Sunday 18 October 2015

Speed up Internet using Command Prompt



        The computer user's major problem is slow internet access. We are using many softwares and tricks to speed up our internet connection. But how many of these softwares and tricks makes us satisfy?  So today I'll give you such a nice trick to speed up your internet connection using command prompt. Already i have given you a post about Speedup Internet without any Software. Don't miss to read it. Click here to read Speed Up Internet 20% - 30% Without any Software

Note : Check your Internet speed test on www.scanmyspeed.com before start this trick. Then, again you can check the new internet speed and feel the difference of this awesome trick.  How to Speedup Internet connection using Command Prompt  Click on Start Type cmd in Search program and files box (Run cmd as Administrator) Now command prompt will appear In command prompt go to root directly "C:\" ( type cd C:\ ) Now type netsh interface tcp set global autotuning=disabled

Press Enter. That's all, you have Done !!!

Saturday 3 October 2015

Google Hacking: The hidden face of Google


Logical operators and symbols

Google can understand three logical operators: AND, NOT and OR, so Google recognizes the “OR” as the operator and “Or”, “oR” or “or” as search elements or keywords.
  • The AND operator is used to include more than one keyword in a single research query and can be replaced by a single space ” ” even if the results differ slightly between both, as you can see by looking for example for “reverse AND engineering AND tutorials “and” reverse engineering tutorials”
  • The NOT operator is extremely useful and can be used to eliminate some keywords from the result of a query, this operator is equivalent to the sign “-” (less) used within a keyword, to figure out the meaning try searching for “email service” and “email service -marketing” (please note that there is no space between “-” and “marketing”)
  • The OR operator is used to include in the result of a query a keyword or another keyword but not both, and is equivalent to the use of “|” , eg “reverse OR engineering” means to Google exactly “reverse|engineering” (try it then try “reverse engineering” to see the difference)
In addition to these operators, Google distinguishes between some symbols like ~, +, *,””
  • Using the tilde “~”
     
This little character is used to include in the result of a query the desired keyword, its synonyms and words similar to it, for example, if you search “it security ~tools” the result will be more consistent the result of “it security tools”, since Google will consider also terms such as “Software” and show them among the returned result.
  • Using the sign plus “+”
Google tends to ignore punctuations and removes little words like “we”, “the”, ‘to”, and “of”… Using the sign plus before a word tells Google to include it in the search query, so this way and for instance, the result of this query “security is never complete” will definitely differs from this one “security +is never complete”
  • Use of quotation marks “” (or exact phrase search)
If you are sure that you have entered a word as it should be written but Google continues to suggest spelling corrections, or if you want to search for a phrase, quote or an error message … putting your query between quotes marks provides you with a more relevant result, example try searching “Debugging DLLs” with and without quotes.
  • Using the asterisk “*” also called wildcard or Joker
The use of the wildcard helps a lot when you want to search something but with one or more missing words (generally used with exact phrase search). For example if you want to find the title of the movie “Get the Gringo” but you are remembering only “Get The” you can try “Get The * movie”, try also “the art of *” hacking book”
Now that we know a little more about how the Google search bar interprets what we type in, let’s see some more interesting operators and keywords, especially when talking about security!
Define:word

This query returns the definition of the given word from the most reliable sources (websites). Define:Security

Filetype:file_extension

Using Filetype you can find files with specific extensions; this means that you restrict your search to a specific file type. Note that there is no space between filetype: and the following word; eg. We can search for databases backups using “backup filetype:sql”
Click to Enlarge
Click to Enlarge
Ext :file_extension

Regarding this operator, we can say that it has more or less the same role as the one cited above (filetype), except that the use of “ext” to seek uncommon extensions (like dmp, ks, key …) sends a more deep and accurate result.
Intitle:keyword(s)

This keyword allows you to search for a single word or a whole phrase present in the title of web pages and it is a commonly used keyword / operator to find directory listings. For example: intitle:index of “Last modified”
Click to Enlarge
Click to Enlarge
You can also use allintitle:keyword1 keyword2 keyword3 … to find results with all these different elements / keywords in web page titles.
Inurl :keyword

As Intitle and allintitle, Inurl and Allinurl can be used find one or more keywords present in the web pages URLs, this operator is widely used and can provide a lot of sensitive information such as in the case of the use of this query inurl:cgi-bin/etc/

