Wednesday, November 30, 2011

How / Why to Completely Anonymize Your BitTorrent Traffic



If you're using BitTorrent without taking special measures to hide your activity, it's just a matter of time before your ISP throttles your connection, sends you an ominous letter, or worst case, your ISP gets a subpoena from a lawyer asking for your identity for a file-sharing law suit. Here's how to set up a simple proxy to keep your torrenting safe and anonymous.

BTGuard is a BT-focused proxy server and encryption service. Below, I'll explain what it does, how it works, and how to set it up to privatize and anonymous your BT traffic.



When you download or seed a torrent, you're connecting to a bunch of other people, called a swarm, all of whom—in order to share files—can see your computer's IP address. That's all very handy when you're sharing files with other netizens, but file sharers such as yourself aren't necessarily the only people paying attention. Piracy monitoring groups (often paid for by the entertainment industry either before or after they find violators) also join BitTorrent swarms, but instead of sharing files, they're logging the IP addresses of other people in the swarm—including you—so that they can notify your ISP of your doings. A proxy (like BTGuard) funnels your internet traffic—in this case, just your BitTorrent traffic—through another server, so that the BitTorrent swarm will show an IP address from a server that can't be traced back to you instead of the address that points to your house. That way, those anti-piracy groups can't contact your ISP, and your ISP has no cause to send you a harrowing letter.
But wait, can't the piracy groups then go to the anonymizer service (BTGuard) and requisition their logs to figure out that you're the one downloading the new Harry Potter? Theoretically, yes, but the reason why we chose BTGuard is because they don't keep logs, so there's no paper trail of activity leading back to you. All the piracy monitors see is BTGuard sharing a file, and all your ISP sees is you connecting to BTGuard—but not what data you're downloading, because it's encrypted.
If you subscribe to an ISP that throttles BitTorrent traffic, and aren't using an anonymizer service, you have an additional problem. Your ISP can still see what you're doing, and if they detect that you're using BitTorrent—even if you're using it for perfectly legal purposes - they'll throttle your connection so you get unbearably slow speeds. When you encrypt your BitTorrent traffic, your ISP can't see what you're using your connection for. They'll see that you're downloading lots of information, but they won't be able to see that it's BitTorrent traffic, and thus won't throttle your connection. You still have to be careful of going over your ISP's bandwidth cap, however, if that exists.
BTGuard offers you both a proxy (to combat spying) and encryption (to combat throttling) though many torrent clients have encryption built-in as well.






If you enjoyed this post, make sure you subscribe to my RSS feed! Comments are encouraged

Tuesday, November 22, 2011

How to get Code like @+[1234567890123:0] And make a link for your Page/Group/Profile | Facebook Tricks


Go to Your Page which have URL like this Facebook.com/<username>
But here we need code. So open your Page if you are admin click on Edit Page in the URL box it will show id

Paste your Code replacing red colored Code  @[1234567890123:0]
And you can Try on Your Wall, Hope you got it, If Got Any Problem Feel Free to Comment.









If you enjoyed this post, make sure you subscribe to my RSS feed! Comments are encouraged

How to update Anti Virus Offline

Here is a list of some antiviruses and their procedures to update off line.


Avast

Download http://files.avast.com/iavs5x/vpsupd.exe
Run this .exe file to update the antivirus Avast.

This off-line update will work only if a serial number has been entered into Avast.


AntiVir Personal Edition

Download ivdf: http://www.avira.com/en/support/vdf_update.html

Copy the Zip file on the machine that has no Internet (using a USB key for example).
Start AntiVir, and in the main window, select Update> Manual Update ... and target the ZIP file (No need to unzip the file).
This updates the engine as well as signatures.


Spy-bot Search & Destroy

Download http://www.spybotupdates.com/updates/files/spybotsd_includes.exe
Run this .exe file to update Spybot.


Ad-Aware

Download http:http://dlserver.download.lavasoft.com/public/defs.zip
Unpack the ZIP file in the installation directory of Ad-Aware.


Panda

Go to: http://www.pandasecurity.com/homeusers/downloads/clients/?sitepanda=particulares
Right click on the link under "Virus Signature files" Save Target As
Unzip the downloaded file, you must keep the pav.sig file
Open Panda click Configure.
Under "Update Location " choose the path "floppy, CD-ROM or local network" and enter the path to the file pav.sig, C:\Users\Moi\Desktop\pav\
Click on "Update".

