Corona Update

Stats

Monday, July 29, 2013

Call diversion

Secret codes for call divert,waiting ,identity


The following are the secret codes for all mobiles including nokia,sony ericcson,motorola and other mobiles.using these secret codes you can easily call divert your calls to another number and enable call waiting in your mobile and also for activating calling line identity.

Call Diverting

All
To Activate: * * 21 * NUMBER # [SEND]
To Cancel: # # 21 # [SEND]
To Check: * # 21 # [SEND]

No Answer
To Activate: * * 61 * NUMBER # [SEND]
To Cancel: # # 61 # [SEND]
To Check: * # 61 # [SEND]

Unreachable

To Activate: * * 62 * NUMBER # [SEND]
To Cancel: # # 62 # [SEND]
To Check: * # 62 # [SEND]

Busy

To Activate: * * 67 * NUMBER # [SEND]
To Cancel: # # 67 # [SEND]
To Check: * # 67 # [SEND]
To Cancel All Call Forwarding # # 002 # [SEND]

Call Waiting

To Activate: * 43 # [SEND]
To Deactivate: # 43 # [SEND]
To Check: * # 43 # [SEND]

Calling Line Identity 
Outgoing

To Activate: * 31 # [SEND]
To Deactivate: # 31 # [SEND]
To Check: * # 31 # [SEND]

Incoming

To Activate: * 30 # [SEND]
To Deactivate: # 30 # [SEND
SEE ALL TYPE PHONE MODEL

NOKIA PHONE'S MODEL
*#0000#
to see model no.

SONY ERICSSON MOBILES 

press >*<<*<* after doing that a hidden menu will be appear. now u can check all the service of mobile.
You'll see phone model, software info, IMEI, configuration info, sim lock status, REAL time clock, total call time and text labels.
You can also test your phones services and hardware from this menu (main display, camera, LED/illumination, Flash LED, keyboard, earphone, speaker, microphone, radio and vibrator tests)

SAMSUNG PHONE'S MODEL
*#92782#

LG PHONE'S MODEL 

LG all models test mode: Type 2945#*# or 2945#-*# on the main screen. Secret menu for LG: 2945*#01*# or 2945*-#01*# 

Wednesday, June 19, 2013

More than 100 Keyboard Shortcuts must read & Share



Keyboard Shortcuts (Microsoft Windows)
1. CTRL+C (Copy)
2. CTRL+X (Cut)
3. CTRL+V (Paste)
4. CTRL+Z (Undo)
5. DELETE (Delete)
6. SHIFT+DELETE (Delete the selected item permanently without placing the item in the Recycle Bin)
7. CTRL while dragging an item (Copy the selected item)
8. CTRL+SHIFT while dragging an item (Create a shortcut to the selected item)
9. F2 key (Rename the selected item)
10. CTRL+RIGHT ARROW (Move the insertion point to the beginning of the next word)
11. CTRL+LEFT ARROW (Move the insertion point to the beginning of the previous word)
12. CTRL+DOWN ARROW (Move the insertion point to the beginning of the next paragraph)
13. CTRL+UP ARROW (Move the insertion point to the beginning of the previous paragraph)
14. CTRL+SHIFT with any of the arrow keys (Highlight a block of text)
SHIFT with any of the arrow keys (Select more than one item in a window or on the desktop, or select text in a document)
15. CTRL+A (Select all)
16. F3 key (Search for a file or a folder)
17. ALT+ENTER (View the properties for the selected item)
18. ALT+F4 (Close the active item, or quit the active program)
19. ALT+ENTER (Display the properties of the selected object)
20. ALT+SPACEBAR (Open the shortcut menu for the active window)
21. CTRL+F4 (Close the active document in programs that enable you to have multiple documents opensimultaneously)
22. ALT+TAB (Switch between the open items)
23. ALT+ESC (Cycle through items in the order that they had been opened)
24. F6 key (Cycle through the screen elements in a window or on the desktop)
25. F4 key (Display the Address bar list in My Computer or Windows Explorer)
26. SHIFT+F10 (Display the shortcut menu for the selected item)
27. ALT+SPACEBAR (Display the System menu for the active window)
28. CTRL+ESC (Display the Start menu)
29. ALT+Underlined letter in a menu name (Display the corresponding menu) Underlined letter in a command name on an open menu (Perform the corresponding command)
30. F10 key (Activate the menu bar in the active program)
31. RIGHT ARROW (Open the next menu to the right, or open a submenu)
32. LEFT ARROW (Open the next menu to the left, or close a submenu)
33. F5 key (Update the active window)
34. BACKSPACE (View the folder onelevel up in My Computer or Windows Explorer)
35. ESC (Cancel the current task)
36. SHIFT when you insert a CD-ROMinto the CD-ROM drive (Prevent the CD-ROM from automatically playing)
Dialog Box - Keyboard Shortcuts
1. CTRL+TAB (Move forward through the tabs)
2. CTRL+SHIFT+TAB (Move backward through the tabs)
3. TAB (Move forward through the options)
4. SHIFT+TAB (Move backward through the options)
5. ALT+Underlined letter (Perform the corresponding command or select the corresponding option)
6. ENTER (Perform the command for the active option or button)
7. SPACEBAR (Select or clear the check box if the active option is a check box)
8. Arrow keys (Select a button if the active option is a group of option buttons)
9. F1 key (Display Help)
10. F4 key (Display the items in the active list)
11. BACKSPACE (Open a folder one level up if a folder is selected in the Save As or Open dialog box)

