Tuesday, May 31, 2011

How to Crack a Wi-Fi Network’s WEP Password with BackTrack

http://lifehacker.com/286607/intermediate-guide-to-bittorrent?utm_source=Lifehacker+Newsletter&utm_campaign=eb4e813a91-UA-142218-1&utm_medium=email

Wireless Tether Turns Your Phone into a Wi-Fi Hotspot



Finally, Wireless Tether. For many users, this feature is the single most important thing in the world of mobile devices, so having the ability to use it is a must. Wireless Tether turns an Android phone, regardless of carrier, into a full blown W-Fi hotspot for any nearby devices that need one. It's as simple as that, but only rooted phones can use it.

*** If you get force closes after the update uninstall and install it again! ***
This program enables wifi AND bluetooth-tethering (PAN) for "rooted" handsets.
Clients (your laptop for example) can connect via wifi or bluetooth and get access to the internet using the mobile connection (4G, 3G, 2G) or (in case you are using bluetooth) the wifi connection which is established by the handset.
Wifi-tethering creates a so called adhoc (peer-to-peer) network on most devices. Infrastructure-mode is suppported for some devices – including the HTC Evo for instance.

** FEATURES **
-) Access-control feature. Allow/deny clients to use your mobile-data connection.
-) Wifi-Encrytion. 128-bit WEP in general. WPA/WPA2 on supported devices.
-) Reduce wifi-transmit power (on supported devices)
-) Settings for wifi-ssid, wifi-channel, „lan“-network and more.

This application requires a "rooted"-device and a (custom-) kernel which supports netfilter (iptables)!
** PREREQUISITE **
1) Root
2) Netfilter-enabled kernel

For more information visit our developer-site on google-code:
http://code.google.com/p/android-wifi-tether/

Use this application at your own risk. It is possible that use of this program may violate your carrier's Terms of Service.


Visit Developer's Website

Friday, May 27, 2011

How do you enable Registry Editing again if it has been disabled by your administrator

First Method:

Click Start -> Run -> gpedit.msc -> User Configuration -> Administrative Templates -> System -> Prevent access to registry editing tools -> Right Click Properties -> Set it to Not Configured.

Second M! ethod:

Click Start -> Run. Type this command in Run box and press Ok. REG add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableRegistryTools /t REG_DWORD /d 0 Then a prompt will come up with this question: Value DisableRegistryTools exists, overwrite (Y/N)? Type yes and hit Enter. After u did that also type this command in the run box and hit enter. REG add HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableRegistryTools /t REG_DWORD /d 0 Then it will also come up with the question: Value DisableRegistryTools exists, overwrite (Y/N)? Type yes and hit Enter.

Third Method:

STEP1. Disable as much as you can from your startup. Remove programs from your startup folder and such, so as not to lag down the bootup process.

STEP2.Create a new shortcut on your desktop, point it to "C:\Windows\regedit.exe"

STEP3.Log off, then log back on.

STEP4.A! s soon a s you see your desktop, double click on the shortcut. The system does not check for policies until a few seconds after it booted up. If you click on the icon fast enough, it should let you get in. After you close it though, it will not open unless you redo step 3 and 4.

Fourth Method:

Getting into the registry editor by making a vbs script in notepad: Open Notepad and copy this script into it. And save it as regtool.vbs on your desktop. VBS SCRIPT(select everything and copy into notepad and save as regtool.vbs): Option Explicit
'Declare variables
Dim WSHShell, rr, rr2, MyBox, val, val2, ttl, toggle
Dim jobfunc, itemtype
On Error Resume Next
Set WSHShell = WScript.CreateObject("WScript.Shell")
val = "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools"
val2 = "HKLM\Software\Micro! soft\Windows\CurrentVersion\Policies\System\DisableRegistryTools"
itemtype = "REG_DWORD"
jobfunc = "Registry Editing Tools are now "
ttl = "Result"
'reads the registry key value.
rr = WSHShell.RegRead (val)
rr2 = WSHShell.RegRead (val2)
toggle=1
If (rr=1 or rr2=1) Then toggle=0
If toggle = 1 Then
WSHShell.RegWrite val, 1, itemtype
WSHShell.RegWrite val2, 1, itemtype
Mybox = MsgBox(jobfunc & "disabled.", 4096, ttl)
Else
WSHShell.RegDelete val
WSHShell.RegDelete val2
Mybox = MsgBox(jobfunc & "enabled.", 4096, ttl)
End If Open regtool.vbs And there you go!

