tag:blogger.com,1999:blog-21946472376735935882024-03-13T11:28:32.166+05:30Infinite RealmColinhttp://www.blogger.com/profile/10076561696860953748noreply@blogger.comBlogger36125tag:blogger.com,1999:blog-2194647237673593588.post-91189483373740513602010-08-22T07:14:00.003+05:302010-08-31T06:11:20.719+05:30iCodeSourceMe and my friends have been fiddling with an idea of a 'Code Library' for a long time now. So I've finally decided to put some code together.<br />
<br />
<br />
<a href="http://icode-source.blogspot.com/">http://icode-source.blogspot.com/</a><br />
<br />
This site will be used as a code journal, till the final release is out. Request friends and folks to come out with ideas to improve the product and/or any of its features.Colinhttp://www.blogger.com/profile/10076561696860953748noreply@blogger.com0tag:blogger.com,1999:blog-2194647237673593588.post-63711512565560359952009-11-21T15:31:00.014+05:302009-11-21T17:02:11.588+05:30Ubuntu & Chromium OSAfter Google recently announced their intention of developing their latest venture, the Chromium OS, as an open source project, it has lead to cheers from all corners. An example of this openness was given at the <a href="https://wiki.ubuntu.com/UDS-L">Ubuntu Developer Summit in Dallas</a>.<br /><br />Here is an interesting excerpt from the <a href="http://blog.canonical.com/?p=294">Canonical blog</a>,<br /><br /><div style="border: 1px dashed rgb(47, 111, 171); padding: 5px; background-color: rgb(249, 249, 249);"><p style="margin: 0px; padding: 1em; font-size: 110%;"><code>In the interest of transparency, we should declare that Canonical is contributing engineering to Google under contract. In our discussions, Sundar Pichai and Linus Upson made it clear that they want , wherever feasible, to build on existing components and tools from the open source community without unnecessary re-invention. This clear focus should benefit a wide variety of existing projects and we welcome it.</code></p></div><br /><br /><br />Something else that struck me on the issue is from this <a href="http://sites.google.com/a/chromium.org/dev/chromium-os/building-chromium-os">Chromium site</a>,<br /><br /><div style="border: 1px dashed rgb(47, 111, 171); padding: 5px; background-color: rgb(249, 249, 249);"><p style="margin: 0px; padding: 1em; font-size: 110%;"><code>Prerequisites<br />You need to have Linux. We currently support the following:<ul><li>Ubuntu (Hardy 8.04 or newer, Karmic 9.10 recommended)</li><li>An account with root access (needed to run chroot and modify the mount table)</li><li><a href="http://code.google.com/p/chromium/wiki/LinuxBuildInstructionsPrerequisites">Chromium prerequisites</a> (needed to build a Chromium-based browser as part of building Chromium OS)</li></ul></code></p></div><br /><br />So, Google seems to be using a tried & tested platform as a foundation for their Chromium OS. The year 2010, seems to be getting interesting, with Lucid Lynx & Chromium OS. At least, we get to spend some good time; before the Mayans get the better of us, two years later. <img src="http://l.yimg.com/us.yimg.com/i/mesg/emoticons7/10.gif" border="0"/>Colinhttp://www.blogger.com/profile/10076561696860953748noreply@blogger.com1tag:blogger.com,1999:blog-2194647237673593588.post-4702690384001930472009-11-15T11:13:00.010+05:302009-11-26T07:31:53.921+05:30LAMP server on UbuntuIf you want to have a LAMP server on your Ubuntu machine, but found if difficult to install the different components seperately, the geeks (developers) at Ubuntu have literally made it as good as spoon-feed. For the un-initiated, LAMP is a software bundle for <span style="font-weight: bold;">L</span>inux, consisting of <span style="font-weight: bold;">A</span>pache HTTP server, <span style="font-weight: bold;">M</span>ySQL (database component),<span style="font-weight: bold;"> P</span>HP (for scripting).<br /><br />The result of their efforts is the following command,<br /><br /><div style="border: 1px dashed rgb(47, 111, 171); padding: 5px; background-color: rgb(249, 249, 249);"><pre style="margin: 0px; padding: 1em; font-size: 95%;"><code>sudo apt-get install lamp-server^</code></pre></div><br /><span style="font-style: italic;">Note: The carrot is not a typo-error, its part of the command. It refers to the 'Tasksel packages' for different tasks. If you need to see the complete list type "</span><span style="font-weight: bold;">sudo tasksel</span><span style="font-style: italic;">" in the console.</span><br /><br />Follow the onscreen instructions, you will be prompted to confirm all the packages, reply with 'YES'. While the installation is halfway, you will be prompted to chose a password for the root user on the MySQL database. Enter your password and confirm it.<br /><br />Thats it, the install is done; now for the configuration part.<br /><br />1] Apache2: Open "http://localhost/" in a browser window, if you see a page with "It Works" written on it; then you apache2 installation has succeeded.<br /><br />Open a terminal window, and paste the following into it, to open up apache2.conf;<br /><div style="border: 1px dashed rgb(47, 111, 171); padding: 5px; background-color: rgb(249, 249, 249);"><pre style="margin: 0px; padding: 1em; font-size: 95%;"><code>sudo gedit /etc/apache2/apache2.conf</code></pre></div><br />add an entry to the end of the file; <span style="font-weight:bold;">ServerName your-domain.com</span> (you will have to replace your-domain.com)<br /><br />2] PHP: Open a console, and type<br /><div style="border: 1px dashed rgb(47, 111, 171); padding: 5px; background-color: rgb(249, 249, 249);"><pre style="margin: 0px; padding: 1em; font-size: 95%;"><code>sudo gedit /var/www/phptest.php</code></pre></div><br />here, enter the following code in the gedit document,<br /><br /><div style="border: 1px dashed rgb(47, 111, 171); padding: 5px; background-color: rgb(249, 249, 249);"><pre style="margin: 0px; padding: 1em; font-size: 95%;"><code><<b></b>? php phpinfo(); ?></code></pre></div><br /><br />restart apache2 with the following command<br /><div style="border: 1px dashed rgb(47, 111, 171); padding: 5px; background-color: rgb(249, 249, 249);"><pre style="margin: 0px; padding: 1em; font-size: 95%;"><code>sudo /etc/init.d/apache2 restart</code></pre></div><br /><br />Now open your browser to "http://localhost/phptest.php"; if your PHP install was succesful, this page will list out the details of the PHP installation.<br /><br />3] MySQL<br />Open the MySQL configuration, <br /><div style="border: 1px dashed rgb(47, 111, 171); padding: 5px; background-color: rgb(249, 249, 249);"><pre style="margin: 0px; padding: 1em; font-size: 95%;"><code>sudo gedit /etc/mysql/my.cnf</code></pre></div><br /><br />Make sure the following setting is proper.<br /><span style="font-weight:bold;">bind-address = 127.0.0.1</span><br /><br /><br />(This is an optional step)<br />Installing phpMyAdmin<br /><div style="border: 1px dashed rgb(47, 111, 171); padding: 5px; background-color: rgb(249, 249, 249);"><pre style="margin: 0px; padding: 1em; font-size: 95%;"><code>sudo apt-get install libapache2-mod-auth-mysql phpmyadmin</code></pre></div> <br />Follow the onscreen instructions to complete the install, you can access it at "http://localhost/phpmyadmin/"<br /><br />Finally restart the apache2 server; <br /><div style="border: 1px dashed rgb(47, 111, 171); padding: 5px; background-color: rgb(249, 249, 249);"><pre style="margin: 0px; padding: 1em; font-size: 95%;"><code>sudo /etc/init.d/apache2 restart</code></pre></div><br /><br />There you go, your machine is up and runningColinhttp://www.blogger.com/profile/10076561696860953748noreply@blogger.com1tag:blogger.com,1999:blog-2194647237673593588.post-14853010412573951892009-11-13T07:00:00.005+05:302009-11-13T07:30:08.985+05:30GO - A brand new programming language from Google<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjD-Cs8bXB_dWEL9rrZixK8YuO1IuLjuqzUD3qyUeKaf71ROUlRF-wA9JIa0CcVNDBHy05ktu7lIkBJqwhM2uL0kjFkWFDrr9AJ6ZOKHyUw3d6HddhvjIwJhvgzVXKqe75Oa9SRR7rhUm0/s1600-h/gogopher.png"><img style="float:right; margin:0 10px 10px 0;cursor:pointer; cursor:hand;width: 295px; height: 295px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjD-Cs8bXB_dWEL9rrZixK8YuO1IuLjuqzUD3qyUeKaf71ROUlRF-wA9JIa0CcVNDBHy05ktu7lIkBJqwhM2uL0kjFkWFDrr9AJ6ZOKHyUw3d6HddhvjIwJhvgzVXKqe75Oa9SRR7rhUm0/s400/gogopher.png" border="0" alt=""id="BLOGGER_PHOTO_ID_5403401496230689202" /></a>Big news for developers out there: Google has released a new, open source programming language, Go. Go, is currently experimental, and it combines the performance and security benefits associated with using a compiled language like C++ with the speed of a dynamic language like Python. The official mascot of Google Go is a nice little Gopher.