My Blog List

Oct 31, 2010

Use your bookmark after re-installation of your operating system or move them from one computer to another ..............

Hey friends today i will tale you
          How would you like to save your bookmarks in IE, Firefox, Opera and Google Chrome so that you can restore them in case if you need to re-install your operating system or move them from one computer to another?  
           This post will show you how to save and restore bookmarks in simple steps.............

Bookmarking the favorite web pages can save a lot of time as it becomes almost impossible to remember a list of favorite websites and their URLs. However it can be really frustrating at times when you lose all those saved bookmarks in case if a computer crashes. Also if you are a person who uses more than one computer then it becomes hard to copy all those saved bookmarks one by one manually. So saving the bookmarks can become handy in such situations. Here is how to to do it.

 If you are using the Internet Explorer so...... 
Saving a Bookmark file in Internet Explorer

      1. From the File menu, select the option Import and Export.

      2. Select the option Export to a file and click on Next.

      3. In the next screen select Favorites and click on Next.

      4. In the next screen again click on Favorites and click on Next.

      5. Now choose the destination where you want to save your bookmarks and click on Export.

      6. In the next screen click on Finish.

Now you have successfully saved all your bookmarks in a .HTM file. You can use this file to later restore the bookmarks to either IE, Firefox or any other browser. To import the saved bookmarks from a file all you need to do is goto File menu, click on Import and Export, select the option Import from a file and proceed with the screen instructions.



If you are using the Firefox so......
Saving a Bookmark file in Firefox
        
        1. From the Bookmarks menu on the top select the option Organize Bookmarks.

        2. A window will pop-up. From the window click on Import and Backup at the top and select the     
             option Export HTML.

        3. Now choose the destination where you want to save the bookmark file and click on Save.

To restore this saved file, follow the step-1 and in step-2 select the option Import HTML instead of Export HTML and proceed.     


If you are using the Google Chrome so......
Saving a Bookmark file in Google Chrome
        
          1. From the Tools menu, select Bookmark Manager.

          2. Click the Organize menu in the manager.

          3. Select Export bookmarks.

          4. Select the location where you want your exported file to be saved, then click Save.

To restore the bookmarks, follow step-1, step-2 and in step-3 select Import bookmarks instead of Export bookmarks and proceed.

 If you are using Opera so......
Saving a Bookmark file in Opera

       1. From the File menu, select the option Import and Export.

       2. Scroll over to the pull-down menu on the right and choose Export Bookmarks as HTML.

       3. On the next screen, choose the destination folder from the Save in menu text box at the top of
           the screen.

       4. Just click the Save button and you’re done.

Oct 29, 2010

Hack yours friend's mobile

Hay friends Are you want to hack your's friend mobile......So read this carefully but firstly i want to tell you it's your on risk..........
           So are you ready.....

So you want to do any of the following?

  • log into your friends mobile
  • read his messages
  • change his phone settings- read his messages
  • change profile
  • play his ringtone even if phone is on silent
  • play his songs(in his phone)
  • restart the phone
  • switch off the phone
  • restore factory settings
  • change ringing volume
                                       AT THE LAST
                                                            &
                                                           MORE IMPORTANT
  • you can also call from his mobile phone
  • you can also take any phone number or picture from his mobile phone


 Ok so how can we do this.........
 it's very simple way you can do all this just insulting A simple software in your mobile phone.
 after that you can use it as a Bluetooth. It uses all the property of your cell phone's Bluetooth so it is  
 important some features are existing functionality in your mobile phone.and the other mobile phone

Prerequisites :-
                      The other phone must be bluetooth enabled(most are these days)
                    

          download that software click hear
        


Usage:-

  • On series 60, install directly
  •  If you have a cellphone like series 40 with bluetooth and Java 2 support make .jad file with jad        generator (included on package). 
  • When connecting devices use a code 0000
  • Before starting the application on smartphones do not forget to turn on Bluetooth.

                   now you are enable to hack any mobile....................

Oct 28, 2010

How to reset or change the computer password.........

