Saturday, 21 September 2013

Ноw tо Hide Drives with CMD ???


1
Step 1. Сlісk оn Start – Run , if you are Using Windows 8, Then Click on start and search for Run, or just hold down windows key and press  ” R “.

Step 2. Run bох will appear, kіndly type ” сmd ” аnd hіt Еntеr.

Step 3. Now you will see Command promt windows, Type ” Dіskраrt ” аnd hіt Еntеr.

Note : In Windows 8 i was asked to confirm if i want to allow this program to make changes to this computer. Just click on yes and another Window will open up shortly.

Step 4. Now you have to type  ” lіst vоlumе ” аnd Hit Enter to see the list of all drives details

Step 5. Now i have some personal data in my drive E which i dont want any other person to peep in, So i want to hide it, For that i will type ” Select volume E ”  and hit Enter.

Іf уоu wіsh tо hide  vоlumе D , Then you will type ” Select vоlumе D ” аnd hіt Еntеr. Now you can see something like below picture.

hide any drive

By now you have selected the Drive successfully which you want to hide. But the last part which is to Hide the Drive is still remaining.

 Step 6. To hide the drive you have to type “ Remove letter E ” and hit enter.

drive hidden.



Congrats you have successfully Hidden the drive.

How do i get the Drive Back ?

Alright Now the only question you want me to ask is ” Hey. How do i get my drive back  ”


Let me tell you thats easy as well. Just follow the below simple steps.

Step 1. Scroll Back up and perform steps 1,2,3,4 and 5 again.

Step 2. ok Now you have Completed the 5 steps listed above. Just make sure you have completed till

” Select volume E ”

Step 3. Earlier in the article to Hide the drive we typed ” Remove letter E ” , Now to unhide it we will

Type ” Assign letter E ” and hit Enter. Thats it

Step 4. Check if you have successfully got the drive back. Now Just Restart your Computer if you wish to.

Monday, 16 September 2013

Jolla's Sailfish OS now compatible with Android hardware and software


Finland-based mobile startup Jolla has announced that its Sailfish smartphone operating system is now compatible with Android, in terms of application and hardware compatibility.

While the company had previously mentioned that phones running the Sailfish OS would be able to run Android apps, by announcing support for hardware that's compatible with Android, it aims to reach a large number of OEMs that produce Android devices. Hardware compatibility with Android means OEMs will be able to leverage existing hardware already available for Android, and use it to run Sailfish operating system instead, if they want. This would enable the operating system to seek growth opportunities in markets like China.

"We believe Sailfish with Android compatibility is a highly relevant mobile operating system option for major mobile companies in Europe and in Asia. We are already in discussions with several major Asian vendors regarding this opportunity," says Tomi Pienimaki, CEO Jolla.

Jolla also said that it will cooperate with leading global app stores to ensure users can seamlessly download Android apps on their Sailfish-powered devices. The company noted that due to software compatibility with Google's operating system, popular Android apps can already run on the Sailfish platform.

"For example, highly popular apps such as Instagram, WhatsApp and Spotify run directly on Sailfish OS. Also Chinese WeChat - already with over 400 million users - runs on Sailfish OS," Pienimaki added.

The company also announced that it's opening the next production batch for pre-orders of its phones later in the week through its website, Jolla.com.

Jolla had closed its pre-sales campaign for its first Sailfish OS-based smartphone, in August. The first Sailfish-based smartphones are targeted to begin shipping by the end of 2013, with the initial phones expected to be available in Europe. The company disclosed that it had received online pre-orders from 136 countries, but did not shed light on the number of units booked though it hinted that the number of devices sold through the campaign could be in the tens of thousands of units range.

Jolla's phone runs the gesture-based Sailfish OS which is based on the MeeGo platform which received acclaim when it launched on Nokia's N9 smartphone. However, Nokia abandoned MeeGo and chose Windows Phone as the future OS platform for its smartphones,  following which a group of employees of Nokia's MeeGo unit left the company to start Jolla and work on their own smartphone.

Sunday, 15 September 2013

Top 5 Infamous Hackers of All Time

There are basically three types of hackers. First kind of hackers is Ethical Hackers. These are also called white hat hackers. These hackers use their hacking skills for good cause. They work in companies to develop security tools and system. These hackers are also known as ethical hackers. Second kind of hackers is Cyber Criminal of Black hat hackers. These hackers break the security, try to get unauthorized access, steal passwords and involved in cyber-crimes. Third kind of hackers is Grey Hat hackers. These hackers behave like both ethical hackers and cyber criminals. They are sometimes good and sometimes bad. But in general, whenever we use hacker word, instantly the image of second kind of hackers comes in mind. If you see the history of computer science, you will find the name of many hackers who impacted the world by their skills. Some hackers are well known for their security skills while others are known for their cyber-crimes. In this post, we are listing 5 most popular black hat hackers of all time. These hackers are known for their big cyber-crimes.

