Wednesday, 28 November 2012

How to hack a website or ur friends pc using IP adress ? [Study Purpose]

What is the real meaning of a HACKING..

Literally, hacking is accessing something or somebody in internet without their permission or interest. While, speaking in summary, hacking is very easy job, it is like instead of using front door, finding the hidden door of a house and hijacking the precious things. Among all the hacking, hacking via IP address is one of the most common yet powerful beginning.
You may want to hack the website and put your advertisement there or grab some database information In this type of hacking, you are playing with the web server’s computer instead of the administrator’s computer. Because, www.website.com is hosted in separate web server rather than personal computer.
Another can be accessing your friend’s computer from your home. Again this is IP based and this is possible only when your friend’s computer is online. If it is off or not connected to internet then remote IP hacking is totally impossible.

Saturday, 24 November 2012

What is the meaning of service pack (SP) ?!

A PERFECT ans...

A SP or a service pack is a collection of updates and fixes, called patches, for an operating system or a software program. Many of these patches are often released before the larger service pack, but the service pack allows for an easy, single installation.
Service packs also often include new features in addition to fixes.
***********

 A service pack (in short SP) is a collection of updates, fixes, or enhancements to a software program delivered in the form of a single installable package. Companies often release a service pack when the number of individual patches to a given program reaches a certain (arbitrary) limit. Installing a service pack is easier and less error-prone than installing many individual patches, even more so when updating multiple computers over a network.
Service packs are usually numbered, and thus shortly referred to as SP1, SP2, SP3 etc.They may also bring, besides bug fixes, entirely new features, as is the case of SP2 of Windows XP.

Thursday, 15 November 2012

Run Ur pc smoother Ever...!

PC maintenance tips

  1. Always protect your PC by installing some kind of antivirus and regularly keep the antivirus updated. There are numerous antivirus software available on the internet. Make sure you choose a known anti-virus after consulting a computer expert. A weak anti-virus program will do more harm than good to your computer. A high-quality anti-virus program on the other hand will protect your computer from dangerous invasive software that can wash out your important data. Here are top three free antivirus: Avast Home Edition Free Antivirus, Avira Personal Free Antivirus and AVG Antivirus Free Edition. You can choose the one you like best.
  2. Keep the firewall protection on as it will protect your PC from the unwanted interferers. If the firewall is not turned on and you are accessing the internet, then some hackers can see and access all the files on your computer and can infect your PC with viruses that can slow down your PC and can sometimes even crash it. Three free firewall products I recommend are: PC Tools Firewall Plus (totally free for Windows without limitations or time-limit), COMODO Internet Security and ZoneAlarm Free Firewall.
  3. Temp files, downloaded Internet files, and old, unused files can occupy space in your PC. Do regular disk cleanup using tools available or you can also do so manually. Regularly delete files from the Recycle Bin to remove all the unneeded files from the computer. Remove all the cookies from the PC as they are unneeded and will occupy computer’s memory and slows down its performance.
  4. You should also install a Registry Cleaner tool from the internet. It will increase the efficiency of the PC as well as make the hardware and software run smoothly. Run this regularly weekly for best results. There are a few popular free Registry Cleaners you can get online: Registry Mechanic, Registry Easy and Registry Fix. Also there are a few commercial Registry Cleaner tools I recommend: Registryrid, WiseCleaner and Registry Medic.
  5. Keep checking for spyware and adware infection by installing spyware detectors.  A high-quality Anti Virus program also helps you detect these. Spyware/Malware/Adware are very infectious and make the PC run very slow and sometimes even damage your system and invade your personal data. There are three popular free antispyware: Ad-Aware Free, Spybot Search & Destroy and Windows Defender. You can read the reviews before you download.
  6. All the software installed in your computer must be regularly updated so that they can work efficiently. Nowadays most software have auto update facility and they prompt for updating them. As soon as the internet is turned on, they will automatically search for the updates and if new updates are available they will get it.
  7. Sometimes it may happen that your computer is not infected but still it is running slow. The reason for this is the installed programs require more memory for smooth running than that is available in your PC. So the solution for this is to add more RAM.
  8. Backups help to preserve the data and important files stored within the computer. Backup creation is an easy process; you just need to copy your important data in another hard drive or pen drive/USB Sticks etc. depending on the amount of data. USB drives and sticks are convenient and portable.
  9. Make sure that you clean your PC to ensure that dust does not harm its components. CPU fan must be cleaned regularly to avoid dust and small debris which can harm your PC in many ways. CPU fan plays an important role in making the computer run faster. The computer monitor also must be cleaned. You can do so using the household glass cleaner and a soft cloth.
  10. When your PC is not in use, ensure that you turn it off. Also, don’t turn off the PC directly from the power switch till the Windows shuts down completely.
.$!d

Wednesday, 7 November 2012

The SToRy Of Top 8 Most zaPing Virus ..