Microsoft Natural Keyboard Shortcuts
1. Windows Logo (Display or hide the Start menu)
2. Windows Logo+BREAK (Display the System Properties dialog box)
3. Windows Logo+D (Display the desktop)
4. Windows Logo+M (Minimize all of the windows)
5. Windows Logo+SHIFT+M (Restorethe minimized windows)
6. Windows Logo+E (Open My Computer)
7. Windows Logo+F (Search for a file or a folder)
8. CTRL+Windows Logo+F (Search for computers)
9. Windows Logo+F1 (Display Windows Help)
10. Windows Logo+ L (Lock the keyboard)
11. Windows Logo+R (Open the Run dialog box)
12. Windows Logo+U (Open Utility Manager)
13. Accessibility Keyboard Shortcuts
14. Right SHIFT for eight seconds (Switch FilterKeys either on or off)
15. Left ALT+left SHIFT+PRINT SCREEN (Switch High Contrast either on or off)
16. Left ALT+left SHIFT+NUM LOCK (Switch the MouseKeys either on or off)
17. SHIFT five times (Switch the StickyKeys either on or off)
18. NUM LOCK for five seconds (Switch the ToggleKeys either on or off)
19. Windows Logo +U (Open Utility Manager)
20. Windows Explorer Keyboard Shortcuts
21. END (Display the bottom of the active window)
22. HOME (Display the top of the active window)
23. NUM LOCK+Asterisk sign (*) (Display all of the subfolders that are under the selected folder)
24. NUM LOCK+Plus sign (+) (Display the contents of the selected folder)
25. NUM LOCK+Minus sign (-) (Collapse the selected folder)
26. LEFT ARROW (Collapse the current selection if it is expanded, or select the parent folder)
27. RIGHT ARROW (Display the current selection if it is collapsed, or select the first subfolder)
Shortcut Keys for Character Map
After you double-click a character on the grid of characters, you can move through the grid by using the keyboard shortcuts:
1. RIGHT ARROW (Move to the rightor to the beginning of the next line)
2. LEFT ARROW (Move to the left orto the end of the previous line)
3. UP ARROW (Move up one row)
4. DOWN ARROW (Move down one row)
5. PAGE UP (Move up one screen at a time)
6. PAGE DOWN (Move down one screen at a time)
7. HOME (Move to the beginning of the line)
8. END (Move to the end of the line)
9. CTRL+HOME (Move to the first character)
10. CTRL+END (Move to the last character)
11. SPACEBAR (Switch between Enlarged and Normal mode when a character is selected)
Microsoft Management Console (MMC)
Main Window Keyboard Shortcuts
1. CTRL+O (Open a saved console)
2. CTRL+N (Open a new console)
3. CTRL+S (Save the open console)
4. CTRL+M (Add or remove a console item)
5. CTRL+W (Open a new window)
6. F5 key (Update the content of all console windows)
7. ALT+SPACEBAR (Display the MMC window menu)
8. ALT+F4 (Close the console)
9. ALT+A (Display the Action menu)
10. ALT+V (Display the View menu)
11. ALT+F (Display the File menu)
12. ALT+O (Display the Favorites menu)

MMC Console Window Keyboard Shortcuts

1. CTRL+P (Print the current page or active pane)
2. ALT+Minus sign (-) (Display the window menu for the active console window)
3. SHIFT+F10 (Display the Action shortcut menu for the selected item)
4. F1 key (Open the Help topic, if any, for the selected item)
5. F5 key (Update the content of all console windows)
6. CTRL+F10 (Maximize the active console window)
7. CTRL+F5 (Restore the active console window)
8. ALT+ENTER (Display the Properties dialog box, if any, for theselected item)
9. F2 key (Rename the selected item)
10. CTRL+F4 (Close the active console window. When a console has only one console window, this shortcut closes the console)
Remote Desktop Connection Navigation
1. CTRL+ALT+END (Open the Microsoft Windows NT Security dialog box)
2. ALT+PAGE UP (Switch between programs from left to right)
3. ALT+PAGE DOWN (Switch between programs from right to left)
4. ALT+INSERT (Cycle through the programs in most recently used order)
5. ALT+HOME (Display the Start menu)
6. CTRL+ALT+BREAK (Switch the client computer between a window and a full screen)
7. ALT+DELETE (Display the Windows menu)
8. CTRL+ALT+Minus sign (-) (Place a snapshot of the active window in the client on the Terminal server clipboard and provide the same functionality as pressing PRINT SCREEN on a local computer.)
9. CTRL+ALT+Plus sign (+) (Place asnapshot of the entire client window area on the Terminal server clipboardand provide the same functionality aspressing ALT+PRINT SCREEN on a local computer.)

