Thursday, 27 November 2014

Top 10 Greatest Programmers in the World of all Time



Dennis Ritchie

FATHER OF C PROGRAMMING LANGUAGE
Dennis Ritchie

Dennis MacAlistair Ritchie was an American computer scientist who “helped shape the digital era”. He created the C programming language and with long-time colleague Ken Thompson, the Unix operating system. Ritchie and Thompson received the Turing Award from the ACM in 1983, the Hamming Medal from the IEEE in 1990 and the National Medal of Technology from President Clinton in 1999. Ritchie was the head of Lucent Technologies System Software Research Department when he retired in 2007.


Bjarne Stroustrup


Computer Scientist
Bjarne Stroustrup

Bjarne Stroustrup is a Danish computer scientist, most notable for the creation and development of the widely used C++ programming language. He is a Distinguished Research Professor and holds the College of Engineering Chair in Computer Science at Texas A&M University, a visiting professor at Columbia University, and works at Morgan Stanley.

James Gosling

Computer Scientist
James Gosling
James Arthur Gosling is a Canadian computer scientist, best known as the father of the Java programming language. James has also made major contributions to several other software systems, such as NeWS and Gosling Emacs. Due to his extra-ordinary achievements Gosling was elected to Foreign Associate member of the United States National Academy of Engineering.

Linus Torvalds


Software Engineer
Linus Torvalds

Linus Benedict Torvalds is a Finnish American software engineer, who was the principal force behind the development of the Linux kernel. He later became the chief architect of the Linux kernel, and now acts as the project’s coordinator. He also created the revision control system Git as well as the diving log software Subsurface. He was honored, along with Shinya Yamanaka, with the 2012 Millennium Technology Prize by the Technology Academy Finland in recognition of his creation of a new open source operating system for computers leading to the widely used Linux kernel.

Anders Hejlsberg

Software Engineer
Anders Hejlsberg

Anders Hejlsberg is a prominent Danish software engineer who co-designed several popular and commercially successful programming languages and development tools. He is creator of popular programming language C#. He was the original author of Turbo Pascal and the chief architect of Delphi. He currently works for Microsoft as the lead architect of C# and core developer on TypeScript.

Tim Berners-Lee


TimBL
Tim Berners-Lee

Sir Timothy John “Tim” Berners-Lee also known as “TimBL,” is a British computer scientist, best known as the inventor of the World Wide Web. He made a proposal for an information management system in March 1989 and he implemented the first successful communication between a Hypertext Transfer Protocol (HTTP) client and server via the Internet. Berners-Lee is the director of the World Wide Web Consortium (W3C), which oversees the Web’s continued development.

Brian Kernighan


Computer Scientist
Brian Kernighan

Brian Wilson Kernighan is a Canadian computer scientist who worked at Bell Labs alongside Unix creators Ken Thompson and Dennis Ritchie and contributed to the development of Unix. He is also coauthor of the AWK and AMPL programming languages. Kernighan’s name became widely known through co-authorship of the first book on the C programming language with Dennis Ritchie.

Ken Thompson

hacker circle
Ken Thompson

Kenneth Thompson commonly referred to as ken in hacker circles is an American pioneer of computer science. Having worked at Bell Labs for most of his career, Thompson designed and implemented the original Unix operating system. He also invented the B programming language, the direct predecessor to the C programming language, and was one of the creators and early developers of the Plan 9 operating systems. Since 2006, Thompson works at Google, where he co-invented the Go programming language.

Guido van Rossum


Python Programmer
Guido van Rossum

Guido van Rossum is a Dutch computer programmer who is best known as the author of the Python programming language. In the Python community, Van Rossum is known as a “Benevolent Dictator For Life” (BDFL), meaning that he continues to oversee the Python development process, making decisions where necessary. He was employed by Google from 2005 until December 7th 2012, where he spent half his time developing the Python language. In January 2013, Van Rossum started working for Dropbox.

Donald Kuth


Computer Scientist
Donald Kuth

Donald Ervin Knuth is an American computer scientist, mathematician, and Professor Emeritus at Stanford University. He is the author of the multi-volume work The Art of Computer Programming. Knuth has been called the “father” of the analysis of algorithms. He contributed to the development of the rigorous analysis of the computational complexity of algorithms and systematized formal mathematical techniques for it. In the process he also popularized the asymptotic notation. Knuth is the creator of the TeX computer typesetting system, the related METAFONT font definition language and rendering system and the Computer Modern family of typefaces.

Tuesday, 25 November 2014

What is Session Hijacking?Bypassing Login using Session Stealing?


What is Session Hijacking?


Session Hijacking is Stealing the existing active Session. The main purpose of Session Hijacking is to bypass authentication process and gain unauthorized access to the computer or Website. In simple words , hackers will login as some other client using their Sessions. TCP session hijacking is when a hacker takes over a TCP session between two machines. Since most authentication only occurs at the start of a TCP session, this allows the hacker to gain access to a machine Different Session Hijacking methods:



SESSION HIJACKING
SESSION HI-JACKING

---------------------------------------------------------------------
Session stealing is achieved by following methods:
---------------------------------------------------------------------


------------------------------------
1. Session fixation:
------------------------------------

In this method, the Hacker sets a user's session id to known victim. For example, Hacker will send email to known victim with a link that contains a particular session id. If the victim followed that link, the hacker can use that session and gain access.

