Turn On/Off Monitor using keyboard

If you are using a Desktop computer then it’s easy to turn On or Off your monitor screen. But still if you are lazy enough to stretch your hand to the monitor screen you can use one cool small app to make your life easier.

PushMoitorOff is a tiny app which allows you to control your monitor screen from your keyboard. This tool comes handy for laptop users too. As most of the laptops don’t have the different On/Off button for the screen. So those who believe in saving energy can use this tool when needed.

The app is very easy to use. Whenever you feel like turning on/off your monitor you just have to press Shift+f1. You can change this shortcut key also using the options provided in the software

Download PushMoitorOff

Advertisements

Folder Options Missing??

Many of us sometimes find the folder options missing in windows explorer due to some virus or trojan effect.

Here’s the solution–>

Open Run and then type “gpedit.msc”.
Now goto User Configuration > Administrative templates > Windows Component > Windows Explorer.
Click on Windows Explorer you will find the 3rd option on the right side of screen “Removes the Folder Option menu item from the Tools menu”
Just check it, if it is not configured then change it to enable by double clicking on it and after applying again set it to not configured.


You will find the option after restarting windows..

BlackSheep – Detect Users Of FireSheep On The Network

As you surely know, things blew up recently at Toorcon 12 with the release of the much talked about Firefox plugin called Firesheep.

There were various discussions about how to mitigate against it like using Firefox plug-ins to force SSL connections (where available). Microsoft also tried to secure Hotmail with SSL but kinda b0rked that too.

For the 1 person in the World left that doesn’t know, Firesheep allowed any user to seamlessly hijack the web session of another user on the same local network. Although such attacks are not new, the ease of use presented by Firesheep brought session hijacking to the masses.

BlackSheep, also a Firefox plugin is designed to combat Firesheep. BlackSheep does this by dropping ‘fake’ session ID information on the wire and then monitors traffic to see if it has been hijacked. While Firesheep is largely passive, once it identifies session information for a targeted domain, it then makes a subsequent request to that same domain, using the hijacked session information in order to obtain the name of the hijacked user along with an image of the person, if available. It is this request that BlackSheep identifies in order to detect the presence of Firesheep on the network. When identified, the user will be receive the following warning message:

t should be noted that Firesheep and BlackSheep cannot be installed on the same Firefox instance as they share much of the same code base. If you want to run both Firesheep and BlackSheep on the same machine, they should be installed in separate Firefox profiles.

Requirements

In order to install BlackSheep, you need:

  • Mac OS X: 10.5 or newer on an Intel processor.
  • Windows: XP or newer. Install Winpcap first!
  • Firefox: 3.5 or newer. 32-bit only.
  • Linux : details here

You can download BlackSheep here:

blacksheep-latest.xpi

DDOSIM – Layer 7 DDoS Simulator

ddosim is a tool that can be used in a laboratory environment to simulate a distributed denial of service (DDOS) attack against a target server. The test will show the capacity of the server to handle application specific DDOS attacks. ddosim simulates several zombie hosts (having random IP addresses) which create full TCP connections to the target server. After completing the connection, ddosim starts the conversation with the listening application (e.g. HTTP server).

ddosim is written in C++ and runs on Linux. Its current functionalities include:

  • HTTP DDoS with valid requests
  • HTTP DDoS with invalid requests (similar to a DC++ attack)
  • SMTP DDoS
  • TCP connection flood on random port

In order to simulate such an attack in a lab environment we need to setup a network like this:

Download : ddosim-0.2.tar.gz

Guide to Hacking

Q: What is hacking?

Hacking is unauthorized use of computer and network resources. This is normally done through the use of a ‘backdoor’ program installed on your machine. However, most people understand a hacker to be what is more accurately known as a ‘cracker’.The terms “hack” are also used to refer to a modification of a program or device to give the user access to features that were otherwise unavailable, such as DIY circuit bending. It is from this usage that the term “hacking” is often incorrectly used to refer to more nefarious criminal uses such as identity theft, credit card fraud or other actions categorized as computer crime.

Q: What is cracking?

