Sunday, 30 August 2015

FASTEST WAY TO LEARN HACKING


INTRODUCTION FOR HACKER

Hacker is a term used for "a clever programmer", "who tries to break into computer systems."
A "good hack" is a clever solution to a programming problem and "hacking" is the act of doing it &  who attempts to crack someone else's system or otherwise uses programming or expert knowledge to act maliciously. He refers the term cracker 
·  A person who enjoys learning programming language or system
·  A person who enjoys actually doing the programming rather than just theorizing about it
·  A person capable of appreciating someone else's hacking
·  A person who picks up programming quickly
·  A person who is an expert at a particular programming language or system, as in UNIX hacker.

 NOTE-Hacking is a fascinating field but it definitely isn't easy.

STEPS TO BECAME A HACKER 

Step 1: Learn To Program In C
Step 2: Learn More Than One Programming Language
            (java,Perl,Php,python)
Step 3: Learn UNIX or LINUX
Step 4: Learn Networking Concepts
Step 5: Start Simple: Go Through Tutorials About Hacking
Step 6: Learn Cryptography
Step 7: Experiment A Lot
Some of the things you may need to keep in mind when doing experiments
- Keep a backup before any experiment.
- Start small and have check points.
- Know when to stop.
- Document your progress
- Keep improvising
- Automate repetitive tasks
Step 8:Go Next Level: Write Vulnerability
Step 9: Contribute To Open Source Security Projects
Step 10: Continue Learning And Keep Listening To Security Talks

BASIC CONFIGRATION & TOOLS REQUIRED

  • Know the "LIMIT" of your system
  • install an ANTI-VIRUS
  • VIRTUAL MACHINE
  • SANDBOXIE
  • COMODO firewall
  • VPN (virtual private network)

MORE TOPICS TO CHECK OUT

  • HOW TO STAY ANONYMOUS
  • TROJANS
  • RATS
  • KEYLOGGER
  • PROTECT YOURSELF
  • CHEAT ENGINES 



Tuesday, 25 August 2015

INTRODUCTION TO LINUX


ABOUT LINUX

LINUX IS JUST AN ANOTHER O/S (OPERATING SYSTEM).

IT IS FREE & OPEN SOURCE (OPEN SOURCE MEANS THE SOURCE CODE OF LINUX IS AVAILABLE…YOU CAN MODIFY YOUR LINUX O/S ACCORDING TO YOUR NEED).

IT IS DEVELOPED BY “LINUX TORVALDS” IN 1991…AS A COLLEGE PROJECT.

LINUX IS LEADING O/S ON SERVERS  & OTHER BIG IRONS SYSTEMS SUCH AS MAINFRAME COMPUTERS, (9 OUT OF 10) SUPER COMPUTERS BUT IT IS ONLY 2%-5% USED ON DESKTOP COMPUTERS.

IT IS ALSO RUNS ON EMBEDDED SYSTEMS.

IT IS ALSO RUN ON DEVICE WHOSE O/S IS TYPICALLY BUILT INTO THE FIRMWARE (FIRMWARE IS AN KIND OF SOFTWARE THAT IS INBUILT IN HARDWARE ) 

YOU USE LINUX EVERY DAY, WHETHER YOU KNOW IT OR NOT. OVER 850,000 ANDROID PHONES RUNNING LINUX ARE ACTIVATED EVERY SINGLE DAY 
COMPARE THAT TO JUST 30,000 WINDOWS PHONES ACCORDING TO THE LATEST REPORTS.

 NEARLY 700,000 TELEVISIONS ARE SOLD EVERYDAY MOST OF WHICH ARE RUNNING LINUX. 

EIGHT OUT OF TEN FINANCIAL TRADES ARE POWERED BY LINUX. .

GOOGLE, TWITTER, FACEBOOK, AND AMAZON ARE ALL POWERED BY LINUX (THE SERVER OF ALL THIS IS BASED ON LINUX...). 

 HOW WAS LINUX DEVELOPED TO ACHIEVE ALL OF THIS? UNLIKE OTHER OPERATING SYSTEMS LIKE WINDOWS OR IOS, LINUX IS BUILT COLLABORATIVELY ACROSS COMPANIES, GEOGRAPHIES, AND MARKETS RESULTING IN THE LARGEST COLLABORATIVE DEVELOPMENT PROJECT IN THE HISTORY OF COMPUTING.

TODAY LINUX IS DOMINATING ON


  1. MOBILE DEVICES 
  2. IN THE ENTERPRISE
  3. WEB INFRASTRUCTURE
  4. DATA CENTERS
  5. SUPER COMPUTERS
  6. + MORE

FEATURES OF LINUX

  1. SECURITY
  2. SILENT FEATURE 
  3. FASTER USING BY CL(COMMAND LINE) 
  4. CLI (COMMAND LINE INTERFACE) + GUI (GRAFICAL USER INTER FACE) BASED
  5. POWERFUL COMMANDS LINE (TERMINAL)
  6. RUN ON LOW MEMORY 



Saturday, 22 August 2015

HOW TO CREATE YOUR OWN HEADER FILE IN TURBO C OR C++


Create your own header file...in 5 simple steps.
Today i will teach you how to create your own header file in turbo c or c++ application,
Now suppose , i want to create header file with the name of " somesh.h " 


STEP 1-
open  turbo c or c++ application.

