How To Speed Up Firefox

Here’s something for broadband people that will really speed Firefox up:

1. Type “about:config” into the address bar and hit return. Scroll down and look for the following entries:

network.http.pipelining

network.http.proxy.pipelining

network.http.pipelining.maxrequests

Normally the browser will make one request to a web page at a time. When you enable pipelining it will make several at once, which really speeds up page loading.

2. Alter the entries as follows:

Set “network.http.pipelining” to “true”

Set “network.http.proxy.pipelining” to “true”

Set “network.http.pipelining.maxrequests” to some number like 30. This means it will make 30 requests at once.

3. Lastly right-click anywhere and select New-> Integer. Name it “nglayout.initialpaint.delay” and set its value to “0”. This value is the amount of time the browser waits before it acts on information it recieves.

If you’re using a broadband connection you’ll load pages MUCH faster now!

Prevent ur Account from Hackers

Here I will be discussing how u can protect ur account’s from Hackers or for the right word Crackers.

1. Beware of Phishing :-

Phishing is one of the most widely used and simplest ways of gaining access to one’s account thru hacking.Phishers are pages which are uploaded into hosting sites and then given away to victims….

In appearance the phisher looks exactly as ur common login page.

For eg :-taking into consideration an orkut account and u received a link by someone asking u to click on that link.

Now when u click on that link , it takes u to a new page that looks like ur orkut account login page.

Don’t be fooled by that , now most of the people will without a second thought enter their username and passcode and press enter.But u will not be logged into ur account.It is a phisher , ur login info will be sent to the person who sent u the link.

So no matter who and however trusty that person is do not login on any other page except.

Or else ur account might be on the verge of getting hacked……

PHISHING DONE IN ANOTHER WAY

MANY TIMES .. PHISHERS WILL SEND U A MAIL IN UR EMAIL ID .. WITH THE ID — GMAILPASSWORDRECOVERE .. ET ETC .. AND TELLING U TO VERIFY UR ACCOUNT OR ELSE UR ACCOUNT WILL BE DELETED .

DON’T EVER LOGIN AT ANY PAGE OTHER THAN THE ORIGINAL WEBSITE

2. Keep a strong password :-

Always have a passcode with many characters , minimum 6 characters having a combination of small and big letters and number and special characters like “$”.Then there are very minimal chances that ur passcode will be hacked…..

3. Keyloggers :-

Many times u make online friends that u do not know personally.Then after many chats the person tells u he created a game and wanted u to see it and give a review.U gladly accept it, the game might actually be a keylogger.Keyloggers have become very common nowadays.Now when u double click on the keylogger it gets activated.The next time u login into any page ur username and passocode will be sent to the other guy…..

So do not accept such things from people u do not trust very much…….

4. Keeping ur antivirus up-to-date :-

Many people believe that antiviruses do nothing and hence they do not install them , and think that if a virus infects their PC then they will format the PC.But this is wrong , whenever a virus enters ur PC then there is a very strong possibility that a bad sector is created in ur PC.Antiviruses thus protect ur PC….

Fastest PC Shutdown

SHUTDOWN PC in 3-4 seconds…..

PRESS CTRL + ALT + DELETE {TO OPEN TASK MANAGER…}

NOW HOLD CTRL {KEEP HOLDING UNTIL PC SHUTS DOWN}

CLICK ON SHUTDOWN IN TASK MANAGER {GIVEN AS A TAB}

THEN CLICK ON TURN OFF…..

PC WILL BE SHUT DOWN IN 3-4 SECONDS {U CAN COUNT}

Most famous Black Hat Hackers

This article is about Most famous Black Hat Hackers in this world.

1. Jonathan James:

James gained notoriety when he became the first juvenile to be sent to prison for hacking. He was sentenced at 16 years old. In an  anonymous PBS interview, he professes, “I was just looking around, playing around. What was fun for me was a challenge to see what I  could pull off.”

James’s major intrusions targeted high-profile organizations. He installed a backdoor into a Defense Threat Reduction Agency server. The  DTRA is an agency of the Department of Defense charged with reducing the threat to the U.S. and its allies from nuclear, biological,  chemical, conventional and special weapons. The backdoor he created enabled him to view sensitive emails and capture employee  usernames and passwords.