Intext :keyword / Allintext :keyword1 keyword2 keyword3 …

Allintext and intext can search for keywords present in the body of web pages or documents and can be very helpful to find some interesting things like: allintext:”Control Panel” “login”

Site:domain

The use of the keyword site restricts the result to a particular website; specifying the domain, Google filters the result by limiting it to the chosen domain or website. Site:com, site:fr , site:gov … or you can limit your query to a specific website “reverse engineering site:infosecinstitute.com”

Cache :www.site.com

Once a website is indexed by Google, there are a lot of chances that it is kept in the Google cache, so we can get some old information even after website’s updates or in some cases even if the website is not available anymore:

Info :www .site.com

This query returns links to pages containing information about the website or web page in question. For example info:infosecinstitute.com

Google is not only good at finding stuff, it can even do math!
Until now, there’s nothing bad, but we will see that by combining different operator’s together, different keywords and knowing exactly what we want to find … the results usually exceed our expectations and especially when we are looking for vulnerabilities or some “private” data. This is conventionally called Google Hacking.
A according to the Wikipedia definition, Google hacking involves using advanced operators in the Google search engine to locate specific strings of text within search results. Some of the more popular examples are finding specific versions of vulnerable web applications. The following search query would locate all web pages that have that particular text contained within them. It is normal for default installations of applications to include their running version in every page they serve, e.g., “Powered by XOOPS 2.2.3 Final”.
Finding usernames

We will use Google to find files containing user names which is useful for making dictionaries for example. allintext:username filetype:log . Here is a part of a file with more than 2209 rows:
Error Retrieving RSS File:
username:picklepeople

user_id:7321
rss:http://a*******l.org/feed
XML Processing Error: 4Empty document

username:inferno
user_id:240
rss:http://r*****o.l******n.com/rss/
XML Processing Error: 9Invalid character
username:rishey
user_id:338
rss:http://feeds.feedburner.com/____dio.xml

And using the same query I found an SQL injection log attack:
2012-08-15 03:48:50 213.xxx.xx.229 cid http://www.h*****.at/index.php?option=com_yelp&controller=showdetail&task=showdetail&cid=-1+UNION+ALL+SELECT+1,2,3,concat(0×26,0×26,0×26,0×25,0×25,0×25,username,0x3a,password,0×25,0×25,0×25,0×26,0×26,0×26),5,6,7,8,9,10,11,12,13,14,15,16,17+FROM+jos_users– 2012-08-21 04:48:01 61.xxx.xxx.72 id http://www.h*****.at/index.php?option=com_recipes&Itemid=S@BUN&func=detail&id=-1/**/union/**/select/**/0,1,concat(username,0x3a,password),username,0x3a,5,6,7,8,9,10,11,12,0x3a,0x3a,0x3a,username,username,0x3a,0x3a,0x3a,21,0x3a/**/from/**/mos_users/*
Collecting email addresses

allintext:email OR mail +*gmail.com filetype:txt, with this query I was really surprised since the first result was a text file (without talking about the very interesting host found) containing 35,572 email addresses and passwords


Finding sensitive files and directories

intitle:”index of” inurl:ftp (pub OR incoming)
intitle:”Index of” phpMyAdmin , intitle:index of inurl:config* intext:last modified
intitle:”index of” AND password OR passwd OR pwd intext:”last modified”

All these queries return interesting results; we just need to know what we want to find and how to tell Google to look for it. Example of a result returned by one of these queries:
define(“MYSQL_HOST”, “mysql106.db.******.***.jp”);
define(“MYSQL_ID” , “na***o-hoso”);
define(“MYSQL_PASS”, “mJtp2XfG”);
define(“DBNAME”, “na***o-hoso”);

Finding error messages (eg finding some websites vulnerable to SQL Injection)

allintext:”Warning: mysql_connect(): Access denied for user: ‘*@*” “on line” -help -forum -tuto* inurl:”id=” & intext:”Warning: mysql_num_rows()” -help –forum

We can almost find everything we want using Google if we are able enough to sharpen our query. I enjoyed making some queries using different combinations of keywords within different operators, see some of results below:
Full access to mailboxes



IPN Logs (Instant Payement Notification)

[07/30/2012 8:16 PM] – SUCCESS!

