Monday, 21 September 2015

KNOW MORE ABOUT HACKER


Computer security also known as information security or cyber security is mainly associated with computer,internet  & computing devices like computer systems,smart phones,computer network etc.


HACKING-


Hacker is a term used for "a clever programmer", "who tries to break into computer systems."
Hacking is the part of computer science which helps to finding loopholes and exploits in a system or web system.
Technical definition of Hacking is-
Getting an unauthorized access or  entry in someone's digital life or finding loopholes and flaws in a computer system or computer network.


Difference b/w Hacker and Cracker
A hacker is someone who seeks and exploits loopholes and flaws in a computer system or computer network to secure the network.Whereas a cracker is someone who hacks a system for his own benefits and fun.They cause a lot of troubles.


Classification of Hackers

TYPES OF HACKER ON THE BASIS OF KNOWLEDGE

1 ) Script Kiddies
They are the beginners in the field of hacking.These  people are those  who don't even know about  the 'H' of Hacking.They simply use third party tools and follow step by step tutorials to break the security but they don't know what is actually going on.There knowledge about hacking is less or nothing.

2 ) Admins
Most of the hackers fall in this category.They have a good knowledge of hacking.
They also use third party tools available on internet as well as they used their brain & knowledge to access others computers systems.

3 ) Coders
They are the Hacking Gods or legends of cyber world.they are the most dangers hackers. They develop or code their own tool which in turn are used by script kiddies and admins.It takes a lot of hard work,deep knowledge,zeal and enthusiasm to become a coder.


TYPES OF HACKERS ON THE BASIS OF PROFESSION


1 ) White Hat Hackers
They are the good guys in the cyber world.They exploit a computer system or a web server to find loopholes and then they patch those loopholes for good.
They help in stopping the cyber crimes.There is a scarcity of white hat hackers in the IT world.Companies are ready to pay huge amount of money to protect their sites,servers etc.So be one of them.Become a white hat hacker.

2 ) Black Hat Hackers
Here come the bad boys in the cyber world.They are responsible for breaking the system,distributing viruses and malwares. They use their skills for bad purposes like stealing credit card numbers,email id & its password.
I would suggest you not to become a black hat hacker because use your knowledge for a  good purpose.

3 )Grey Hat Hackers
As their name suggests,they stand between white hat hackers and black hat hackers.They are basically white hat hackers but they do bad things just to prove themselves.Most of the hackers fall in this category.




Scopes of HACKERS

Hackers play vital and crucial role in the technical field..As a HACKER you can do the following works as discribed below :-

  • you can work in top level MNC's as security administrator and one of the best thing that you will have control our the whole server system which will be manipulated according to your desire. Which i think in the dream of every HACKER to have full access over something.
  • Now lets see in terms of salary what you will got....???     you will have an addition of 25 to 30% more salary over each and every colleague whit which you are working.
  •  beside going for a privte job you can also apply for government jobs as well. And there you salary will be based on your experience. 

10 AMAZING FACTS ABOUT GOOGLE SEARCH

  • Searching for "zerg rush" creates a search page being eaten by 'O's. Click each O three times to kill it. GO AHEAD...WE'LL WAIT.
  • Felling bored don’t worry google search take care of you ,Just go to Google Images search & search for " Atari Breakout. " …& play the interesting game.
  • Google search helps us to Convert currency. Want to find out how much you REALLY spent in dollars in that pub in US? Well, maybe when you feel better.
  • Google search helps us to find "Graph for (math function)" shows the function plot on your computer screen...(ENJOY YOUR MATHS HOMEWORK)
  • "solve circle/triangle/rectangle/..." similarly solves Geometry problems…IN GOOLE SEARCH.
  • Need to calculate a tip? Just search "calculate tip!"
  • Google present tilt page for your Searching..just type in google search box "tilt" or "askew".
  • A search for "do a barrel roll" or "Z or R twice" will spin the page..
  • Want to see how Google looks in 1998 just Searching for "google in 1998" gives you an old version or look.
  • Google search help you to find distance between cities, . "Books by...", "Songs by....", Set a timer etc.

Thursday, 17 September 2015

HOW TO CHANGE USER ACCOUNT PASSWORD USING CMD

A CMD (command prompt) is an entry point for typing computer commands in the Command Prompt window. By typing commands at the command prompt, you can perform tasks on your computer without using the Windows graphical interface.


step 1- type  " net user " hit enter

step 2- type  "net user (account name) " hit enter

step 3- type "net user (account name) * " hit enter

step 4- type password(it is hidden)


step 5- re type your password 


FOR EXAMPLE- 



Wednesday, 16 September 2015

AMAZING AND COOL TRICKS TO SPEED UP THE INTERNET CONNECTION

THREE AMAZING WAYS TO SPEED UP YOUR SLOW INTERNET CONNECTION

Hey friends , Everyone hates slow internet connection. Everyone wishes to have high speed internet connection but can't afford for every one.
  1. Optimize your Browser
  2.  DNS Servers
  3. Using Command Prompt




1]  Optimize your Browser 

First of all change your browser to boost up your internet speed with updated version of your browser.
And I suggested to use GOOGLE CHROME because it takes  less memory and bandwidth than other browsers.




2] Speed up Internet with Top Public DNS Servers

DNS server is also playing an important role in the increasing your speed of your internet connection.
Just change the DNS server address.

Google:
Preferred DNS server - 8.8.8.8 
Alternate DNS server - 8.8.4.4 

Comodo DNS: 
Preferred DNS server - 8.26.56.26 
Alternate DNS server - 8.20.247.20 

OpenDNS: 
Preferred DNS server - 208.67.222.222 
Alternate DNS server - 208.67.220.220


Steps to perform to speed up internet connection using Public DNS server

Go to Control Panel
Open Network and Sharing Center
Then Open Local Area Connection and select IPV4 and properties



Now Click on Use the following DNS Server addresses and change it with any of above given top public DNS Address and click on OK.
      