James also cracked into NASA computers, stealing software worth approximately $1.7 million. According to the Department of Justice, “The software supported the International Space Station’s physical environment, including control of the temperature and humidity within the living space.” NASA was forced to shut down its computer systems, ultimately racking up a $41,000 cost. James explained that he downloaded the code to supplement his studies on C programming, but contended, “The code itself was crappy . . . certainly not worth $1.7 million like they claimed.”

Given the extent of his intrusions, if James, also known as “c0mrade,” had been an adult he likely would have served at least 10 years. Instead, he was banned from recreational computer use and was slated to serve a six-month sentence under house arrest with probation. However, he served six months in prison for violation of parole. Today, James asserts that he’s learned his lesson and might start a computer security company.

2. Adrian Lamo:

Lamo’s claim to fame is his break-ins at major organizations like The New York Times and Microsoft. Dubbed the “homeless hacker,” he used  Internet connections at Kinko’s, coffee shops and libraries to do his intrusions. In a profile article, “He Hacks by Day, Squats by Night,” Lamo  reflects, “I have a laptop in Pittsburgh, a change of clothes in D.C. It kind of redefines the term multi-jurisdictional.”

Lamo’s intrusions consisted mainly of penetration testing, in which he found flaws in security, exploited them and then informed companies of  their shortcomings. His hits include Yahoo!, Bank of America, Citigroup and Cingular. When white hat hackers are hired by companies to do  penetration testing, it’s legal. What Lamo did is not.

When he broke into The New York Times’ intranet, things got serious. He added himself to a list of experts and viewed personal information on contributors, including Social Security numbers. Lamo also hacked into The Times’ LexisNexis account to research high-profile subject matter.

For his intrusion at The New York Times, Lamo was ordered to pay approximately $65,000 in restitution. He was also sentenced to six months of home confinement and two years of probation, which expired January 16, 2007. Lamo is currently working as an award-winning journalist and public speaker.

3. Kevin Mitnick:

A self-proclaimed “hacker poster boy,” Mitnick went through a highly publicized pursuit by authorities. His mischief was hyped by the  media but his actual offenses may be less notable than his notoriety suggests. The Department of Justice describes him as “the most  wanted computer criminal in United States history.” His exploits were detailed in two movies: Freedom Downtime and Takedown.

Mitnick had a bit of hacking experience before committing the offenses that made him famous. He started out exploiting the Los Angeles  bus punch card system to get free rides. Then, like Apple co-founder Steve Wozniak, dabbled in phone phreaking. Although there were  numerous offenses, Mitnick was ultimately convicted for breaking into the Digital Equipment Corporation’s computer network and  stealing software.

Mitnick’s mischief got serious when he went on a two and a half year “coast-to-coast hacking spree.” The CNN article, “Legendary computer hacker released from prison,” explains that “he hacked into computers, stole corporate secrets, scrambled phone networks and broke into the national defense warning system.” He then hacked into computer expert and fellow hacker Tsutomu Shimomura’s home computer, which led to his undoing.

Today, Mitnick has been able to move past his role as a black hat hacker and become a productive member of society. He served five years, about 8 months of it in solitary confinement, and is now a computer security consultant, author and speaker.


White Hat Hackers of All Time

Top 5 Most Famous White Hat Hackers of All Time

Hackers that use their skills for good are classified as “white hat.” These white hats often work as certified “Ethical Hackers,” hired by companies to test the integrity of their systems. Others, operate without company permission by bending but not breaking laws and in the process have created some really cool stuff. In this section we profile five white hat hackers and the technologies they have developed.

1. Stephen Wozniak:

“Woz” is famous for being the “other Steve” of Apple . Wozniak, along with current Apple CEO Steve Jobs, co-founded Apple Computer. He  has been awarded with the National Medal of Technology as well as honorary doctorates from Kettering University and Nova Southeastern  University. Additionally, Woz was inducted into the National Inventors Hall of Fame in September 2000.

Woz got his start in hacking making blue boxes, devices that bypass telephone-switching mechanisms to make free long-distance calls. After  reading an article about phone phreaking in Esquire, Wozniak called up his buddy Jobs. The pair did research on frequencies, then built and  sold blue boxes to their classmates in college. Wozniak even used a blue box to call the Pope while pretending to be Henry Kissinger.

2. Tim Berners-Lee:

Berners-Lee is famed as the inventor of the World Wide Web, the system that we use to access sites, documents and files on the Internet. He has  received numerous recognitions, most notably the Millennium Technology Prize.