Microsoft Internet Explorer Keyboard Shortcuts
1. CTRL+B (Open the Organize Favorites dialog box)
2. CTRL+E (Open the Search bar)
3. CTRL+F (Start the Find utility)
4. CTRL+H (Open the History bar)
5. CTRL+I (Open the Favorites bar)
6. CTRL+L (Open the Open dialog box)
7. CTRL+N (Start another instance of the browser with the same Web address)
8. CTRL+O (Open the Open dialog box,the same as CTRL+L)
9. CTRL+P (Open the Print dialog box)
10. CTRL+R (Update the current Web page)
11. CTRL+W (Close the current window)

Friday, June 7, 2013

Downloading Windows 8 for Free [Full version]


preparing
Windows 8 is a new version of Windows that focuses on variety of hardware platform and form factors such as slim-type computers and new generation of touch devices. The new version free for download was made available for developers and testers of the new OS.
Here’s the download links for the Enterprise version of Windows.
Windows 8 Evolution 2014 preactivated (x86/Eng/Jun2013) Free Download


Platform:  Windows  8 x86
Compilation Date: 1.06.2013
Based on Edition: Pro
Automated Installation : Yes
Category : Operating System
Activation Needed :No
Kernel Type: Hybrid
Installation Type: BIOS
Digitally Signed for Security : Yes
DVD-Key : Not Required
Size: 4.3 GB
No of DVD's: 1 (Normal DVD)
Format: ISO Image File
Installation Time : 25 - 30 Mins



Features :