1. Kevin Mitnick
Kevin Mitnick is the most popular hacker. U.S. Department of Justice called him the “most wanted computer criminal in U.S. history.” It is enough to say how infamous this person is. He was involved in various computer related crimes. Most of the times, he break the security by using Social Engineering attacks. At the age of 12, he bypassed the punchcard system used in the Los Angeles bus system. At 16, he gained unauthorized access of a computer network. He was also charged for hacking into DEC’s computer network and copying their software. He was sentenced to 12 months in prison followed by 3 years of supervised release for his crimes. But near the end of supervised release, he hacked into Pacific Bell voice mail computers and became fugitive for two and a half years Now, he is a full time cyber security consultant and  runs Mitnick Security Consulting, LLC. He is also a well known public speaker for computer security



2. Jonathan James
Jonathan James was an American hacker. At age of 15, he committed many intrusions into various computer systems and networks. But he became most wanted when he intrude into the computers of Defense Threat Reduction Agency. He installed a sniffer into servers and gained passwords of DRTA employees. He also hacked into NASA systems and downloaded the source code of the software. Downloaded assets equaled $1.7 million. When the intrusion was detected, NASA shutdown the computers for three weeks. NASA had to spend $41,000 to check and fix computer systems. But the life of James has a tragic ending. In 2007, many companies faces network attacks and James was suspected for that. He always denied involvement and committed suicide in depression.

3. Gary Mckinnon
Gary Mckinnon aka SOLO is known for the largest military computer hack of all time. He also illegally gained access to computers of NASA and US Armed Forces. When he was caught, he said that he was only searching information related to UFO. But US authorities revealed that he deleted many critical files that caused the damage of $700,000.

4. Albert Gonzalez

Albert Gonzalez is an American computer hacker who is accused of credit card theft. He was charged for reselling more than 170 million cards and ATM numbers from 205 to 2007. This was the biggest fraud of the history. He used SQL injection to deploy backdoor on corporate systems to launch packet sniffing attacks. He have thrown a $75,000 birthday party when he have broken the currency counting machine. Gonzalez was sentenced to prison for 20 years. But there is a twist in this. He will face 2 sentences of 20 years to be served out simultaneously. He is in facing the first.

5. Robert Tappan Morris
Robert Tappan Morris is an American computer scientist. He is best know for creating a Morris Worm in 1988, that is considered as the first known computer worm. This worm exploited several vulnerabilities to gain entry into the target system. It was estimated that the loss caused by the worm and efforts to remove it ranged on each system from $200 to more than $53,000. In 1990, he was sentenced to three years of probation, 400 hours of community services and fine of $10,500. In 1995, he co-founded Viaweb, a company that made software for building online stored. Later he received Ph.D in Applied Sciences from Harvard and then appointed as professor at MIT. It also co-founded Y Combinator, a seed stage startup funding firm.


Copyright © RISHABHTechWORLD



Bangladesh black hat hackers hacked many indian government websites with more than 20000 websites of India

The cyber war between indian hackers and Bangladeshi hackers is now on the peak. Bangladesh black hat hackers are attacking on all type of Indian websites including government websites. Bangladeshi hacker group claimed to hack more than 20,000 websites of India which is one of the biggest mass defacement. The group calling itself ‘Bangladesh Black HAT Hackers’ wrote on its Facebook fan page: “India hacked our 400 sites in total, we hacked 20,000 sites in total since the war started.”
 These are the government websites hacked by BSF http://apdes.ap.gov.in/BCA.html http://www.bsnl.co.in/ http://www.dot.gov.in/ http://www.incometaxindia.gov.in/ http://indiastockexchange.org/ They also exposed the data of INCOME-TAX INDIA See the demo data: 
[userid],[slno],[pwd],[pan]=^29544^x0SFv32uup^AAEHD1663E [userid],[slno],[pwd],[pan]=76161e1543^3418^ua5CtgfSRn^76161e1543 [userid],[slno],[pwd],[pan]=AAAAA0233A^57378^YCBH2003^AAAAA0233A [userid],[slno],[pwd],[pan]=AAAAA1111A^44055^jOFq37Thg0^AAAAA1111A [userid],[slno],[pwd],[pan]=AAAAA1111A^44055^jOFq37Thg0^AAAAA1111A [userid],[slno],[pwd],[pan]=AAAAA1111A^44055^jOFq37Thg0^AAAAA1111A [userid],[slno],[pwd],[pan]=AAAAA1111B^44056^g3BNe65ddx^AAAAA1111B [userid],[slno],[pwd],[pan]=AAAAA1111B^44056^g3BNe65ddx^AAAAA1111B [userid],[slno],[pwd],[pan]=AAAAA1111I^44057^oSJv4AY442^AAAAA1111I [userid],[slno],[pwd],[pan]=AAAAA1234C^212^sXNa61Dqp3^AAAAA1234C [userid],[slno],[pwd],[pan]=AAAAA3272N^62570^t85Bs21RQm^AAAAA3272N Now we can just wait and watch what is going to happen next. But this type of cyber war is not good for both of the countries. They are only ruining the website of innocent webmasters who earning with their websites


Copyright © RISHABHTechWORLD

Scan Entire Internet in 45 Minutes with ZMap

Do you know how much time will it take to scan entire Internet with billions of IP addresses?  now you can scan the whole Internet in just 45 minutes with an opensource scanner Zmap. Researchers from University of Michigan have developed this nice tool. “ZMap is an open-source network scanner that enables researchers to easily perform Internet-wide network studies. With a single machine and a well provisioned network uplink, ZMap is capable of performing a complete scan of the IPv4 address space in under 45 minutes, approaching the theoretical limit of gigabit Ethernet,” Zmap posted on website. The washington post reported that the tool works in similar way as popular network security scanner NMap, but in better way. NMap sends request to a machine and then listen the reply. It also keeps records for each outstanding request that creates overhead and slows down the process. But Zmap forgets the request after sending to a machine. It encodes the outgoing request to identify responses and doesn’t keep a list of outstanding requests. Thus Zmap reduced the overhead making overall scanning process 1000 times faster than Nmap. This tool is really nice and can be used in many kind of analysis process. It helped in finding Hurricane Sandy affected people on the East Coast. It quickly scanned the area to find offline computers and then gave real-time data of affected area.


