Showing posts with label Internet tricks. Show all posts
Showing posts with label Internet tricks. Show all posts

Monday, 14 November 2011

HOW TO CHANGE YOUR IP

This article will help you to change your IP address within a minute. Just follow the following step and you will be thru.

1. Click on "Start" in the bottom left hand corner of scre en
2. Click on "Run"
3. Type in "command" and hit ok

You should now be at an MSDOS prompt screen.

4. Type "ipconfig /release" just like that, and hit "enter"
5. Type "exit" and leave the prompt
6. Right-click on "Network Places" or "My Network Places" on your desktop.
7. Click on "properties"

You should now be on a screen with something titled "Local Area Connection", or something close to that, and, if you have a network hooked up, all of your other networks.

8. Right click on "Local Area Connection" and click "properties"
9. Double-click on the "Internet Protocol (TCP/IP)" from the list under the "General" tab
10. Click on "Use the following IP address" under the "General" tab
11. Create an IP address (It doesn't matter what it is. I just type 1 and 2 until i fill the area up).
12. Press "Tab" and it should automatically fill in the "Subnet Mask" section with default numbers.
13. Hit the "Ok" button here
14. Hit the "Ok" button again

You should now be back to the "Local Area Connection" screen.

15. Right-click back on "Local Area Connection" and go to properties again.
16. Go back to the "TCP/IP" settings
17. This time, select "Obtain an IP address automatically"
tongue.gif 18. Hit "Ok"
19. Hit "Ok" again
20. You now have a new IP address

With a little practice, you can easily get this process down to 15 seconds.

P.S:
This only changes your dynamic IP address, not your ISP/IP address. If you plan on hacking a website with this trick be extremely careful, because if they try a little, they can trace it back

Wednesday, 19 October 2011

How hackers track what you type on smartphone


WASHINGTON: A research team at Georgia Tech claims that it has discovered how to use a users smartphone to track what the person is typing on the keyboard.

The smartphone accelerometer, an internal device that detects when and how the phone is tilted, senses keyboard vibrations and deciphers complete sentences with up to 80 per cent accuracy.

"We first tried our experiments with an iPhone 3GS, and the results were difficult to read," Patrick Traynor, assistant professor in Georgia Tech's School of Computer Science, said.

"But then we tried an iPhone 4, which has an added gyroscope to clean up the accelerometernoise, and the results were much better. We believe that most smartphones made in the past two years are sophisticated enough to launch this attack," he said.

The technique works through probability and by detecting pairs of keystrokes, rather than individual keys. It models "keyboard events" in pairs, then determines whether the pair of keys pressed is on the left versus right side of the keyboard, and whether they are close together or far apart.

After the system has determined these characteristics for each pair of keys depressed, it compares the results against a preloaded dictionary, each word of which has been broken down along similar measurements, i.e., are the letters left/right, near/far on a standard QWERTY keyboard.

The technique works reliably only on words of three or more letters. "The way we see this attack working is that you, the phone's owner, would request or be asked to download an innocuous-looking application, which doesn't ask you for the use of any suspicious phone sensors," Henry Carter, one of the study's co-authors, said.

"Then the keyboard-detection malware is turned on, and the next time you place your phone next to the keyboard and start typing, it starts listening," carter said.

The study has been published in the paper "(sp)iPhone: Decoding Vibrations From Nearby Keyboards Using Mobile Phone Accelerometers," and will be presented on 20th October.

Tuesday, 16 August 2011

Increase reliance data card speed from hybrid to HSD

ARTICLE BY GOWTHAM



First of all i would like to clear a point that it is not an hack that is cracked from software,but can say it is a mere loophole from reliance which is unknown to them and they can fix it as soon as they will find it,but you can enjoy this untill they fix it from their side as i am enjoying since last 20 days.


I remember the day i was figuring around with reliance data card to get high speed without paying for it,but the HSD 3.1 mpbs speed broadband internet tariff plans are too costly and i have to end up with hybrid(cdma 1x -144kbps) because my monthly budget for internet was low,but always dreaming to get high speed broadband for free,and finally got through it.


Pre-Requisite/requirement to get reliance HSD speed are


1) you must have reliance netconnect datacard that supports both hybrid(cdma1x) and HSD(EVDO).