Wednesday, May 25, 2011

Trace route and path ping in network trouble shooting

http://www.ghacks.net/2011/05/24/network-troubleshooting-basics-tracert-pathping/

Collection of Tools and Tricks to bypass Megavideo 72 Minutes Time Limit

http://www.blogsolute.com/megavideo-time-limit-tricks-addons-scripts-tools/8242/

Watch the video on MegaVideo even if the link gets deleted.

Yes, what you read is right. While browsing for some videos , there appears a message that the video is deleted. Ex : http://www.megavideo.com/?v=BH6VMIAP
Luckily, there is a solution to watch the same video which was deleted from Megavideo database.
Megavideo stores 3 copies of same video on their servers called mirrors. So, even if one link is deleted, you can watch the video from rest of other two. Trick is to find those two links.

Mega Video tools to find mirror links are called Regenerators though they don’t regenerate actually. We have a solution which can be accessed by installing addon on your browser (Firefox and Chrome only), Bookmarklet or simply visit http://regen.videourls.com/


Friday, May 20, 2011

JDBC

This article deals with JDBC completely.

What is JDBC?
Posted on: April 13, 2007 at 12:00 AM
JDBC is Java application programming interface that allows the Java programmers to access database management system from Java code.

The Java application programming interface provides a mechanism for dynamically loading the correct Java packages and drivers and registering them with the JDBC Driver Manager that is used as a connection factory for creating JDBC connections which supports creating and executing statements such as SQL INSERT, UPDATE and DELETE. Driver Manager is the backbone of the jdbc architecture.

JDBC has four Components:

1. The JDBC API.
2. The JDBC Driver Manager.
3. The JDBC Test Suite.
4. The JDBC-ODBC Bridge.


The API technology provides the industrial standard for independently connecting Java programming language and a wide range of databases.



The JDBC Driver Manager.

The JDBC Driver Manager is a very important class that defines objects which connect Java applications to a JDBC driver. Usually  Driver Manager is the backbone of the JDBC architecture. It's very simple and small that  is used to provide a means of managing the different types of JDBC database driver running on an application. The main responsibility of  JDBC database driver is to load all the drivers found in the system properly as well as to select the most  appropriate driver from opening a connection to a database.  The Driver Manager also helps to select the most appropriate driver from the previously loaded drivers when a new open database is connected.

The JDBC Test Suite.

The function of  JDBC driver test suite is to make ensure that the  JDBC drivers will run user's program or not .

 The JDBC-ODBC Bridge.

The JDBC-ODBC bridge, also known as JDBC type 1 driver is a  database driver that utilize the ODBC driver to connect  the  database. This driver translates JDBC method calls into ODBC function calls. The Bridge implements Jdbc for any database for which an Odbc driver is available. The Bridge is always implemented as the sun.jdbc.odbc Java package and it contains a native library used to access ODBC.


Layers of the JDBC Architecture




Type 1 JDBC Architecture



Type 2 JDBC Architecture




Accessing Database using Java and JDBC


For this, firstly we need to establish a connection between database and java file with the help of various types of APIs, interfaces and methods. We are using MySQL database.
Connection: This  interface specifies connection with specific databases like: MySQL, Ms-Access, Oracle etc and java files. The SQL statements are executed within the context of this interface.
Class.forName(String driver): It loads the driver.
DriverManager: This class controls a set of JDBC drivers. Each driver has to be register with this class.
getConnection(String url, String userName, String password): This method establishes a connection to specified database url. It is having three arguments:
        url: - Database url where stored or created your database
        username: - User name of MySQL
        password: -Password of MySQL
getMetaData(): This is a method of Connection interface. It retrieves the metadata of the database.
DataBaseMetaData: This interface gives information about the database like number of tables in the database, columns of the table etc.
getTables(null, null, "%", null): This method provides the description of the tables available in the given catalog. As we have set other parameters null, so it will provide only table names.

Code :

import java.sql.*;

public class AccessDatabases {
  public static void main(String[] args) {
    try {
      Class.forName("com.mysql.jdbc.Driver").newInstance();
      Connection con = DriverManager.getConnection(
          "jdbc:mysql://localhost:3306/test""root""root");
      Statement st = con.createStatement();
      DatabaseMetaData meta = con.getMetaData();
      ResultSet rs = meta.getTables(null, null, "%"null);
      String tableNames = "";
      while (rs.next()) {
        tableNames = rs.getString(3);
        System.out.println(tableNames);
      }
    catch (Exception e) {
    }
  }
}





In this section we studies how to connect to database and then list all the tables in the database. We have used MySQL database server.