<br /><br />Here’s how Google describes Go in its blog post:<br /><br />Go attempts to combine the development speed of working in a dynamic language like Python with the performance and safety of a compiled language like C or C++. In our experiments with Go to date, typical builds feel instantaneous; even large binaries compile in just a few seconds. And the compiled code runs close to the speed of C. Go is designed to let you move fast.<br /><br />We’re hoping Go turns out to be a great language for systems programming with support for multi-processing and a fresh and lightweight take on object-oriented design, with some cool features like true closures and reflection.<br /><br />For more details check out <a href="http://golang.org/" target="_blank">Golang.org</a><br /><br />Here's a sample of the 'Hello, World' program:<br /><div style="border: 1px dashed rgb(47, 111, 171); padding: 5px; background-color: rgb(249, 249, 249);"><pre style="margin: 0px; padding: 1em; font-size: 92%;"><code>package main<br /><br />import "fmt"<br /><br />func main() {<br /> fmt.Printf("Hello, 世界\n")<br />}</code></pre></div>Colinhttp://www.blogger.com/profile/10076561696860953748noreply@blogger.com1tag:blogger.com,1999:blog-2194647237673593588.post-37679087723750483222009-11-11T14:04:00.003+05:302009-11-11T14:24:18.199+05:30Fix the Monitor from xorg.confMost Linux distros have some sort of control centres from where we can change display settings and make it optimum for our monitors or graphics cards. Sadly sometimes we come across a distro which doesn't support the resolutions native to our card or monitor, in such cases we can directly modify the <span style="font-weight: bold;">'xorg.conf'</span> file which is responsible for the changes in the display.<br /><br />Before you proceed, back up your old '<span style="font-weight: bold;">xorg.conf</span>'<br /><br /><div style="border: 1px dashed rgb(47, 111, 171); padding: 5px; background-color: rgb(249, 249, 249);"><pre style="margin: 0px; padding: 1em; font-size: 88%;"><code>$sudo cp /etc/X11/xorg.conf /etc/X11/xorg.conf_backup</code></pre></div><br />Now, open up <span style="font-weight: bold;">'xorg.conf'</span> in any text editor you have, I'll use gedit for this example.<br /><br /><div style="border: 1px dashed rgb(47, 111, 171); padding: 5px; background-color: rgb(249, 249, 249);"><pre style="margin: 0px; padding: 1em; font-size: 88%;"><code>$sudo gedit /etc/X11/xorg.conf</code></pre></div><br />Here's an example <span style="font-weight: bold;">xorg.conf</span> file from my machine, only the section corresponding to the monitor is shown<br /><br /><div style="border: 1px dashed rgb(47, 111, 171); padding: 5px; background-color: rgb(249, 249, 249);"><pre style="margin: 0px; padding: 1em; font-size: 88%;"><code><br />Section "Monitor"<br />Identifier "0-CRT1"<br />Option "VendorName" "ATI Proprietary Driver"<br />Option "ModelName" "Generic Autodetecting Monitor"<br />Option "DPMS" "true"<br />Option "PreferredMode" "1280x1024"<br />Option "TargetRefresh" "60"<br />Option "Position" "0 0"<br />Option "Rotate" "normal"<br />Option "Disable" "false"<br />EndSection<br /></code></pre></div><br />Take care before you change any value, its very tempting to try a high resolution, but it might damage your monitor permanently, so always get the specs right from the manufacturers before you change any value.Colinhttp://www.blogger.com/profile/10076561696860953748noreply@blogger.com0tag:blogger.com,1999:blog-2194647237673593588.post-62560171397732786142009-11-10T16:54:00.003+05:302009-11-11T14:22:42.861+05:30FGLRX driver problem in UbuntuAfter successfully in getting my ATI/AMD FGLRX drivers on Ubuntu 9.10, I'm finally loving the visual effects.<br /><br />Earlier whenever I tried to install the drivers from, System>>Administration>>Hardware drivers; the installation of the driver would be successful, but my screen would keep flickering, as if it were some CRT screen being disturbed by radio frequencies.<br /><br />I decided to try and install the FGLRX drivers one last time, I encountered the usual flickering which, not surprising now, vanished when I changed the refresh rate, from the default 75Hz to 50Hz.<br /><br />So if any of you are facing flickering after you have installed your drivers and rebooted, try fiddlng with the refresh rate. <div><br /></div><div>Another workaround that has worked for a few Nvidia Cards is to disable Compiz, from System>>Prefrences>>Appearence and in the Visual Effects, select the 'None' option. A restart will resolve this problem.</div><div><br /></div><div>The last solution I have found to this after scourging the net for hours is to edit the '<b>xorg.conf'</b>in <i>'/etc/X11/xorg.conf'; </i>which I will be posting later.</div>Colinhttp://www.blogger.com/profile/10076561696860953748noreply@blogger.com2tag:blogger.com,1999:blog-2194647237673593588.post-23643540822007713142009-11-03T08:08:00.004+05:302010-10-27T10:22:52.350+05:30Microsoft Windows user authentication, is it a Joke ?A Microsoft Windows computer cannot be called 'secure' in the least bit, at least as far as the user authentication is concerned. I'll tell you how this is true.<br />
<br />
<ul><li>Boot your computer with any live CD / DVD that supports mounting a NTFS drive (preferably live CDs of any Linux) .</li>
<li>Proceed with mounting the Windows root drive from your live CD session and navigate to the "%WINDIR%\System32" folder.</li>
<li>Here, create a backup copy of 'utilman.exe' by renaming it as 'utilman.exe.bak' and rename 'cmd.exe' to 'Utilman.exe'.</li>
<li>Now restart the computer and boot the Windows OS, when you are at the login screen you have to invoke the Utility manager by pressing 'Ctrl+U'; but instead of the utility manager in this case you are presented with a 'no holds barred' command prompt, with SYSTEM privileges.</li>
</ul><br />
And that is how <span property="dcterms:abstract">your lil bro can pwn Windows</span>.<br />
Surely a brand of operating systems thats almost getting its seventh version out must do something about this scenario, considering that it is a major player in the business.<br />
<br />
<br />
EDIT: LOL ... even windows 7 is not secure against this; and this works even if 'cmd.exe' replaces other applications like the onscreen-keyboard(osk.exe), which are accessible from the login screen; you just have to follow the procedure to start whatever 'exe' you replaced with 'cmd.exe', to be able to access the prompt.<br />
<br />
I'm trying to come with a workaround to this problem, been tinkering with the registry. I'll post the solution as soon as possible.Colinhttp://www.blogger.com/profile/10076561696860953748noreply@blogger.com0tag:blogger.com,1999:blog-2194647237673593588.post-23372691572716689232009-10-18T06:52:00.003+05:302009-10-18T07:06:14.266+05:30VI Improved - TutorialHow many people using unix like system do you think, have atleast a basic knowledge of using one of the most powerful editors of the platform? There are many who don't like to use VIM, purely due to its 'UN-GUI'ishness; they tend to go in for other simple to use and comparatively less geeky alternatives like 'nano'. What will you do when you are faced with a scnerio where there are no options other than using it ?<br /><br />This tutorial aims to let you understand the extremely basic stuff you should know about VIM; bewarned that this is not even worthy of being mentioned as the 'Tip of the Iceberg'. VIM is an extensive tool which might take months to master.<br /><br />To start VIM & open a file, say '<span style="font-style:italic;">new.txt</span>'; we type the following at the terminal,<br /><br />'vim new.txt'<br /><br />now you will see the contents of the file <span style="font-style:italic;">new.txt</span> on your screen, at the last line will be written, "new.txt" 9L, 45C; this means that the filename is "new.txt" having 9 lines of data & size 45bytes (1 char {C}= 1 byte). This mode is called normal mode or command mode.