IPN POST Vars from Paypal:
mc_gross=30.16, protection_eligibility=Eligible, address_status=confirmed, payer_id=624*****REN, tax=0.00, <strong>address_street=11 Ta*****x Cr*****nt,</strong>

<strong>Napsbury Park, London Colney</strong>,, payment_date=12:16:49 Jul 30, 2012 PDT, payment_status=Completed, charset=windows-1252, address_zip=AL2 1UT, first_name=francis, mc_fee=1.23, address_country_code=GB, address_name=francis dixon, notify_version=3.5, custom=, payer_status=unverified<strong>, business=aka******ns@gmail.com</strong>, <strong>address_country=United Kingdom</strong>, <strong>address_city=St Albans</strong>,, quantity=1, verify_sign=A5RHA3OA3pOT5X1MMHRoOSFAM28uAiONl5B7uyghy9xnGSAd9ccEWHE0, <strong>payer_email=f****s_m_d****n@hotmail.com</strong>, memo=<strong>11 Tamarix Crescent is my home and card address, but Id like the goods to be delivered to work, hence the delivery address is for Ashlyns Hall, Chesham Road, Berkhamsted, Herts, HP4 2ST. Thanks</strong>, txn_id=65W*******6337, payment_type=instant, last_name=dixon, address_state=Hertfordshire, <strong>receiver_email=ak*******ns@gmail.com</strong>, payment_fee=, receiver_id=223*****GE, txn_type=web_accept, <strong>item_name=www.tg*****en.co.uk</strong>, mc_currency=GBP, item_number=284, residence_country=GB, handling_amount=0.00, <strong>transaction_subject=www.tl****en.co.uk</strong>, payment_gross=, shipping=9.77, ipn_track_id=adca*******6f56,
IPN Response from Paypal Server:

HTTP/1.1 200 OK
Date: Mon, 30 Jul 2012 19:16:58 GMT

Server: Apache
X-Frame-Options: SAMEORIGIN

Set-Cookie: cwrClyrK4LoCV1fydGbAxiNL6iG=hK2VxLRsSDcIYah2BmIWM47I715hlkzTGZn77XqmWH_hTHKBD4Dfb_YB7QJlb4i-XN1tcAlHsYZ7SJG0nwdzGZ9eCXsD8fnHSGUfuv2VDtDWp5doDsPpyYHv0QQK0YpgrIYVxG%7cEm0x-LnDlXeHNV0UQExcUhT9rGdmvXVCyQ4nJjpQbWY-aukw2RIxc_jHE0Le2yfB79mo2m%7cSbl_lt9TSLMGNvfjbyQmu4B3eh7tFun2OFsf-SGv2lectPoMVxcIrwMNF7QDvzNc8v_ON0%7c1343675818; domain=.paypal.com; path=/; HttpOnly
Set-Cookie: cookie_check=yes; expires=Thu, 28-Jul-2022 19:16:58 GMT; domain=.paypal.com; path=/; HttpOnly

Set-Cookie: navcmd=_notify-validate; domain=.paypal.com; path=/; HttpOnly
Set-Cookie: navlns=0.0; expires=Sun, 25-Jul-2032 19:16:58 GMT; domain=.paypal.com; path=/; HttpOnly

Vary: Accept-Encoding
Connection: close

Transfer-Encoding: chunked
Content-Type: text/html; charset=UTF-8

Full information about some website’s customers with their names, addresses, postal codes, cities, phones, mobiles and emails addresses
Click to Enlarge
Click to Enlarge
You can see that things are getting more serious. As you probably guessed, no one escapes the indexation’s spiders and crawlers of Google!
Here is an Excel file containing names, country codes, marks and bachelor courses of more than 8014 students:
Click to Enlarge
Click to Enlarge
Here are full dumps of databases of tens if not hundreds of some website containing in some cases clear usernames and passwords:
Click to Enlarge
Click to Enlarge

I’m going to stop at this point, no need for more demonstration; Google is certainly our common friend, including malicious people with malicious intents, before putting a file, a directory or any other information that’s not supposed to be publicl, you should remember checking the state of access to your sensitive files and folders.
The use of an empty index.hml file within a directory can be very useful to remove simple directory listing, think also about applying the correct CHMOD to your sensitive directories and limit or remove access to your uploaded backups.
The use of the file Robots.txt can also save the privacy of your data; you can prevent Google or any other search engine from indexing your website, files or directories by correctly filling a Robots.txt file.
The following tips may help:
  • Preventing Google from indexing your site:
    User-agent: Googlebot

