Notice

Join This Channel To Get Latest Phone Tips,Tricks,News,Network Security Course,Hacks etc. For Free on Your Mobile!! ... Join our Facebook Discussion Group -Regards Ankit

27 April 2012

Check the Website is safe or not?



To make sure whether site is free from malware or not, we have to verify the target-link with few more sites.

Here ,i list out some websites that helpful to identify whether site is safe or not :


1.MyWot:
WOT is a community-based, free safe surfing tool for browsers that provides website ratings & reviews to help web users as they search, surf & shop online.

website: www.mywot.com

2.VirusTotal:
VirusTotal is a free virus, malware and URL online scanning service. File checking is done with more than 40 antivirus solutions.
 
website: www.virustotal.com

3.Norton Safe Web, from Symantec
Look up website safety information and safe site rankings from Norton Safe Web from Symantec. Read what others think and write your site reviews.

website: safeweb.norton.com

4. Unmask Parasites
Free online website security service. Check your web pages for hidden illicit content (invisible spam links, iframes, malicious scripts and redirects).

website: www.unmaskparasites.com/

5. Google Diagnostic:
checks whether site hosts malware or not.

website: http://google.com/safebrowsing/diagnostic?site=target.com

6.Online Link Scan
Online Link Scan collects and summarizes the threat reports of the aforementioned Phishtank, AVG and Google Safe Browsing engines.

website: onlinelinkscan.com


I believe this list is enough to verify site is safe to user. These sites will helpful when you are doing static malware analysis process.Enjoy...

23 April 2012

A Guide To OSI Model



Credits: prtablegm[HF]

This guide is not meant to be all encompassing. It is a reference to give someone who is interested in network security, but does not know where to start, some guidance of how to begin learning about the vast field of network security and where to look for information. The important thing to keep in mind is stay focused and learn little by little. It is easy to become intimidated when looking at the big picture and all that it entails. Focus on each section and gradually increase your knowledge base.

[Image: osi_model_1.JPG]

OSI Layers Explained

The Open Systems Interconnection model (OSI model) is a product of the Open Systems Interconnection effort at the International Organization for Standardization. It is a way of sub-dividing a communications system into smaller parts called layers. A layer is a collection of similar functions that provide services to the layer above it and receives services from the layer below it. (That part is a direct quote from Wikipedia for I could not say it better my self)

Physical Layer: The physical layer is at the bottom of this data networking model. It deals with crude data that is in the form of electrical signals. The data bits are sent as 0's and 1's. 0's correspond to low voltage signals and 1's correspond to high voltage signals. The mechanical aspects of communication, such as wires or connectors come under this layer. The physical layer also deals with how these wires, connectors, and voltage electrical signals work. Also, the process that is required for these physical aspects are taken into account in this layer itself. Read more on ethernet cable wiring.

The Data Link Layer: The transmission of the data over the communication medium is the responsibility of this layer. The 0's and 1's that are used in the communication are grouped into logical encapsulation. This encapsulation is called frames. The data is transported in frames. The responsibility of these frames is that of the data link layer.

Network Layer: All over the world, there are many different types of ethernets. These networks are connected to each other through various media. When a data packet wants to reach a particular destination, it has to traverse through these networks. Essentially, there are lot of operations that are taking place between the connected networks. Also, the packet data which is traversing, has to choose an optimum route, and the addressing of these packets has to be proper. The various operations between the networks, packet data issues, addressing and routing are handled by this network layer.

Transport Layer: The transport layer ensures quality and reliability of the communication. The data packet switching is entirely handled by the transport layer. There are basically two types of packet switching. They are connectionless packet switching and connection oriented packet switching. In connectionless packet switching, the packet data is allowed to choose the route in which it is going to reach the destination. Obviously, the packet in itself cant do this. Physical devices like routers are mainly responsible for the behavior of packets, but the packets formed from the same datum can reach their destination in different ways. Whereas, in connection oriented packet switching, once the route is decided, then all the packets have to follow the same route. Examples of connectionless packet switching are text messages in mobile phones, and the example of connection oriented switching is a direct voice call.