* New Window Sounds
* New ORB Image
* More Stable and Reliable
* UAC Disabled (You should be able to run Metro Applications without any problem)
* New Look for  Windows  Media Player
* New  Windows  8   evolution   Theme (Default)
* Show extensions for known file types
* Enabled Glass Effect (DWM) without a supported card
*  Windows  will tell you exactly what it is doing when it is shutting down or is booting.
* Add command prompt to right click context menu
* Enabled addition Avalon effects
* Added "Explore from here" context menu while right clicking on folders
* Get rid of the  Windows  Mail splash screen
* Mximum Simultaneous Downloads for Internet Explorer to 20 (Default was 2 )
* Enabled DirectX Video Acceleration in  Windows  Media Player
* Disabled Auto Rip disc when inserted in  Windows  Media Player
* Highly customized shell.
* Enabled Auto Eject disc when ripping is completed
* Disabled deleting files from computer when deleted in library in  Windows  Media Player
* Disabled Auto Add Played Media files
* Enabled Advanced Option in Monitor Folders in  Windows  Media Player
* Disabled deleting *******s from devices when deleting playlist in  Windows  Media Player
* Enabled ClearType Tuning
* Added 'Copy to Folder' to right click context
* Added 'Move to Folder' to right click context
* Enabled Search in system folders
* Improved reliabity and improved performance for gaming.
* Disabled the NTFS Last Access Time Stamp (speeds up viewing folders in ntfs)
* Disabled kernel paging* Optimize Core System Performance
* Disabled kernel paging* Optimize Core System Performance
* Disabled 8.3 names in NTFS
* Disabled Low disk space checks
* Faster Shutdown
* Fully Automated  Windows  Setup
* Added 'Open With Notepad' to right click context
* Disabled StickyKeys Keyboard shortcut (Popups up when pressing SHIFT key five times).
* Disabled FilterKeys Keyboard shortcut (Popups up when pressing SHIFT key eight seconds).
* Disabled ToggleKeys Keyboard shortcut (Popups up when pressing NUM LOCK key five seconds).
* Disabled  Windows  Media Player AutoUpdates
* Disabled IPv6
* Added slow-motion window effects
* Added"Advanced System Properties" to right-click on Computer
* Faster browsing with IE
* Added "Guy's Search" to Recycle Bin Context Menu
* Added Device Manager to My Computer Context Menu
* Added Group Policy Editor to My Computer Context Menu
* Added Registry Editor to My Computer Context Menu
* Added Task Manager to My Computer Context Menu
* Added Services to My Computer Context Menu
* You can update  Windows  without any problems now.
* Enabled Power Down After Shutdown
* Added User Accounts 2 in Control Panel
* Added Administrative Tools in My Computer
* Added Personalization Tools in My Computer
* Added  Windows  Switcher in My Computer
* Added Internet Explorer 9 in My Computer
* Added Network Connections in My Computer
* Added Printers in My Computer
* Added Recycle Bin in My Computer
* New additional gadgets
* Added Run in My Computer
* Added Search in My Computer
* Added  Windows  Update in My Computer
* Added Device Manager in My Computer
* Added Defragment in Drive Context Menu
* Added Group Polic yEditor in Control Panel
* Added Registry Editor in Control Panel
* Added Register & Un-Register to the context menu for .dll files.
* Added Advanced User Accounts to Control Panel
* Added Disk Cleanup to Drives
* Added Extract All to MSI files
* Added  Windows  SideBar Gadgets
* Added Open File / Folder Location
* Added Open In New Process
* The System file coding and scripts are optimized to maximum level to  boost system performance (This option is only available in Reckons  International Team customized  Windows  operating systems)
* Added Run With Priority
* Added TakeOwnership to Right-Click
* Added Register & Un-Register to the context menu for .ocx and .ax files.
* Improved Thumbnail Quality
* Added DirectX Diagnostic Tool To Control Panel
* Disabled Automatic Restart on BSOD
* System Files are boosted to maximum level of performance
*  Windows  Installer will use logging
*  Windows  evaluates file extensions on the first three characters
* It will show Absent Devices in Device Manager
* Hidden Scheduled Tasks in the Network Share
* Hidden Printers and Faxes in the Network Share
* Added New Sidepane Images.
* DirectX files up-to-date
* Disabled First Logon Animation
* Disabled Default Hidden Shares
*  Windows  Update will Notify you about the updates but will not download unless you start downloading
* Enabled All users to download and install  Windows  Updates.
* Disabled Automatic System Reboot after  Windows  Updates has been installed.
* Enabled cross-frame navigation by the ActiveX control in .chm files.
* Enabled display for .pif (DOS Shortcut) file extension.
* Enabled display for .scf (Explorer Command) file extension.
* Enabled display for .shb (******** Shortcut) file extension.
* Enabled display for .shs (Shell Scrap Object) file extension.
*  Windows  will force to unload DDL from memory.
* Everything will run separate memory.
* Added  Windows  Genuine Logo to system properties.
* 16-bit Applications in a separate memory space
* Improved the way System Services run by default
* Boot files to be placed optimally on the hard-drive for faster boots.
*  Windows  will specifie the time, following user input, during which the system keeps apps from moving into the foreground
* Notepad will save window position
* Command Prompt text colour is white now
* Added God Mode in Desktop Context Menu
* Added  Windows  Switcher in Desktop Context Menu
* Added Task Manager in Desktop Context Menu
* Added Registry Editor in Desktop Context Menu
* High Quality Wallpapers
* New High Quality Icons
*  Windows  7 like Start Menu
* Secured kernel-mode drivers
* Seperate UI for Metro and Desktop
* Ribbon Disabled
* New Explorer View
* Large Icons in Control Panel
* Removed Old Default Graphics Card Drivers and updated with latest version drivers.
* New Sample Music
* Removed First Logon Animation
* Added Old  Windows  7 Games back
* Improved system reliabity while playing HD Games
* Integrated Latest  Windows  Updates
* DEP (Data Execution Prevention) Disabled
* Updated Servicing Stack
* Improved System Performance and reliability
* Updated XML Core Services 3.0 and 6.0
* Fixed : Virtual switch extension cannot send packets separately through every individual network adapter in  Windows
* Resolved Delayed delivery when you send many messages on a  Windows  8-based Message Queuing server
* Fixed : I cannot open Help that was created in the  Windows  Help format (WinHlp32.exe)
* Fixed : Telephone line information is not updated in a Tsec.ini file  after you assign more than five telephone lines to a user in Windows
* Fixed : You cannot watch or record certain TV shows by using  Windows  Media Center on a computer that is running  Windows  8
* Fixed : Vulnerabilities in  Windows  shell could allow remote code execution
* Updated  Windows  OpenType Compact Font Format (CFF) driver
* Updated for Vulnerabilities in Adobe Flash Player in Internet Explorer 10
* Fixed : WinRE is not enabled after you run the OOBE wizard in  Windows  8
* Fixed : Vulnerability in DirectPlay could allow remote code execution
* Fixed : Clients cannot connect to IPv4-only resources when you use DirectAccess and external load balancing in  Windows  8
* Fixed : Incorrect keyboard layout is used after you refresh  Windows  8
* Fixed : You cannot log on to a virtual machine that is running  Windows  8 or  Windows  Server 2012 in a VDI environment
* Fixed : You cannot create a cluster file share on a third-party dynamic disk resource in  Windows  8
* Fixed : Offloaded Data Transfers fail on a computer that is running  Windows  8
* Fixed : Name constraint validation fails when a URN is specified in a subject alternative name in  Windows  8
* Fixed : Network status is "Limited" when you use a force tunneling VPN connection in  Windows  8
* Resolved You cannot overwrite an exported event log file by using the Wevtutil.exe tool in  Windows  8
* Fixed : RDP virtual static channels don't work and an operation stalls in  Windows  8
* Fixed : Vulnerabilities in  Windows  Kernel-Mode drivers could allow elevation of privilege
* Fixed : HD Audio devices and audio options may disappear after you restart or resume  Windows  8
* Fixed : Error message when you run the "New-VirtualDiskSnapshot -TargetStoragePoolName" Storage Management cmdlet in  Windows  8
* Fixed : MPIO paths do not recover when you use MSDSM
* Fixed : Vulnerability in  Windows  kernel-mode driver could allow elevation of privilege
* Fixed : Slow performance when you connect to a WebDAV shared folder in  Windows  8
* Resolved  Windows  Update stops at 13 percent in  Windows  8
* Fixed : "0x0000009F" Stop error when a website turns on a webcam in  Windows  8
* Fixed : "0x80100065" error when you call the SCardConnect function in  Windows  7,  Windows
* Fixed : Vulnerabilities in Microsoft SSL implementation could allow security feature bypass
* Resolved Program Compatibility Assistant dialog box appears when you  start a desktop app from the "Autoplay" dialog box in  Windows  8
* Resolved Slow performance when you connect to a WebDAV shared folder in  Windows  8
* Fixed : You receive a "DPC_WATCHDOG_VIOLATION (133)" Stop error message on a  Windows  8
* Fixed : Window 8 may stop responding (hang) when multiple abort commands are sent to an embedded storage device