Password cracking is the process of recovering passwords from data that has been stored in or transmitted by a computer system.A lot of crackers also try to gain access to resources through the use of password cracking software, which tries billions of passwords to find the correct one for accessing a computer.On a file-by file basis, password cracking is utilized to gain access to digital evidence for which a judge has allowed access but the particular file’s access is restricted.

Q: What is a virus/trojan/malicious script file?

A virus is a program or programming code that replicates by being copied or initiating its copying to another program, computer boot sector or document.Trojan executes on your computer, the attacker, i.e. the person running the server, has a high level of control over your computer, which can lead to destructive effects depending on the attacker’s purpose.

Q: What is a stealer?

A stealer is a software designed to create viruses. This virus is called as a server. You send the server to the victim and if they open it all their passes (according to how the stealer is built) will be sent to you via email, or ftp or a php webhost.

Q: What is a RAT?

A Rat is a software created that created similar servers (virus). If the victim opens it they will be your RAT. You can have a complete access to their system. There are hundereds of features.
RAT – Remote Administration Tool.

Q: What is a keylogger?

A keylogger is a software designed to create servers. You send the server to the victim and if they open it all their keystrokes would be sent you via email, ftp, php webhost etc.

Q: What is BOT?

A bot is a malicious program which has several purposes.
They are usually told what to do by a botnet admin although many of the features now are automated.

Q: What is a BOTNET?

A botnet is a network of infected computers that all connect to one area where they are commanded by the botnet admin.

Q: What is a crypter?

All your servers that you create of a keylogger, stealer, RATs etc. are detected by antivirus. So inorder to make it FUD (Fully UnDetectable) we use a crypter and crypt your infected server.

Q: How does a crypter work?

A crypter has a built in or external file called stub. This stub is based on common encryptions like rc4, xor, tweafish, blowfish etc. When you crypt your infected file the crypter embeds the stub onto your server and covers the server. Just like how you paint your rusted metals. And makes it undetectable from anti-virus.

Q: What is reverting?

Reverting is a technique used to obtain forgotten passwords. But a hacker uses this method to access the victims account.

Q: What is social engineering?

It is a psychological approach, where you manipulate people into performing actions or divulging confidential information, rather than by breaking in or using technical hacking techniques.

Q: What is DDos?

The core design intention behind Denial of Service (DoS) Attack Trojan is to produce a lot of internet traffic on the victim’s computer or server, to the point that the Internet connection becomes too congested to let anyone visit a website or download something. An additional variation of DoS Trojan is the Mail-Bomb Trojan, whose key plan is to infect as many computers as possible, concurrently attacking numerous email addresses with haphazard subjects and contents that cannot be filtered.

Q: Who can be hacker ?

“Little bit” of knowledge and “no” commonsense.

Facebook Mail service launching Today(22Nov2010)

Facebook has launched a facebook mail service, It has been called Gmail killer by many tech experts, The Facebook’s founder Mark zuckerburg said that Facebook mail service will allow you to contact people in a “seamless, informal, immediate, personal, simple, minimal and short

 

 

 

How to Get Facebook Social Messaging Invitation

Facebook mailing service is currently open for invite-only so therefore you need to wait until some one invites you, Alternatively you can just drop in a request for an invitation at the Facebook website. You can get to the request page using the following URL.

http://www.facebook.com/about/messages/

Facebook mail service will launch on 22Nov2010, According to Techcrunch Facebook’s planned email service was part of a secret project known as ‘Project Titan,’ which is “unofficially referred to internally as its ‘Gmail killer.’”

The new Facebook email will fully integrate the social network, using the working model of the network of friends.

Free Antivirus Download

Here are the most popular free Antivirus available to download.

Download the top Free Anti-virus from here :

  1. AVG Anti-Virus Free Edition
  2. Avira AntiVir Personal – Free Antivirus
  3. Avast Home Edition – Free Antivirus
  4. Norton AntiVirus 2010 – Free Tial Version – 30 days
  5. Kaspersky Internet Security 2010 – Free trial version – 30 days
  6. ThreatFire AntiVirus Free Edition
  7. ESET NOD32 Antivirus – Free trial version – 30 days
  8. Microsoft Security Essentials – Free Antivirus , Antispyware