<br /><br />Now you want to edit the file, go to the character from where you would like to 'insert' text and press either '<span style="font-weight:bold;">a</span>' or '<span style="font-weight:bold;">i</span>'. If you press '<span style="font-weight:bold;">a</span>' the cursor will advance 1 character forward and start inserting and if you type '<span style="font-weight:bold;">i</span>' the cursor will start inserting at the current position. This mode when you insert data or text is called as '<span style="font-weight:bold;">insert</span>' mode, to come out of the insert mode to the command mode, press '<span style="font-weight:bold;">Esc</span>' key.<br /><br />If you wish to delete some text then follow the same steps for editing to enter the '<span style="font-weight:bold;">insert</span>' mode and use '<span style="font-weight:bold;">Backspace</span>' key to delete charecters, again using '<span style="font-weight:bold;">Esc</span>' key to exit the '<span style="font-weight:bold;">insert</span>' mode and enter the '<span style="font-weight:bold;">command</span>' mode.<br /><br />Now that you have edited the file, you have to options; either save the changes done to the file or discard the changes and quit VIM.<br /><br />To save a file type '<span style="font-weight:bold;">:wq</span>' in the '<span style="font-weight:bold;">command mode</span>', (Note: - ':wq' will not work in the insert mode), if you want to save the file with another name use '<span style="font-weight:bold;">:W FILENAME</span>' in the '<span style="font-weight:bold;">command</span>' mode, but in this option VIM will save the file with the name you specified and continue to edit the old file, and another command is '<span style="font-weight:bold;">:saveas FILENAME</span>' which is the same as '<span style="font-weight:bold;">:w FILENAME</span>' but it will now edit the new file after saving.<br /><br />To quit the VIM editor use the command '<span style="font-weight:bold;">:q</span>', which is only allowed if the file has not been modified. If you wish to discard the changes and quit type '<span style="font-weight:bold;">:q!</span>'.<br /><br />These are just '<span style="font-weight:bold;">dirt basic</span>' that you need to know if you are going to use a Unix machine, VIM is too extensive to be covered in a few blog posts. Hope it helps even if its a bit. If you have any queries, feel free to post them as comments and I will surely try to clarify them.Colinhttp://www.blogger.com/profile/10076561696860953748noreply@blogger.com0tag:blogger.com,1999:blog-2194647237673593588.post-31871988622554252302009-10-17T12:30:00.002+05:302009-10-18T07:09:06.100+05:30pppoe configuration in Ubuntu LinuxYesterday after getting irritated with the <b>'$ sudo pon dsl-provider'</b> command for my pppoe connection, I decided to shorten the length or atleast make it simpler, something like <b>'</b>$<b> sudo pon bsnl'</b> or simply <b>'</b>$<b> sudo pon'</b>.<br /><br />According to the MAN pages on pon it requires a parameter to specify the provider which has to be dialed, on absence of provider it executes the file '<i>/etc/ppp/pppoe_on_boot'</i>, if it is existing and executable.<br /><br />Again on lack of arguments to the <b>'</b>$<b> sudo pon'</b> and absense of the <i>'/etc/ppp/pppoe_on_boot'</i> file (which is created when you specify that the connection be automatically dialed up at startup), in such a case the <i>'/etc/ppp/peers/provider'</i> file is executed' which is often the cause of error to most people.<br /><br />If you have a look at the file <i>'/etc/ppp/peers/dsl-provider'</i> you'll realise that copying the contents to a new file will enable you to use a command such as <b>'</b>$<b> sudo pon isp'</b><br /><br />Steps for <b>'</b>$<b> sudo pon isp'</b> - Run the following commands in a terminal:<br /><ul><li> $ <b>sudo cp</b> <i>/etc/ppp/peers/dsl-provider</i> <i>/etc/ppp/peers/dsl-provider.bak (</i>optional<i>)<br /></i></li><li> $ <b>sudo cp</b> <i>/etc/ppp/peers/dsl-provider</i> <i>/etc/ppp/peers/isp</i></li></ul>Now a command like <b>'$ sudo pon isp'</b> will dial your pppoe connection.<br /><br />Steps for <b>'$ sudo pon'</b> - Run the following commands in a terminal:<br /><ul><li>$<b> sudo cp</b> <i>/etc/ppp/ppp_on_boot</i> <i>/etc/ppp/ppp_on_boot.bak</i></li><li>$<b> sudo cp</b> <i>/etc/ppp/peers/dsl-provider</i> <i>/etc/ppp/ppp_on_boot</i></li></ul>Now a command like <b>'$ sudo pon'</b> is sufficient for conecting to the internet.Colinhttp://www.blogger.com/profile/10076561696860953748noreply@blogger.com3tag:blogger.com,1999:blog-2194647237673593588.post-46731369813778223542009-09-03T10:19:00.002+05:302009-11-03T08:26:28.486+05:30Protection against packet sniffers<span xmlns=''><p>Some while back when I was using a SIFY Broadband connection, there was this particular period when all transfers on LAN as well as net speeds dropped drastically. I felt very weird about the fact that this happened almost every day at around 6pm. There was only one cause I knew of (mentioned in the previous post), which could have such an effect; someone is doing a MITM or Man in the Middle attack. <br /></p><p><br /> </p><h4>So how do we detect these guys?<br /></h4><p>Firstly I have only tried this trick in my network, I'm not sure it will work with you; but you can still give it a try.<br /></p><ul><li>Start a sniffer like Wireshark, sniff for some time when you think the attack is being carried out. Now from the captured packets, separate out the DNS request packets and search for reverse DNS lookups. If at all there's an attacker who is sniffing or doing a MITM, there are bound to be reverse DNS lookups, either by the application or manually.<br /></li><li>If any system on a network responds to a ARP request that is sent to a non-broadcast address, that means that the system is clearly in promiscuous mode.<br /></li><li>Later on I found this handy tool XArp <a href='http://www.chrismc.de/developing/xarp/'>http://www.chrismc.de/developing/xarp/</a>.<br /></li><li>Also on a windows machine command prompt the "arp –a" command will show you your ARP entries, and "arp –d *" command will delete all entries in your ARP table.</li></ul></span>Colinhttp://www.blogger.com/profile/10076561696860953748noreply@blogger.com0tag:blogger.com,1999:blog-2194647237673593588.post-78432191072230989772009-09-01T21:10:00.004+05:302009-11-03T08:26:28.486+05:30Cain and Abel – Hacking Local Area Networks<span xmlns=""><p>This is another tool that is favored in extracting or recovering passwords. Note very carefully, Cain and Abel is a "PASSWORD RECOVERY" tool, use it carefully.<br /></p><p>(THIS POST IS FOR EDUCATIONAL USE ONLY)<br /></p><p>Before I start, there are a few requirements.<br /></p><ul><li>Download Cain and Abel from <a href="http://www.oxid.it/">www.oxid.it</a><br /> </li><li>Should have a switched LAN. (Most ISPs other than BSNL provide broadband via LAN, e.g. SIFY, HATHWAY, local Cable internet connections)<br /></li><li>Any Microsoft Windows Operating System.<br /></li></ul><p>If you are not sure about being on a switched network, continue the steps, until you find out.<br /></p><ol><li>Download and install Cain and Able from the link given above.<br /></li><li>Start Cain and Abel (requires admin privileges in Vista), go to the sniffer tab, click on the configure menu, select your NIC, check 'start sniffer on startup', press 'OK'.<br /></li><li>Click on the 'Start / Stop Sniffer' (the 2<sup>nd</sup>) button on the toolbar. Now click the blue '+' (plus) sign (this is the 7<sup>th</sup> button on the toolbar). Check 'All Tests' and click 'OK'.<br /></li><li>After the scan is complete, if you are on a switched network then, you must be able to see many IP and MAC addresses in this pane. If you don't see any IP other than your own, probably you are not on a switched network.<br /></li><li>Notice the tabs on the bottom, HOSTS, APR, Routing, Passwords, and VoIP. You are currently on the HOSTS tab, select the APR tab click on the 'top pane' and click the 'blue +' (7<sup>th</sup> on toolbar).