Copyright © RISHABHTechWORLD

Electronic Corporation of India (ECIL) Hacked, Sensitive Data Leaked


A known hacker Phr0zenMyst is now in news for his another high profile hack. This time he has breached the website of Indian defense contractor Electronic Corporation of India (ECIL). Website of ECIL www.ecil.co.in is currently down. Hackers has also leaked the sensitive email conversation between the ECIL and BARC (Bhabha Atomic Research center). You can see the snapshot of leaked document. Electronics Corporation of India Limited (ECIL) hacked, documents leaked! #OpIzzah #OpKashmir — Phr0zenMyst (@Phr0zenM) August 24, 2013   Hacker has also uploaded the data to pastebin and Mega. 20 PDF files and 1 document file are leaked online. One PDf file seems to be very important and contains 85 pages. All files are available to download via Mega. Phr0zebMyst is a well know hacker who also has a past record of hacking into various government websites. hacking the official website of Australian Broadcasting Corporation (ABC) and leaking personal details of 50,000 users for #OpWilders. It is more than 23 hours of the hack and files are still available to download. I am not sure why Indian government or ECIL has contacted to these file hosting websites to delete files.


Copyright © RISHABHTechWORLD

How to close all open programs in single click

If there are so many applications are running on your windows desktop, you can minimize all applications with the shortcut winkey+M. But you have to close all applications one by one usually takes a little more effort. But there is a nice tool which is really helpful and allow users to close all running programs in a single click. This program is availale in both 32- and 64-bit versions and of 32 KB in size. This program also does not need any type of installation. If you are using windows 7, pin it to the task bar or create a shortcut or quick launch for older version of windows systems. Each time, when your PC is just too cluttered with many running applications and windows, click the Close All Windows shortcut and it will try to shut down all down. If an application has some work which you have not saved then it will not close it immediately and ask if you want to save your data. You can also configure it if you never want to close an application. Suppose you do not want to close firefox and chrome windows while using this tool. Just modify your shortcut properties to provide the relevant executable filenames on the command line.

CloseAll.exe -x=”firefox.exe|chrome.exe”

DOWNLOAD FROM THIS LINK
http://www.downloadcrew.com/article/27294-close_all_windows


Copyright © RISHABHTechWORLD

Microsoft Launches Xbox Music on Web And Devices For Free


Microsoft has launched its Xbox music streaming service on web for Free. This service is also available for those who do not use Windows 8. Xbox Music website (music.xbox.com) is now streaming 30 million songs. Just visit the website and start listening music for free. The service was launched back in October for Windows 8 devices. Later it launched for Xbox 360 and Windows Phone

Along with the launch on web, Microsoft has also launched the service on Android and iOS devices. Apps are now available in Google Play Store and iTunes App Store. The service is nice and will take on Spotify. This service will stream music on all browsers. Currently it offers free web streaming for first six months for free. After six months, it will offer limited hours of music streaming and unlimited with paid subscription. A radio service on Xbox Music also generates song playlists automatically. The service is available for free but users will upgrade it with $10 per month for more feature. Starting with Nov. 22, XBox One users will also able to enjoy gaming with listening music simultaneously.

Copyright © RISHABHTechWORLD

Vodafone Hacked, 2 Million Customers’ Details Leaked

One server of Vodafone has been leaked in Germany. Intruder gained access to details of 2 Million users who had applied for a new contract. Stolen data includes names, addresses, birth dates, and bank account information.


Vodafone confirms that the attacker has also been identified by police. Company detected the attack earlier this this month. “Vodafone Germany announces that it has recently been subject to a highly sophisticated and illegal intrusion into one of its servers in Germany, which has resulted in the theft of a limited amount of German customer data. This criminal attack appears to have been executed by an individual working inside Vodafone. An individual has been identified by the police and their assets have been seized,” Vodafone said in press release. Vodafone confirms that the incident only affects the clients in Germany. Company also confirms that attacker didn’t get access to credit card information, password, PIN numbers, mobile numbers or other secure details. Vodafone said that stolen data is not enough to access customer’s bank accounts. But company has warned customers about potential phishing attacks.


Copyright ©RISHABH TechWORLD

five Best Websites to Sell Your Gadgets Online in India

1. OLX
5 Best Websites to Sell Your Gadgets Online in India  website top internet  

OLX is one of the most popular website that lets users sell anything. You can easily list your products, add categories, add sub-categories attach photo and then make your listing live. You will start getting calls from buyers in few minutes after listing.