The Sessions Layer: The sessions layer is mainly responsible for creating, maintaining and destroying the communication link. PDU (Protocol Data Unit), in which various protocols are defined, that have to be followed during communication, are the responsibility of the sessions layer. The applications that use RPC's (remote procedure calls) are taken care of by the sessions layer.

Presentation Layer: There are various techniques of data compression which are used to send and receive the optimized data. For example, if certain data is repeating itself for a number of times, then it is logical to send the data only once, and specify the number of times it is repeated. This bundling of the repeated data is one of the techniques of compressions. The compression and decompression of the data is handled by the presentation layer. Also, encryption and decryption techniques used to thwart malicious attacks on data are handled by the presentation layer.

Application Layer: This is the topmost layer of the OSI reference model. This layer comes into picture when there is a process to process communication. Whenever a user invokes any application, all the associated processes are run. Many a times, when an application wants to communicate with another application, then there has to be communication between these associated processes. The application layer is responsible for this interprocess communication.

Thank you Keith Barker for this story.

Title:
King invites King to lunch.

Once upon a time, there were two Kings. King A and King B. They lived in separate kingdoms, kingdom A and kingdom B.

One day, King A, decided to invite King B to a lunch. No telephones were available, and King A doesn't have to ride a horse all the way over to kingdom B to personally invite King B, as both kings have a huge staff of 7 workers. So here is what happens for the invitation.

King A calls for staff member 7, the scribe (application layer), and the scribe writes down the message indicating that the local King A, wants to invite the remote King B to a lunch. The scribe puts this message into a container, such as an envelope. Staff member 7, the scribe, then hands it to the next staff member 6, the translator.

Staff member 6, the translator (presentation layer), simply ensures that the language that the scribe used, is appropriate for the language understood by King B?s staff on remote side. The translator puts the results in another envelope, and hands it to staff member 5, the negotiator.

Staff member 5, the negotiator (session layer), knows how to deal with people, and the rules for engagement for communicating with other kingdoms. He adds his 2 cents, and puts the results in yet another envelope. He hands this envelope to staff member 4, to the middle manager.

Staff member 4, the middle manager (transport layer) is very concerned about making sure that the envelope it received makes it all the way to kingdom B. In fact, if the envelope is quite large, the middle manager, staff member 4, may divide the envelope into 2, and label them 1 of 2, and 2 of 2 with the intent of getting an acknowledgment from the middle manager on the remote side (kingdom b), to verify that all the pieces got there. If the messages are not too important, the middle manager may just send the information, and not even ask for an acknowledgment. Depends on the rules for the specific message. Either way, the middle manager, hands the envelope(s) down to staff member 3, which is Google maps guy, who only has the ability to the world from a 5,000 foot view, and no closer.

Staff member 3, looking at the view of the countryside from 5,000 feet (network layer), and seeing that the envelope is to be delivered to kingdom b, sees that kingdom b is absolutely remote, (not local), and adds information regarding whether the message needs to travel North, South, East or West. In this example, lets say that staff member 3 made the decision that the message needs to go east. After adding that, he hands the envelope to staff member 2, which is the mail room guy.

Staff member 2, the mail room guy (data link layer), knowing that the message needs to go east, takes a look at all of his carriers, (FedEx, UPS, USPS, Carrier Pigeon, etc), and if there is only 1 that is going east, he prepares the message for that carrier. It if is FedEx, staff member 2 puts the message in the appropriate FedEx envelope (frame), and puts it in the pile for FedEx pickup.

FedEx isn't really a staff member, but if they were, they would be staff member 1 (physical layer), who takes the data and causes it to actually leave kingdom A, on its way (finally) to kingdom B.

Now, let's go on a road trip, and see what happens in Kingdom B, when the message arrives there.

