to how they left it so they don't think something is up.

Step 2:

Now go back to your computer. Click ‘start,’ then click ‘run’ (bottom left, under 'search').



After the ‘run’ screen opens it should look like this:



Now type ‘CMD’ into the box provided and click 'OK.' Now this window should pop up:



When it opens type ‘shutdown/i’ and this window will open:









All you have to do now is click ‘add’ and type the name of the computer that you wrote down (or took a picture of) earlier (I suggest that you practice on yourself the first time then cancel the shutdown, see extra tips). You can also change the shutdown delay and even write a little message to the person you are shutting down in the 'comment' box. Try using a fun one like 'Your computer has been infected with an unknown device and needs to delete all open files.' That should really freak someone out who has a report or something important on the screen.
Posted by rajan
I have just set up a wireless connection at home - whenever I log on it says that the connection is unsecure - how do I secure it? I have a new Toshiba Laptop and a Phillips Router. I saw something about a WEP key....where do I enter this?



You are right to worry about this problem, actually, because any open wireless network is an invitation for neighbors and various unsavory characters to connect to your network as if they were on your local area network. This means that they'd be able to use your network-friendly printer, your networked hard drive backup system, and try to break into your computers too. In addition, they'd be able to use your network connection itself and if they were to download tons of illegal music, for example, the RIAA could get your ISP to shut you down, or if they downloaded porn or terrorism research data, well, the FBI could get involved. Not good!

Fortunately, it's pretty easy to secure a wireless network system: you need to log in to your router / base station (your Phillips unit), which is probably done by simply entering a special IP address in your Web browser (try 192.168.1.1 if the documentation that was included with the router doesn't explain). If that fails, you might need to hook the router directly to the computer via a USB cable, though those are definitely rare systems.

Once you've hooked up, you should find a multi-tab configuration tool that has one tab labeled "Security" or similar. Click on that and you should be able to find "Password" as an option or button. Click on that and it should give the options of WEP or WPA. I recommend that you choose WPA and use a long password - it's far more secure than WEP.

Here's an example from the configuration screen of my Linksys router:










As you can see, it's a bit complicated, but once you enter a password it automatically generates all the scary looking (hexidecimal) security codes: any of those will be what you would enter on your Toshiba laptop -- once -- to be securely connected forever.

I hope that helps you get your hatches battened down!
Posted by rajan
u can try google translator .. or one proxy which i found intresting was greenpips.com try that or . try this http://64.233.179.104/translate_c?hl=de&ie=UTF-8&oe=UTF-8&langpair=de%7Cen&u=http://www.your website.com/ change the last part to the website you like to
Posted by rajan
Mail bomber is the software that floods user’s e-mail with big number of mails. Mails can contain different information: from the simple newsletter to the offer to enlarge your body parts.

Mail bombers sometimes are used as mass mailing software and in that case are legal programs used for business improvement. Individual users also are able to use these programs.
Most popular programs are:Avalanch 3.6, Aenima 2.0, Bomsquad, Extreme Mail, Hacktec, KaBoom 3.0, Unabomber, Homicide, Digital Destruction Beta, Euthanasia, Ghost Mail 5.1, Saddamme 0.2, X-Mail, etc. Most of them are free.Business corporations use mass mailing software for newsletters.
They provide new information about their new products, new services, updates and other things to legally registered members of theirs site who agreed to get notifications. It’s very convenient to use mass mailing software in that case. Individual users use mail bomber for mass mailing messages. If one had received a good joke, it’s more convenient to send it to a group of friend. It is useful and fun tool.But in the hands of porno site’s manager it can become a tool for Spam. If your e-mail address is known or obtained without your knowledge you might be flooded with Spam. You can get over thousand letters per day. They can be infected, or advertisement for porno sites, remedy, etc. Links that are included in e-mail may lead you to site’s that are bundled with hijackers or some other spyware.
It might be great threat to you privacy.Using good Anti-Spyware or Anti-Spam program should help you to prevent Spam and mail bombers flood.
Posted by rajan

The powerful chip at the heart of Sony's PlayStation gaming console has been used to crack passwords faster than ever before.
Security researcher Nick Breese used a PS3 to crack supposedly strong eight-character passwords in hours.


Typically, previous attempts to crack such passwords took days to get the same result.



Eight-character passwords are used to protect PDF and Zip files as well as those produced by Microsoft Office.