2. Quikr
5 Best Websites to Sell Your Gadgets Online in India  website top internet  

Quikr is another similar kind of classified website that lets users sell anything quicker. It works like OLX. Add products, add description, add photo and then publish. You will start getting calls from buyers in few minutes. People also use it to sell properties and vehicles.

3. eBay India
5 Best Websites to Sell Your Gadgets Online in India  website top internet  

eBay is one of the most popular website for selling your used things online. You can also create auction for your used products with eBay. List your products, add details, add photos and then start getting buyer’s calls. Later, you will also have to select payment method to receive money.

4. Sulekha
5 Best Websites to Sell Your Gadgets Online in India  website top internet  

Sulekha.com also has an online portal for buying/selling used phones. Like other classified websites, it also lets users list their old gadget online and look for potential buyer.

It also has a product comparison and price comparison portal.

5. Click India
5 Best Websites to Sell Your Gadgets Online in India  website top internet  

Click India is another free classified website for selling and buying things online. List your products, add price and then wait for buyers’ calls. Everything is simple and fast.

Hide Photos in Android Device With These Apps

listing few free apps that lets users to hide photos in Android smartphones and tablets. Some apps are advanced that also allow to hide files, songs, videos and apps. See the apps below and share the one which you use.

Hide Photos in Android Device With These Apps
 Hide pictures – KeepSafe Vault


KeepSafe Valut is a nice app that allows users to make photos private in gallery. You can decide which photo or video should not appear to public. But private photos and videos will be available only to you. Use of the app is really simple. Open the KeepSafe app and select photos or videos that you want to hide. Similar process can be done to unhide photos. All photos are stored in the local storage.

Gallery & Apps Lock + Hide

Gallery & Apps Lock + Hide is another popular app that lets users to hide photos, videos, SMS, contacts and apps to keep them secure. But this app has limitation. You can only hide limited number of photos, videos and apps. For unlimited usage, you need to upgrade to the pro version.

Hide Files, Photos, Videos

This is also a nice app that lets users to hide files, folders, photos, videos and audio files. In the liste version, you can only hide 10 objects. For unlimited usage, you need to upgrade to premium version of the app. This app is easy to use. And you can use lite version to check how it works. These are the few apps that allow users to hide apps in Android devices. You can also hide apps, contacts, music and video files. All the listed apps are free. Pro version of these apps are also available. Install the apps and share your experience



Microsoft Deal, Nokia Was Working on Android Devices

Lumia with Android? Yes Nokia was working on Android powered devices before Microsoft deal. And Android powered by Lumia devices could come sometimes after later 2014.
NY Times gets few details of Anroid powered Nokia devices from an internal team within Nokia. The team within Nokia was secretly working on Android powered devices before Microsoft acquired Nokia’s Mobile and services division for $7.2 billion.

It was not surprising because Nokia’s Windows Phone effort was not working good for company. And company always has a Plan B for its future.

The Verge also notes that Nokia’s effort was not limited to only Android powered Lumia devices. Company was also experimenting Asha devices on Android for low-end Android devices.

Nokia devices comes with a good design and colors. People always like the design but expect it to run on Android. Now Microsoft is the owner and every single hope of Nokia with Android is gone. We will probably never see a Nokia device with Android OS.

Basics-How To: Change Your Ip In Less Then 1 Minute:



1. Click on "Start" in the
bottom left hand corner of
screen
2. Click on "Run"
3. Type in "command" and
hit ok
You should now be at an
MSDOS prompt screen.
4. Type "ipconfig /release"
just like that, and hit
"enter"
5. Type "exit" and leave
the
prompt
6. Right-click on "Network
Places" or "My Network
Places" on your desktop.
7. Click on "properties"
You should now be on a
screen with something
titled "Local Area
Connection", or something
close to that, and, if you
have a network hooked
up,
all of your other networks.
8. Right click on "Local Area
Connection" and click
"properties"
9. Double-click on the
"Internet Protocol (TCP/IP)"
from the list under the
"General" tab
10. Click on "Use the
following IP address"
under the "General" tab
11. Create an IP address (It
doesn't matter what it is. I
just type 1 and 2 until i fill
the area up).
12. Press "Tab" and it
should automatically fill in
the "Subnet Mask" section
with default numbers.
13. Hit the "Ok" button
here
14. Hit the "Ok" button
again
You should now be back to
the "Local Area
Connection"
screen.
15. Right-click back on
"Local Area Connection"
and go to properties again.
16. Go back to the "TCP/IP"
settings
17. This time, select
"Obtain an IP address
automatically"
tongue.gif
18. Hit "Ok"
19. Hit "Ok" again
20. You now have a new IP
address
With a little practice, you
can easily get this process
down to 15 seconds.
P.S:
This only changes your
dynamic IP address, not
your ISP/IP address. If you
plan on hacking a website
with this trick be
extremely careful, because if they try
a little, they can trace it
back.

Thursday, 12 September 2013

PDF Trick!!!