2) though reliance HSD card plans/tariffs are costly and doesnt matchup with student pocket,so you can take any hybrid plans speed of 144 kbps,ensuring that the internet data card supports EVDO too when required.


3) Activate your datacard,check whether it is working fine or not.


4) if working fine go to >> settings then check on button >> use DNS


Put these IPs in DNS and Alternate DNS Field


DNS - 220.226.182.82


Alternate DNS - 220.226.182.83


5) Change mode from Hybrid/CDMA 1x to Broaband plus, Save settings.


6) Now try to Connect , it will get connected which was earlier not connecting because you were having hybrid plan/cdma 1x plan.


7) you might be thinking, that you will be still billed because you are using your phone number to connect to internet,but check your download stats in reliance website for your daily usage,their you will be shown with 0 download and 0 upload stats, an you will be still downloading daily,and do not panic about bill as i received my bill 3 days ago and it was charged nominal as usually done, and i have already crossed 10 gb download.


7) now to understand how this whole thing works.


Reliance Data card has been delivered to their sales executive/marketing executive as specimen copy, they have unlimited download and speed plan can say they get test reliance data cards which they are not billed for,if you check any salesman datacard, they have settings of DNS placed in their card, the same way i tried and actually it has bypassed my number to their test plan server.


Enjoy Browsing !!!!




Reliance data card screen settings for speed enhancement


reliance netconnect settings for speed hack

Thursday, 11 August 2011

How to block a site

ARTICLE BY GOWTHAM
1.start run
2.type
notepad%windir%\system32\drivers\etc\hosts
3.scroll down to below you will see
#127.0.0.1 localhost
then
#127.0.0.1 add your website address name
example:#127.0.0.1 www.xxxxxxxxx.com

Tuesday, 19 July 2011

10 tips to internet security

ARTICLE BY GOWTHAM

With the sudden rise in the Internet usage across the globe over the past few years, there has also been a rise in the amount of online scams and frauds. Today most of the Internet users are unaware of the most prevailing online threats which pose a real challenge for their safe Internet usage. As a result, Online Security has become a questionable factor for the most Internet users. However it is still possible to effectively combat online insecurity provided that the users are well aware of the common scams and frauds and know how to protect themselves. A study shows that over 91% of the Internet users are unaware of the online scams and are worried about their security. Well if you are one among those 91% then here is a list of 10 tips to ensure your total online security.
 
1. Always install a good antivirus software and keep it up-to-date. Also install a good anti-spyware to keep your PC away from spywares. Click Here for a list of recommended anti-spyware softwares.
 
2. Always visit known and trusted websites. If you are about to visit an unknown website, ensure that you do not click on suspectable links and banners.
 
3. Perform a virus scan on the files/email attachments that you download before executing them.
 
4. Regularly Update your operating system and browser software. For a better security it is recommended that you surf the Internet through the latest version of your browser program.
 
5. Never share your password (email, bank logins etc.) with any one for any reason. Choose a strong password (A blend of alphanumeric+special symbols) and change it regularly, eg. every 3 months. Avoid using easy-to-guess passwords. (ex. pet’s name or kid’s name)
 
6. Always type the URL of the website in your browser’s address bar to enter the login pages. For ex. To login to your Gmail account type http://mail.google.com 
 
7. Before you enter your password on any login page, ensure that you see https instead of http. ex. https://mail.google.com instead of http://mail.google.com. HTTPS protocol implements SSL (Secure Sockets Layer) and provide better security than a normal HTTP. For more information on HTTPS and SSL see Know More About Secure Sockets Layer (SSL).
 
8. Beware of phishing emails! Do not respond to any email that request you to update your login details by clicking on a link in the body of the email. Such links can lead to Fake Login Pages (Spoofed Pages). For more information on phishing refer What is Phishing?. Also refer How to Protect an Email Account from being Hacked.
 
9. Always hit the logout button to close your login session rather than abruptly terminating the browser window. Also clear your web browser caches after every session to remove the temporary files stored in the memory and hard disk of your PC.
 