The work to turn the PS3 into a password cracker was carried out by Nick Breese, who works for Auckland-based Security Assessment.

The Cell processor at the heart of the PS3 is the key to speeding up the time it takes to crack a password.

In a presentation given at the Kiwicon security conference in mid-November, Mr Breese said a powerful Intel chip could crank through 10-15 million cycles per second.

The architecture of the Cell processor meant it could speed through 1.4 billion cycles per second. This speed boost was possible because each Cell chip had several processing cores - each one of which could be effectively trying passwords at the same time.

This was important when attempting "brute force" attacks that go through all possible combinations for a password.

Speaking to the Sydney Morning Herald, Mr Breese said although the PS3 could be used to crack eight-character passwords featuring letters and numbers, stronger encryption systems - such as those used to safeguard web transactions - remained safe.

Mr Breese's research comes soon after work by Russian company Elcomsoft to use graphics cards to speed up password cracking.
Posted by rajan
1- Direct connections via the Internet

These connections can be used to attach to SQL Servers sitting naked without firewall protection for the entire world to see (and access). DShield's Port Report shows just how many systems are sitting out there waiting to be attacked. I don't understand the logic behind making a critical server like this directly accessible from the Internet, but I still find this flaw in my assessments, and we all remember the effect the SQL Slammer worm had on so many vulnerable SQL Server systems. Nevertheless, these direct attacks can lead to denial of service, buffer overflows and more.

2. Vulnerability scanning

Vulnerability scanning often reveals weaknesses in the underlying OS, the Web application or the database system itself. Anything from missing SQL Server patches to Internet Information Services (IIS) configuration weaknesses to SNMP exploits can be uncovered by attackers and lead to database server compromise. The bad guys may use open source, home-grown or commercial tools. Some are even savvy enough to carry out their hacks manually from a command prompt. In the interest of time (and minimal wheel spinning), I recommend using commercial vulnerability assessment tools like QualysGuard from Qualys Inc. (for general scanning), WebInspect from SPI Dynamics (for Web application scanning) and Next Generation Security Software Ltd.'s NGSSquirrel for SQL Server (for database-specific scanning). They're easy to use, offer the most comprehensive assessment and, in turn, provide the best results. Figure 1 shows some SQL injection vulnerabilities you may be able to uncover





3- Direct-exploit attacks

Direct attacks using tools such as Metasploit, shown in Figure 2, and its commercial equivalents (CANVAS and CORE IMPACT) are used to exploit certain vulnerabilities found during normal vulnerability scanning. This is typically the silver-bullet hack for attackers penetrating a system and performing code injection or gaining unauthorized command-line access.








4- Cracking SA passwords
Deciphering SA passwords is also used by attackers to get into SQL Server databases. Unfortunately, in many cases, no cracking is needed since no password has been assigned (Oh, logic, where art thou?!). Yet another use for the handy-dandy SQLPing tool mentioned earlier. The commercial products AppDetective from Application Security Inc. and NGSSQLCrack from NGS Software Ltd. also have this capability.

5- Perusing Web site source code
Source code can also turn up information that may lead to a SQL Server break in. Specifically, developers may store SQL Server authentication information in ASP scripts to simplify the authentication process. A manual assessment or Google could uncover this information in a split second.
Posted by rajan
We all know that Firefox takes a lot of Time to load when it is run for the first time. Today I will show you a simple way to reduce this loading time and thus turn your slow firefox into fast firefox.

You can slash Firefox’s slow load time by compressing the DLLs and executables. There are many choices for compression but I suggest you use UPX which is free, efficient and time proven.

1. Download UPX from http://upx.sourceforge.net/#download
2. Unzip upx.exe into your Firefox installation folder which is normally C:\Program Files\Mozilla Firefox.

3. Make sure Firefox is not running then shell to a command prompt in the Firefox installation directory.

4. Type in the following command in a single line and hit return:

for %v in (*.exe *.dll components\*.dll plugins\*.dll) do upx “C:\Program Files\Mozilla Firefox\%v”

5. If on some later occasion you want to unpack the files, just type in the command above but add the decompression switch “-d” after “do upx.”

That’s it; enjoy the difference!
Posted by rajan
Visit the Site
MARVEL and SPIDER-MAN: TM & 2007 Marvel Characters, Inc. Motion Picture © 2007 Columbia Pictures Industries, Inc. All Rights Reserved. 2007 Sony Pictures Digital Inc. All rights reserved. blogger template by blog forum