Hey frndz now u can listen to
wats there in a pdf document
instead of reading the whole
document....
Try out the following key
combinations for Acrobat 6.0 &
7.0:
- ctrl+ shift + b ---> To hear the
whole document
ctrl + shift + v ---> To hear only the
page
ctrl + shift + c ---> To resume
ctrl + shift + e ---> To stop

Wednesday, 11 September 2013

How To Block Sites On Computer Without Using Software

It is very easy to block sites on computer without any software. This trick will work on Windows XP, Windows Vista, and Windows 7. I have tried this trick on all windows and it really works. Follow the steps below to learn how to block sites on computer.

Go to Run(Windows Key + R)
Type C:/windows/system32/drivers/etc/hosts
Hit enter
Open the file as Notepad
Type 127.0.0.1 www.yoursitedomain.com below 127.0.0.1 local host
Save it.
Done!

25 Most Interesting Computer Facts

Here is a collection of 25 Most Interesting Computer Facts featuring Funny Computer Facts,I nternet facts,virus facts and more Computer Fun Facts.

1. 80% of all pictures on the internet are of naked women
2. Another name for a Microsoft Windows tutorial is ‘Crash Course’!
3. Bill Gates house was designed using a Macintosh computer.
4. By the year 2012 there will be approximately 17 billion devices connected to the Internet.
5. Domain names are being registered at a rate of more than one million names every month.
6. E-mail has been around longer than the World Wide Web.
7. For every ‘normal’ webpage, there are five porn pages.
8. In the 1980s, an IBM computer wasn’t considered 100% compatible unless it could run Microsoft Flight Simulator*.
9. MySpace reports over 110 million registered users. Were it a country, it would be the tenth largest, just behind Mexico.
10. One of every 8 married couples in the US last year met online.
11. The average 21 year old has spent 5,000 hours playing video games, has exchanged 250,000 e-mails, instant and text messages and has spent 10,000 hours on the mobile phone.
12. The average computer user blinks 7 times a minute, less than half the normal rate of 20.
13. The first banner advertising was used in 1994.
14. The first computer mouse was invented by Doug Engelbart in around 1964 and was made of wood.
15. The first domain name ever registered was Symbolics.com.
16. The world’s first computer, called the Z1, was invented by Konrad Zuse in 1936. His next invention, the Z2 was finished in 1939 and was the first fully functioning electro-mechanical computer.
17. There are approximately 1,319,872,109 people on the Internet.
18. There are approximately 1.06 billion instant messaging accounts worldwide.
19. While it took the radio 38 years, and the television a short 13 years, it took the World Wide Web only 4 years to reach 50 million users.
20.70% of virus writers work under contract for organized crime syndicates.
21.A program named “Rother J” was the first computer virus to come into sight “in the wild” — that is, outside the single computer or lab where it was created.
22.The worst MS-DOS virus ever, Michelangelo (1991) attacked the boot sector of your hard drive and any floppy drive inserted into the computer, which caused the virus to spread rapidly.
23.A virus can not appear on your computer all by iself. You have to get it by sharing infected files or diskettes, or by downloading infected files from the Internet.
24. Country with the highest percentage of net users is Sweden (75%).
25. The first popular web browser was called Mosaic and was released in 1993

15 Most Interesting Linux Facts



Linux is one of the world’s most powerful and popular operating system. Linux operating system was developed by Linus Benedict Torvalds at the age of 21. At present there are more than 300 flavors of Linux available and one can choose between any of them depending on the kind of applications they want. If you are new to Linux read, Top 5 Advantages of Using Linux Os

Linux is a freeware and generally speaking its free from Virus and other malware infections.  In this post I will share few Linux facts which may or may not be know for many of us.

15 Most Interesting Linux Facts

Only 2% of the current Linux kernel written by Linus Torvalds.
The Linux kernel version is written in the programming language C.
The first commercial distribution GNU / Linux was Yggdrasil was launched Lice-CD format in 1992. Red Hat was one of the first distributions to settle within companies and data centers in 1999.
A guy named William Della Croce Jr. registered the name Linux and demanded royalties for use of the mark. Later, he agreed to assign the trademark to the true owner, who is Torvalds.
Countries such as Russia, Brazil and Venezuela have put their focus on Linux as a basis for interoperable management , cost efficient and technologically independent.
U.S. Department of Defense, U.S. Navy Submarine Fleet, Federal Aviation Administration uses Linux in government offices. Indian state of Tamil Nadu uses Linux for education purpose.
90% of the world’s most powerful supercomputers using an operating system GNU / Linux, in fact, the top ten of supercomputers use Linux. In fact, the penetration of Linux in data centers is very high, 33.8% of the world runs on Linux servers compared to 7.3% does so in a Microsoft operating system.
The name of the penguin, Tux , is not entirely clear. On the one hand, it is said that the origin of the name comes from the fact that penguins appear to be wearing a tuxedo, which in English is said max tuxedo tux and is abbreviated. In contrast, another source comes from the letters of the logo of Tux are Unix Torvalds.
Torvalds wanted to call the kernel Freax (a combination of “free”, “freak”, and the letter X to indicate that it is a Unix-like), but his friend Ari Lemmke, who administered the FTP server where the kernel was hosted for download, the download directory called kernel of Linux Torvalds.
Debian was one of the first GNU / Linux that was constituted and organized as a community of developers.
Linux is present in highly critical applications such as Japan’s bullet trains, traffic control, San Francisco, the New York Stock Exchange, CERN, many air traffic control systems or control of nuclear reactors of submarines and ships many nuclear war.
Linux programmers are often associated with living “isolated” in the world, however, over 75% of the code developed for the Linux kernel came from private sector developers. In fact, large technology companies like Intel, Google, IBM, AMD, Sun Microsystems, Dell, Asus, HP, Analog Devices, Oracle, Novell or Red Hat help developing applications, contributing to the core or pre-installing any GNU / Linux their machines. In fact, during the 2003 Super Bowl (which paralyzes the United States and remains glued to the TV for many Americans), IBM delivered a beautiful ad talking about Linux and open source options.
The GNU project in 1991, had no drivers and kernel, that’s what led to Linus Torvalds to address the Linux kernel development. If GNU had had, perhaps, Torvalds had not been put to work on that.
The Linux kernel is now the most widely ported operating system, running on a great variety of operating systems.
World known companies such as Google, Cisco, Facebook, Twitter, Linked in etc use Linux as their main operating system.