FOR REST OF THE TOPICS LIKE EXCEPTION HANDLING AND ETC,. GOTO SOURCE
Source : RoseIndia

Wednesday, May 18, 2011

Difference between Pointer and reference

In OOP like Java, guys often speak that there are no pointers but there are references. Here the reference or a reference pointers like as follows.
Dog d;
d.setName();

Here d is reference.
Actual concept of pointers is not implemented in Java due to the reasons like confusion and the hell caused by them.

However there are pointers in Java but in JCuda (Java bindings for the CUDA runtime and driver API) http://www.jcuda.de/jcuda/doc/index.html there is a class called jcuda.Pointer.                      


Java automatic memory management from Wikipedia

" One of the ideas behind Java's automatic memory management model is that programmers can be spared the burden of having to perform manual memory management. In some languages, memory for the creation of objects is implicitly allocated on the stack, or explicitly allocated and deallocated from the heap. In the latter case the responsibility of managing memory resides with the programmer. If the program does not deallocate an object, a memory leak occurs. If the program attempts to access or deallocate memory that has already been deallocated, the result is undefined and difficult to predict, and the program is likely to become unstable and/or crash. This can be partially remedied by the use of smart pointers, but these add overhead and complexity. Note that garbage collection does not prevent "logical" memory leaks, i.e. those where the memory is still referenced but never used. "

Monday, May 16, 2011

Lock Your Computer With USB Flash Drive

1.  Launch the predator.

2. Now Insert your USB.

3. Set the password when prompted.

4. Check that the drive letter displayed under “USB key drive” actually matches your flash drive or choose the correct letter from the dropdown list

5. Finally click on Create Key button and then on OK button

6. Restart the program.

Predator icon in the task bar turns green when started.

Features : 

  • Works with all versions of windows
  • Data on the USB won't get affected.




Enhanced by Zemanta

Disable Create, Rename Function For Files Folders Inside a Directory

PathLock is a small utility that lets you take full control of the actions of users on each path of the system, in two moves you can decide which directories users can rename files and folders, or create files and folders.

Features: Open Source


Sunday, May 15, 2011

Create Torrent of any File already Hosted on Web and Download it faster


Downloading a file from Internet using Bittorrent and direct FTP / HTTP are two different things. Torrents use Peer to Peer Technology where the load isn’t on single server instead file is served by multiple computers. Here’s How you can create Torrent of any file hosted on web and download via Bittorrent client.
BurnBit is a online service which can burn any file on web into torrent which contains meta data information about the content file. This .torrent file in turn can be downloaded via Bittorrent client on your system.

Why should I convert a File into Torrent when it is served directly?

While you are downloading file directly, it is possible that many others are downloading from same location. This increases load on server where it is hosted which results in slow download speed. So, Creating Torrent is viable option sometimes. And, if there are many other like you downloading via Torrent from BurnBit you get more peers, more speed from Server and Peers who successfully downloaded.
BurnBit says, If a file exists, there is torrent of it. If not, it will be burned.
So, this is a two way connection offering the maximum possible speed to download certain file. Incase, you are the first one, you can still get the download speed as usual and then you can keep seeding to offer it to the world.
For Webmasters who are sharing a file on their website, it is definitely worth giving .torrent download option to users and don’t even care to keep seeding all time for availability.

How to create Torrent for any file hosted on Web

You just need URL or link of the file and paste it on BurnBit homepage and hit BURN button. File will be processed in minutes and you are offered to download .torrent of that file.
Web masters can get script to embed on website and offer your readers to download the file via Bittorrent. Also, you can add additional HTTP mirrors for better connectivity and availability.
In short, BitBurn is useful to Webmasters in every way. However, for downloaders, it is more beneficial when it already exists on BitBurn database to get faster download speeds.