<br /></li><br /><br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEign_1pKv8cKCGs-BGnRjUq61mpjs_7lxdBfA-XjN9rHw51nkxFiv_ZjihEKRJbIqU1Xs0jfk0UiTek20RuCX0PjQEAZv9YuFJ-gMNYaUN-Pjalwmz_zRZ8fmLigbCHEp111CpQRF7ifG0/s1600-h/CAIN.png"><img src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEign_1pKv8cKCGs-BGnRjUq61mpjs_7lxdBfA-XjN9rHw51nkxFiv_ZjihEKRJbIqU1Xs0jfk0UiTek20RuCX0PjQEAZv9YuFJ-gMNYaUN-Pjalwmz_zRZ8fmLigbCHEp111CpQRF7ifG0/s400/CAIN.png" style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 400px; height: 249px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEign_1pKv8cKCGs-BGnRjUq61mpjs_7lxdBfA-XjN9rHw51nkxFiv_ZjihEKRJbIqU1Xs0jfk0UiTek20RuCX0PjQEAZv9YuFJ-gMNYaUN-Pjalwmz_zRZ8fmLigbCHEp111CpQRF7ifG0/s400/CAIN.png" alt="" id="BLOGGER_PHOTO_ID_5376881762215560114" border="0" /></a><br /><br /><br /><li>Now you will again see the IP & MAC address (in the left pane) you saw in Step 5. From this list, select your 'Gateway IP', (this will mostly be something like 192.xxx.xxx.1 or 10.xxx.xxx.1 etc; check your network properties for more info on gateway.) after selecting your 'Gateway IP Address' (now some IP will appear on the right); drag and select all the entries in the right pane, and click 'OK'.<br /></li><li>Now click on the 'Start/Stop APR' (the 3<sup>rd</sup>) button on the toolbar. You will see 'HALF ROUTING' and 'FULL ROUTING' entries in the lower pane.<br /></li><li>Now go to the Passwords tab on the bottom. Slowly you will see passwords appearing in this section; most will be under HTTP.<br /></li></ol><p><br /></p><p>The password section gives you full details on the capture, including Username, password, URL, etc. Any person who was online during the time you completed Steps 3 – 5, will be affected, and you will have access to their passwords.<br /></p><p><br /></p><p><strong>Beware: </strong>What this program does is send all the traffic through your computer, so the LAN speeds slow down drastically. On my home network, LAN transfer speeds reduced from 10MB/s to 100Kb/s in 10 minutes.<br /></p><p><br /></p><p>Also according to me, any network can be efficiently analyzed with a combination of 'Cain and Abel' (<a href="http://www.oxid.it/cain.html">http://www.oxid.it/cain</a>) and 'Wireshark' (<a href="http://www.wireshark.org/">http://www.wireshark.org/</a>).</p></span>Colinhttp://www.blogger.com/profile/10076561696860953748noreply@blogger.com2tag:blogger.com,1999:blog-2194647237673593588.post-27737625685057986692009-08-29T17:59:00.004+05:302009-11-03T08:26:28.487+05:30Qumana – Blog Editor<span xmlns=''><p>I haven't used any blog editor other than the default editor in blogger and MS Word. I had done a search for a blog editor a while ago, but never came across Qumana, until yesterday. Qumana needs Java Runtime Environment installed before you consider installing Qumana. I wanted a editor which would help me post the blog-post without having to sign up at blogger using a browser and editing it over there, (this happens to me at month ends when I desperately try to save some bandwidth), I also wanted a spell checker for proof reading my post. Qumana satisfies all requirements and as an added benefit, it can even integrate AdGenta adverts into your blog-post.<br /></p><h4>Features:<br /></h4><ul><li>Supports a lot of blog providers including Blogger, Wordpress, TypePad, DairyLand, SquareSpace, Drupal, MSN Space, LiveJournal, etc.<br /></li><li>Qumana supports AdGenta adverts, which can be inserted by you into your post while editing the post itself.<br /></li><li>Can manage multiple blogs from the same provider or by multiple providers.<br /></li><li>Allows editing in multiple modes, i.e. the WYSIWYG mode or the HTML mode.<br /></li><li>Inserting images and videos is made very simple.<br /></li><li>Can insert tags and track backs, allow or disallow trackbacks or comments.<br /></li><li>Has a spell check utility, so that you can correct your mistakes before publishing.<br /></li><li>One click publish.<br /></li><li>It can also set the time of posting.<br /></li></ul><h4>Bummer:<br /></h4><p>I agree this is a pretty good blog-editor but I loved a feature in MS Word where simple mistakes like capitalization gets corrected automatically, Qumana with its 'spell check as you type' feature comes very close.<br /></p><p><br /> </p><p>Get Qumana at http://www.qumana.com/</p></span>Colinhttp://www.blogger.com/profile/10076561696860953748noreply@blogger.com0tag:blogger.com,1999:blog-2194647237673593588.post-57999616169902855722009-08-27T07:35:00.004+05:302009-10-18T07:06:14.267+05:30AutoIt Scripting<span xmlns=''><p>A freeware scripting language for the Microsoft Windows platform, which uses keystrokes, mouse movements, window manipulation among others to automate tasks in the windows. This little handy tool does not require any runtimes and will run on most machines without much hardware requirements.<br /></p><p>Some of the notable features of AutoIt are:<br /></p><ul><li>Very easy to learn and understand syntax.<br /></li><li>Scripts can be compiled into standalone executables.<br /></li><li>Creation of GUI is very easy.<br /></li><li>Direct call to DLL functions and windows API.<br /></li><li>Supports Windows 95, 98, ME, NT4, 2000, XP, VISTA.<br /></li><li>Detailed help file with examples of code.<br /></li></ul><p>If you can't find a use for AutoIt scripts, then I'd like to tell you to go and get a brain.</p></span>Colinhttp://www.blogger.com/profile/10076561696860953748noreply@blogger.com0tag:blogger.com,1999:blog-2194647237673593588.post-3371784059940031482009-08-26T10:45:00.004+05:302009-10-18T07:14:14.250+05:30Nmap-online.com – Nmap on the internet<span xmlns=''><p>I had installed Nmap yesterday to scan a particular target of interest to me, but unfortunately I was getting certain errors about Nmap being unable to find the network adaptor, and I couldn't find a way to make it work. A quick Google search revealed this wonderful online Nmap port scanner, <a href='http://www.nmap-online.com'>www.nmap-online.com</a><br /> </p><p>The interface is intuitive, the default option when the website loads is to quick scan your own computer, full Nmap scans of your own system and custom scans, which allow you to scan custom targets with your own parameters are also included, it keeps your scan requests on queue and lets you know the number of requests before it on queue. When I used it last night, there weren't any other requests so I got my results pretty fast and even if there are many requests it has the option of e-mailing the results of the scan to your own e-mail id. </p><p>Whats more is, this service may keep your scan anonymous from the target, if he has surveillance installed.</p></span>Colinhttp://www.blogger.com/profile/10076561696860953748noreply@blogger.com0tag:blogger.com,1999:blog-2194647237673593588.post-55691677933143559312009-08-25T07:46:00.003+05:302009-10-18T07:09:06.101+05:30Google Analytics – A Web Masters’ Swiss Army Knife<span xmlns=''><p>Why I have called Google Analytics as a Swiss army knife, is the amount of information it gives you about your website or blog, which helps you understand your visitors needs and trends. Frankly speaking, I myself haven't tried any other web statistics service; because after I saw one report of Analytics, I was pretty sure I won't need anything else.<br /></p><p>It's not possible for me to go into every aspect of Analytics in just one post, so here is the overview.<br /></p><p><br /> </p><h4>The Dashboard View:<br /></h4><p>This is a basic description of most data compressed for a 'one look' understanding of stats like site usage (which consists of visits, page views, pages / visit, bounce rate, avg. time on site, % of new visits), visitor overview, map overlay, traffic sources, content overview. You can chose to view data specific to any of the stats specified from the sidebar on the left, some of them are specified below.<br /></p><p><br /> </p><h4>Visitor overview:<br /></h4><p>Displays a graph showing the visitors to your domain, with technical information like the browser used by the visitors and their connection speeds, which web-masters find very useful when writing scripts or html code for specific browsers as different browsers have some difference in the way they render a particular code.<br /></p><h4>Traffic sources overview:<br /></h4><p>Displays a graph showing visits to your domain, along with information of the top traffic sources, top referring sites and top keywords which connect to your site.