Included Programs :

1.) 7-Zip
2.) WinRAR (Activaed)
3.) CDBurnerXP
4.) Mozilla Firefox
5.) K-Lite Mega Codec Package
6.) Adobe Flash Player
7.) Notepad ++
8.) Java Runtime Environment Update
9.) CCleaner Bussines Edition
10.) RocketDock
11.) StartIsBack (Activated)
12.) Microsoft .NET Framework (2.0 to 3.5)


Install Notes
1. Burn Iso with any burner
2. then reboot your system
3. then press any key
4. format and Install it
5. AND NJOY CF

-------------------------------------------------------------------------

Sunday, March 31, 2013

Let your PC boot up completely



1. Let your PC boot up completely before opening any applications.

2. Refresh the desktop after closing any application. This will remove any unused files from the RAM.

3. Do not set very large file size images as your wallpaper. Do notkeep a wallpaper at all if your PC is low on RAM (less than 64 MB).

4. Do not clutter your Desktop with a lot of shortcuts. Each shortcut on the desktop uses up to 500 bytes of RAM

5. Empty the recycle bin regularly. The files are not really deleted from your hard drive until you empty the recycle bin.

6. Delete the temporary internet files regularly.

7. Defragment your hard drive once every two months. This will free up a lot of space on your hard drive and rearrange the files so that your applications run faster.

8. Always make two partitions in your hard drive. Install all large Softwares (like PSP, Photoshop, 3DS Max etc) in the second partition. Windows uses all the available empty space in C drive as virtual memory when your Computer RAM is full. Keep the C Drive as empty as possible.

9. When installing new Softwares disable the option of having a tray icon. The tray icons use up available RAM, and also slow down the booting of your PC. Also disable the option of starting the application automatically when the PC boots. You can disable these options later on also from the Tools or preferences menu in your application.

10. Protect your PC from dust. Dust causes the CPU cooling fan to jam and slow down thereby gradually heating your CPU and affecting the processing speed. Use compressed air to blow out any dust from the CPU. Never use vacuum.

Trace Emails


----------------
So here is the method of tracing the
exact location from where the
email is sent.I am showing the email
tracing on yahoo here but
gmail and other mail providing
services have same concept.
Step 1:-First open up your email
account and click on your
inbox.
Step 2:-Now Select any email that
you want to trace
Step 3:-After Opening scroll the
mail at the end and in right
corner you will see a option FULL
HEADER click on it
Have a close eye on these contents
Step4. : This is how it will look like :
[Received From: - 127.0.0.1(EHLO
mail-qy-f200.google.com)
(209.85.221.200) ] <-------The IP
address at last is the real IP address
of
the person who is sending this mail.
2. To see the proper location of this
IP address Go to
www.whatismyip.com or
www.whois.domaintools.com .These
websites help you to find the whole
detail and satellite images of
the ISP location from the Email was
sent.

Comment and like for more!

Saturday, March 30, 2013

World's biggest DDoS attack blamed for slowing down global Internet speeds


DDoS attack blamed but there could actually be other reasons for slow Internet.
World's biggest DDoS attack blamed for slowing down global Internet speeds

A massive DDoS (Distributed Denial of Service) attack levelled against Dutch anti-spam group Spamhaus may be causing global Internet speeds to fall, news reports have claimed. A BBC report states that the DDoS attack entailed Spamhaus’ servers being assaulted by 300 Gb/s of data through a technique called DNS reflection.According to an executive at security firm Arbor Networks, the largest DDoS attack before this one comprised of a peak data rate of 100 Gb/s. While speaking to the BBC, cybersecurity expert Alan Woodward said that this massive traffic was resulting in falling Internet speeds across the world.
The DDoS attack against Spamhaus comes in the wake of the blacklisting of Cyberbunker, a Dutch web hosting service, by the anti-spamming group. Cyberbunker, whose infamous and unofficial motto is that it will host anything that’s not child pornography or terrorism related, has been accused by Spamhaus of colluding with Eastern-European criminal gangs to wage the DDoS attack in retaliation for the blacklisting. Cyberbunker has rejected the accusations and has instead pointed a finger towards Stophaus, an online group formed by ISPs and users disgruntled by Spamhaus. While speaking to RT, Sven Olaf Kamphuis, a spokesman for Cyberbunker, also accused Spamhaus of falsely accusing ISPs of being spammers and blacklisting them without any evidence.
Kamphuis also claimed that the DDoS attack wasn’t causing Internet speeds to fall and blamed CloudFlare, the security firm that helped Spamhaus deal with the attack, for exaggerating information in order to show itself in good light. Gizmodo also gave this claim some degree of veracity by pointing out that no other company, apart from CloudFlare and Spamhaus, that relies on the Web has come out with reports of service outage. Also, sites that monitor global Internet speeds and general service health didn’t show any major anomalies generated by the DDoS attack.
However, many users in India did complain of slow speeds yesterday but that could probably be blamed on undersea cables near Egypt being cut- cables that provided Internet access to parts of Asia and Africa. Other Internet gateways providing services to Europe and India were also undergoing maintenance at the same time, which may have also been directly responsible to slow Internet speeds rather than the DDoS attack.
Spamhaus has said that law enforcement agencies from five different countries have started investigations in response to the DDoS attack.
Sources: BBCRTGizmodoGigaOM