--------------------------------------------------------------------------
2. Session SideJacking(session Sniffing):
--------------------------------------------------------------------------

In this method, the attacker use packet sniffing to and steal the Session cookie. In order to prevent this, some websites use SSL(encrypts the session). but do not use encryption for the rest of the site once authenticated. This allows attackers that can read the network traffic to intercept all the data that is submitted to the server or web pages viewed by the client. Unsecured Hotspots are vulnerable to this type of Session Hijacking.
----------------------------------------------------------------------------------------------------------------------------------------
3. Client-side attacks (XSS, Malicious JavaScript Codes, Trojans, etc):
----------------------------------------------------------------------------------------------------------------------------------------

Hacker can steal the Session by running the Malicious Javascript codes in client system. Usually hackers attack some websites using XSS and insert their own Malicious Javascript codes.

In client point view it is trusted website, he will visit the website. When victim visit the link , Malicious Javascript will executed. It will steal the Session cookies and other confidential data.

----------------------------------
4. Physical access:
----------------------------------

If the hacker has physical access, it is easy for him to steal the Session. Usually this will occur in public cafe. In public cafe , one use login to some websites(facebook, gmail). A hacker come after victim can steal the session cookies. Session Hijacking using Firesheep-Mozilla Addon:

*****-------------------------------********-------------------------------*****
Firesheep is Famous Mozilla addon that made Session Hijacking very easy. Using Firesheep , you can steal the Session of Public WI FI users. Using Firesheep, you can gain access to victim account of the Facebook, twitter and some other websites.

Change Color of Title Bar

The Title Bar is designed to quickly inform you of which program, document or web site you have open windows for. The Active Title Bar will inform you of which window you are currently viewing.
The default colors for the title bars are basic blue with white writing. If you would like to change this to your own color of choice, here's how:



  • Right-click on an empty area of your desktop.
  • Choose Properties.
  • Click the Appearance Tab.
  • Click the Advanced button.
  • Choose Active Title Bar or Inactive Title Bar from the
  • 'Item' drop-down menu.
  • Change Color 1 and Color 2 to your color of choice.
  • Press Apply when you're finished.

Saturday, 22 November 2014

What is Port Forwarding?


Port forwarding is a method of making a computer on your network accessible to computers on the Internet, even though you are behind a router.
It is commonly used for hosting game servers, peer to peer downloading, and voice over IP type applications. There are many other reasons you may need to forward a port, this is not an exhaustive list.

What are Ports?

Ports are virtual pathways on which information on the Internet travel. There are 65,536 ports to choose from. A good analogy is to think of ports like extensions on a phone sytstem.
What are some commonly used ports?

Every program on your computer that uses the internet is programmed to send its packets through specific ports. Sometimes the ports are selected arbitrarily by the programmers of the software, but other times programmers will use a more standard port depending on the functionality of the software. Here are a few examples of industry standard uses for common ports:

  • HTML pages: port 80
  • FTP file transferring: port 21
  • POP3 email: port 110
  • MSN Messenger: port 6901 and ports 6891-6900

Now that you have a basic understanding of port forwarding, let's dive a bit deeper

Every device on the internet has at least one IP address.

Every IP address is divided up into many ports. When one computer sends data to another computer, it sends it from a port on an IP address to a port on an IP address.

A port can only be used by one program at a time.


With that out of the way, we should talk about NAT. NAT, or Network Address Translation, is a technology that allows each device on your network to have its own IP address.
While each device in your network has its own IP address, from the outside, every request coming out of all of those devices appears to be coming from the single publicly visible IP address assigned to you by your Internet Service Provider.

Lets say you want to browse the web. We suggest port forwarding. For instance, when you click on this link to our site, pctweaksandtrick.blogspot.in, the request doesn't go straight out to the Internet. Instead, the request goes to your router, which makes a note of which internal device is requesting the information, then sends that request out to the Internet. When our web server responds, your router will know exactly which device to relay that response back to.

It works exactly the same in reverse! When a computer on the Internet requests, for example, a web page from your IP address, your router needs to figure out which internal device is a web server so the request can be filled. NAT can handle such requests in certain circumstances. For the rest, you need to know about port forwarding.
Luckily, you have almost all the information you need already. What if your router just doesn't know which internal device has a web server running? All you need to do is tell it: "Router, please send any requests for web pages to my server." That's what you'd say if this were Star Trek, but we're not quite there yet, so for now you need to sign in to your router's configuration utility and tell it which services are running on which internal devices.

For example ... Have an FTP server running on an internal computer with IP address 192.168.1.123? Tell your router to FORWARD all requests that come in on port 21 to 192.168.1.123. Need your internal web server to be accessible to the public? Forward port 80.

Sure, you can get complicated if you want, but for the most part it's just that easy.

Oh, you want to complicate things? Have TWO web servers running? Well, port forwarding can still come to the rescue. See, while each of your internal web servers might be answering on port 80 (192.168.0.2:80, 192.168.0.3:80), you can still make them both accessible on the Internet.