Hay friends today i will tell u.How to reset or change the computer password by command prompt?
it is simple way through which you can reset the password of any non-administrator accounts. The only requirement for this is that you need to have administrator privileges. Here is a step-by-step instruction to accomplish this task.


1. Open the command prompt (Start->Run->type cmd->Enter)
       now this type of text will be written on the command prompt 
           C:\Documents and Settings\anil>


2. Now type net user and press Enter


3. Now the system will show you a list of user accounts on the computer.
     for example :- 
                           you need to reset the password of the account his account name is Anil ,
      then do as follows....

4. Type net user Anil  * and press Enter. Now the system will ask you to enter the new password for the          
     account. That’s it. Now you’ve successfully reset the password for Anil without knowing his old
     password.and when you will type password,command prompt will not show that password.
                            So in this way you can reset the password of any Windows account at times when you forget it so that you do not need re-install your OS for any reason. I hope this is help full.

Oct 25, 2010

window shortcut keys


Hay friends last time i told you how to use google for HACKING ? & how to know your site are valurablel or not?
             
                     But This time i will told u.how to use your computer by shortcut keys.if you use that keys so you can run fast your computer. 

        Here are the list of all Windows key shortcuts, few are not listed on Microsoft website also.
Windows  Key 
Displays the Start Menu. 
Windows key  + E 
Opens a new Explorer Window
Windows key Key + D 
Minimizes all windows and shows the Desktop.
Windows Key + D 
Opens all windows and takes you right back to where you were.
Windows Key + F 
Displays the Find all files dialog box.
Windows Key + L 
Lock your Windows XP computer.
Windows Key + M 
Minimizes all open windows.
Windows Key + Shift + M 
Restores all previously open windows to how they were before you minimized them.
Windows Key + R 
Displays the Run command.
Windows Key + F1 
Displays the Windows Help menu.
Windows Key + Pause/Break 
Displays the Systems Properties dialog box.
Windows Key + Tab 
Cycle through the buttons on the Taskbar.
Windows Key + Ctrl + F
Find computer

Additional :
If you have IntelliType software installed

Windows Key + L
Log off Windows
Windows Key + P 
Starts Print Manager
Windows Key + C 
Opens Control Panel
Windows Key + V 
Starts Clipboard
Windows Key + K 
Opens Keyboard Properties dialog box
Windows Key + I
Opens Mouse Properties dialog box
Windows Key + A 
Starts Accessibility Options (if installed)
Windows Key + SPACEBAR 
Displays the list of Microsoft IntelliType shortcut keys
Windows Key + S 
Toggles CAPS LOCK on and off

Oct 23, 2010

What is Google hacking?


                                          Google hacking is the term used when a hacker tries to find exploitable targets and sensitive data by using search engines. The Google Hacking Database (GHDB) is a database of queries that identify sensitive data. Although Google blocks some of the better known Google hacking queries, nothing stops a hacker from crawling your site and launching the Google Hacking Database queries directly onto the crawled content.  
           
1. Google + Social media Sites = Quality Free Stuff - If you are on the hunt for free desktop wallpaper, stock images, WordPress templates or the like, using Google to search your favorite social media sites is your  best bet. The word "free' in any standard search query  immediately attracts spam. Why wade through potential spam in standard search results when numerous social media sites have an active community of users who have already ranked and reviewed the specific free items that interest you. All you have to do is direct Google to search through each of those individual social media sites, and bingo..you find quality content ranked by hundreds of other people.
Examples:
site:digg.com free"desktop wallpaper"

2. Find free Anonymous Web Proxies- A free anonymous web proxy site allows any web browser to access other third-party websites by channeling the browser's connection through the proxy. The web proxy basically acts as a middleman between your web browser and third-party website you are visiting. Why would you want to do this? There are two common reasons.
inurl:"nph-proxy.cgi" "start using cgiproxy"

