All about Computer & Hacking |
- Things to Know Before you Download Windows 8
- How to monitor or track any Cell Phone
- Hacking website using SQL Injection -step by step guide
- Protect A Website From Being Defaced Or Hacked
- Free microsoft office 2010 Product key
| Things to Know Before you Download Windows 8 Posted: 09 Nov 2012 11:10 AM PST Microsoft today unveiled the "release preview" version of Windows 8 which mostly indicates that the new Windows operating system is feature-complete. Windows 8 Release Preview is available as a free download and it is very likely that your existing system specs are good enough to run Windows 8. The System Requirements for Windows 8 According to this Windows 8 FAQ, any machine equipped with 1 GB of RAM, 16 GB of hard disk space and 1 GHz processor should be able to handle Windows 8. The minimum RAM requirements are 2 GB in case you would like to install the 64-bit version of Windows 8. Should you download Windows 8 Setup or the ISO Image? As you may have noticed on the Windows 8 download page, the installation of Windows 8 can be done in two ways.
If you are planning to install Windows 8 on your existing computer, either on a different partition (dual-boot) or just want to upgrade from an older version of Windows to Windows 8, the default Setup program is a good choice. Please note that that your installed software programs will only be preserved if you are upgrading from Windows 7 to Windows 8. If your planning to install Windows 8 on top of Windows XP or Vista, only the files will be preserved but not the various software programs that you may have on the disk. The Windows 8 ISO image may be more handy in other situations like:
The universal product key for Windows 8 is TK8TP-9JN6P-7X7WW-RFFTV-B7QPF. Will my software programs run inside Windows 8? Before grabbing the ISO image of Windows 8, quickly run this setup utility and it will show a list of all software programs and hardware drivers on your system that are compatible with Windows 8. Alternatively, you can visit this page to see a list of all known software and hardware devices that are found to be working with Windows 8. How should I go about installing Windows 8? You can have Windows 8 on your computer in three ways – you can install Windows 8 side-by-side (also known as dual-boot), as a virtual machine (so that it runs inside your existing Windows just like any other software) or you can have Windows 8 as your primary OS (there's no going back from here). If you just want to try out Windows 8 but without modifying any of your existing set-up, the safest bet is to use a Virtual Machine. If you have a vacant disk partition or don't mind creating one (it's easy), go for the dual-boot option. Else, if you have a spare computer, you can consider upgrading to Windows 8 overwriting the previous installation of Windows. Also note that if you are upgrading from Windows 8 Consumer Preview to the new Windows 8 Release Preview, none of your installed programs, files and account settings will be preserved though everything would be moved to the windows.old folder. |
| How to monitor or track any Cell Phone Posted: 09 Nov 2012 09:35 AM PST How to monitor or track any cell phone?There is no denying that cell phones are part and parcel of current times and smartphones with a whole gamut of features are hot favorites. Mobile phones are being profusely used for a variety of functions and have become repositories of so much personal and professional information. If and when people can get at a cell phone's data, they acquire almost complete knowledge about the owner! But getting at a mobile's data is more easily said than done.People cannot keep grabbing furtively at a phone and going through the information stored in it! An invisible and silent way to transmit all the cell phone related activities and data, including deleted ones is needed. This is the basic idea behind monitoring or tracking cell phones using cell phone spy applications. How to monitor a cell phone most effectively?Monitoring software for cell phones is available for a variety of mobile models and operating systems. Such software, like the widely used Mobile Spy can be quickly installed on any cell phone that has to be monitored. The apps are thoroughly camouflaged and are designed to run undetected in the mobile's backdrop without intruding on the instrument's activities.Setting up cell phone monitoring softwareThe mobile tracking app installation typically involves a simple procedure. The user first creates an account for himself or herself on a server designated by the app at the time of buying. After this, the user has to physically pick up the cell phone to be monitored and set up the mobile monitoring software on it.As part of this step, he is also asked to select the data to be tracked. Immediately after the installation process is completed, the app becomes active and runs whenever the cell phone is on. It tracks the required data, encrypts it for security and then transmits it to the server account. User can view and use the logs recorded in the server by accessing his account from anywhere, at anytime through a web browser. Mobile data