    Disallow: /
  • Preventing every search engine from indexing your site:
    User-agent: *

    Disallow: /
  • You can also prohibit Google from indexing a specific file type:
    User-agent: Googlebot

    Disallow: /*.sql$
  • To prohibit a directory and all its content from being indexed by Google:
    User-agent: Googlebot

    Disallow: /directoryName/
  • To prohibit a specific page from being indexed by Google:
    User-agent: Googlebot

    Disallow: /confidential.html
These tips could be used along with some HTML tags (Meta tags) which you can place between <head> and </head>
<meta name=”robots” content=”noindex, nofollow”>
And you can also prevent caching your website by Google by using this:
<meta name=”Googlebot” content=”noarchive”>
This non-exhaustive list of solutions may possibly help you to protect yourself against search engines and especially against Google, but you must be very careful when handling the way Googlebot (or any other search engine crawler) can see your website to not see your pages disappearing completely from their search engine results!

Smart Google searching ...........

Looking for the ultimate tips for Google searching? You've just found the only guide to Google you need. Let's get started:
1. The best way to begin searching harder with Google is by clicking the Advanced Search link.
2. This lets you search for exact phrases, "all these words", or one of the specified keywords by entering search terms into the appropriate box.
3. You can also define how many results you want on the page, what language and what file type you're looking for, all with menus.
4. Advanced Search lets you type in a Top Level Domain (like .co.uk) in the "Search within site of domain" box to restrict results.
5. And you can click the "Date, usage rights, numeric range and more" link to access more advanced features.

Wednesday 9 September 2015

inode and its structure in linux



Linux inode tutorialLet me begin this tutorial by a famous UNIX statement which emphasizes the main underlying working model of Linux operating system. The statement is that "Everything Is a File".
If you are one of that person who spends a lot time with Linux or any NIX system, then you might have already understood that statement. Each and everything in Linux is accessed by a file. To make that much more clear, even block devices like Hard disks,and CD/DVD's are nothing other than a file(yeah but a special file..but a file).
Now if we start digging a bit deeper into files, we will come to know that, to the operating 

Howto see output of C program in Linux or UNIX

Syntax
gcc -o output-file program.c

Task: Compile program

To compile type the command:
$ gcc test.c

Show All Running Processes in Linux


How do I see all running process in Linux operating systems using command line or GUI options?


  1. top command : Display and update sorted information about processes.
  2. atop : Advanced System & Process Monitor.
  3.     htop : Interactive process viewer.


Friday 4 September 2015

Command Prompt - Advanced Disk Management Commands

In one of our previous articles, we've shown how to manage your disks using the Disk Management utility. Now it's time to see how the same can be done from the Command Prompt using the DiskPart program. In this article you will learn how to create, format, delete and check your partitions for errors, directly from the Command Prompt.
NOTE: In order to perform any action presented in this article, you need to have administrative permissions and run the Command Prompt as administrator. Check out How to Run Programs as Administrator in Windows 7 to see how to run Command Prompt as administrator.
Important: If you misuse the commands listed in this article, you can risk losing your data. It is important to be careful and have a backup available for your data. Therefore proceed carefully and don't say we did not warn you. :)

Thursday 3 September 2015

Open Proxy Site

go to:-
  
     https://hide.me/en/proxy
  enjoy 
        - by kishor

404 Page Not Found

404 Page Not Found
 404 Not Found error messages can appear in any browser and in any operating system. Most 404 Not Found errors display inside the Internet browser window just as webpages do.
In Internet Explorer, the message The webpage cannot be found usually indicates an HTTP 404 Internal Server Error but a 400 Bad Request error is another possibility. You can check to see which error IE is referring to by checking for either 404 or 400 in the title bar.
404 errors received when opening links via Microsoft Office applications generate a The Internet site reports that the item you requested could not be found (HTTP/1.0 404) message inside the MS Office program.
When Windows Update produces a 404 error, it appears as a code 0x80244019 or as the message WU_E_PT_HTTP_STATUS_NOT_FOUND.