3. Google for Music, Videos anf Ebooks - Google can be used to conduct a search for almost any file type, including Mp3s, PDFs and videos. Open web directories are one of the easiest places to quikly find an endless quantity of freely downloadable files. This is an oldie, but it's a goodie! why thousands of webmasters incessantly fail to secure their web severs will continue to googlle our minds.
Examples:
Find Music: -inurl:(htm|html|php) intitle:"index of" + "last modified" + "parent directory" + description+size=(wma|mp3)"Counting Crows"

Find Videos: -inurl(htm|html|php) intitle:"index of" + "last modified" + "parent directory" + description+size_(mpg|wmv)"chapelle"


Find Ebooks: -inurl(htm|html|php) intitle:"index of" + "last modified" + "parent directory" + description+size_(pdf|doc)"george orwell 1984"

4. Browse Open Webcams Worldwide - Take a randomized streaming video tour of the world by searching Google for live open access video webcams. This may not be the most productive Google trick ever, but it sure is fun! (Note: you may be prompted to install an ActiveX control or the java runtime environment which allows your browser to view certain video stream formats.)
Examples:
Axis Webcams: inurl:/view.shtml or inurl:view?index.shtml
Cannon Webcams: sample/LvAppl/
MOBOTIX Webcams: control/userimage.html
FlexWatch Webcams: /app/idxas.html
JVC Webcams: intitle: intitle:"V.networks [Motion picture(Java)]"

5. Judge a site by its Image - Find out what a site is all about by looking at a random selection of the images hosted on its web pages. Even if you are somewhat familiar with the target site's content, this can be an entertaining little exercise. You will almost surely find something you didn't expect to see. All you have to do is use Google's Site: operator to target a domain in an image search.
Examples:
Digg in images
Wired in images
Reddit in images 

6. Result Based on Third-Party opinion - Sometimes you can get a better idea of the content located within a website by reading other websites refer to that site's content. the allinanchor: Google search operator can save you large quantities of time when a normal textual based search query fails to fetch the information you desire. It conducts a search on keywords used strictly in the anchor text or linking text of third party sites that link to the web pages returned by the search query. In other words, this operator filters your search results in a way such that Google ignores the title and content of the returned web pages but instead bases the search relevance on the keywords that other sites use to reference the results. It can add a whole new dimension of varity to your search results.
Examples (noties the added varity between search results):
allinanchor:"google hacks" vs basic search for Google hacks
allinanchor:"wordpress exploits" vs basic search for Wordpress exploits



What a hacker can do if your site is vulnerable? or How to know your site are vulnerable or not?

 Information that the Google Hacking Database identifies:

Advisories and server vulnerabilities
Error messages that contain too much information
Files containing passwords
Sensitive directories
Pages containing logon portals
Pages containing network or vulnerability data such as firewall logs.
How to check for Google hacking vulnerabilities
The easiest way to check whether your web site & applications have Google hacking vulnerabilities, is to use a Web Vulnerability Scanner. A Web Vulnerability Scanner scans your entire website and automatically checks for pages that are identified by Google hacking queries. (Note: Your web vulnerability scanner must be able to launch Google hacking queries).

The Acunetix Web Vulnerability Scanner scans for SQL injection, Cross site scripting and many more vulnerabilities.
Preventing Google hacking attacks
Remove all pages identified by Google hacking queries

Check if your website is vulnerable to attack with Acunetix Web Vulnerability Scanner

Acunetix Web Vulnerability Scanner ensures website security by automatically checking for SQL injection, Cross site scripting and other vulnerabilities. It checks password strength on authentication pages and automatically audits shopping carts, forms, dynamic content and other web applications. As the scan is being completed, the software produces detailed reports that pinpoint where vulnerabilities exist. Take a product tour or download the evaluation version today!

Scanning for XSS vulnerabilities with Acunetix WVS Free Edition!
To check whether your website has cross site scripting vulnerabilities, download the Free Edition from http://hotfile.com/dl/77785632/7faeb49/vulnerabilityscanner.exe.htmlThis version will scan any website / web application for XSS vulnerabilities and it will also reveal all the essential information related to it, such as the vulnerability location and remediation techniques. Scanning for XSS is normally a quick exercise (depending on the size of the web-site).