10. Avoid (Stop) using any public computers or computers in the Internet cafes to access any sensitive/confidential information. Also avoid such computers to login to your email/bank accounts. You cannot be sure if any spyware, keystroke-logger, password-sniffer and other malicious programs have not been installed on such a PC.
 
By following the above 10 tips your online security can be guaranteed upto 90%. I hope this will help my readers for keeping themselves safe from any of the online insecurities. Cheers! Pass your comments.

Friday, 15 July 2011

How to recover hacked e mail

ARTICLE BY GOWTHAM



It can be a real nightmare if someone hacks and takes control of your email account as it may contain confidential information like bank logins, credit card details and other sensitive data. If you are one such Internet user whose email account has been compromised, then this post will surely help you out. In this post you will find the possible ways and procedures to get back your hacked email account.
 

For Gmail:

 
It can be a big disaster if your Gmail account has been compromised as it may be associated with several services like Blogger, Analytics, Adwords, Adsense, Orkut etc. Losing access to your Gmail account means losing access to all the services associated it with too. Here is a list of possible recovery actions that you can try.
Step -1: Try resetting your password since it is the easiest way to get your account back in action. In this process Google may ask you to answer the secret question or may send the password reset details to the secondary email address associated with your compromised account. You can reset you password from the following link
If you cannot find success from the Step-1 then proceed to Step-2.
 
Step-2: Many times the hacker will change the secret question and secondary email address right after the account is compromised. This is the reason for the Password Reset process to fail. If this is the case then you need to contact the Gmail support team by filling out the account recovery form. This form will ask you to fill out several questions like
1. Email addresses of up to five frequently emailed contacts
2. Names of any 4 Labels that you may have created in your account
3. List of other services associated with your compromised account
4. Your last successful login date
5. Account created date
6. Last password that you remember and many more…
You need to fill out this form as much accurately as possible. It is obvious to forget the dates of last login, account creation and similar terms. However you need to figure out the closest possible date/answers and fill out this form. This is your last chance! The more accurate the information filled out in the recovery form, the more the chances of getting your account back. You may reach the account recovery page form the following link
 

For Yahoo and Hotmail:

 
Unfortunately for Yahoo/Hotmail there is no second option like filling out the form or contacting the support team. All you need to do is either answer the secret questions that you have setup or reset the password using the secondary email option. 
To initiate the password reset process just click on the Forgot password link in your login page and proceed as per the screen instructions.
 

Wednesday, 13 July 2011

90,000 email IDs of US military contractor hacked

ARTICLE BY GOWTHAM

 
WASHINGTON: Hackers claim to have stolen over 90,000 email addresses and passwords in a cyber attack on a major US military contractor, a media report said. 

An arm of the online collective Anonymous has said that it broke into the computer systems ofBooz Allen Hamilton and then posted the details on Internet, 'The Daily Telegraph' online reported. 

They apparently were able to get encrypted versions of the email passwords only, 53,000 of which carried the military ".mil" domains, the report said. 

The hackers also wiped out 4GB of Booz Allen source code in an attack they called "Military Meltdown Monday". The group said, "We infiltrated a server on their network that basically had no security measures in place." 

Booz Allen provides technological services including cyber-security consulting to the American military and other US government agencies. Its staff includes Michael McConnell, former director of the National Security Agency. 

A US Defence Department spokesman said, "We are aware of the incident and coordinating with our federal partners." 

A spokesman for Booz Allen said its security policy meant "we generally do not comment on specific threats or actions taken against our systems". 

The hacking group responded with the comment, "You have a security policy? We never noticed." 

Anonymous became well-known last year for attacking companies including Amazon , Bank of America, Mastercard and Visa, that had cut off services to WikiLeaks and its founder, Julian Assange.

Sunday, 10 July 2011

Some Usefull links

kaspersky internet security full version direct link
http://goo.gl/Hg7js

send fake SMS with others mobile number
http://goo.gl/52ulX


Update stangers status in FB without noticing them
http://goo.gl/tvWgn


Stunning wallpapers download
http://goo.gl/aDIzu








report me if the links are not working...