<br /></p><h4>Map overlay:<br /></h4><p>Shows a world map with indications which allow you to find the country and region in the country in which your visitors live. It also has a table with columns like country, visits, pages/visit, average time on site, % new visits, bounce rate; and also the site average for all these stats.<br /></p><h4>Content overview:<br /></h4><p>Content overview, shows you the top contents in your site, tell you how many times a particular content has been viewed, tell you the top landing and leaving pages for your domain.<br /></p><p><br /> </p><p>There is just too much for me to try and explain in a post, and you will understand that when you sign up for Google Analytics. As is with all of Google Products, it's perfectly free.<br /></p><p><br /> </p><h4>Bummer:<br /></h4><p>There's only one feature that I wished were present here; real-time statistics. I guess all the other features do more than covering up for this.</p></span>Colinhttp://www.blogger.com/profile/10076561696860953748noreply@blogger.com0tag:blogger.com,1999:blog-2194647237673593588.post-34758728377443898132009-08-24T21:24:00.004+05:302009-11-03T08:26:28.487+05:30Greedy Torrent<span xmlns=''><p>This tool considered by many as the savior of leechers on the bit-torrent protocol, helps them from getting banned on trackers which demand a 1:1 transfer ratio. The communication between your bit-torrent client and the tracker is modified, by telling the tracker that you upload is actually high; even if you aren't uploading.<br /></p><p><img alt='' src='http://www.greedytorrent.com/screens/7.jpg' height="570" width="750" /><br /> </p><p><h4>Features:</h4><br /></p><p>Greedy torrent only needs to be configured once during install and never again. The configuration also can be done by a newbie, the upload can be set up to 5 times your download, best factor is that you don't need to change your favorite bit-torrent client.</p></span>Colinhttp://www.blogger.com/profile/10076561696860953748noreply@blogger.com0tag:blogger.com,1999:blog-2194647237673593588.post-41135116482002153992009-08-24T14:37:00.007+05:302009-11-13T21:53:23.124+05:30Fav Icon & the Blogger Nav bar<span xmlns=""><p>You might want to bookmark this page if you plan to start a blog or a website, or this might be already be useful if you are having one.<br /></p><p><br /> </p><p><h4>1] Favorite Icon:</h4><br /></p><p>Check out the tiny image of my Unicorn logo, on the left corner of the tab and also on the left part of the address bar. By default when you create a blog or a website, the favorite icon or fav-icon is mostly the logo of the hosting company, for blogger accounts it's the blogger logo which is the default fav-icon.<br /></p><p><br /> </p><p>So, how is this changed ?<br /></p><p>Finally it's a pretty simple one line code<br /></p><p><br /> <em><link href='url of your image in png or gif format' rel='shortcut icon' type='image/png'/><br /></em></p><p>[paste the above line immediately after the <head> tag] [if using .GIF instead of .PNG image, replace png with gif in type='image/gif']<br /></p><p>Note: Any image should not be used for the fav-icon. Take care of two basic rules.<br /></p><ul><li>Keep the format as .PNG or .GIF, these formats keep the image size small.<br /></li><li>A image of resolution 16x16 or 32x32 is preferred.<br /></li></ul><p>If you are creative enough, you could even create an animated GIF to be used as a fav-icon, but the only problem in this approach is that the animation is visible only in Firefox browsers. In most other browsers only the first image in the animated GIF is shown.<br /></p><p><br /> </p><p><h4>2] The Blogger Navigation Bar (nav-bar)</h4><br /></p><p>So you have made a blog with blogger.com, you made your first post. Everything is working fine, but you don't like the navigation bar that blogger.com has provided, you feel no need for it.<br /></p><p>There is a simple CSS for achieving that.<br /></p><p><em> <style type='text/css'>#navbar-iframe { display:block }</style><br /></em></p><p><em> <style id='page-skin-1' type='text/css'><br /></em></p><p><em> #navbar-iframe {<br /></em></p><p><em> height:0px;<br /></em></p><p><em> visibility:hidden;<br /></em></p><p><em> display:none;<br /></em></p><p><em> }<br /></em></p><p><em> </style></em></p><p>[place the above code in the <head> section of you blogger layout-html]<br /></p><p>I am not sure whether removing the Navigation bar is against blogger rules, be sure to read them before you do anything, don't do anything stupid if the rules do say that the navigation bar may not be removed.</p></span>Colinhttp://www.blogger.com/profile/10076561696860953748noreply@blogger.com0tag:blogger.com,1999:blog-2194647237673593588.post-62054878997032688552009-08-24T10:45:00.006+05:302009-10-18T07:09:06.103+05:30Anatomy of a simple IP logger in php<p><span style=";font-family:Courier New;font-size:10pt;" ><?php<br /><br />// IP logger, place file at yourdomain.com/log.php<br /><br />//This picture variable defines which image to show<br />$picture = "http://img.infotropic.com/w/w060529_2.jpg";<br /><br />//Visitor's IP address is stored in the variable '$ip'<br />$ip = $_SERVER['REMOTE_ADDR'];<br /><br />//this line tells the logger the name you want to use for the log file.<br />// if log.txt doesn't already exist, it will be created automatically<br />$logs = "log.txt";<br /><br />//here, we open the log.txt for writing to. The 'a' means append to the EOF<br />$fh = fopen($logs, 'a') or die(" ");<br /><br />//here we put the ip address into a variable called 'string data'<br />// the backslash-n starts a new line in the text file, to make it easier to read<br />$stringData = "$ip \n";<br /><br />//here we write to the text file what is in the stringdata variable<br />fwrite($fh, $stringData);<br /><br />//now we close the file<br />fclose($fh);<br /><br /><br />//and finally we echo some html back to the user's browser so they see an image<br />echo "<img src='$picture'>";<br /><br />?><br /><br /></span></p><p><br /></p><h5><span style="font-family:Courier New;">Note:<br /></span></h5><p><span style=";font-family:Courier New;font-size:10pt;" >If you want to learn web technologies, <a href="http://www.w3schools.com/">www.w3schools.com</a> is a pretty good website.<br /></span></p>Colinhttp://www.blogger.com/profile/10076561696860953748noreply@blogger.com0tag:blogger.com,1999:blog-2194647237673593588.post-44543559943419769902009-08-23T10:55:00.002+05:302009-11-03T08:26:28.487+05:30Windows Explorer Shell Replacements<p class="MsoNormal">Have you ever tried using any shells other than the native Explorer? There are a lot of options that are available to you, with some of them free while others cost a bit. Here are some of the most popular ones.</p> <h4>Talisman Desktop by Lighttek Software</h4> <p class="MsoNormal">Talisman Desktop is a desktop alternative and shell-replacement for Windows 9x/ME and NT/2000/XP/2003/Vista, capable of transforming your desktop into an interface organized as you like. The program's basic purpose: Launch other applications in a new interface, instead of the standard Windows desktop but the opportunities presented by Talisman are much broader.</p> <h5>Special Features</h5> <p class="MsoNormal">Talisman Desktop has the ability to switch the default shell from Explorer to Talisman, or it can be run as a native program inside Explorer.</p> <h5>Bummer</h5> <p class="MsoNormal">This is not free software; also the configurations for some themes are confusing.</p> <h5>Home Page</h5><div><p class="MsoNormal"><a href="http://www.lighttek.com/">http://www.lighttek.com/</a></p><p class="MsoNormal"><br /></p><p class="MsoNormal"></p><h4>SharpE<b style="mso-bidi-font-weight:normal"> </b>by<b style="mso-bidi-font-weight: normal"> </b>Low<b style="mso-bidi-font-weight:normal"> </b>Dimension<b style="mso-bidi-font-weight:normal"> </b>International</h4> <p class="MsoNormal">Sometimes shortened as #E, is an open source shell replacement for Microsoft Windows 2000 and XP, released under the GNU General Public License (GPL). SharpE is near the end of a major rewrite, which greatly simplifies and cleans up both the source code and the end user experience. The end result is a much better, but somewhat experimental shell. </p> <h5>Special Features</h5> <p class="MsoNormal">As part of this rewrite, all configuration is now stored for each user in editable XML files as opposed to the registry or "resource files".