Top 25 Application Secrets in Windows XP

There are some hidden secrets inside the application
window XP and sometimes we do not know ...
the following list is a list of confidential applications are:

To run the applications below:[/color]
Open a command prompt and Type the name of the program (example:
cleanmgr.exe)
or click Start -> Run and Type in the name of the program (example: cleanmgr.exe).

1. Disk Cleanup = cleanmgr.exe
Used to cleanup disk

2. Character Map = charmap.exe
Used to search for unusual characters

3. Dr Watson = drwtsn32.exe
Used for troubleshooting on the PC.

4. DirectX diagnosis = dxdiag.exe
Used for diagnosis audio video card

5. Private character editor = eudcedit.exe
Used to create a new character in your windows

6. IExpress Wizard = iexpress.exe
Used to create self-extracting / self-installing package. such as a Zip file

7. MICR * Synchronization Manager = mobsync.exe soft
Used to make sincronisasi.

8. Clipboard Viewer = clipbrd.exe
Used to view the content of the Windows clipboard

9. Windows Media Player 5.1 = mplay32.exe
Used to open Windows Media Player version 5.1

10. ODBC Data Source Administrator = odbcad32.exe
Used for database

11. Object Packager = packager.exe
Used to insert an object into a file.

12. System Configuration Editor = sysedit.exe
Used to change the system.ini and win.ini

13. Syskey = syskey.exe
Used to configure an account on the windows.

14. MICR * soft Telnet Client = telnet.exe
Used to connect to the Internet before there was a browser.

15. Driver Verifier Manager = verifier.exe
Used for monitoring drivers in your windows

16. Windows for Workgroups Chat = winchat.exe
Used to chat sec

17. System configuration = msconfig.exe
Used to control startup programs

18. System Monitor = perfmon.exe
Used to monitor your PC.

19. Program Manager = progman.exe
Is inherited from Windows 3.x desktop shell

20. gpedit.msc
Used to set the group policy and authorization, if you use Active Directory.

21. Remote Access phone book = rasphone.exe
It is applications like phone book

22. Registry Editor = Regedt32.exe [also regedit.exe]
Used for tweaking and editing windows registry

23. Network shared folder wizard = shrpubw.exe
Used to create a shared network folder

24. Siganture file verification tool = sigverif.exe
Used to verify signatures

25. Volume Control = sndvol32.exe
Used to display the sound control in the System Tray

The 10 Best Hacker Movies

1. Tron (1982)

Tron , a poetical “cyberadventure” where the cyber world is a methaphorical representation of the “real” one.A classic! A hacker is transported into the digital universe inside a computer, and must survive combat as a cyber gladiator in order to stop the villanous Master Control. The imagination behind this movie made big ripples in the science fiction world, and today, Tron is a cult classic that every computer user should see at least once.

This movie is very old, but it is still a pivotal film in many viewers’ minds. A young man finds a back door into a military central computer in which reality is confused with game-playing, possibly starting World War III. A preposterous plot, but a compelling commentary on nuclear war and the destruction of the human race. You have to see this movie just to say you have seen it.

Leave it to Bruce Willis to save the world from uber hackers. Macintosh advertising personality, Justin Long, plays the reluctant programmer caught up in an digital terrorism scheme. Like Swordfish, this movie has over-the-top violence and outrageous action sequences, but if you liked the Die Hard series, definitely see this .

Modern heist movies always involve some sort of hacking. This particular heist movie is extremely entertaining, especially when the supposed true inventor of “Napster” is the main hacker. At least 20 minutes of hacking footage in this actioner. An explosive guy, a safe-cracker, a computer genius, a wheel-man and a man with a spectacular plan of stealing 35 million without using a gun.

Over-the-top violence, preposterous situations, sexy women, and outstanding special effects make this a great popcorn rental. No, don’t bring your brain to watch this, but if you like techno-thrillers, definitely rent this. A secretive renegade counter-terrorist co-opts the world’s greatest hacker (who is trying to stay clean) to steal billions in US Government dirty money.

Recently my friend Desigan gave this movie to me.Its an entertaining thriller about a crazed young computer geek who becomes the deranged moderator of his own “Kill With Me” live internet feed where he displays new victims being slowly tortured to death. The more hits he gets at his site, the faster the people featured on his webcam die.
FBI agent Jennifer Marsh is tasked with hunting down a seemingly untraceable serial killer who posts live videos of his victims on the Internet. As time runs out, the cat and mouse chase becomes more personal.