Biggest cyber-attack in history


'Biggest cyber-attack in history' slows down internet worldwide after quarrel between web-hosting company and anti-spam group



Internet users worldwide are having to endure slow connections after the biggest cyber-attack in history.



The attackers are throwing so much digital traffic at online networks that they have reportedly disrupted access to popular sites such as Netflix, the on-demand TV streaming service. 

Tonight there were fears that any worsening of the attack could affect web browsing and emails.
The onslaught has focused attention on the extent to which modern communications depend on the internet. Matthew Prince, chief executive of CloudFlare, one of the firms dealing with the assault, likened it to a series of digital “nuclear bombs”. “It’s so easy to cause so much damage,” he added.
The attack is believed to have begun last week, when Spamhaus, an anti-spam organisation, was hit by a wave of digital traffic that knocked its website offline. 

The body draws up  lists of the servers used to send spam messages around the world. Email administrators use these lists to block spam.

But last week one of the spammers irked by Spamhouse’s work is believed to have launched the massive distributed denial of service, or DDoS, attack to bring down the anti-spam group.

Wednesday, March 27, 2013

Hacking WEP wifi passwords

Basic Entry into a WEP Encrypted Network

This Tutorial explains EVERYTHING in detail So, it is quite long. Enjoy.

1. Getting the right tools
This Tutorial is in Bt3 But Download The Latest Release Bt4.

Download Backtrack 4. It can be found here:

http://www.backtrack-linux.org/downloads/

 I downloaded the Dvd iso and burned it to a Dvd. Insert your BT4 Dvd/usb drive and reboot your computer into BT4. I always load into the 3rd boot option from the boot menu. (VESA/KDE) You only have a few seconds before it auto-boots into the 1st option so be ready. The 1st option boots too slowly or not at all so always boot from the 2nd or 3rd. Experiment to see what works best for you.

2. Preparing the slave network for attack

Once in BT4, click the tiny black box in the lower left corner to load up a "Konsole" window. Now we must prep your wireless card. 
Type:

airmon-ng

You will see the name of your wireless card. (mine is named "ath0") From here on out, replace "ath0" with the name of your card. 
Now type:

airmon-ng stop ath0

then type:

ifconfig wifi0 down

then:

macchanger --mac 00:11:22:33:44:55 wifi0

then:

airmon-ng start wifi0

What these steps did was to spoof (fake) your mac address so that JUST IN CASE your computeris discovered by someone as you are breaking in, they will not see your REAL mac address. Moving on...
Now it's time to discover some networks to break into.

Type:

airodump-ng ath0

Now you will see a list of wireless networks start to populate. Some will have a better signal than others and it is a good idea to pick one that has a decent signal otherwise it will take forever to crack or you may not be able to crack it at all. 
Once you see the network that you want to crack, do this:

hold down ctrl and type c

This will stop airodump from populating networks and will freeze the screen so that you can see the info that you need.

**Now from here on out, when I tell you to type a command, you need to replace whatever is in parenthesis with what I tell you to from your screen. For example: if i say to type: 
-c (channel) 
then dont actually type in 
-c (channel)
Instead, replace that with whatever the channel number is...so, for example you would type:
-c 6
Can't be much clearer than that...lets continue...

Now find the network that you want to crack and MAKE SURE that it says the encryption for that network is WEP. If it says WPA or any variation of WPA then move on...you can still crack WPA with backtrack and some other tools but it is a whole other ball game and you need to master WEP first.

[Image: airodump.jpg]

Once you've decided on a network, take note of its channel number and bssid. The bssid will look something like this --> 05:gk:30:fo:s9:2n
The Channel number will be under a heading that says "CH".
Now, in the same Konsole window, type:

airodump-ng -c (channel) -w (file name) --bssid (bssid) ath0

the FILE NAME can be whatever you want. This is simply the place that airodump is going to store the packets of info that you receive to later crack. You don't even put in an extension...just pick a random word that you will remember. I usually make mine "wepkey" because I can always remember it. 