How to Transfer Data between two laptops using LAN Cable

1.  Insert IP address in both computer . 
  •  Open control panel window.
  •  Choose Network and Sharing Center button.
Image
  • Then you find a pop up box of Network and Sharing Center.  Here, click on Change adapter setting.
Image
  • In Network Connections Pop –up Window, right click on correctly installed LAN Card hardware adapter in your computer and select its properties.
Image
  • Then Local Area Connection (LAN) properties window is appearing. Choose Internet protocol Version 4 (TCP/IPv4) button and click on properties option.
Image
  • Now enter IP (Internet protocol) address in both computers manually according to below and select OK Option.
First computer (computer name – NAVIN – PC) 
Enter IP Address: – 192.168.0.1
Enter Subnet mask: – 255.255.255.0
Image
Second computer (computer name- ABHISHEK – PC)
Enter IP Address: – 192.168.0.2
Enter Subnet mask: – 255.255.255.0
Image
  • After inserting IP address in both computer properly, restart it.
  • when computer will load windows 7,  click on start search box and type network. click on this link.
Image
  • In network tab, you find all connected computers in networking under similar workgroup.
Image
How to share computer drives to transfer files over network ? 
When both computers are showing in network tab and want to share computer drives
  •  At first, open computer explorer window of the first computer, press right click on opted drive partition which we want to share with another computer over network.
  • From drop down menu list, choose share with option.
  • Now select Advance Sharing button.
Image
  • A new tab of opted drive properties is appearing. click on Advance Sharing option.
Image

Data recovry

Knoppix-Based Runtime Live CD - Experimental*)

ShadowCopy

Runtime Live CD
ISO Image 550 MB**)
Runtime Software has teamed up with Knoppix, the Linux-based bootable live system. Already used by Millions around the world, the Knoppix Live CD features automatic hardware detection and support for many network adapters, graphic cards, hard disk controllers, SCSI and USB devices, and other peripherals.

Free Download**)

Ready-To-Use Recovery Environment

How to Compile the Linux Kernel

The Linux kernel is the heart of any Linux system. It handles user input/output, hardware, and controlling the power in the computer. While the kernel that comes with your Linux distribution is usually sufficient, this allows you to make your owns specialized kernel!
Ad

Steps

  1. Compile the Linux Kernel Step 1.jpg

Transistor Operation


npn- Transistor Operation

A forward-biased pn- junction is comparable to a low-resistance circuit element because it passes a high current for a given voltage. In turn, a reverse-biased pn- junction is comparable to a high-resistance circuit element. By using the Ohm's law formula for power (P = I2·R) and assuming current is held constant, you can conclude that the power developed across a high resistance is greater than that developed across a low resistance. Thus, if a crystal were to contain two pn- junctions (one forward-biased and the other reverse-biased), a low-power signal could be injected into the forward-biased junction and produce a high-power signal at the reverse-biased junction. In this manner, a power gain would be obtained across the crystal. This concept, which is merely an extension of the material covered in the previous topics, is the basic theory behind how the transistor amplifies. With this information fresh in your mind, let's proceed directly to the npn transistor.

What are the parts in a hard drive?

The parts/components inside a hard drive
     A hard drive has only a few basic parts. There are one or more shiny silver platters where information is stored magnetically, there's an arm mechanism that moves a tiny magnet called a read-write head back and forth over the platters to record or store information, and there's an electronic circuit to control everything and act as a link between the hard drive and the rest of your computer.
After a hard-drive crash last year, I was left with an old drive that no longer worked. I took a peek inside, and here's what I found...

Free Energy


       Free Energy ....




ALL WINDOWS SERIAL NO

 ALL WINDOWS SERIAL NO


Windows 95 :
CD-key Serial Number: 875-7215850 or
CD-key Serial Number: 100-1208613 or
CD-key Serial Number: 757-2573155
Windows 95 (2) :
CD-key Serial Number: 727-0208693 or
CD-key Serial Number: 767-0602634 or
CD-key Serial Number: 747-1012622

What is Robots.txt ?

The robots exclusion protocol (REP), or robots.txt is a text file webmasters create to instruct robots (typically search engine robots) how to crawl and index pages on their website.