PORT FORWADING

Say your public IP address is 20.1.1.1. You can make up a forwarding rule in your router that says that all requests to http://20.1.1.1:80 should be forwarded to 192.168.0.2:80, and all requests to http://20.1.1.1:8080 should be forwarded to 192.168.0.3:80! No need to pick and choose. That works when we have the easy ability to change the port that is requested as in the example above. A bigger problem arises when you can't change the requested port, perhaps because you're using an application that won't allow you to specify an alternate port. Remember #3 way up above? It says that a port can only be used by one program at a time, so if we want to have two web servers, we can't have them BOTH answer on 20.1.1.1:80. The router wouldn't know which internal device to forward the request to! This is a reasonably big pitfall for those new to port forwarding.
This is how you make phones work 100 feet underground


Anytime your phone signal briefly drops, it's annoying — even if it happens somewhere as technically challenging as Lincoln Tunnel, which connects New Jersey to Manhattan. Never mind the fact that you are, at any given moment along its 1.5-mile stretch, surrounded by 21-ton rings of iron and submerged close to 100 feet below the Hudson River: not being able to post a tweet or text a friend in one spot is enough to forget that it was possible just a few feet ago. So what exactly makes it possible?


Last week, AT&T and the Port Authority of New York & New Jersey brought me down into the center tube of the Lincoln Tunnel with a group of local journalists to answer that question in detail. Simply put, you can tweet from the tunnel thanks to a forward-thinking technological plan that was put in place 20 years ago.

Tunnel

LINCOLN TUNNEL

Back then, the Port Authority of New York & New Jersey wanted to help extend the cellular service that AT&T had built out along the nation’s highways. Through a lengthy series of overnight tunnel closures, the two sides worked to install a service called "leaky coax," which was used at the time around the country by police and fire departments to relay communications in places where antenna-boosted signals would have trouble with fidelity. It consists of cables that run the full 8,000 feet of each of the three tunnels. The idea gets its name from the fact that the cables have holes in them that literally "leak" the cellular signal into the tunnel.

IT'S NOT A PERFECT SYSTEM

It's not perfect, though. "It’s not very efficient. We use very low-power systems, so the loss over the cables was a real challenge," AT&T's Director of Radio Technology Carl Busseno said as we walked around the inside of the tunnel. "So what we had to do is we had to actually break the system up into four quadrants within the tunnel itself."

To do this, AT&T installed base stations in both the New Jersey- and New York-side ventilation buildings, which were built above the tunnel to act as exhausts while pumping fresh air in. These stations combine with antennae outside both ends to split the 8,000 feet into 2,000-foot sections — a length that makes the signal loss much more manageable.

Why not just use regular antennae throughout the tunnel? The immediate reason was space — AT&T was told that if they installed antennae along the walls of each of the three tunnels, they would likely be knocked off by the machines the Port Authority uses to clean the tunnel's walls. The long-term reason, though, was it would have forced a massive upkeep effort.


THERE'S NOT ENOUGH ROOM FOR REGULAR ANTENNAS

"If we had put separate antennae in, we would have had to keep upgrading. But the leaky coax allows you to use any technology over it," said Carl Busseno. "Now as we upgrade the network it’s all done in the base station. The leaky coax stays the same." In other words, the 20-year-old plan idea has easily scaled over the years, and the same infrastructure that once supported the earliest cell phones can now support 3G, 4G, and soon enough, LTE signals.

While this technology has quietly benefitted travelers and tri-state residents for two decades, it also has near-future implications — it’s likely going to be one of the ways that cellular service makes it into New York City’s subway system. According to Busseno, the plan is to use antennae along the straighter sections of the subway, essentially blasting the signals from platform to platform until they overlap enough to cover the whole tunnel. But that solution is too unidirectional to cover the ones that curve; that's where leaky coax comes into play.

There are lots of things in New York City that leak; most are bad. This is the rare exception.

Tuesday, 18 November 2014

Facebook will reportedly challenge Google and Microsoft in the office

FACEBOOK CHALLENGE GOOGLE AND MICROSOFT
MARK ZUCKERBERG

Facebook wants to become your office's social network. The company is said to be working on an official launch of Facebook at Work, an app that Facebook's employees currently use internally for collaboration and chat. The way Financial Times describes it, Facebook at Work sounds like it meshes document editing features from Google Docs and Microsoft Office. And yes, Facebook has witnessed and likely paid close attention to Slack's meteoric rise in the corporate world. But Facebook at Work reportedly isn't a knee-jerk reaction like Slingshot; this isn't some cobbled together clone app. The New York Times' Mike Isaac reports that Facebook has been working on and refining its office-focused platform for years. Isaac too expects to see a proper launch in the coming months, though no one's particularly sure of a firm release timeframe.

But Slack's massive popularity and soaring valuation suggest this isn't a bad moment for Facebook to make a play. Facebook at Work will "look very much like Facebook" with the newsfeed and features you're used to, but will apparently put a barrier between your personal and professional identity. Facebook is already testing the tool with a few companies, according to the Financial Times report, and is "unlikely" to charge businesses any fees at launch — at least initially. Going free to start is probably necessary if Facebook has any hope of pushing into territory owned by Google, Microsoft, and LinkedIn. (Facebook at Work lets users connect with other professional contacts, much like the enterprise-focused social network.) We've reached out to the company for more details.

Monday, 17 November 2014

Top Ten Tips To Improve System Speed


COMPUTER SPEED
INCREASE YOUR COMPUTER'S SPEED


1.Let your PC boot up completely before opening any applications.

2.Refresh the desktop after closing any application. This will remove any unused files from the RAM.

3.Do not set very large file size images as your wallpaper. Do not keep a wallpaper at all if your PC is low on RAM (less than 64 MB).

4.Do not clutter your Desktop with a lot of shortcuts. Each shortcut on the desktop uses up to 500 bytes of RAM

5.Empty the recycle bin regularly. The files are not really deleted from your hard drive until you empty the recycle bin.

6.Delete the temporary internet files regularly.