You've now boost up your internet connection using Public high speed DNS Server.






3]  Using Command Prompt ( CMD ) to speed up slow internet connection

You can also increase your net speed by entering some commands in your command prompt

Steps to perform to boost internet connection using command prompt
-Open cmd with administrator mode 
-Type following lines in command prompt and hit enter

netsh int tcp show global
netsh int tcp set global chimney=enabled
netsh int tcp set global autotuninglevel=normal
netsch int tcp set global congestionprovider=ctcp 



BEST HACKING TOOLS

Hacking tools can be dangerous, So be careful, handle tools with lots of  care...they can be just as useful tools for a good ethical hacker.




 Hacking tools make hacking quite easy. But , Hackers don’t  depend on hacking tools .These tools make it very simple, but they are nothing unless you have the knowledge about other aspects of hacking as well.





Wireless Hacking:
1. Aircrack-ng
2. Kismet 



Intrusion Detection Systems:
1. Snort
2. NetCop


Port Scanners:
1. Nmap



Encryption Tools:
1. KeePass 
2. OpenSSH
3. Putty
4. OpenSSL
5. Tor
6. OpenVPN



Password Crackers
1. Ophcrack
2. Medusa
3. RainbowCrack
4. Wfuzz
5. Brutus
6. L0phtCrack
7. THC Hydra



Packet Crafting: 
1. Hping
2. Scapy
3. Netcat
4. Socat



Traffic Monitoring: 
1. Splunk
2. Nagios
3. P0f
4. Ngrep



Packet Sniffers:
1. Wireshark
2. Tcpdump
3. Ettercap



Vulnerability Exploitation: 
1. Metasploit
2. sqlmap
3. Social Engineer Toolkit
4. BeEF



NOTE- These tools are pre-installed in kali linux (almost all tools).

Thursday, 10 September 2015

HACKER'S CHOICE : KALI


What is Kali Linux ?


Kali Linux is an operating system used for advanced Penetration Testing and Security Auditing Linux distribution.
Kali Linux is a Debian-derived Linux distribution . It is maintained and funded by Offensive Security Ltd. Mati Aharoni, Devon Kearns and Raphael Hertzog are the core developers.

Kali Linux Features

-Kali is a complete re-build of BackTrack Linux,
-More than 600 penetration testing tools included
-Open source Git tree
-Vast wireless device support
-Custom kernel patched for injection
-Secure development environment
-Multi-language
-GPG signed packages and repos
-Completely customizable

Why Kali Linux?


With Kali Linux, hacking becomes much more  easier since you have all the tools (appx 600 pre-installed tools) and other useful tools can be downloaded easily. 
Hacking with kali linux is very simple & without hard work.

  

How to install kali linux in VMplayers





Some Useful Commands

Some frequently used  linux  command line interface(terminal) commands , here are a few that will keep it in your mind.
The default username and password is 'root' and 'toor'.
press 'ctrl'+'alt'+ 't' for open terminal 
Type 'poweroff' in the terminal to shutdown. 
apt-get command can be used to install tools and updates. 
apt-get update and apt-get upgrade will update all the programs installed on your machine. 




Monday, 7 September 2015

NEW WAY OF PROGRAMMING WITHOUT SEMICOLON



// PROGRAMING WITHOUT SEMICOLON

THERE ARE MANY WAYS TO WRITE A SIMPLE PROGRAM...BUT NOW I AM GOING TO TECH YOU A NEW WAY OF PROGRAMMING ...THAT IS WITHOUT USING SEMICOLON



1- FOR DEV C++ COMPILER


#include<stdio.h>
#include<conio.h>
int main()
{
if(printf("Hello world \n  i m somesh sah... \n ENJOY PROGRAMMING"))                    
{
}
}



2-FOR OTHER COMPILER


#include<stdio.h>
#include<conio.h>
void main()
{
if(printf("Hello world \n  i m somesh sah... \n ENJOY PROGRAMMING"))                    
{
}
}







FOR MORE UPDATES LIKE MY FACEBOOK PAGE -CLICK HERE

Wednesday, 2 September 2015

COMMON WAYS TO CRACK SOMEONES PASSWORD



1. BruteForce Attack

Any type of password can be cracked by using Brute-force attack. Brute-force attacks try every possible combinations of numbers, letters and special characters until the right combination is matched. It is an long time process (time tacking process) depending upon difficulty of combination.


2. Social Engineering

Social engineering is process of manipulating someone to trust you and get information from them. It is similar to phishing


3. Rats And Keyloggers

In keylogging or RATing the hacker sends keylogger or rat to the victim. This allows hacker to monitor every thing victim do on his computer. Every keystroke is logged including passwords. More ever hacker can even control the victim’s computer.


4. Phishing

Phishing is the most easiest and popular way of hacking used by hackers to get someone account details. In Phishing attack hacker send fake page of real website like yahoo mail, gmail to victim. When someone login through that fake page his details is send to the hacker. This fake pages can be easily created and hosted on free web-hosting sites.


5. Guessing

This seems simple but very effective and easily help you to get someones password within seconds. If hacker knows you, he can use information he knows about you to guess your password.
For safety …don’t use simple passwords like your name, sir name,date of birth ,phone number etc.  

WINDOWS SUBSYSTEM FOR LINUX

Microsoft partnered with Canonical (creator of Ubuntu) to bring Linux environment experience in Windows 10. Through Windows Subsystem F...