**Side Note: if you crack more than one network in the same session, you must have different file names for each one or it won't work. I usually just name them wepkey1, wepkey2, etc.

Once you typed in that last command, the screen of airodump will change and start to show your computer gathering packets. You will also see a heading marked "IV" with a number underneath it. This stands for "Initialization Vector" but in noob terms all this means is "packets of info that contain clues to the password." Once you gain a minimum of 5,000 of these IV's, you can try to crack the password. I've cracked some right at 5,000 and others have taken over 60,000. It just depends on how long and difficult they made the password. 

Now you are thinking, "I'm screwed because my IV's are going up really slowly." Well, don't worry, now we are going to trick the router into giving us HUNDREDS of IV's per second. 

3. Actually cracking the WEP password

Now leave this Konsole window up and running and open up a 2nd Konsole window. In this one type:

aireplay-ng -1 0 -a (bssid) -h 00:11:22:33:44:55 ath0

http://i574.photobucket.com/albums/ss184...eplay1.jpg

This will send some commands to the router that basically cause it to associate with your computer even though you are not officially connected with the password. If this command is successful, you should see about 4 lines of text print out with the last one saying something similar to "Association Successful :-)" If this happens, then good! You are almost there. Now type:

aireplay-ng -3 -b (bssid) -h 00:11:22:33:44:55 ath0

http://i574.photobucket.com/albums/ss184...eplay2.jpg

This will generate a bunch of text and then you will see a line where your computer is gathering a bunch of packets and waiting on ARP and ACK. Don't worry about what these mean...just know that these are your meal tickets. Now you just sit and wait. Once your computer finally gathers an ARP request, it will send it back to the router and begin to generate hundreds of ARP and ACK per second. Sometimes this starts to happen within seconds...sometimes you have to wait up to a few minutes. Just be patient. When it finally does happen, switch back to your first Konsole window and you should see the number underneath the IV starting to rise rapidly. This is great! It means you are almost finished! When this number reaches AT LEAST 5,000 then you can start your password crack. It will probably take more than this but I always start my password cracking at 5,000 just in case they have a really weak password. 

Now you need to open up a 3rd and final Konsole window. This will be where we actually crack the password. Type:

aircrack-ng -b (bssid) (filename)-01.cap

Remember the filename you made up earlier? Mine was "wepkey". Don't put a space in between it and -01.cap here. Type it as you see it. So for me, I would type wepkey-01.cap
Once you have done this you will see aircrack fire up and begin to crack the password. typically you have to wait for more like 10,000 to 20,000 IV's before it will crack. If this is the case, aircrack will test what you've got so far and then it will say something like "not enough IV's. Retry at 10,000." DON'T DO ANYTHING! It will stay running...it is just letting you know that it is on pause until more IV's are gathered. Once you pass the 10,000 mark it will automatically fire up again and try to crack it. If this fails it will say "not enough IV's. Retry at 15,000." and so on until it finally gets it. 

http://i574.photobucket.com/albums/ss184...crack1.jpg

If you do everything correctly up to this point, before too long you will have the password! now if the password looks goofy, dont worry, it will still work. some passwords are saved in ASCII format, in which case, aircrack will show you exactly what characters they typed in for their password. Sometimes, though, the password is saved in HEX format in which case the computer will show you the HEX encryption of the password. It doesn't matter either way, because you can type in either one and it will connect you to the network. 

Take note, though, that the password will always be displayed in aircrack with a colon after every 2 characters. So for instance if the password was "secret", it would be displayed as:
se:cr:et
This would obviously be the ASCII format. If it was a HEX encrypted password that was something like "0FKW9427VF" then it would still display as:
0F:KW:94:27:VF
Just omit the colons from the password, boot back into whatever operating system you use, try to connect to the network and type in the password without the colons and presto! You are in!

It may seem like a lot to deal with if you have never done it, but after a few successful attempts, you will get very quick with it. If I am near a WEP encrypted router with a good signal, I can often crack the password in just a couple of minutes. 

I am not responsible for what you do with this information. Any malicious/illegal activity that you do, falls completely on you because...technically...this is just for you to test the security of your own network. :-)

I will gladly answer any legitimate questions anyone has to the best of my ability.
HOWEVER, I WILL NOT ANSWER ANYONE THAT IS TOO LAZY TO READ THE WHOLE TUT AND JUST ASKS ME SOME QUESTION THAT I CLEARLY ANSWERED. No one wants to hold your hand through this...read the tut and go experiment until you get it right.