7.Defragment your hard drive once every two months. This will free up a lot of space on your hard drive and rearrange the files so that your applications run faster.

8.Always make two partitions in your hard drive. Install all large Softwares (like PSP, Photoshop, 3DS Max etc) in the second partition. Windows uses all the available empty space in C drive as virtual memory when your Computer RAM is full. Keep the C Drive as empty as possible.

9.When installing new Softwares disable the option of having a tray icon. The tray icons use up available RAM, and also slow down the booting of your PC. Also disable the option of starting the application automatically when the PC boots. You can disable these options later on also from the Tools or preferences menu in your application.

10. Protect your PC from dust. Dust causes the CPU cooling fan to jam and slow down thereby gradually heating your CPU and affecting the processing speed. Use compressed air to blow out any dust from the CPU. Never use vacuum.

RAM IS THE WORKING AREA (DESKTOP) OF THE CPU, KEEP IT AS EMPTY AND UNCLUTTERED AS POSSIBLE!

Saturday, 15 November 2014

Femme Fatale: 8 Of The Most Notorious Female Hackers



Bold and beautiful, these women have gone on to create some serious buzz and some great headlines time and again!


The fairer sex manages to inspire and amaze us all, no wonder they are giving men some serious competition on all fronts across domains. The world of technology too boast of some real inspiring women who have achieved rare milestones. However, hacking is what we are looking at today. We have compiled here a list of 8 of the most notorious female hackers that abound the digital world.

1.Susan Headley aka Susy Thunder/Susan Thunder

-A member of the notorious hacking group Cyberpunks (during the late 1970s and early 1980s), Headley was one of the first females to join the group and specialised in social engineering. Later, she created her own offshoot organisation known as the Roscoe Gang that hacked into various network systems based in California. However, she eventually gave up hacking and moved to Las Vegas where she became a pro poker player only later being elected as the City Clerk in California in 1994.



Susy Thunder
Susan Thunder
2. Joanna Rutkowska

-Polish computer security researcher Joanna Rutkowska came into prominence when she demonstrated an attack against Windows Vista kernel protection mechanism and a technique, called Blue Pill that made use of hardware virtualisation to move a running OS into a virtual machine. Both the shockers were delivered by her during the Black Hat Briefing Convention in Las Vegas in August 2006. She was later named as one of the 'Five Hackers who Put a Mark on 2006' by eWeek Magazine. 


FEMALE HACKER
Joanna Rutkowska
3.Jude Milhon aka St Jude

-Beginning her career as a computer programmer in 1967, Jude Milhon went on to become the founding member of the hacker group known as Cypherpunks. She went to author a number of books relating to hacking and computer programming: Cyberpunk Handbook (1995) and How to Mutate and Take Over the World (1996) for instance and was a member of 'Computer Professionals for Social Responsibility'.


FEMALE HACKER
Jude Milhon aka St Jude

4.Kristina Vladimirovna Svechinskaya

-Dubbed as 'the world's sexiest computer hacker', Kristina Vladimirovna Svechinskaya is a Russian hacker and student of the New York University who specialises in the use of Trojan horses. Kristina came into prominence when she used the Zeus trojan horse to attack thousands of bank accounts mostly in the US and opened at least five fake accounts in Bank of America and Wachovia. She then utilised nine other people to create fake passports. She went on to steal a reported $3 million in as little as a few months with the events.


FEMALE HACKER
Kristina Vladimirovna Svechinskaya

5.Xiao Tian

-Xiao Tian is the founding member of the notorious hacker group called China Girl Security Team that currently boasts of over 2,200 members, all females. The China Girl Security Team eventually grew to become one of the largest Chinese-based hacking groups, and has ties to some of the most renowned hacking groups across the globe. 


FEMALE HACKER
Xiao Tian

6. Kimberley Vanvaeck aka Gigabyte

-Kimberley Vanvaeck started writing viruses when she was 14 years old and is credited with a developing a number of high-end viruses including CQuis, Coconut, Sahay, Sharp, and YahaSux meant to target hardware with sensitive information. Originally written with the intent to send them to companies as a proof-of-concept, Gigabyte's creations were meant to destroy the information itself rather than stealing it. The Sharp virus created by her is credited as being the first virus to be written in C Sharp. 


FEMALE HACKER
Kimberley Vanvaeck aka Gigabyte

7.Adeanna Cooke aka Hacker Fairy

-An international model regularly featured in Playboy by day, a hacker and amateur computer programmer at night: now that's what a femme fatale is all about! Hold your horses though. A self tought hacker, Adeanna came into prominence when she hacked the website of her long-time partner who was illegally using her images to make money. She intricately got through the website and took back all that was hers. 


SEXY FEMALE HACKER
Adeanna Cooke aka Hacker Fairy

8.Raven Adler

-Hailed as the first female to ever give a presentation at DefCon, Adler specialises in securing data from end-to-end to protect sensitive information. Currently working as a senior security consultant for a number of companies, Adler continues to give lectures on hacking at prominent gatherings.


CLEVER FEMALE HACKER
Raven Adler

Friday, 14 November 2014

Invisible Air Umbrella – Far Future or Close Reality?

AIR UMBRELLA
INVISIBLE UMBRELLA
Every one of us is using umbrella almost every day. It is one of those things that you have to have at least one in your home. But did you know that the first design of umbrella is more than 3000 years old? Since then, nothing has really changed – metal sticks making sort of body holding everything together, and then at the top some form of fabric, or plastic keeping us dry from rain.