Malwarebytes Anti-Malware

Download it here: Malwarebytes
Download the update offline here: MBAM Rules.exe
Save the file to your desktop.
Once the download is complete, double click the downloaded executable (or transfer it to the computer without a connection) and follow the wizard. After all the procedures are completed, you will see in the Malwarebytes Anti-malware interface, that the software has been updated.





If you enjoyed this post, make sure you subscribe to my RSS feed! Comments are encouraged

Tuesday, November 15, 2011

Create launcher in Ubuntu 11.10 | How to create shortcut icon on Desktop in Ubuntu 11.10


First of all , Install Package through terminal . 

sudo apt-get install --no-install-recommends gnome-panel

If done , Create your first desktop icon through following command. 

gnome-desktop-item-edit --create-new ~/Desktop

To create one more, type above command again and hit enter. As of now, this is the only way..






If you enjoyed this post, make sure you subscribe to my RSS feed! Comments are encouraged

Saturday, November 12, 2011

Building a better Firewall with Ubuntu

The following article will teach you how to build a firewall with Intrusion Detection Prevention Capabilities built in.

For more details check out this link. Building a better firewall 

Friday, November 11, 2011

How to build a chrome extension

Check out this link for complete guide.


http://lifehacker.com/5857721/how-to-build-a-chrome-extension?utm_source=Lifehacker+Newsletter&utm_campaign=c02bdaca9d-UA-142218-1&utm_medium=email





If you enjoyed this post, make sure you subscribe to my RSS feed! Comments are encouraged

Change Key functionality in windows | Remapping


We can actually change the keys functionality of each and every key in either Windows or Linux. This is called Remapping. In this post I will discuss about the Windows Remapping. 


There are 3 ways. 

1) The direct way of remapping keys in Windows is to use the Windows Registry.

HKEY_LOCAL_MACHINE\SYSTEM\
CurrentControlSet\Control\Keyboard Layout 

Disadvantage : User need scan codes to change a key’s functionality.

2) Alternate method is using remap software. 

Advantages : Visual representation of the keyboard, Scan codes not required.

3) Sharp Keys supports 104 keys that can be remapped on the computer keyboard. Sharp Key uses the native Windows functionality to remap the keys. This means that the software does not have to be running in the background after the changes have been made. Remapped keys on the keyboard can be deleted all the time which will write the original information to the Windows Registry again.

We have many utility tools for remapping. Some of them are MapKeyboard, KeyTweak etc,.

MapKeyboard
KeyTweak


If you enjoyed this post, make sure you subscribe to my RSS feed! Comments are encouraged
Enhanced by Zemanta

How To Disable The Caps Lock Key Permanently | Windows


1) Open the Windows Registry
2)  Navigate to the following Registry key in the folder browser on the left.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layout
3) Right-click on Keyboard Layout and select New > Binary from the context menu.
4) Enter "Scancode Map" as Value name (without quotes) and press enter to add the key.
5) Double-click on the newly created key afterwards and enter the following information.
00 00 00 00 00 00 00 00
02 00 00 00 00 00 3A 00
00 00 00 00

6) Restart your PC.  Nothing happens if you tap on the key from now on.


Voila ! Thats it ! You're done.

Note : If you wanna change the functionality or remap the keyboard layout check it here.
If you enjoyed this post, make sure you subscribe to my RSS feed! Comments are encouraged
Enhanced by Zemanta

Thursday, November 3, 2011

How to Join Facebook Fellowship Program

Applications to join Facebook Fellowship Program are open now and this year Ph.D. students studying at international universities can also apply in addition to applications from Ph.D. students studying in the United States.


Facebook accepts applications from students interested in several academic topics like Computer Vision, Computer Architecture, Computer Networking, Computer Security, Internet Economics, Machine Learning, Smart Datacenters, Social Computing etc.
The Fellowship Program is now open to all Ph.D students globally,  enrolled during the current academic year and studying Computer Science, Computer Engineering, Electrical Engineering, System Architecture, or a related area and must be nominated by a faculty member.
Each Facebook Fellowship includes several benefits like
  • Tuition and fees will be paid for the academic year.
  • $30,000K stipend (paid over 9 months).
  • $5000 per year for conference attendance / travel.
  • $2500 for personal computer.
  • Opportunity to apply for a paid summer internship.
Apply here.  Applications for Facebook fellowships will close on December 16, 2011. Any student, faculty member or university administrator can submit the application. Meet the 2011 Facebook fellowship winners. This is Facebook’s third annual Fellowship Program and they are doubling the number of awards this year.