</p> <h5>Bummer</h5> <p class="MsoNormal">Not much of an eye-candy.</p> <h5>Home Page</h5> <p class="MsoNormal"><a href="http://www.sharpe-shell.org/">http://www.sharpe-shell.org/</a></p><p class="MsoNormal"><br /></p><p class="MsoNormal"></p><h4>GeoShell</h4> <p class="MsoNormal"><span class="gscontent">GeoShell is a replacement shell for Windows™ to replace the standard desktop interface. In other words, you trade your start menu, taskbar, system tray and desktop in, and you get our versions, featuring slick, skinnable geoBars which can be placed anywhere and alpha blended into your background.<o:p></o:p></span></p> <h5><span class="gscontent">Special Features<o:p></o:p></span></h5> <p class="MsoNormal"><span class="gscontent">GeoShell has plugins that add additional functionality like RSS readers, weather forecasts, mail checkers, web search bars, virtual desktops and more. In its default installation geoShell also uses fewer resources than Windows Explorer, and is particularly effective when combined with third-party web browsers and file managers to completely upgrade your basic Windows interface.<o:p></o:p></span></p> <h5><span class="gscontent">Bummer<o:p></o:p></span></h5> <p class="MsoNormal">There seems to be limited development going on over this one.</p> <h5>Home Page</h5> <p class="MsoNormal"><a href="http://www.geoshell.org/">http://www.geoshell.org/</a></p><p class="MsoNormal"><br /></p><p class="MsoNormal"></p><h4>Aston Shell</h4> <p class="MsoNormal"><span style="mso-fareast-font-family:"Times New Roman"; mso-bidi-font-weight:bold">Aston shell</span><span style="mso-fareast-font-family: "Times New Roman""> is an original replacement for the Windows user environment, allowing users to modify and redesign their entire desktop environment, from the start menu and taskbar to new elements for the desktop, toolbars, etc. </span><span style="font-size:12.0pt;font-family:"Times New Roman","serif"; mso-fareast-font-family:"Times New Roman"">The desktop and taskbar environment allows control of appearance of the PC by utilizing the variety of existing themes and skins.<o:p></o:p></span></p> <h5><span style="mso-fareast-font-family:"Times New Roman"">Special Features<o:p></o:p></span></h5> <p class="MsoNormal"><span style="font-size:12.0pt;font-family:"Times New Roman","serif"; mso-fareast-font-family:"Times New Roman"">Aston may be run on older hardware configurations without any performance penalty, and for more modern hardware setup (but not for 64-bit systems). Customizing Aston interface is somewhat easier than most other shell replacements, as it uses a paged configuration dialog rather than forcing the user to edit hidden scripts. Basic functions can be enhanced by using various plugins which are freely available on official site.<o:p></o:p></span></p> <h5><span style="mso-fareast-font-family:"Times New Roman"">Bummer<o:p></o:p></span></h5> <p class="MsoNormal">This is not free software.</p> <h5>Home Page</h5> <p class="MsoNormal"><a href="http://www.astonshell.com/">http://www.astonshell.com</a></p><p></p><p></p><p></p></div>Colinhttp://www.blogger.com/profile/10076561696860953748noreply@blogger.com0tag:blogger.com,1999:blog-2194647237673593588.post-32247517053906580202009-08-22T11:47:00.000+05:302009-08-22T07:56:56.108+05:30Email spoofing<div xmlns='http://www.w3.org/1999/xhtml'><span xmlns=''><p>Email spoofing is a term used for an activity when you send a email, which has certain information which has been modified. It certainly will be a good prank to send spoofed mails to your friends from people they admire, (like celebs) or may be something like a mail from <a href='mailto:god@heaven.com'>god@heaven.com</a> telling them that their behavior has not been up to mark recently.<br/></p><h4>How is email spoofing done?<br/></h4><p>Spoofing an email is pretty simple; all you need to have is a mail server and a mail client which will let you edit the headers of the mail. The mail client can be skipped if you know how to connect and interact with a mail server through a terminal.<br/></p><p>I'd suggest MiniRelay from <a href='http://netvicious.com/'>Netvicious</a> you can download it from <a href='http://www.pendriveapps.com/portable-smtp-server-mini-relay/'>here</a>; or Free SMTP server by <a href='http://softstack.com/freesmtp.html'>Softstack</a> from <a href='http://www.pendriveapps.com/free-smtp-server-portable-smtp-server/'>here</a>.<br/></p><p>You could use Quick Mailer as you email client, download quick mailer from <a href='http://davidp.ordinarylight.com/qm/'>here.</a><br/> </p><p>Now start Minirelay, minimize it to the taskbar, start Quick Mailer and configure it from the preferences menu under File, to use 'localhost' as outgoing server port number '25' and no authentication. Now type in the required fields, i.e. the 'to' field (compulsory), the 'from' field (compulsory), the 'subject' field (optional), and attach any files (optional), and now send this mail.<br/></p><p>To the receiver the senders email will look just as you typed, regardless of the ownership of the email address.<br/></p><h4>Bummer<br/></h4><p>Sometimes the recipients email provider refuses to accept emails originating from dynamic IP addresses, if this is the case you can try to use free proxies found on the net, but make sure that they support SMTP proxy and not just HTTP proxy. Or you could try by using <a href='http://prixti.blogspot.com/2009/08/proxy-helpers.html'>Proxy Helpers</a><br/></p></span><br/><br/><div class='zemanta-pixie'><img src='http://img.zemanta.com/pixy.gif?x-id=f8d4beca-ad65-8245-8999-b630c89da895' alt='' class='zemanta-pixie-img'/></div></div>Colinhttp://www.blogger.com/profile/10076561696860953748noreply@blogger.com0tag:blogger.com,1999:blog-2194647237673593588.post-23887532625567889872009-08-21T15:27:00.001+05:302009-10-18T07:10:18.689+05:30Wikipedia hits 3 Million<span xmlns=''><p>Wikipedia, the successor of Nupedia, a free online English language encyclopedia project, has finally hit 3 million articles (in the English language section). It has taken more than 8 years from its launch in January 15, 2001.<br /></p><p>The growth on the English Wikipedia has been steady after the 3 years since its inception when it exploded with articles. It has not been devoid of controversy, when it was found that corporate houses modified content to please certain operatives, amid claims by the science journal Nature that it was about as accurate as Encyclopedia Britannica. </p></span>Colinhttp://www.blogger.com/profile/10076561696860953748noreply@blogger.com0tag:blogger.com,1999:blog-2194647237673593588.post-3198333803950854802009-08-21T07:51:00.006+05:302009-08-21T11:50:24.538+05:30Proxy Helpers<span xmlns=""><p>Sometimes we come across applications or games which have no native support for proxy settings in it, which many of us find annoying. Sometimes we desperately need that proxy support, may be to run a game which doesn't have one.<br /></p><h4>Is there a solution?<br /></h4><p>Of course, Proxy Helpers or 'socksifier' will allow any application which doesn't have proxy support to run via the Your Freedom proxy network instead of connecting directly. Proxy Helpers have cross platform support. Currently there are versions available for Windows 2000 and above, MAC OS X, and a java application which can be used in Linux. Even multiple executable applications can be 'socksified' with Proxy Helpers. You can download the application from <a href="http://www.your-freedom.net/index.php?id=3">your-freedom.net</a><br /> </p><p>Installation and usage details can be found on the <a href="http://www.your-freedom.net/index.php?id=144">Docs page</a>.<br /></p><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiCbJXkKdPnJ1md494lMftKjqO7BoCJR7VvwqJgdOl2prrRir4jNYK9fHjj3tP2k8KIPby06aLP6w487ljSh8N96fDrYjQ9f3ZWwhLcisibdlEWpx1pbVJcby-1j1bDteqoWiQBQTh9rZk/s1600-h/proxyhelpers.PNG"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 166px; height: 180px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiCbJXkKdPnJ1md494lMftKjqO7BoCJR7VvwqJgdOl2prrRir4jNYK9fHjj3tP2k8KIPby06aLP6w487ljSh8N96fDrYjQ9f3ZWwhLcisibdlEWpx1pbVJcby-1j1bDteqoWiQBQTh9rZk/s400/proxyhelpers.PNG" border="0" alt=""id="BLOGGER_PHOTO_ID_5372238061758365618" /></a><br /><br /><h4>Bummer:<br /></h4><p>This service requires that you register at your-freedom.net, though they do have a free service that lets you use it with a 64kbps speed cap, for 1 hour continuously, up to 6 hours in any 24 hour interval, up to 18 hours in any week interval.