Complex but lighthearted thriller about computers and cryptography, government and espionage, secrets and deception and betrayal. The story revolves around two college buddies who take different paths in life. One becomes an ethical hacker, and the other…well, he is not quite so noble. Some great plot twists and comic scenes make this a good way to spend a Saturday afternoon at home.

Edward Norton and Robert De Niro are fabulous in this heist flick. In a clever plot to rob a Montreal customs house of some royal artifacts, Norton and De Niro must break into the security systems with the help of a socially-awkward hacker who lives in his mother’s basement. Ten minutes of hacking, and 100 minutes of phenomenal robbery storytelling!

A lower-budget movie about hobby bank robbers, this was a delightful surprise to many viewers. Ryan Reynolds and his friends “virtually” rob banks for fun, but are blackmailed into doing a heist for real. This is a good action rental.

This documentary tells the story about the Linux operating system, and how it forwarded the philosophy of “open source” and free intellectual property. Not an action movie, but definitely interesting for people who want to learn more about why computer culture is the way it is. There’s a scene where Bill Gate’s is responding to the issue of free software.I think the OpenSource movement is revolutionary, but I’m not sure this film brings this across.

Top 10 Most Deadly Computer Virus In The World


A computer virus can cause a lot of destructive damage. VIRUS is an acronym which stands for Vital Information Resources Under Siege. Viruses are sometimes confused with worms and Trojan horses, which are technically different. So, I recommend you to read this article Difference Between a Virus, Trojan Horse and Worm. You just imagine how big organizations, governments, schools,businesses and IT sector were affected when certain viruses attacked their systems.

Computer Virus creates lots of problem in an organization which would result in millions, even billions of dollars in damages and losses. Though not all of these malicious computer programs are massively destructive, there are still some that have caused a lot of damage.Checkout, 6 Techniques used by malware composers to know more about malwares. Here are the top 10 most destructive computer viruses of all time.

1. Bagle
Bagle was detected in 2004, it infected users through an email attachment, and also used email to spread itself. Bagle did not rely on the MS Outlook contact list to make a list of where to send itself. It harvested email addresses from various document files stored in the infected computer – from plain-text files to MS Excel files. The danger of this virus was that its design opened a backdoor where a remote user could gain access and control of the infected computer. It could download additional components to either spy and steal information from the user or launch DDoS attacks to certain networks and computers.

2. Melissa
Melissa virus was made in 1999 by David L. Smith, created with Basic program, exactly with Microsoft Word macros. The Melissa virus was mass-mailing malware that was said to have infected up to 20 percent of computers worldwide. This virus spreads via email with the document “Here is That document you asked for, do not show it to anybodey else”. When this file will be opened or clicked it will automatically run the virus replication and automatically send a pass up to the top 50 in the address book of an email. Email servers around the world were forced to shut down in order to prevent the virus from spreading, as well as to remove the virus from their system.Smith was jailed 20 months and fined $ 5,000 and prohibited from accessing the computer without supervision.

3. Sasser
Creator by 17 year old German student, Sven Jaschan in 2004. Sasser attack Microsoft Windows. Sasser does not spread via email. The virus is usually spread through the network. It infected computers by exploiting vulnerability present in both Windows 2000 and Windows XP machines, known as the RPC (Remote Procedure Call) exploit. This will create a computer virus could not be shutdown without unplug the power. Jaschan Finally caught but he’s not jail, was only given probation 1 year 9 months, because at that time still under the age of 18.

4. ILOVEYOU a.k.a. Lovebug/Loveletter Virus
This virus started spreading in the Philippines, these virus classified as worm, which has the ability to do her own replication. Creator Onel de Guzman was from the Philippines. ILOVEYOU spread via email, with the title “love letters” from a secret admirer. Once opened, it loaded itself to the memory, infecting executable files. When a user received and opened the email containing the attachment “LOVE-LETTER-FOR-YOU.txt.vbs”, the computer became automatically infected. It then spread itself by infecting *.exe,*.jpg,*.mp3 files. After that, the virus sent itself to others by looking up the addresses contained in the MS Outlook contact list. The virus was written by a Filipino programmer who was still a college student at that time. He said the release of the virus was only “accidental.” This virus spread throughout the world in just a day, infecting computers of large corporations and governments, including the Pentagon in the United States. It caused billions of dollars in damages. The actual “damage” occurred during the removal of the infection from computers, as email servers and computer networks had to be shut down before the virus could be removed.His original file LOVE-LETTER-FOR-YOU.TXT. vbs.

5. MyDome
MyDome virus was detected in 2004. This virus is making a backdoor on the OS. Computer was first known attack on first February by doing DDoS. Then reported back to attack on the 12th of Feb, after that the virus stopped spreading and start creating backdoors. MyDoom spreads via email. MyDoom slowed down global Internet access by ten percent, and caused some website access to be reduced by 50%.