Source : QuickOnlineTips






If you enjoyed this post, make sure you subscribe to my RSS feed! Comments are encouraged

How to hide or change your mac address in Ubuntu

I've been Googling and searching everywhere on the internet for the ways to hide my mac address. Finally I got many solutions. but here is the most optimum one.

First point to keep in mind is we cannot hide mac address if we want to be on a active network. The mac address can be changed / spoofed as per our wish.

1. Install "macchanger" using sudo apt-get install macchanger.
2. If you type macchanger --help , you will get all the possible options.
3. Type ifconfig and hit enter.
4. You will be provided with the sections like eth0, eth1, lo, wlan0, wlan1 etc., depending on your network connections. Check for HWaddr 1c:bb:3c:de:56:7f  similar to this.
5. This is your mac address. Now type sudo macchanger -A eth0 and hit enter.
 (In this I took etho as an example. If you are using eth1 or wlan0 replace it accordingly. -A refers to assign some mac address of any kind. I would recommend this option unless you want to spoof .)
6. Voila ! Your mac address is changed.

To know how to change / hide /spoof your ip address go here.
For any difficulties, let me know through your valuable comments.


Note : For educational purposes only. I am not responsible for the consequences.
If you enjoyed this post, make sure you subscribe to my RSS feed! Comments are encouraged

Tuesday, November 1, 2011

THC-SSL-DOS | TOOL TO KILL SSH SERVERS

Specialty : average laptop computer with windows Or any LINUX operating system and a standard DSL connection. are enough. ! :D


How it works :
Open command prompt.
Change the prompt directory to the drive in which you have unzipped the tool.
Change directory to thc-ssl-dos.
Now run the exe file. Pass the command thc-ssl-dos to execute it. 

Now in order to perform attack using this tool , you will have to pass the following command;
thc-ssl-dos TARGET IP --accept
On passing the command the tool will start its process.



Download THC-SSL-DOS from here.


If you find any difficulty in the process, let me know through your valuable comments so that I will update with screen shots.


For Linux users :


Use "./configure; make all install" to build and Run : ./thc-ssl-dos 127.3.133.7 443


1.The average server can do 300 handshakes per second. This would require 10-25% of your laptops CPU.
2. Use multiple hosts (SSL-DOS) if an SSL Accelerator is used.
3. Be smart in target acquisition: The HTTPS Port (443) is not always the best choice. Other SSL enabled ports are more unlikely to use an SSL Accelerator (like the POP3S, SMTPS, ... or the secure database port).



Counter measures :


No real solutions exists. The following steps can delay (but not solve) the problem:
1. Disable SSL-Renegotiation
2. Invest into SSL Accelerator





NOTE : FOR EDUCATIONAL PURPOSES ONLY. I AM NOT RESPONSIBLE FOR 
CONSEQUENCES.




If you enjoyed this post, make sure you subscribe to my RSS feed! Comments are encouraged

HackTheWeb | Add on for Mozilla FIrefox - A Tool to let you Hack out

The Web. Displayed Your Way.
A Tool to let you Hack out all the stuff that annoys you.

  • Images.
  • Sidebars.
  • Flashing text.
  • Advertisements.
  • Bad Page Layout.
Reduce the Noise. Increase the Signal. User Empowerment (based on aardvark).

Tip: If you need a "do-over" just reload the page.


For more help, goto Workswonders . :D






If you enjoyed this post, make sure you subscribe to my RSS feed! Comments are encouraged

how to login as root in Ubuntu


#1 : Open Terminal/shell , (hit CTRL+ALT+T)
#2 : Then, Type the command (Followed by your Login Password).
sudo passwd root
#3 : when you will be prompted for “Enter the New Unix Password” Twice, Enter the root password.
#4 : That’s All, To enjoy root power, logout from the current user session. At the login window, Enter ‘root’ as a username and the password, you entered in above step.




Note : In root mode, don’t perform any action about which you aren’t sure, because a single mistake can cause a lot of damage.






If you enjoyed this post, make sure you subscribe to my RSS feed! Comments are encouraged