Tuesday, May 10, 2011

Top 10 MySQL Mistakes Made by PHP People

A lot of developers would choose PHP than any other programming languages. Why? Because PHP is commonly said to be faster and more efficient for complex programming tasks and trying out new ideas, and is considered by many to be more stable and less resource-intensive as well. It is a very powerful programming language. However, what you created in PHP is not effective if you implement a weak database. Commonly, when you work in PHP, you'll also probably work with MySQL for the database. Well, many would have problems involving PHP and MySQL and some of these are caused by the mistakes which are listed below:


1. Using MySQL and not MySQLi



This is one of the very very common mistake made by PHP people. PHP Manual recommends using MySQLi over MySQL

If you are using MySQL versions 4.1.3 or later it is strongly recommended that you use the mysqli extension instead.

2. User inputted data not sanitized/cleaned



When you are creating a form, it enables a user to input anything they want, therefore, exposing your database to any vulnerability that there is. Your code, which processes the input from your form, should be carefully written so as to ensure that the input is as requested. If not your database would be prone to SQL injection or any attack which could lead to its destruction.

3. Querying all the fields (*) instead of specific fields.



It is important to create your query based only on what you need. Using * returns all columns in a table. One disadvantage of this is - it is slower compared to the specific query because it extracts all the data stored in a specific table (and some of it may not be of use).

4. Using full-privileged users for database operations.



Privileges such as updating, adding, deleting, etc. should only be granted to users with such specific functions. Full privileges can be very powerful and in the same way harmful, and should be granted only when necessary to roles and trusted users of the database.

5. Poor naming standards.



When naming your databases, objects, fields, etc., use descriptive names. Name them so that when you go back to your code years from now, you still know what it is about. Sometimes, you name fields, tables, or databases with names that only makes sense to you. When you visit it again after a month or so, you can't even figure out what it is. So, better name them carefully and descriptively. There really isn't a right or wrong way to name them. Although there are some simple general rules that should be followed like not using spaces, avoiding the use of reserved words, not using dashes, etc.

6. Not properly normalized tables.



Normalization is the process of organizing data to minimize redundancy. It involves dividing large tables into smaller ones to produce well-structured relations. When not properly normalized, additions, deletions, and modifications of any data may lead to problems like data redundancy or data inconsistency.

7. Using usernames or other character typed fields as primary keys.



A primary key is anything unique that you assign to a specific record in your database. In other words, that certain record only belongs to that certain primary key. Using usernames or other character typed fields as primary keys may lead to accidental access to certain information.

8. Relying too much on PHP.



Instead of using MySQL functions to do the mathematical calculation PHP developer's prefer to be using PHP to perform those calculation. As an example AVG() is an built in Function in MySQL still I have seen many people prefer to be using PHP to get the average of values fetched from MySQL.

Apart from that comparing values, or any other operations that we need to solve, sometimes, we tend to create our own versions of functions which we don't know exists in MySQL. For example, using PHP script for comparison in order to determine the largest value in a group of data, when in fact, we can use the Max() function in MySQL. This can lead to unnecessary steps and ultimately results in slower code. Therefore, it is good to utilize your knowledge in MySQL, or in cases where you are not familiar enough with it, it's good to study and analyze MySQL.

9. Using wrong data types.



MySQL supports a number of data types which includes numeric types, date and time types, and string (character) types.So, for example, if you're storing dates use the Date data type. Using any other data type will only make it complicated. You should use the most precise data type for your data to ensure optimum storage and to reduce possible errors.

10. Not using UTF-8.



MySQL includes character set support that enables you to store data using a variety of character sets and perform comparisons according to a variety of collations. When creating a database, some of us forget to set the database to UTF-8 character set, which then makes us wonder why some of the data won't appear anywhere else. Setting it to UTF-8 usually solves those issues.  
source : Go4Expert
Sometime during the year of 2008, NRG businessman Subhash Shihora’s wife and six-month-old baby were not granted to board a flight from Delhi to Ahmedabad Irrespective of having a valid ticket because of a technical malfunction. Shihora, a significant stake-holder in the Rs 2 lakh crore Urok consultancy organisation within the UK, was so provoked he sued the air carrier for Rs 21 crore. He also wished to ensure that it by no means occurred repeatedly. And he found a way out — Shihora has grown to become the first Indian to buy the world’s first commercial flying car branded ‘Transition’, developed by a company in Massachusetts, United States.

Shihora now wants the car to be placed at his farmhouse off SG Road in Ahmedabad. But he worries obtaining consent could possibly not be easy. He will require clearances from not just aviation agencies, but protection bureaus as well, and has recently commenced communicating officials.