The package, finally arrives at kingdom b, and is received at kingdom B's mail room and follows this process:

Mail room receives L1 via FedEx, or possibly another carrier that FedEx handed off to in transit.

Mail room (L2)verifies that the package is for us, at this castle based on the house (castle) number, and hands it to google maps guy at L3.

Google maps guy (L3), looks at the map and says, yup, this envelope doesn't need to be forwarded to any remote location, as it is destined to us. I will just remove the google map info, and hand it up to L4. (Note, if the message needed to go to a different street , the google maps guy would add new information, such as north, south, east or west, and push it back down to the mail room to be sent.)

Middle manager, (L4) is nervous, as the envelope says 1 of 2, and he wants to keep his job. He puts a sticky note on his monitor, that says look for envelope labeled 2 of 2, and if that second envelope doesn't arrive, he may take the initiative to send a little message back to the middle manager at kingdom A, asking for a resend of that information. As data does arrive, middle manager removes any information applied by the remote middle manager, (such as information regarding 1 of 2, and 2 of 2), and pushed the info up to L5.

The negotiator, (L5), understanding the politics and rules for engagement, accepts the contents of the envelope, using any special rules that the negotiator on the remote side may have imposed or recommended. Removing any L5 specific information, he pushes the rest of the data to L6.

The translator (L6) sees that the sender used English, and our local kingdom understands English. He also noticed that there was some short hand used by L6 on the remote side, so the local side decompresses that, and hands the results up to L7.

The scribe (L7) takes the message, approaches King B, and reads? King A, invites you to lunch!?

All that for a lunch invitation!

Any ideas on what process happens if King B responds?

Same logic on virtually all media types.

[Image: telecommunication_osi.gif]

Ways to remember the OSI Model

Please Do Not Trouble Steve's Pet Alligator
Please Do Not Throw Sausage Pizza Away
All People Seem To Need Dominos Pizza
American Pu**y Seems To Need Deeper Penetration
All People Seem To Need Data Processing
All Prostitutes Seem To Need Double Penetration

Yes it just keeps going. Whatever it takes to remember the OSI model.
Enjoy...

21 April 2012

RUN SYMBIAN APPLICATIONS ON PC



1. Download Symbian SDK from HERE
2. Install the SDK and all chaintools included in the package in their default location.
3. After all packages are installed, reboot your PC.
4.Now goto Start » Program files » Nokia Developer Tools » Symbian SDK » Emulator to launch the emulator
5. Wait for the Emulator to completely load. The Emulator program will look like this when finished loading.



6.Now inside the Emulator program, go to File » Openand then choose your favorite Symbian applications that you want to run.



7. All set, install and enjoy your favorite Symbian apps on your PC. If you get error while installing unsigned applications, gotoMenu » Settings » Application settingsand change value from Signed only to all.




NOTE: THE SYMBIAN SDK ARE HBIG FILES. IF YOU WANT TO DOWNLOAD SDK YOU SHUD NEED A NOKIA DEVELOPER ACCONT.

FOR: S60 3rd Edition, Feature Pack 1.
S60 3rd Edition.
S60 2nd Edition, Feature Pack 2 (formerly 2.2).
S60 2nd Edition, Feature Pack 1 (formerly 2.1).
S60 2nd Edition (formerly 2.0).
S60 1st Edition, Feature Pack 1 (formerly 1.2).
S60 1st Edition (formerly 0.9).Enjoy...

17 April 2012

Boost GSM Signals



You suffer from an absent or steady mobile signal? So this article will help you to resolve this problem.

Today's high-time human activity is unthinkable without communication and even today when long distances are not a barrier thanks to high-quality provider. The days when a cell phone was remarkable and expensive for everyone are gone.

Through the efforts of mobile operators, cellular phone is no longer a luxury and it has become an integral accessory of a modern man. As concerning mobile communication it is penetrated into the remotest corners of our globe.