</p></span>Colinhttp://www.blogger.com/profile/10076561696860953748noreply@blogger.com0tag:blogger.com,1999:blog-2194647237673593588.post-32598832907452370612009-08-19T22:46:00.009+05:302009-11-03T08:26:28.488+05:30Software review - Digeus Registry Cleaner<div xmlns="http://www.w3.org/1999/xhtml">Over a period of time after installing Windows on our computers, we find that the loading time of windows has increased, copying a movie takes more time than drinking tea, most of these problems have their origins in the registry.<br /><br />We install a lot of softwares after formatting and uninstall them when we don't need it, this process makes the registry filled with junk or invalid values which were not removed during the uninstall. These affect the performance of your computer, often drastically. All you need to boost your computers performance is a utility to remove these errors.<br /><br /><br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhYasqLsFPwwQtG4Upf77fIEWCOZiYArSZAYpXklzPczhdon8GVHzWFZKGP04PhFpsjJ5vERxu-7ldiIPF9Dim4wshe95cYqjkOssStWKmBfCVofjux7Zj2JdS-VXLCx_WmF4Pk7Y_bBwM/s1600-h/rc_box.png"><img src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhYasqLsFPwwQtG4Upf77fIEWCOZiYArSZAYpXklzPczhdon8GVHzWFZKGP04PhFpsjJ5vERxu-7ldiIPF9Dim4wshe95cYqjkOssStWKmBfCVofjux7Zj2JdS-VXLCx_WmF4Pk7Y_bBwM/s400/rc_box.png" style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 286px; height: 377px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhYasqLsFPwwQtG4Upf77fIEWCOZiYArSZAYpXklzPczhdon8GVHzWFZKGP04PhFpsjJ5vERxu-7ldiIPF9Dim4wshe95cYqjkOssStWKmBfCVofjux7Zj2JdS-VXLCx_WmF4Pk7Y_bBwM/s400/rc_box.png" alt="" id="BLOGGER_PHOTO_ID_5371727007368284834" border="0" /></a><br /><br />Digeus boasts of some features that are not available with most other registry service tools.<br />Features of Digeus Registry Cleaner<br /><br /><ul><li>Slow Boot up</li><li>Longer Machine Response Time</li><li> Unexpected System Crashes</li><li> BSOD (Blue Screen of Death) - My personal favorite<br /></li><li> Unresponsive System</li><li> Slower Internet Browser Response</li><li> Slow Start Up of Your Favorite Software </li></ul><br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgANS0z-sMVJqH0P30yKcYOFIpTD3wKtWpAMBU4a118NkUyFPwigbtgQwmVSlliS5su3irUyd1uUuxDkUXnhUI4Br6gHoLxFmnVp1OFPjiWgk4ONM9bwwJIq00Iv_hTqpXverp93DwcgDA/s1600-h/Image(27).png"><img src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgANS0z-sMVJqH0P30yKcYOFIpTD3wKtWpAMBU4a118NkUyFPwigbtgQwmVSlliS5su3irUyd1uUuxDkUXnhUI4Br6gHoLxFmnVp1OFPjiWgk4ONM9bwwJIq00Iv_hTqpXverp93DwcgDA/s400/Image(27).png" style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 400px; height: 281px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgANS0z-sMVJqH0P30yKcYOFIpTD3wKtWpAMBU4a118NkUyFPwigbtgQwmVSlliS5su3irUyd1uUuxDkUXnhUI4Br6gHoLxFmnVp1OFPjiWgk4ONM9bwwJIq00Iv_hTqpXverp93DwcgDA/s400/Image(27).png" alt="" id="BLOGGER_PHOTO_ID_5371727720173414434" border="0" /></a><br />Digeus Registry Cleaner scans, locates, cleans and optimizes the following registry entries:<ul><li>Missing shared dlls, unused file extensions, files and folders that no longer point to the correct objects</li><li>Invalid application paths, start-up programs or missing shortcut references that take time when start-up or shutdown PC</li><li>Invalid ActiveX & COM that no longer point to the correct controls</li><li>Invalid installer references that are no longer used or have been moved.<br /></li></ul><br />It also has an option to backup registry before a scan, and restore it at some other time if need be. The user interface is simple and straight forward, there aren't any confusing options. One of the feature I loved in this tool was the ability to prevent BSOD.<br /><br />If you are someone who regularly downloads and installs softwares for checking them out, or for temporary use, or you are just a casual computer user, this product will be useful to you as long as you have a computer.<br /><br />Interested in Digeus Registry Cleaner ??<br /><br />Head over to the WebSite at http://www.digeus.com/<br /><br />or simply click <a href="http://www.digeus.com/products/regcleaner/registry_cleaner_5_3.html">here</a><br /><br /><div class="zemanta-pixie"><img src="http://img.zemanta.com/pixy.gif?x-id=c3e38b40-bad9-8e48-adde-2136c4287ddb" fix="tofix" src="http://img.zemanta.com/pixy.gif?x-id=c3e38b40-bad9-8e48-adde-2136c4287ddb" alt="" class="zemanta-pixie-img" /></div></div>Colinhttp://www.blogger.com/profile/10076561696860953748noreply@blogger.com0tag:blogger.com,1999:blog-2194647237673593588.post-11911753203478680792009-08-19T08:17:00.003+05:302009-11-03T08:26:28.488+05:30SysMetrixFor all of you looking for some more eye-candy for your Windows desktop, here another cool product SysMetrix. It is a rather skinnable clock that has much more features than you can think of, and these features or system statistics are displayed in pretty cool ways.<br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEigEbnm4qFQUEAiIi1clvHE4o_gFOnd4xo_fHqb0zA0mN-vuIHpfcvnzhkW-LL6t1C7Vm-Ju0sEXCCR3LXitbR0wBBCLrMA2ZkaRSf1b7FYHkQpmQM2ZBszPg2djN6qB5iDOn1NT2liDII/s1600-h/SysMetrix.PNG"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 322px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEigEbnm4qFQUEAiIi1clvHE4o_gFOnd4xo_fHqb0zA0mN-vuIHpfcvnzhkW-LL6t1C7Vm-Ju0sEXCCR3LXitbR0wBBCLrMA2ZkaRSf1b7FYHkQpmQM2ZBszPg2djN6qB5iDOn1NT2liDII/s400/SysMetrix.PNG" border="0" alt=""id="BLOGGER_PHOTO_ID_5371504507090298258" /></a><br /><br />Following are some of the statistics it can monitor<br /><br /><table style="width: 677px; height: 540px;" border="0" cellpadding="0" cellspacing="0"><tbody><tr><td align="left" valign="center" width="20%">Date </td> <td align="left" valign="center" width="20%">Time </td> <td align="left" valign="center" width="20%">CPU Usage </td> <td style="vertical-align: top;"><br /></td><td align="left" valign="center" width="20%">User Name </td> <td align="left" valign="center" width="20%">IP Address </td> </tr> <tr> <td align="left" valign="center" width="20%">Machine Name </td> <td align="left" valign="center" width="20%">Windows Uptime </td> <td align="left" valign="center" width="20%">Phys. Mem Total </td> <td style="vertical-align: top;"><br /></td><td align="left" valign="center" width="20%">Phys. Mem Used </td> <td align="left" valign="center" width="20%">Phys. Mem Free </td> </tr> <tr> <td align="left" valign="center" width="20%">Phys. Mem %Used </td> <td align="left" valign="center" width="20%">Phys. Mem %Free </td> <td align="left" valign="center" width="20%">Swap Mem Total </td> <td style="vertical-align: top;"><br /></td><td align="left" valign="center" width="20%">Swap Mem Used </td> <td align="left" valign="center" width="20%">Swap Mem Free </td> </tr> <tr> <td align="left" valign="center" width="20%">Swap Mem %Used </td> <td align="left" valign="center" width="20%">Swap Mem %Free </td> <td align="left" valign="center" width="20%">Virt. Mem Total </td> <td style="vertical-align: top;"><br /></td><td align="left" valign="center" width="20%">Virt. Mem Used </td> <td align="left" valign="center" width="20%">Virt. Mem Free </td> </tr> <tr> <td align="left" valign="center" width="20%">Virt. Mem %Used </td> <td align="left" valign="center" width="20%">Virt. Mem %Free </td> <td align="left" valign="center" width="20%">TCP Bytes In </td> <td style="vertical-align: top;"><br /></td><td align="left" valign="center" width="20%">TCP Bytes Out </td> <td align="left" valign="center" width="20%">Tot. TCP In </td> </tr> <tr> <td align="left" valign="center" width="20%">Tot. TCP Out </td> <td align="left" valign="center" width="20%">Ave. TCP In </td> <td align="left" valign="center" width="20%">Ave. TCP Out </td> <td style="vertical-align: top;"><br /></td><td align="left" valign="center" width="20%">TCP Bytes Out </td> <td align="left" valign="center" width="20%">Tot. Unread Email </td> </tr> <tr> <td align="left" valign="center" width="20%">Tot. Email Size </td> <td align="left" valign="center" width="20%">Rotating Email Stats </td> <td align="left" valign="center" width="20%">Recycle Bin Files </td> <td style="vertical-align: top;"><br /></td><td align="left" valign="center" width="20%">Recycle Bin Size </td> <td align="left" valign="center" width="20%">Drive Vol Label </td> </tr> <tr> <td align="left" valign="center" width="20%">Drive Total Space </td> <td align="left" valign="center" width="20%">Drive Free Space </td> <td align="left" valign="center" width="20%">Drive Used Space </td> <td style="vertical-align: top;"><br /></td><td align="left" valign="center" width="20%">Drive %Used </td> <td align="left" valign="center" width="20%">Drive %Free </td> </tr> <tr> <td align="left" valign="center" width="20%">Generic Text </td> <td align="left" valign="center" width="20%">Mouse position </td> <td align="left" valign="center" width="20%">Active Window </td> <td style="vertical-align: top;"><br /></td><td align="left" valign="center" width="20%">System Mute state </td> <td align="left" valign="center" width="20%">System Volume </td> </tr> <tr> <td align="left" valign="center" width="20%">Microphone Volume </td> <td align="left" valign="center" width="20%">Wave Volume </td> <td align="left" valign="center" width="20%">MIDI Volume </td> <td style="vertical-align: top;"><br /></td><td align="left" valign="center" width="20%">CD Volume </td> <td align="left" valign="center" width="20%">Line Volume </td> </tr> <tr> <td align="left" valign="center" width="20%">Pixel color </td> <td align="left" valign="center" width="20%">Media State </td> <td align="left" valign="center" width="20%">Media Artist </td> <td style="vertical-align: top;"><br /></td><td align="left" valign="center" width="20%">Media Track </td> <td align="left" valign="center" width="20%">Media Track # </td> </tr> <tr> <td align="left" valign="center" width="20%">Media Track len </td> <td align="left" valign="center" width="20%">Media Track pos </td> <td align="left" valign="center" width="20%">Media Track % </td> <td style="vertical-align: top;"><br /></td><td align="left" valign="center" width="20%">Media Track remain </td> <td align="left" valign="center" width="20%">Media Bitrate </td> </tr> <tr> <td align="left" valign="center" width="20%">Media Samplerate </td> <td align="left" valign="center" width="20%">Media Channels </td> <td align="left" valign="center" width="20%">OS Name </td> <td style="vertical-align: top;"><br /></td><td align="left" valign="center" width="20%">OS Build </td> <td align="left" valign="center" width="20%">OS Version Info </td> </tr> <tr> <td align="left" valign="center" width="20%">GMT-based Times </td> <td align="left" valign="center" width="20%">Timezone Desc. </td> <td align="left" valign="center" width="20%">CAPS Lock </td> <td style="vertical-align: top;"><br /></td><td align="left" valign="center" width="20%">Num Lock </td> <td align="left" valign="center" width="20%">Scroll Lock </td> </tr> <tr> <td align="left" valign="center" width="20%">Number of CPUs </td> <td align="left" valign="center" width="20%">Network Connected </td> <td align="left" valign="center" width="20%">Weather Description </td> <td style="vertical-align: top;"><br /></td><td align="left" valign="center" width="20%">Outside Temperature </td> <td align="left" valign="center" width="20%">Dew Point </td> </tr> <tr> <td align="left" valign="center" width="20%">Relative Humidity </td> <td align="left" valign="center" width="20%">Heat Index </td> <td align="left" valign="center" width="20%">Barometric Pressure </td> <td style="vertical-align: top;"><br /></td><td align="left" valign="center" width="20%">Pressure Trend </td> <td align="left" valign="center" width="20%">Wind Speed </td> </tr> <tr> <td align="left" valign="center" width="20%">Wind Direction </td> <td align="left" valign="center" width="20%">Wind Chill </td> <td align="left" valign="center" width="20%">Visibility </td> <td style="vertical-align: top;"><br /></td><td align="left" valign="center" width="20%">Registry Value </td> <td align="left" valign="center" width="20%">Power Source </td> </tr> <tr> <td align="left" valign="center" width="20%">Battery State </td> <td align="left" valign="center" width="20%">Battery %Used </td> <td align="left" valign="center" width="20%">Battery %Free </td> <td style="vertical-align: top;"><br /></td><td align="left" valign="center" width="20%">Battery Time Used </td> <td align="left" valign="center" width="20%">Battery Time Left </td> </tr> <tr> <td align="left" valign="center" width="20%">Battery Time Total </td> <td align="left" valign="center" width="20%">CPU #1 MHz </td> <td align="left" valign="center" width="20%">CPU Description </td> <td style="vertical-align: top;"><br /></td><td align="left" valign="center" width="20%">Wireless Strength </td> <td align="left" valign="center" width="20%">Wireless SSID </td></tr></tbody></table><br /><br />Further you can skin it as you like, with lots of skins available on the SysMetrix website and also some others available on third party sites.<br /><br />Where do I get this ?<br />SysMetrix can be downloaded form http://www.xymantix.com/sysmetrix/<br />SysMetrix skins can be downloaded from the Xymantics website<cite> or from http://www.skinbase.org/Skins/SysMetrix<br /><br /></cite><div class="zemanta-pixie"><img src="http://img.zemanta.com/pixy.gif?x-id=151b3ddd-15d6-83e4-a1d4-5584b0205023" src="http://img.zemanta.com/pixy.gif?x-id=151b3ddd-15d6-83e4-a1d4-5584b0205023" alt="" class="zemanta-pixie-img" /></div>Colinhttp://www.blogger.com/profile/10076561696860953748noreply@blogger.com0tag:blogger.com,1999:blog-2194647237673593588.post-21961648637869363142009-08-18T13:03:00.003+05:302009-10-18T07:09:06.104+05:30Hack the most out of Sify BroadbandSify Broadband customers, this post is for you.<br /><br />Most of Sify Broadband customers are on a switched network, making MITM attacks very much possible, some network admins have secured their networks against this kind of attacks, but there still exists the main Flaw in Sify.<br /><br /><br /><strong>(NOTE: THIS ARTICLE IS MEANT FOR EDUCATIONAL PURPOSE ONLY. I WILL NOT BE HELD RESPONSIBLE FOR ANY HARM DONE BY YOU TO YOURSELF OR ANYONE.)</strong><br /><br />Main flaw in Sify : Their authentication system.<br /><br />How does Sify authentication system work ?<br /><br />Sify authenticates a client by checking the following parameters.<br /><br />1] Username<br />2] Password<br />3] IP address<br />4] MAC address<br /><br />If any of the above is not matching with the records in their database, you are not logged on.<br /><br />So whats the flaw ? Everything seems so perfect.<br /> Well suppose Mr. X and Mr. P are friends who have a sify connection, but Mr. P's prepaid account has expired. All he has to do is find out when Mr. X is online and change his IP and MAC address to that of Mr. X. That will get him online on Mr. X's broadband account.<br /><br />The above means that, if you can find someone who is logged into his Sify Account then you can piggyback on his session and access the Internet. This is also termed as session hijacking. All you need is a IP and MAC address. Username and password are not exactly required if you want to use someone else's connection provided that he/she is logged on.<br /><br />Method 1:<br />Search on Google for IP and MAC scanners, I'm sure there are plenty of them out there. A good MAC changer would be Technitium MAC Changer, and you could use Angry IP scanner for getting MAC address and IP address.<br /><br />Method 2:<br />Another way to get the IP and MAC is to get control of your switch.<br /><br />How do I do that ?<br />Note that your switch is always located at your gateway IP address.<br />Connect to the switch by typing "telnet 10.xxx.xxx.1" (replace this with IP Address of your switch)<br />The switch will now ask for a password, go to <a href="http://www.governmentsecurity.org/default_logins_and_passwords_for_networked_devices">Governmentsecurity.org</a> for a list of default login and passwords. <br /><br />Look around the switch to search for the command where all the IP and corresponding MAC are listed.Colinhttp://www.blogger.com/profile/10076561696860953748noreply@blogger.com1