Cheat Sheet

Block all web crawlers from all content
User-agent: *
Disallow: /
Block a specific web crawler from a specific folder
User-agent: Googlebot
Disallow: /no-google/

Computer POST and beep codes

How to Promote a website

Whether you’ve already taken your business online or still looking for a simple solution to create a professional website, you probably already know that promoting your website is crucial to your success.
If you have no previous experience with site promotion, you’re likely reaching for a bottle of Aspirin right now. But fear not, promoting your website isn’t only simple, it can be done without even spending a penny!
Check out the links below for a list of opportunities to promote your site online for free! With the right time and effort, you can find yourself attracting a whole slew of new clients to your great looking site!

33 Free Places to Promote your Website OnlineSearch Engines

It may or may not surprise you to hear that the majority of traffic from the internet is derived from search engines. With that said, search engines should be the first place that you should turn to to promote your online presence. Ensure that search engines know that your site exists by submitting your link directly to them. Once that’s out of the way, the best way to improve your search engine presence is by taking the time to improve your SEO.
Right now, the search engines that generate the most traffic are:
Google 
Yahoo
Bing

Search Engines

Wix.comOnline Directories:

The modern day Yellow Pages, online directories are where potential clients turn to to find business solutions. Adding your site to online directories is extremely important as it greatly improves your site’s SEO by linking back to your website. When submitting your site, make sure to include important details like your location and business category so that your website will appear in sub-categories where new and potential clients can easily find you.
Yelp
Google Business
Yahoo Local
TripAdvisor
Yellow Pages
Super Pages
Angie’s List
Manta
DexKnows
BBB
Merchant Circle
Online Directories:
Bonus!
Restaurateurs should also take the time to get listed in these restaurant specific sites:
Urban Spoon
Open Table Restaurant Management Software
Be sure to add the Open Table App to your Wix site as well for maximum exposure.

Social Link Building

Social sites are where many web surfers spend the majority of their online time. Linking your content on popular social sites is a great way to put your business in the face of your known audience, and also a fantastic opportunity to gain quality backlinks by exposing your brand to broader audiences.
Facebook Pages
Youtube
* More than a social network, Youtube is one of the most searched business directory in America
Google +
Pinterest
Foursquare
Polyvore
Stumble Upon
Reddit
Diigo

Social Link BuildingBlogging Platform / Article Submission

Blogging platforms and article-submission sites are a terrific way to promote your site. All you need to do is write an original article related to your business and submit it to these sites. While it’s important to keep these articles informative, try to keep your tone friendly. Articles that sounds genuinely well-intentioned and have a less aggressive marketing tone, will likely draw more interest to your site than self-promotion alone. Blogs and articles are also great for promoting link building for SEO benefits.
Blogger
*Owned by Google, Blogger is hardwired with Google’s Adsense advertising program.
You can also add the Blogger Feed from the Wix App Market to your Wix Website for maximum exposure.
Tumblr
Postach.io
SlideShare
Digg

Blogging Platform / Article SubmissionPhoto Sharing

Similarly to social network sites like Pinterest and Polyvore, photo sharing sites give you the opportunity to display visual content that is related to your business, and can be used to refer and link back to your website. Photo sharing sites are not for photographers alone – any business can use these sites to post images of events, coworkers, news and everything in between, as long as it’s connected to your biz.
Picasa
*Another Google Integrated site, sharing and tagging on this site come with additional SEO benefits.
Flickr
Photobucket
Photo Sharing
Looking for an easy way to create a professional website? Wix’s web templates are optimized for SEO and mobile viewing & are super easy to customize.

Show Hidden Files Using Command Prompt

  1. Go to Start>>All Programs>>Accessories>>Click Command Prompt.
    Alternatively in recent version of windows you can click on Start and in the search box type "cmd" then press enter.
    Ad
  2. 2

    Click Start>>Computer/My Computer.
    Look for a Removable (F:)(Example only)

This copy of windows is not genuine solution

1. Click on start menu.
2.Type cmd in search field.
3.Right click on cmd file and click on Run as Administrator.It is must to run command prompt with administrator privileges.
4. Type SLMGR -REARM (SLMGR is Windows software licensing management tool. REARM command will reset the licensing status of machine) and press enter.

How to delete duplicate records from a SQL data table

  introduction How to delete duplicate records from a SQL data table using CTE (common table expression). Specifies a temporary named result...