There are rare occasions where someone will use WEP encryption with SKA as well. (Shared Key Authentication) If this is the case, additional steps are needed to associate with the router and therefore, the steps I lined out here will not work. I've only seen this once or twice, though, so you probably won't run into it. If I get motivated, I may throw up a tut on how to crack this in the future.
Hacking WEP wifi passwords

BEST TOOLS EVER [1]


COMMENT FOR THE BROKEN LINK  

Facebooz
Many people were asking on how to hack facebook account. This tool is design to hack any facebook account you want with 2 simple steps. Specify the username and the pass list and let it work.
It will hack that account and give you the pass.
And for idiots who say that it doesn't work. Well it works but it need times between each attemd to login otherwise it will become a facebooz freezer

http://uploading.com/files/8b949bb8/facebooz.jar/


Brutus
This tool will hack for you any login page by trying all password possibilities. The reason i added here is because many people were finding troubles with there brutus and couldn't do any hack so this one should solve all there nightmares.
http://uploading.com/files/ba745666/Brutus.rar/


PassList Generator
Many days ago someone post here in the forum a pass list that is 2GB size. I know that some people cannot download such a file including me so i did some search and found this tool. This software should create the pass list that you need to your brute force. Very small size but very big efficiency. 
http://uploading.com/files/f8f9769b/PLG.zip/


In Shadow Batch Virus Gen - 4.1.2
This tool is a virus creater. It will create very proffesional virus. Never test any virus on your PC. Very effective for bad hackers.
password with no quotes: "In shadow"

http://uploading.com/files/FZRK98VO/In%2...2.zip.html


Atomics Virus Creator V.65
This tool is a virus creater. It will create very professional virus. Never test any virus on your PC. Very effective for bad hackers
http://uploading.com/files/6CZZN22N/Atom...5.zip.html


Now I will post 3 tools that should be downloaded together for better results.
Exploitscanner
This tool will search for vulnarable websites. You only have to write the dock and it will search for potential website to hack. Always use inurl:"article.php?id=1" as a dork.
http://uploading.com/files/19217P2R/expl...r.zip.html


SQL I Helper V.2.7
After you find your potential website , use this tool to auto hack the website using SQL injection. This tool will do all the hard job by itself. Just select buttons to tell here what to do.
You might need to find the pass using the hash method

http://uploading.com/files/2a7acf21/SQLI...V.2.7.rar/


Admin finder
After you findthe passwords , use this tool to find the admin page login. Some people are heaving problems finding that page. This should solve this problem but remember that can't find all login pages. It use the most common extensions. You have the ability to add more extensions to the list to increase your search range
http://uploading.com/files/KCDVDDST/admi...r.rar.html


cain and abel
Crack PC passwords , hack network connections , sniff , brute , ....................... and all your dirty job.
I don't think i need to explain what does this tool do. Everyone know about and how neccesary it for hacking job.

http://uploading.com/files/m55616a9/cain%2526abel.rar/


w32 disassembler degguer
This tool will help you to disassemble any program you want. Very effective for programmers
http://uploading.com/files/CX9JY7UR/w32%...r.rar.html


72389 Email Bomber
This tool will help you to spam any email you want. This one is special because you have the ability to spam from different email at the same time. All credit go to Nathan72389
http://uploading.com/files/ZC2HM6E1/7238...r.rar.html


Simple Binder 
Use this tool to bind any 2 files in a single file. You are not restricted to jpg or mp3 files but you can bind any type of file. It is very effective to hide virus and worms and all malwares type. All credits go Nathan72389
http://uploading.com/files/SEQDHH33/Simp...9.rar.html


Hotmail Hacker And Messenger Fun
This tool will help you to hack any Hotmail messenger you want. It simply work by making the person think he can hack email using it while in the reality he is the one to be hacked. All credit go to Nathan72389
http://uploading.com/files/9c8ae7f5/Hotm...2BFun.rar/


Gmail Hacker
This tool will help you to hack any Gmail you want. It simply work by making the person think he can hack email using it while in the reality he is the one to be hacked. All credit go to Nathan72389
http://uploading.com/files/d7f79mm9/Gmail%2Bhacker.rar/


Chat Spammer
Use this tool to spam any chat room. Write what phrase you want it to be spammed. I am still try to figure out the best way to use it. Very funny and worst to try it
http://uploading.com/files/D7YJGAI9/Chat...r.rar.html


1st Mass Mailer 4.2
This tool will help you to mass spam emails. Little bit compliacted but very very effective.
Serial: "18935379480889"
Thanks to 88power88 for the serial

http://uploading.com/files/17m9mc69/1stM...ler42.rar/


My lock box
Many people were asking for tools to hide files and folders. This tool will hide the files that you don't want anyone to see it by hiding it inside a box that the software create and to make it impossible to anyone to reach it. Very easy to use
http://uploading.com/files/O0PDO80I/mylo...p.exe.html


I lock
Same as the one before but this one is more proffessional. This tool will hide the files that you don't want anyone to see it by hiding it inside a box that the software create and to make it impossible to anyone to reach it.
http://uploading.com/files/9m8d4e29/ilockstp.rar/


Lock an exe
This tool will lock any ".exe" file by making it not working anymore. If you click on the new exe , it won't execute. Ability to share it between PCs safetly at a condition that these 2 pc have this tools to lock it and unlock it
http://uploading.com/files/XIG3N1MN/lockanexe.zip.html


Icon Changer v3.8
Some people were asking for tools that can change the icon for there files. Use this tool to change the icons of any thing you want on your PC. Customize anything that have a icon interference. 
http://uploading.com/files/VJHMKK2V/Icon...8.zip.html