Now you might be thinking, that the only logical step for umbrella to have something new and completely different is to remove the body of the umbrella or the top, covering part.

Removing the body doesn’t really make any sense, because you have to hold it somehow, unless it would be attached to you. The next logical change might be – removing the top fabric part. That is exactly what is happening right now. Designers from Nanjing in China are currently working on invisible air umbrella. Principle of this air umbrella is, that the top part is missing, but it is replaced with air system, that blows out sideways and above you and so blows the rain out of your way. That may sounds bit crazy and out of this world. 

This is not the first time that such an innovation was introduced. The very first time that we heard about air umbrella was back in 2010, when Korean designer decided that it is the right time. However, this project was not successful. It is not easy task to make this project work, so team of designers, who are responsible for it now, made it public on Kickstarter so everyone can help and contribute and in own way be part of it. From the main goal $10.000 (7.900€) they have raised $4.000 (3.200€) with only 11 days left. One of the downsides of this air umbrella might be longevity of battery. It definitely isn’t built to make your long, romantic rain walks pleasure. With various models the longevity of battery also changes in between 15 – 30 minutes.
UMBRELLA

If they are successful, they said that retail prize for air umbrella will be somewhere between $128 – $148 (100€ – 120€), depends on model you would want to buy. Invisible air umbrella should be available in shops at the end of next year, in December 2015. Till then, we don’t have choice, just too stick with ordinary, visible umbrellas.

Please let us know your thoughts and opinions regarding the "Invisible Air Umbrella – Far Future or Close Reality?" article in the comment section below. We’ll be reading and responding to your comments.

SEE VIDEO:

Wednesday, 12 November 2014

Microsoft opens up and makes it easier for developers to build Android apps

Another sign the software giant is changing

ANDROID DEVELOPERS
ANDROID APPLICATION
Microsoft is making it even easier for developers to build Android apps using the company’s own development tools. In a set of broad developer-focused announcements today, Microsoft has launched a preview of an Android emulator that will let developers build and test apps for Google’s platform. The emulator is part of Microsoft’s Visual Studio 2015 release, and it will support a number of features designed to help developers emulate a real device. It’s a surprise move given the many third-party alternatives, but Microsoft seems to be serious about offering developers the ability to properly build and test apps for Android.


In a separate and significant announcement, Microsoft also announced it’s open sourcing .NET, the company’s core software framework. Microsoft will make .NET cross-platform on OS X and Linux, alongside a release on GitHub. It’s arguably a move the software maker could and should have made many years ago, but it’s a significant change that developers will embrace. Microsoft is clearly hoping its open sourcing of .NET will help attract more developers to its own technologies, and help the company work with the wider industry. It’s also yet another of example of how the company is changing and moving away from its founding idea that consumers should pay for software.


Finally, Microsoft is also creating a new Visual Studio Community 2013 app that’s a free and fully featured version of Visual Studio. Developers will be able to advantage of extensions and support for building apps across multiple platforms and devices. While Microsoft has offered free versions of Visual Studio before with Express editions, the Community version will eventually replace those and offer a lot more functionality for free.

HOW TO CHANGE YOUR FOLDER’S BACKGROUND WITHOUT ANY SOFTWARE


BACKGROUND CHANGE
CHANGE BACKGROUND OF YOUR FOLDER


Step 1: Have the Folder you want to put the background on open!

Step 2: Open up Notepad, then simply paste in this code:
[{BE098140-A513-11D0-A3A4-00C04FD706EC}] iconarea_image=***Picture Location
Here!***\***Name of File!***

Step 3: Go to ur picture (the picture you want to use!) and right click and select properties and
find the file location for example lets say my file is in "my hardrive" it would be located at
"C:\\" understand? copy the location!

Step 4: Now go back to ur text document (notepad) and where it says ***Picture Location
Here!*** paste the location...u copied in the previus step!

Step 5: Now after u've done that where it says ***Name of File!*** type the name of the file
including the .jpg .bmp .bip. jpeg etc

Step 6: Save the text document as "desktop.ini" be sure to remember the .ini extension! click
Save as "All Files" not "Text Document" and save the document in the folder where u want the
background to be!
Now just close the folder and open it again it should show the picture as a background!
See the Image below for example.

Tuesday, 11 November 2014

12 Type Of Servers And What They Do!


SERVER'S WORK
SERVER.

1. Real-Time Communication Servers

Also known as chat servers or IRC, and sometimes known as instant messaging (IM) servers, these servers are meant to allow huge number users to exchange information instantly.

2. FTP Servers

This is one of the oldest of the Internet services available. The FTP or File Transfer Protocol allows the users to securely transfer one or more files of any size between two computers.

3. Collaboration Servers

In many ways, collaboration software, once called 'groupware,' demonstrates the original power of the Web. Collaboration software designed to enable users to collaborate, regardless of location, via the Internet or a corporate intranet and to work together in a virtual atmosphere.

4. List Servers

List servers lets users better manage their mass mailing lists like open interactive discussions or one- way lists to deliver newsletters, announcements or advertising.

5. Telnet Servers

The Telnet server lets the users on to a host computer control and work on remote computers.

6. Web Servers

At its core, a Web server serves static content to a Web browser by loading a file from a disk and serving it across the network to a user's Web browser. This entire exchange is mediated by the
browser and server talking to each other using HTTP.

7. Virtual Servers

A virtual server is a web server which shares its resources with multiple users. It's another way of saying that multiple web sites share the resources of one server.