STEP 2-
go to file then new

STEP 3-
#ifndef __somesh_h     {name of your header file like somesh}
#define __somesh_h


 {now define any function}

int add(int a, int b)
{ cout <<"enter the two numbers";
   cin>>a>>b;
   int sum =a+b;
   cout<<"sum="<<sum;
   return 0;
}

STEP 4-
now, save this with any name...as i save it as " somesh.h " ( you can use any name insted of somesh)
and copy the file ...go to TC folder in C drive inside TC folder you see an INCLUDE FLODER
 inside INCLUDE FOLDER paste your headder file ("somesh.h")

STEP 5-
to use your header file..

#include"somesh.h"  //your header file name
#include<stdio.h>
#include<conio.h>
void main( )
{
  int x,y,z;
  clrscr( );
  cout<<"enter two numbers";
  cin>>x>>y;
  z=sum(x,y);
  cout<<("sum is %d",c);  //change code accordingly to your program
  getch( );
}



***COMPILE & EXECUTE THE PROGRAM & ENJOY THE PROGRAMMING***




FOLLOW THIS BLOG ON FACEBOOK FOR MORE UPDATES : https://www.facebook.com/hackersrocks

HOW TO BE SECURE FROM PHISHING




Phishing is an online fraud techniques and phishers are nothing more than tech-savvy artists and redirect you to the replica (looking same as original site) of authentic website which illegitimate . In a typical phishing scam, phishers send out emails, which appear to come from a legitimate company, in an attempt to scam users into providing private information that will be used for identity theft.
Phishers use a variety of sophisticated devices to steal information—including pop-up windows, URL masks which simulate real Web addresses, and keystroke loggers that capture account names and passwords...


HERE ARE SOME ANTI-PHISHING SAFETY TIPS

  1. Do not select the option "auto save" on your browsers for storing your user name and password when you login to banking and payment.
  2. Get your computer updated with the latest versions of the browsers and operating system & its security updates. 
  3. Make sure your computer has the latest version of the anti-virus software. Download the updates of this software on a regular basis to protect your computer against new viruses.
  4. Install a personal firewall and the latest anti-virus software on your computer. This will prevent unauthorized access to your system.
  5. If you are using a public or shared computer, you should clear your browser's cache and history after each session so that your account information is removed.
  6. Use an Internet browser that supports 128-bit encryption.
  7. Use ON- screen keyboard to fill payment details and login credentials. So that it can’t be keylogged.
  8. Ensure https (i.e http secure protocol) connection to the website.
  9. Do not follow any link through the email for login and payment because authentic sites do not use these methods.
  10. Users can use online payment wallet or virtual wallet sites.
  11. Beware of social media scams which is vast in trends to target more users.



Friday, 14 August 2015

HOW TO UNLOCK PHOTON MAX 3G WIFI

HEY FRIEND, TODAY I WILL TEACH YOU...HOW TO UNLOCK TATA DOCOMO PHOTON MAX 3G WIFI...IN 9 EASY STEPS...


STEP 1- THE PHOTON DEVICE IS HUAWEI E8231 (I AM USING THIS DEVICE).

STEP 2- OPEN THE DEVICE & REMOVE TATA DOCOMO SIM WITH OTHER SIM CARD.

STEP 3- NOTE THE IMEI NUMBER OF YOUR DEVICE...THAT IS WRITTEN ON THE BACK OF YOUR PHOTON DEVICE.

STEP 4- NOW PLUG IN YOUR DEVICE(WITH REPLACED SIM CARD) & OPEN "192.168.1.1" IN YOUR BROWSER. 

STEP 5- NOW, IT WILL ASK YOU ABOUT 8 DIGIT UNLOCK CODE.

STEP 6-NOW IN ANOTHER TAB OPEN " http://bb5.at/huawei.php?imei=xxxxxxxxxxxxxxxxx " .... & IT WILL ASK YOU, IMEI NUMBER OF YOUR DEVICE..
ENTER YOUR IMEI NUMBR & CLICK ON CALCULATE.


STEP 7-
NOW THE UNLOCK (V3/201): XXXXXXXX ...THIS IS YOUR PHOTON DEVICE UNLOCK CODE.

STEP 8- NOW...NOTE THE 8 DIGIT NUMBER & ENTER IN YOUR PHOTON DEVICE ON THE WEB PAGE...& ENJOY THE HACKING.

STEP 9- IF IT WILL HELP YOU...SO PLEASE LIKE & COMMENT...THANK YOU.



ENJOY !!!

WINDOWS SUBSYSTEM FOR LINUX

Microsoft partnered with Canonical (creator of Ubuntu) to bring Linux environment experience in Windows 10. Through Windows Subsystem F...