However, the situation when the mobile phone receives a signal badly and you can not make or receive calls is familiar for many people. How often do you come to the window or go outside to talk to?

There are areas of unstable reception in any gsm network where you need mobile signal amplification to improve the quality of cellular communication. The hindrance of the passage of radio waves could be massive walls, metal objects and concrete floors of your home. In such conditions the communication by the cell phone is limited or impossible.



The cellular enhancing is achieved through the installation of mobile signal booster:

Where is necessary to strengthen the cellular gsm signal? Anywhere! It can be private houses, cottages and villas; offices, shopping malls and stores; restaurants, bars, clubs; underground car parks and parking; warehouses, hangars, etc.

First of all to ensure the stability of the cell phone communication and boost cell phone signal will be necessary in country houses, cottages, situated on the slopes and valleys, in basements and other places where radio waves from mobile base stations of cellular operators can not penetrate into the buildings.

Now you do not need to seek a peaceful place to make phone calls, because in your home, shop or office you will not have problems associated with disruption of cellular communication. You will save yourself from having to search the place of reliable reception of cell signal and will be able to do what is really important for you.
Enjoy...

15 April 2012

Using Vnap Proxy Buster for Free internet



Here is New Vnap .NetBuster Proxy Pro For Download, This Software is same as Handler software But for PC. This is New Version of Vnap .NetBuster Proxy Pro.

What’s New?
  • Fully Rebuild Proxy Engine for Faster Connection.
  • Solved many Bugs.
  • Incorporated my suggestions that users gave.
  • New Easy to Use Installer
  • Easy Settings with Instructions and Better Import and Export Function for sharing your settings
  • All new Windows 8 GUI

Requirements are:
  • Net 4 Framework
  • Compatible with Windows XP /Vista / Windows 7 (x86/x64) / All New Windows 8 (x86/x64)
 Download Vnap Buster

How to Get Free internet?
Airtel: http://www.hackopedia.in/2012/04/airtel-3g-trick-april-2012.html
Reliance: http://www.hackopedia.in/2012/03/gprs-trick.html
MTS: http://www.hackopedia.in/2012/02/mts-blaze-hack-2012-for-free-internet.html
Vodafone: http://www.hackopedia.in/2011/08/hack-vodafone-3g.html
Aircel: http://www.hackopedia.in/2011/08/aircel-3g-hacks-2011-finally-revealed.html

Stay Connected for More 3G Tricks..!

Enjoy...

12 April 2012

PHP Video Tutorials



Php Video Tutorials Database Website From Scratch Course


Php Video Tutorials – Database Website From Scratch Course
Genre: E-Learning | English

It’s 13 lessons 6+ hours with all source code provided! I saved the code at the end of every lesson so you can start from any lesson you like.
Starting from the beginning and coding every line along with me is the best way though! you’ll learn more and have a better understanding of how everything works.

Lesson 01 – Introduction
We talk about what we are going to build.

Lesson 02 – Setting up the database
Create our database and set up the tables we are going to need. We also talk about the relationships between our tables.

Lesson 03 – PHP to MySql
Now we dive head first into connecting to MySQL from PHP. We also set up all the SQL for our Application (Creating, Selecting, Updating, Deleting)

Lesson 04 – Code to functions
Then we review our code and turn it into nice functions we can reuse over and over again!

Lesson 05 – MVC
We talk about MVC application layout. Look at some diagrams and think about how we can achieve this application layout.

Lesson 06 – Setting up the application
We begin to layout out our application and framework.

Lesson 07 – Routing System
Now we have a foundation.. it’s time to add friendly URLs and using our knowledge of regular expressions we set up a cool little routing system! Go PHP go!!

Lesson 08 – Routing to functions
We then review our code again and re-factor it into functions. It’s all about keeping your code in the right spots and keeping everything tidy.