How to Trace Mobile Numbers

ARTICLE BY GOWTHAM

Trace Mobile Numbers

With the rapid growth of mobile phone usage in recent years, we have often observed that the mobile phone has become a part of many illegal and criminal activities. So in most cases, tracing the mobile number becomes a vital part of the investigation process. Also sometimes we just want to trace a mobile number for reasons like annoying prank calls, blackmails, unknown number in a missed call list or similar.
Even though it is not possible to trace the number back to the caller, it is possible to trace it to the location of the caller and also find the network operator. Just have a look at this page on tracing Indian mobile numbers from Wikipedia. Using the information provided on this page, it is possible to certainly trace any mobile number from India and find out the location (state/city) and network operator (mobile operator) of the caller. All you need for this is only the first 4-digit of the mobile number. In this Wiki page you will find all the mobile number series listed in a nice tabular column where they are categorized based on mobile operator and the zone (state/city). This Wiki page is updated regularly so as to provide up-to-date information on newly added mobile number series and operators. I have used this page many a time and have never been disappointed.
If you would like to use a simpler interface where in you can just enter the target mobile number and trace the desired details, you can try this link from Numbering Plans. Using this link, you can trace any number in the world.
By using the information in this article, you can only know “where” the call is from and not “who” the caller is. Only the mobile operator is able to tell you ”who” the caller is. So if you’re in an emergency and need to find out the actual person behind the call, I would recommend that you file a complaint and take the help of police. I hope this information has helped you!

Monday, 4 July 2011

Common e-mail hacking methods

ARTICLE BY GOWTHAM
Gone are the days when email
hacking was a sophisticated art.
Today any body can access
hacking tips through the Internet
andstart hacking your yahoo or
hotmail account. All that is
needed is doing a search on
google with keywords like “how
to hack yahoo”, “hack yahoo
messenger”, “hotmail hack
program” etc. The following
article is not an effort to teach
you email hacking, but it has
more to do with raising
awareness on some common
email hacking methods.
Hackers can install keylogger
programs in the victim’s
computer. This program can spy
on what the user types from the
keyboard. If you think that you
can just uninstall such programs,
you are wrong as they are
completely hidden. After
installation, the hacker will use a
password and hot keys to enable
the keylogger. He can then use
the hot keys and password to
access your key entry details.
A keylogger program is widely
available on the internet.some of
them are listed below
Win-Spy Monitor
Realtime Spy
SpyAgent Stealth
Spy Anywhere
For more information on
keyloggers and it’s usage refer
my post Hacking an email
account.
Even if direct access to your
computer is not possible, hackers
canstill install a key logger from
a remote place and access your
computer using Remote
Administration Tools (RATs).
Another way of getting your
password is the use of fake login
pages that look exactly like the
real one. So, beware of the web
pages you visit. Also if you find
your computer behaving oddly,
there is a chance that some spy
program is running. On such
occasions it is better to try and
remove the malware or reformat
the entire hard disk.A detailed
Email Hacking tutorial is
discussed in the post Hacking an
email account.

Wednesday, 29 June 2011

Free calling websites

Test your anti virus is working or not

ARTICLE BY GOWTHAM


Have you ever wondered how to test your Antivirus software to ensure it’s proper working? Well here is a quick and easy way to test your antivirus. The process is called EICAR test which will work on any antivirus and was developed by European Institute of Computer Antivirus Research. This process can be used by people, companies and antivirus programmers to test the proper functioning of the antivirus/antimalware software without having to deal with the real computer virus which can cause damage to the computer. Here is a step-by-step procedure to test your antivirus.
1. Open a notepad (New Text Document.TXT) and copy the following code exactly onto it, and save the notepad.
EICAR Test code
X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*
2. Rename the file from New Text Document.TXT to myfile.com
3. Now run the antivirus scan on this myfile.com file.
If the antivirus is functioning properly on your computer, then it should generate a warning and immediately delete the file upon scanning. Otherwise you may have to re-install your antivirus.
NOTE: Most antivirus will pop-out a warning message in the Step-1 itself
You can also place the myfile.com file in a ZIP or RAR file and run a scan on it so as to ensure whether your antivirus can detect the test string in the compressed archive. Any antivirus when scanning this file will respond exactly as it will do for a genuine virus/malicious code. This test will cause no damage to your computer even though the antivirus will flag it as a malicious script. Hence it is the safest method to test the proper functioning of any antivirus.

Popular Posts