While a student at Oxford University, Berners-Lee was caught hacking access with a friend and subsequently banned from University computers.  w3.org reports, “Whilst [at Oxford], he built his first computer with a soldering iron, TTL gates, an M6800 processor and an old television.”  Technological innovation seems to have run in his genes, as Berners-Lee’s parents were mathematicians who worked on the Manchester Mark1,  one of the earliest electronic computers.

3. Linus Torvalds:

Torvalds fathered Linux, the very popular Unix-based operating system. He calls himself “an engineer,” and has said that his aspirations are  simple, “I just want to have fun making the best damn operating system I can.”

Torvalds got his start in computers with a Commodore VIC-20, an 8-bit home computer. He then moved on to a Sinclair QL. Wikipedia  reports that he modified the Sinclair “extensively, especially its operating system.” Specifically, Torvalds hacks included “an assembler and  a text editor…as well as a few games.”

4. Richard Stallman:

Stallman’s fame derives from the GNU Project, which he founded to develop a free operating system. For this, he’s known as the father of  free software. His “Serious Bio” asserts, “Non-free software keeps users divided and helpless, forbidden to share it and unable to change  it. A free operating system is essential for people to be able to use computers in freedom.”

Stallman, who prefers to be called rms, got his start hacking at MIT. He worked as a “staff hacker” on the Emacs project and others. He  was a critic of restricted computer access in the lab. When a password system was installed, Stallman broke it down, resetting passwords  to null strings, then sent users messages informing them of the removal of the password system.

5. Tsutomu Shimomura:

Shimomura reached fame in an unfortunate manner: he was hacked by Kevin Mitnick. Following this personal attack, he made it his cause  to help the FBI capture him.

Shimomura’s work to catch Mitnick is commendable, but he is not without his own dark side. Author Bruce Sterling recalls: “He pulls out  this AT&T cellphone, pulls it out of the shrinkwrap, finger-hacks it, and starts monitoring phone calls going up and down Capitol Hill while  an FBI agent is standing at his shoulder, listening to him.”

white hat vs black hat

This article is about computer hackers

White hat

A white hat is the hero or good guy, especially in computing slang, where it refers to an ethical hacker or penetration tester who focuses on securing and protecting IT systems.

White hat hackers are computer security experts, who specialize in penetration testing, and other testing methodologies, to ensure that a company’s information systems are secure. White hat hackers are also called “sneakers”, red teams, or tiger teams. These security experts may utilize a variety of methods to carry out their tests, including social engineering tactics, use of hacking tools, such as Metasploit, which exploits known vulnerabilities, and attempts to evade security to gain entry into secured areas.

Black hat

Black hat is used to describe a hacker (or, if you prefer, cracker) who breaks into a computer system or network with malicious intent. Unlike a white hat hacker, the black hat hacker takes advantage of the break-in, perhaps destroying files or stealing data for some future purpose. The black hat hacker may also make the exploit known to other hackers and/or the public without notifying the victim. This gives others the opportunity to exploit the vulnerability before the organization is able to secure it.

Customize your Firefox with useful Add-ons!

This post deals with a few useful Firefox Add-ons, which makes your Firefox more comfortable than before.

Tiny Menu:

If you are not using the menu bar frequently and you feel that the menu bar is occupying more space in your browser, then you can shrink it with this add-on. It will help to replace the standard menu bar in Firefox with a single popup icon in the menu bar. Customization on menu to be collapsed can also be made simple with its option.

IE Tab:

For some web pages, we still have to use internet explore so we have to change the browser to continue with it, but now it very easy with IE tab in Firefox. Single click will change the Firefox tab into IE tab and you can continue browsing with it without any disturbance.

Convert Web Pages to PDF:

No more tiring HTML formats for saving web page! With this add-on, web pages can be saved in PDF format. This add-on can be also used as PDF management tool in Firefox. Sometimes opening PDF files in low bandwidth makes Firefox crash but this add-on will provide the pop up option to save or open, using which the PDF file can be downloaded.

Tab Popup:

This add-on pop up displays the tab content on doing a mouse-over, which enables us to see what’s inside the page. So, no need to switch between tabs until pages are completely downloaded. Pop up size of the tab is customizable.

Splash:

It adds a screen before Firefox opens up. Any image, text or audio file can be used in the splash screen to “welcome” you.

Extended Status Bar:

This add-on provides images, speed, percentage, time and loaded size of the web page.