1 ) Jerusalem – 1987
This is one of the first MS-DOS viruses in history that caused enormous destructions, affecting many countries, universities and company worldwide. On Friday 13, 1988 the computer virus managed to infect a number of institutions in Europe, America and the Middle East. The name was given to the virus after one of the first places that got “acquainted” with it – the Jerusalem University.
Along with a number of other computer viruses, including “Cascade”, “Stoned”, “Vienna” the Jerusalem virus managed to infect thousands of computers while still remaining unnoticed. Back then the anti-virus programs were not as advanced as they are today and a lot of users had little belief of the existence of computer viruses.

2 ) Morris (a.k.a. Internet Worm) – November 1988
The Morris worm or Internet worm was one of the first computer worms distributed via the Internet. It is considered the first worm and was certainly the first to gain significant mainstream media attention. It also resulted in the first conviction in the US under the 1986 Computer Fraud and Abuse Act. Once the worm discovers an internet connection, all that it must do is download a copy of itself to that location, and continue running as normal.  Now it has been 7 years since the Worm was defeated, but it is still worth looking at what happened, both in terms of how the program operated, and as to what conditions allowed it to do what it did. With that in mind, there are a number of subtopics of interest.
 
3 ) Solar Sunrise – 1998
Two Californian teenagers took American government by surprise, in 1998, when they intruded and took control of around 500 systems that belonged to the governmental as well as private sector. This was done with the help of a computer virus and the situation was given the name of Solar Sunrise, after an operating system called Sun Solaris. The computers that ran this OS had few weaknesses. US government took the incident as another golden opportunity to blame Iraqis but soon found out that the culprits were no other than their own Americans.
Initially it was believed that the attacks were planed by the operatives in Iraq. It was later revealed that the incidents represented the work of two American teenagers from California. After the attacks, the Defense Department took drastic actions to prevent future incidents of this kind.
 
4 ) Melissa – 1999
The Melissa virus, also known as “Mailissa”, “Simpsons”, “Kwyjibo”, or “Kwejeebo”, is a mass-mailing macro virus. As it is not a standalone program, it is not in fact a worm. Melissa can spread on word processors Microsoft Word 97 and Word 2000 and also Microsoft Excel 97, 2000 and 2003. It can mass-mail itself from e-mail client Microsoft Outlook 97 or Outlook 98.  If a Word document containing the virus, either LIST.DOC or another infected file, is downloaded and opened, then the macro in the document runs and attempts to mass mail itself.  When the macro mass-mails, it collects the first 50 entries from the alias list or address book and sends itself to the e-mail addresses in those entries.
Melissa computer virus was developed by David L. Smith in Aberdeen Township, New Jersey. Its name comes from a lap dancer that the programmer got acknowledged with while in Florida. After being caught, the creator of the virus was sentenced to 20 months in federal prison and ordered to pay a fine of $5,000. The arrest represented a collaboration of FBI, New Jersey State Police and Monmouth Internet.
 
5 ) I Love You – May 2000
This is one of the most dangerous worms ever and spread worldwide in only one night. It infected around ten percent of all internet users, and the monetary loss was around $5.5 billion. The process started when a user received an email with the subject “ILOVEYOU” and an attachment “LOVE-LETTER-FOR-YOU.TXT.vbs”. As soon as the file was opened, the virus managed to send its copy to every address present in the Windows Address Book. This worm was written by a Filipino student who was punished as Philippines had no law related to such cyber crimes. Perhaps this incident triggered the creation of European Union’s global Cybercrime Treaty.
 
6 ) The Code Red worm – July 2001
The Code Red worm was a computer worm observed on the Internet  on July 13, 2001. It attacked computers running Microsoft’s IIS web server.  The Code Red worm was first discovered and researched by eEye Digital Security employees Marc Maiffret and Ryan Permeh. The worm was named the .ida “Code Red” worm because Code Red Mountain Dew was what they were drinking at the time, and because of the phrase “Hacked by Chinese!” with which the worm defaced websites.
Although the worm had been released on July 13, the largest group of infected computers was seen on July 19, 2001. On this day, the number of infected hosts reached 359,000. The worm spread itself using a common type of vulnerability known as a buffer overflow. It did this by using a long string of the repeated character ‘N’ to overflow a buffer, allowing the worm to execute arbitrary code and infect the machine.
 
7 ) Nimda – 2001
Nimda is a computer worm, and is also a file infector. It quickly spread, eclipsing the economic damage caused by past outbreaks such as Code Red. Multiple propagation vectors allowed Nimda to become the Internet’s most widespread virus/worm within 22 minutes.  The worm was released on September 18, 2001. Nimda was considered to be one of the most complicated viruses, having up to 5 different methods of infecting computers systems and duplicating itself.
 
8 ) Downadup – 2009
The Downadup worm, also known as Conficker and Kido, has affected 6 million PCs in just the past three days, according to British officials. his malicious program was able to spread using a patched Windows flaw. Downadup was successful in spreading across the Web due to the fact that it used a flaw that Microsoft patched in October in order to distantly compromise computers that ran unpatched versions of Microsoft’s operating system. According to New York Times, conficker has more than 7 million computer systems under its control now. China, Argentina, Brazil, Russia, and India were the main affected nations.

Blog Top Sites

Share Our Badge

 Computer Stuffs

Be Updated Its Free.

Subscribe via Email

Visitors Everyday



Followers