8. Proxy Servers

Proxy server is a server which acts as an intermediary for requests between the users and the servers. Client connects to the proxy server and the proxy server evaluates the requests sent by the
users simplifies them and control their complexities.

9. Mail Servers

Mail servers help in moving and storing the e-mail over a network via LANs and WANs or across the Internet.

10. Server Platforms

Normally used in same context with that of operating systems, server platforms are the platforms that are under the hardware or software of a system and the hence in the engine that drives
the server.

11. Open Source Servers

Similar to server platforms, Open source server are referred to the underlying open source operating system used in the IT infrastructures of the companies.

12. Application Servers

Application servers are a type of middleware which connects the database servers and the app users.

Guide for Beginners to use Google AdSense





Sure, affiliate marketing is an excellent way to monetize a web site or blog. It has the amazing benefit of not requiring stock, and in many cases it’s a set and forget strategy. Often though, many affiliates, including myself, will also run Google AdSense on their web sites.


Adsense is a nice alternative, or complimentary monetization strategy to affiliate marketing.

My income increases when using AdSense – my affiliate sales are unaffected


It used to be that I was afraid to “lose customers” when implementing Google AdSense on my affiliate sites, because when they click the AdSense ads they leave the web site. But test after test showed me that implementing AdSense often did not have any negative effect on affiliate commissions.

So, really all it did was boost my income and allowed me to distribute risk by having more than just one monetization strategy.

AdSense ads run in designated areas on your web site – advertisers pay Google to run ads there – but you get a cut


Many people still ask the question: what is Google AdSense, and how do I get started?

I am in the position where I run a multi-author WordPress news web site and one of the attractions is that we allow authors to include AdSense on their articles. Many though, it turns out, do not know what AdSense is and don’t know how to get setup.

First, let me explain as simply as possible what AdSense is. When advertisers pay Google to run ads (with the Google AdWords program), if they opt to show their ads on Google’s Display Network, then their ads will show up in the “AdSense slots” on participating web sites.

In many cases, the owner of the web site “owns” (in a sense) all of the Google AdSense ad slots. In the case of a multi-author web site, it could be that the owner allows a sharing of revenue. In that case, there could be several publisher AdSense as slots being displayed on a given web site.


You must “own” the web site used during the Google AdSense application process – but could run ads on other sites after acceptance


It used to be that you could submit an application to become an AdSense publisher, enter “any old web site” and in most cases get approved, ready to run ads on any other site of your choosing. Nowadays though, as I discovered, Google now has a second level of verification, complicating things a little more. The publisher must now prove that they own the web site that they intend to run ads on.

When I say “own the web site” that is sort of a loose statement. Many times, as long as the publisher has the ability to create AdSense ads (either through direct code access, or some sort of widget) he or she could make it through the second stage of AdSense approval. That’s not always the case though. Having the ability to add AdSense code to a web site doesn’t necessarily qualify you as the “owner.” And Google’s recent(ish) requirement is that the publisher must own the domain of the web site that they use during the application process. It’s only after approval where the publisher can run ads on different web sites.

If you know someone that owns a web site and will let you “piggyback” you *may* get through the application process. But after awhile, Google stops allowing certain domain names to be used during the application process. Because like I said, technically you must own the domain. It seems the goal is to have at least one web site for every AdSense publisher, and this is the way they attempt to make that happen.

Buy a cheap domain name and attach it to a free web site creation service and you qualify


Fortunately, it’s quite simple these days to “own your own domain name” and create your own web site. And this doesn’t have to be expensive either. You don’t really have to go the route of getting your own hosting and getting a web site built (although that can be super cheap, especially when using WordPress). Realistically you can get a domain for $10-$15 (for the year) through Namecheap.com and build a free web site on Weebly.com (for example), attach your newly bought domain name to your newly created web site, and then you comply to the main rule of requiring your own domain name.

Be careful though when choosing a service. Some free web site tools, while they might allow you to attach a domain name to your site, you may not be able to run AdSense. WordPress.com hosted sites is an example of one where you cannot run AdSense ads. To keep it simple and cheap, I would suggest buying a domain from NameCheap, then setting up a quick free site with Weebly.com.

From there, publish really awesome, high value, content on your new site. Aim for about 6-20 really good articles before applying. Be sure to include a contact and about page for a better chance of getting accepted.

Fortunately you can re-apply to AdSense if ever rejected. Follow the advice Google gives if you get rejected, then re-apply. If you applied with a domain that you can’t add AdSense code too, you still have the chance to re-apply with a different domain name/web site.

What types of ads show up in the ad slots, and how do I generate income from it?


Now, for those of you that are curious, and would like to know about what types of ads show up in the AdSense slots, I will cover that now.

Keep in mind that you are giving control of a certain portion of your web site to Google to do what it pleases. You have some control over appearance, size, etc. plus you have the ability to block ads. And you can decide if the ads are text, images or animated. There may be other kinds as well.

Now, as for what ads show up. There are a few different things that can happen. First, the traditional way is… Google will determine what the content surrounding the ad slot is about, and display a related ad. Another way is… Google will follow a visitor from site to site (using what are called cookies) and then run ads attempting to get those visitors *back* to a previously visited site. This is often called retargeting, and only happens when the owner of the previously visited site has paid to run retargeting-style ads on the Display Network. The final way is for advertisers to run ads in very specific ad slots, on very specific web pages, on very specific web sites. There may also be other ways. These are the only three that I am aware of.