6. Leap-A/Oompa- A
Mac that has a concept of security through obscurity, Mac believe thea system can’t be infected by a virus of cause of the OS system is a closed. But in the year 2006, Leap-A virus or commonly known as Oompa-A appears and spreads via iChat on the Mac. Having a Mac attack, the virus will search for contacts via iChat and send messages to each contact. The message will contain a form of corrupt JPEG file. It’s not dangerous, but this proved that the Mac OS systems are not immune to the virus.

7. SQL Slammer
Appeared in January in the year 2003, spread quickly via the Internet. It caused a considerable amount of damage, though, by overwhelming routers, causing them to shut down. The target of this virus was web servers running a vulnerable version of Microsoft SQL Server. Upon infection of a server, the virus generated random IP addresses through which it attempted to further infect other computers.This virus has also been a U.S. Bank ATMs crash, the collapse of Seattle’s 911 service, and Continental Airlines.

8. Nimda
Reported attacks in 2001, call Nimda taken from opposite the word “Admin”. With its multi-pronged attack, Nimda appears to be the most troublesome virus of its type that has yet appeared. Its name (backwards for “admin”) apparently refers to an “admin.DLL” file that, when run, continues to propagate the virus.These viruses spread very quickly, according to TruSecure CTO Peter Tippett, Nimda only takes 22 minutes to make the Top Ten Virus at the time. The main target of this virus is Internet servers, Nimda spread through Internet network by creating a backdoor into the OS.

9. Code Red
The world had not yet recovered from the damage caused by the ILOVEYOU virus when Code Red was released in simmer 2001.Code red virus attacks only Windows 2000 & NT OS. This virus will create a buffer becomes full so make the memory becomes full. Once a computer was compromised by the virus, it would modify the handled website, displaying the message “Welcome to http://www.worm.com! Hacked by Chinese!” Then, it would later seek other computers running the web server software and do the same thing. After about two weeks of infection, the virus was programmed to launch DDoS (Distributed Denial of Service) attacks on certain websites, including the server of the White House.

10. The Klez
This virus was first known infected on 2001, this virus spreads via email by conducting continuous replication, and sent to all email addresses in the victim’s address book. This virus makes the victim computer becomes very slow and can also turn off the antivirus application.

Kristina Svechinskaya Is The World’s Sexiest Computer Hacker
Kristina Svechinskaya, a Russian Hacker born on born February 16, 1989 is a Russian money mule hacker. This 21 year old sexy girl is already known as the next Anna Chapman. The girl was among four New York students who are accused of stealing at least $3 million from US accounts and another $9.5 million from UK bank accounts and usage of false passports. The group used Zeus Trojan, which when clicked on in an attached email would monitor people’s computer activity and steal their user names and passwords. The Zeus Trojan attacked thousands of bank accounts and opened at least five accounts in Bank of America and Wachovia.
Kristina Svechinskaya was a “money mule”, whose alleged role in the scheme was to open accounts in which to deposit the stolen funds.


How To Clean Your RAM Using Notepad


Steps to Clean Your RAM Using Notepad:
Step 1: Open Notepad
Step 2: Type FreeMem=Space(10240000000)
Step 3: Save it as “CLEANER.VBS” in any location you like.
Step 4: You can edit the code and write 512 instead of 1024 if you own a 512mb RAM or change to anything you like.
Step 5: Run it !
After this final step your RAM will be free.

comment please

4 Useful Tips For Digital File Backup

In this age of increased technological dependence in everything from business, to educational and social environments, the need to compile and keep track of large amounts of electronic data is always increasing. Whether you’re a student downloading e-books, writing papers, and recording lectures on a laptop, a business employee managing company documents and coordinating digital communication, or simply a socially active Internet enthusiast, chances are your computer equipment is full to bursting with various types of documents. So, how do you manage it all?
Depending on the volume and significance of your files, storage and management might be simple. However, if you reach a point at which you require either a more secure method of storage and backup, or simply more space, you’ll need to explore new methods of file storage. Here are four to consider.
1. USB Storage
USB storage remains one of the simplest and most convenient means of storing excess files, either for the sake of accommodation or backup. USB storage devices are available in varying sizes, with some serving needs for just a few files, and others being able to backup enormous amounts of data. It’s always a good idea to have a USB on hand with backups of your most important files – the only danger is that it’s not too tough to lose the USB devices themselves!
2. Cloud Computing
Cloud computing is one of the hottest topics in technology, and is available from a range of providers, from massive tech companies, to niche providers like Sharefile. Cloud computing offers various benefits, but for backing up and storing excess data, it offers a very unique solution. Basically, you can digitally save any file you wish to your cloud, at which point it will be accessible from any device with Internet capability. Think of it as a USB drive that exists only in digital form.
3. External Hard Drive
If you want a more permanent, and more capable solution than a USB, an external hard drive can be a great idea. A strong enough hard drive can essentially hold as much data as your computer can on its own, meaning that you can either enjoy total backup, or store a massive range of extra files. For example, some use external hard drives for personal files, and computers for work or school files.
4. Email Backup
Finally, if you’d rather not purchase a means of digital backup, one simple, makeshift version of cloud storage remains available: email! If you only need backup occasionally, and your computer needs and uses are limited, you can simply email important files to yourself when necessary, ensuring that you can access them through email even if your computer fails you. This is not necessarily the most secure or convenient means of file backup or storage, but it does work for the occasional need.