“I fly down to Ahmedabad at least six times a year and then fly to Mumbai and Rajkot. I had taken a test drive of the flying car. By pressing just one button, the car turns into an aircraft. I have started taking flying lessons to get the licence,” says Shihora. He booked the car in 2009 and will get delivery in 2012. Shihora, who moved to UK in 1998, booked it for Rs 1 crore and will pay another Rs 1 crore by the time it is delivered. “With all taxes and duties paid, the car will cost me around Rs 6 crore in Ahmedabad.”

The car, specifically designed with collapsible wings, safely and effectively completed its first voyage on March 5, 2009 and not long ago received clearance from the US Department of Transportation’s Federal Aviation Administration. The two-seater means of transportation falls inside the light aircraft classification and calls for a private pilot licence to fly it. The vehicle, which is sufficient enough to fit into a home garage and runs on unleaded petrol, will be able to travel up to 450 miles, and has the capability to fly at 115 mph.

Colonel VK Nagar, an aviation industry expert, says, “Directorate General of Civil Aviation and Airports Authority of India (AAI) may give permission under the micro light aircraft category. But a vehicle that can both be driven on roads and can be taken to the skies from anywhere may create issues with security agencies.”

source : NewTechnologyWorld

for more details and pictures, goto the source website.

Saturday, May 7, 2011

Fast Voip now offers Free calls to 13 countries including India

FastVoip announced their best ever deal to make India calls totally free along with other 12 countries where you can make free calls.FastVoip, a leading VOIP company from Europe has just announced their biggest ever promotion to date. FastVoip has now emerged as a strong competitor after this latest announcement to offer free calls to over 13 countries including India Landine.

You can make calls to following countries using FastVoip.

Belgium
Netherlands
Canada (+mobile)
Poland
China
Sweden
France
Thailand
Germany
United Kingdom
India
United States (+mobile)
Italy

Please note the only calls to landline phones are free except for USA and Canada where calls to mobile phones are free too.

In order to use the Free Calls promotion, you need to make a minimum deposit of 5 Euro by Credit card or $7.50 by Ukash. You will need to recharge your account every month for this amount in order to keep the free call service active.
Download FastVoip and start making those free calls.

Hack into a Live Security Camera

This is a part of Google Hacking. I already posted different keywords to use in Google search engine and get many hidden results. The link is here. Now this post is latest.  Just search these following strings in Google and select any result. Whoa, you can see a live cam on your PC screen!! The strings are given below:
inurl:”CgiStart?page=”
inurl:/view.shtml
intitle:”Live View / – AXIS
inurl:view/view.shtml
inurl:ViewerFrame?Mode=
inurl:ViewerFrame?Mode=Refresh
inurl:axis-cgi/jpg
inurl:axis-cgi/mjpg (motion-JPEG) (disconnected)
inurl:view/indexFrame.shtml
inurl:view/index.shtml
inurl:view/view.shtml
liveapplet
intitle:”live view” intitle:axis
intitle:liveapplet
allintitle:”Network Camera NetworkCamera” (disconnected)
intitle:axis intitle:”video server”
intitle:liveapplet inurl:LvAppl
intitle:”EvoCam” inurl:”webcam.html”
intitle:”Live NetSnap Cam-Server feed”
intitle:”Live View / – AXIS”
intitle:”Live View / – AXIS 206M”
intitle:”Live View / – AXIS 206W”
intitle:”Live View / – AXIS 210?
inurl:indexFrame.shtml Axis
inurl:”MultiCameraFrame?Mode=Motion” (disconnected)
intitle:start inurl:cgistart
intitle:”WJ-NT104 Main Page”
intitle:snc-z20 inurl:home/
intitle:snc-cs3 inurl:home/
intitle:snc-rz30 inurl:home/
intitle:”sony network camera snc-p1?
intitle:”sony network camera snc-m1?
site:.viewnetcam.com -www.viewnetcam.com
intitle:”Toshiba Network Camera” user login
intitle:”netcam live image” (disconnected)
intitle:”i-Catcher Console – Web Monitor”

Enjoy!!

Source : Prakash-Hacking

Bing in Blackberry

“Blackberry devices will use Bing as the preferred search provider in the browser, and Bing will be the default search and map application for new devices presented to mobile operators, both in the United States and internationally. Also, effective today Bing will be the preferred search and maps applications with regular, featured placement and promotion in the BlackBerry App World carousel.” said Matt Dahlin – Director, Bing

Evolution of Email (1965 – 2011*)



Source : MicrosoftFeed