Lesson 09 – Layouts and Forms
Our Application needs a layout so using some simple logic we set up a cool Templating system! Then we move onto setting up all our HTML forms.

Lesson 10 – Forms to Database
Now we have our forms we need to make them talk to PHP and MySQL so that’s what we do!

Lesson 11 – Part 1 WYSIWYG and Validation
We add rich editing to our forms and then we setup some simple validation and functions! did someone say CMS!! yeah baby!

Lesson 11 – Part 2 Magic Quotes and Pagination
We look at magic quotes and add previous and next links to our application.

Lesson 12 – User Authentication
It’s time to make our CMS secure so now we add Password Protection!

Lesson 13 – Styling






Php Video Tutorials Database Website From Scratch Course







Php Video Tutorials Database Website From Scratch Course




Vip-File Download Link

http://vip-file.com/downloadlib/94830592119574155176744-93296.99a0b228ac395ee9ae0d38132bdd/Php_Video_Tutorials__Database_Website_From_Scratch.part1.rar.html
http://vip-file.com/downloadlib/2978857042116195615521-49643.4ee670eb961256987cc818b149f5/Php_Video_Tutorials__Database_Website_From_Scratch.part2.rar.html
http://vip-file.com/downloadlib/7966107180562893070609-68077.679cbd9447ce63256545020c27f0/Php_Video_Tutorials__Database_Website_From_Scratch.part3.rar.html
Enjoy...

10 April 2012

Use Google Voice Search through Arduino & Bluetooth



With the launch of Google’s new Voice Search feature on the Chrome browser, you can trust the DIY community to come up with some cool hacks.  The Verbalizer is an Open Source development board based on Arduino which wirelessly communicates with your computer via Bluetooth. Activate it and as usual it opens Google.com in a new tab and starts Voice Search.
Audio feedback lets you know that Google is ready for your voice search. Now, you can speak into the mic and see the results of your search. The Verbalizer gives a development platform to geeks to find creative ways to connect to Google’s Voice Search and create hardware to integrate with the platform.  Take some hints from the video below and download all the project details.
Enjoy...

06 April 2012

Google Trick to Find Private Stuff



Maybe you need some pictures for your school work.

Of course you can go to a dedicated website where you can find lot of free pictures.

But you can also dig some private pictures directories.

Try this little code in Google, you may find lot of Non public pictures



Quote:
intitle:index.of +"Indexed by Apache::Gallery"
search by adding a word at the end, for example:


Quote:
intitle:index.of +"Indexed by Apache::Gallery" +paris
I just realize that maybe some of you guys use Apache Gallery for your own private pictures.

If you want to verify if your own private pictures ares indexed, just paste this code in Google.

Quote:
site:www.YourSite intitle:index.of +"Indexed by Apache::Gallery"
(Replace Your Site by the server hosting your pictures (your URL.)
Apache::Gallery"
Enjoy...

05 April 2012

Airtel 3G Trick April 2012



Airtel New Working Fastest 3g surf + downloading proxies:~

APN:airtelgprs.com
PORT:80
HOMEPAGE:fb.me or live.airtelworld.com or any free site


PROXIES:
1)facebook-proxy.info

2)sixe.info

3)eall.tk

4)biip.info

5)anon-proxy.info

6)infinitetunnel.info

7)00zero.co.uk

8)daveproxy.co.uk

9)usa1.freeninjaproxy.info

10)123fast.co.uk

11) jeefspeed.info

12)rastahighway.info

13)62.75.211.32

14)205.134.229.213

15)99.158.160.201[facebook wrking great]

16)proxy-service.de[youtube supported]

17)lagometer.de(RESUME supported)

18)safe-surf5.tk

19)roboproxy.info

20)roogen.com

21)interrobangpath.org

22)2q34.com

23)khaparocks.tk

 Enjoy...

Views This Month

 

HaCk-O-PeDia - The Hacker's Encyclopedia. Copyright 2010 All Rights Reserved To Ankit