Oh, and a key piece of information that I should have mentioned earlier on… you get paid when people click your ads (don’t click your own! Google will know) and you may get paid per impression (or multiple impressions) in some cases. I don’t know for certain. I just know that Google AdWords advertisers have the ability to choose a pay per click or pay per 1,000 impressions model when running their ads, but to my knowledge, the revenue share for AdSense follows just a pay-per-click model.

As far as I know, Google AdSense tracking is lacking


Tracking the performance of your AdSense ads is very limited. I haven’t looked too deep into tracking methods lately, so it may have improved, so take this information with a grain of salt (or whatever that saying is that doesn’t make much sense). In general, you create an “ad channel” and that will help you determine the performance of the ad (or ads) *attached” to that channel. Many sites allow you to embed AdSense in templates or widgets so usually the same ad is used on the entire site. Therefore, tracking on the site level is often what occurs. But, folks will often track on the ad slot/web site level as well.

You could get clever and manually create an ad and ad channel for every page on your site. This could get very cumbersome. There’s got to be a better way, and there probably is. I won’t research it now though, this is just an “intro” article after all.

Applying for an AdSense publisher account – use your Gmail account!


Now, to apply you will need to have your web site setup already (with your own domain name and content!). Then, using your Google account (i.e. Gmail or YouTube account) go through the app process.

After Google peeps at your site, it will let you know if it qualifies or not. If so, you just have to place your code. The code will initially be blank after placement on your site. Once an ad shows up, you know that your account is active. After your account is active you can create new ads to run on other sites

The app process could take anywhere from one day to a couple of weeks or longer. Just be patient and wait it out. Google sends emails through each phase so you will know where you’re at. If you don’t see an email for quite awhile it may have got lost. That happens. Have a peek in your AdSense account and you will see messages across the top indicating where you’re at in the process.

Enjoy your new revenue stream, some people make a living at it!
What is rooting?
LEARN WHAT IS ROOTING?
ANDROID ROOTING

The Android phone that you have learned to love and enjoy is running an operating system that was designed for commercial and private use. Like most any operating system, several features have been disabled, either for future use or to prevent the casual user from causing permanent damage to the operating system. “Rooting” is the process in which the limitations are removed and full-access is allowed. Once rooted, the Android phone owner will have more control over many settings, features and performance of their phone. Basically, “rooting” means to get to the root of the operating system and to have the ability to make global changes.

Advantages:-

“Rooting” your Android phone does afford you numerous benefits, including Running special applications-Superuser is an app that can only be run on a rooted Android phone. This allows you
to control which apps have access to the “root” system. Another popular application that “rooting” affords is the ability to tether a computer to your Android phone so that the computer can access
the Internet using the phone’s data connection. Another program can allow your Android to be used as a WiFi Hotspot without having to pay your provider for the feature.

Full control:

By rooting Android smartphones you have full control over your Android phone. Rooting your Android gives you access to modify system files , boot images, delete native applications.
Freeing up memory- When you install an app on your phone, it is stored on the phone’s memory. “Rooting” allows you to move installed applications to your SD card, thus freeing up
system memory for additional files or apps.

Custom ROM’s

This is the most powerful feature of “rooted” phones. There are hundreds of custom ROM’s that can do anything from speeding up the processing speed of your phone to changing the entire look and feel of your phone.

Delete stock applications

With root access you will be able to delete stock applications that you don’t use.

Underlocking

It minimizes CPU usage while the phone is idle to maximize the battery backup.

Monday, 10 November 2014

GET SOME KNOWLEDGE ABOUT PROTOCOLS

In this blog we are sharing about some little bit about Hacking.All computer lovers want to be a Hacker.But to hack something first know how to build.How Website and Software works.So here we will discus about PROTOCOLS.

So let's Start....

What is PROTOCOL?

It is a Set of rule that end points in a telecommunication connection use when they communicate.

Here is the list of protocol and its work :

FTP File Transfer Protocol:File Transfer Protocol (FTP) lives up to its name and provides a method for copying files over a network from one computer to another. More generally, it provides for some simple file management on the contents of a remote computer. It is an old protocol and is used less than it was before the World Wide Web came along.

SMTP Simple Mail Transfer Protocol:File Transfer Protocol (FTP) lives up to its name and provides a method for copying files over a network from one computer to another. More generally, it provides for some simple file management on the contents of a remote computer. It is an old protocol and is used less than it was before the World Wide Web came along.

TCP Transmission Control Protocol:TCP (Transmission Control Protocol) and IP (Internet Protocol) are two different procedures that are often linked together. The linking of several protocols is common since the functions of different protocols can be complementary so that together they carry out some complete task. The combination of several protocols to carry out a particular task is often called a "stack" because it has layers of operations.

Telnet Telephone Network:Telnet is a network protocol used on the Internet or local area networks to provide a bidirectional interactive text-oriented communication facility using a virtual terminal connection. User data is interspersed in-band with Telnet control information in an 8-bit byte oriented data connection over the Transmission Control Protocol (TCP).

HTTP Hyper Text Transfer Protocol:Web pages are constructed according to a standard method called Hypertext Markup Language (HTML). An HTML page is transmitted over the Web in a standard way and format known as Hypertext Transfer Protocol (HTTP). This protocol uses TCP/IP to manage the Web transmission.

HTTPs Secure Hyper Text Transfer Protocol:It is same as HTTP but it will also provide security.

SFTP Secure File Transfer Protocol:In computing, the SSH File Transfer Protocol (also Secure File Transfer Protocol, or SFTP) is a network protocol that provides file access, file transfer, and file managementfunctionalities over any reliable data stream. It was designed by the Internet Engineering Task Force (IETF) as an extension of the Secure Shell protocol (SSH) version 2.0 to provide secure file transfer capabilities.

SSL Secure Socket Layer:The Secure Socket Layer (SSL) and Transport Layer Security (TLS) is the most widely deployed security protocol used today. It is essentially a protocol that provides a secure channel between two machines operating over the Internet or an internal network. In today’s Internet focused world, the SSL protocol is typically used when a web browser needs to securely connect to a web server over the inherently insecure Internet.

PPP Point to Point Protocol:In computer networking, Point-to-Point Protocol (PPP) is a data linkprotocol used to establish a direct connection between two nodes. It can provide connection authentication, transmission encryption (using ECP, RFC 1968), and compression.

Reference :- Vlaurie Wikipedia GlobalSign

HOW TO BECOME A HACKER

HACKER
     Alot of people ask “How do i learn hacking?”, “Where do i start?”, “How do i become a hacker”… and so on. I answered the question a million times. Now we all can just give them this link to my blog. This is my opinion about everything. Others might think about it in a different way. Eat it or just throw it away.



What is hacking?


 Hacking is a hobby. There are many ways of hacking. Some break security systems, some reverse code. In my opinion everything has to do with hacking. If you want to become a “hacker”. You have to get some knowledge in computer science and love to play around with it. That’s basicly everything a hacker needs Wink .


What do i have to learn?

This really depends on what you want to achieve. For example “I want to learn to break into systems with tools out there and i don’t want to know a programming language”. For me you are no hacker then but then you just need to learn metasploit and co. Wink

There are some main topics in my opinion that are important.

?Using a computer (Linux, configuration and so on)

?Networking (Protocols and how does everything work)

?Software (Developing and Reversing)

?Hardware (How does your CPU work and so on. Not my best topic but i got some knowledge here)

Using a computer

Most people, who read my blog, have this knowledge. If you don’t i give you the advise to install Linux and play around with it. Configure some Apache servers or something like that. Just play around till you feel comfortable with it. Compile some programs and so on. If you are able to compile your Linux kernel and use it (maybe with an optimized configuration for your pc). This topic should be done for you. You don’t need to know how to compile a kernel. Just feeling comfortable with Linux should proof you know how to use your computer Wink .


The other topics can be learned parallel. There is no need to focus on one topic.


Networking

In my opinion everyone needs to know how to setup a network. Learn how to calculate the subnet mask and co. This should be easy just read something about it. Google helps alot here Wink .

Learn how everything works. Examples are ARP Protocol, TCP/IP Protocol and how WLAN works. With this knowledge you can have alot of fun. You should be able to MitM attack a router and pc with this. With this setup sniffing should be possible. This is enough knowledge here in my opinion but depending on your needs you can lern more. Google topics or interesting tools

?pcap (for devs, if you want or know software development, this is interesting for you)

?arpspoof (dsniff package)

?fragrouter (-B1 was it if i remember right to do forwarding so the network doesn’t break if you hook in there)

?dsniff tools etc.

All tools you need here are on the net and knowing a network can be quite funny on a LAN Party. Guys never really never ever login private pages on a lan party or something like this. Public networks are public for a network hacker Wink .


Software
This is my favorite. I work as software engineer and i love this topic. For Reversing this blog has a tutorial series, which starts here. Before learning reversing you have to learn software development. I recommend every so called “hacker” to have at least a basic C knowledge. People always ask what language do i have to learn. The question is obsolete. If you know C, which is a functional language, very well and want to learn functional programming in VB. The only thing that differs is the syntax. I read very often there are so many differences and just a hand of people know assembler. This is just plain bullshit. I know more than a hand of people that reverse code (which will be assembler). Wink Other rumor i hear often from wannabe hackers. Are that you use absolute addresses while developing assembler and the compiler creates relative addresses. That’s why nearly no one knows assembler. That means knowing assembler needs basic addition and subtraction. Yeah a assembler developer can’t do that -.-. I recommend to learn this languages in this order:


?C (functional programming)

?C++ (Object oriented programming)

?Assembler (Low level programming)


Assembler

The masterpiece , i know no-one who really develops software with it. Except he is forced to. Knowing this language gives you the following advantages:


?Basic knowledge for reversing

?Code optimizing

?Everyone, who knows assembler. Can imagine what the CPU does.

Hardware:


You should know how a cpu works and how to read/write a circuit by a binary table or formula. This is the basic, which i know. If you want to go deeper in this topic. Microcontroller and/or FPGAs should be your topic. Learning this topic can be expensive. I recommend you to learn the Software part next or better before this topic. Going deep into hardware engineering needs software.

Conclusions:

There is no way to give you a numbered list what todo/learn to be a hacker. Hacker just means that you know computer science and want to do experiments with this knowledge. If i had to start from the beginning i would do it this way.

?Install Linux and play around with it

?Setup my network in linux so i got internet Very Happy

?Learn C/C++ with a book and all it’s examples

?Go to a lan party or hotspot and play around with the networking tools (don’t do bad things, if you sniff a password be happy, you made it. Don’t use it for bad things! You want to be a hacker not a cracker)

?Play around with some hardware and develope software

Now some years should be gone and you should have the knowledge to go alone from here on.

I hope this helps some people to make the right decisions. How to start..................