that becomes accessible with monitoring appsSophisticated monitoring apps for smartphones give many advanced options apart from the fundamental ones such as call, SMS, email and chat tracking and access to phone data like address book, video and picture files and so on. To encompass a wider scope for mobile tracking, the apps could have location tracking of mobiles with GPS or cell ID, live overhearing of calls and the mobile's environment, live viewing of the phone's screen, permissions to block applications and lock device remotely, the ability to limit phone usage timings, get current SIM details and many more options.Who can benefit from tracking mobiles?Parents interested in watching over their kids, firms that want to monitor their employee actions, husbands or wives doubtful about their partner's faithfulness and any persons who need evidence against someone are the cases where mobile tracking is called for.Some people use it as a data backup option on their own mobiles and some use such apps as a precaution against mobile loss. With mobile monitoring apps, anyone can acquire the power to track data and activity related to cell phones and by collecting the necessary information they can mitigate risks easily before any problems get precipitated. About The Author Lucille J Cronk is a blogger enthusiastic about cell phone technology and other mobile applications. |
| Hacking website using SQL Injection -step by step guide Posted: 09 Nov 2012 06:33 AM PST Before we see what SQL Injection is. We should know what SQL and Database are. Database: Database is collection of data. In website point of view, database is used for storing user ids,passwords,web page details and more. Some List of Database are: * DB servers, * MySQL(Open source), * MSSQL, * MS-ACCESS, * Oracle, * Postgre SQL(open source), * SQLite, SQL: Structured Query Language is Known as SQL. In order to communicate with the Database ,we are using SQL query. We are querying the database so it is called as Query language. Definition from Complete reference: SQL is a tool for organizing, managing, and retrieving data stored by a computer Simple Basic Queries for SQL: Select * from table_name : this statement is used for showing the content of tables including column name. For eg: select * from users; Insert into table_name(column_names,...) values(corresponding values for columns): For inserting data to table. For eg: insert into users(username,userid) values("BreakTheSec","break"); I will give more detail and query in my next thread about the SQL QUERY. What is SQL Injection? SQL injection is Common and famous method of hacking at present . Using this method an unauthorized person can access the database of the website. Attacker can get all details from the Database. What an attacker can do? * ByPassing Logins * Accessing secret data * Modifying contents of website * Shutting down the My SQL server Now let's dive into the real procedure for the SQL Injection. Follow my steps. Step 1: Finding Vulnerable Website: Our best partner for SQL injection is Google. We can find the Vulnerable websites(hackable websites) using Google Dork list. google dork is searching for vulnerable websites using the google searching tricks. There is lot of tricks to search in google. But we are going to use "inurl:" command for finding the vulnerable websites. Some Examples: inurl:index.php?id= inurl:gallery.php?id= inurl:article.php?id= inurl:pageid= Here is the huge list of Google Dork Click Here To Donwload How to use? copy one of the above command and paste in the google search engine box. Hit enter. You can get list of web sites. We have to visit the websites one by one for checking the vulnerability. So Start from the first website. ![]() Note:if you like to hack particular website,then try this: site:www.victimsite.com dork_list_commands for eg: site:www.victimsite.com inurl:index.php?id=Step 2: Checking the Vulnerability: Now we should check the vulnerability of websites. In order to check the vulnerability ,add the single quotes(') at the end of the url and hit enter. (No space between the number and single quotes) For eg: If the page remains in same page or showing that page not found or showing some other webpages. Then it is not vulnerable. If it showing any errors which is related to sql query,then it is vulnerable. Cheers..!! For eg: You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '\'' at line 1 Step 3: Finding Number of columns: Now we have found the website is vulnerable. Next step is to find the number of columns in the table. For that replace the single quotes(') with "order by n" statement.(leave one space between number and order by n statement) Change the n from 1,2,3,4,,5,6,...n. Until you get the error like "unknown column ". For eg: change the number until you get the error as "unknown column" if you get the error while trying the "x"th number,then no of column is "x-1". I mean: so now x=8 , The number of column is x-1 i.e, 7. Sometime the above may not work. At the time add the "--" at the end of the statement. For eg: Step 4: Displaying the Vulnerable columns: Using "union select columns_sequence" we can find the vulnerable part of the table. Replace the "order by n" with this statement. And change the id value to negative(i mean id=-2,must change,but in some website may work without changing). Replace the columns_sequence with the no from 1 to x-1(number of columns) separated with commas(,). For eg: if the number of columns is 7 ,then the query is as follow:
If the above method is not working then try this: It will show some numbers in the page(it must be less than 'x' value, i mean less than or equl to number of columns). Like this: Now select 1 number. It showing 3,7. Let's take the Number 3. Step 5: Finding version,database,user Now replace the 3 from the query with "version()" For eg: It will show the version as 5.0.1 or 4.3. something like this. Replace the version() with database() and user() for finding the database,user respectively. For eg: If the above is not working,then try this: Step 6: Finding the Table Name if the version is 5 or above. Then follow these steps. Now we have to find the table name of the database. Replace the 3 with "group_concat(table_name) and add the "from information_schema.tables where table_schema=database()" For eg: Now it will show the list of table names. Find the table name which is related with the admin or user. Now select the "admin " table. if the version is 4 or some others, you have to guess the table names. (user, tbluser). It is hard and bore to do sql inection with version 4. Step 7: Finding the Column Name Now replace the "group_concat(table_name) with the "group_concat(column_name)" Replace the "from information_schema.tables where table_schema=database()--" with "FROM information_schema.columns WHERE table_name=mysqlchar-- Now listen carefully ,we have to find convert the table name to MySql CHAR() string and replace mysqlchar with that . Find MysqlChar() for Tablename: First of all install the HackBar addon: https://addons.mozilla.org/en-US/firefox/addon/3899/ Now select sql->Mysql->MysqlChar() This will open the small window ,enter the table name which you found. i am going to use the admin table name. click ok Now you can see the CHAR(numbers separated with commans) in the Hack toolbar. Copy and paste the code at the end of the url instead of the "mysqlchar" For eg: http://www.victimsite.com/index.php?id=-2 and 1=2 union select 1,2,group_concat(column_name),4,5,6,7 from information_schema.columns where table_name=CHAR(97, 100, 109, 105, 110)-- Now it will show the list of columns. like admin,password,admin_id,admin_name,admin_password,active,id,admin_name,admin_pas s,admin_id,admin_name,admin_password,ID_admin,admin_username,username,password..etc.. Now replace the replace group_concat(column_name) with group_concat(columnname,0x3a,anothercolumnname). Columnname should be replaced from the listed column name. anothercolumnname should be replace from the listed column name. Now replace the " from information_schema.columns where table_name=CHAR(97, 100, 109, 105, 110)" with the "from table_name" For eg: Sometime it will show the column is not found. Then try another column names Now it will Username and passwords. Enjoy..!!cheers..!! If the website has members then jock-bot for you. You will have the list of usernames and password. Some time you may have the email ids also,enjoy you got the Dock which can produce the golden eggs. Step 8: Finding the Admin Panel: Just try with url like: etc.If you have luck ,you will find the admin page using above urls. or try this list . Here is the list of admin urls: Download |
| Protect A Website From Being Defaced Or Hacked Posted: 09 Nov 2012 03:33 AM PST ![]() A website defacement occurs when the hacker changes the visual appearance of a website, usually replaces the website's index.html file with his own file, which may contain the hacker's message or any thing related to it. There are many techniques that can be used to deface a website, However one of the most common technique used for defacement is simple SQL Injection, which allows the hacker to gain administrative access to the website. Some times the hacker may manage to gain root access to the webserver and therefore may cause a Mass defacement, replacing the index files of all the website available on that particular servers. This may be difficult when done manually, however there are many scripts that automatically do it. ![]() If you are a webmaster and looking forward to protect your website from being defaced or hacked you are in the right place. AntiDef is a tool written in java, specially designed for the purpose of protecting a website from being defaced or hacked. The usage is quite simple, all the server manager should do is to run this application with the following parameters:
How Does This Tool Work?The tool compares the source and the destination files, if they are found to be different it replaces the files with the backup or original files. |
| Free microsoft office 2010 Product key Posted: 08 Nov 2012 09:50 PM PST If you are looking Microsoft office 2010 Product keys then you are in the right place.Previously i posted on Microsoft office 2007 product key.You may use one of the following product keys to activate your Microsoft office keys, Microsoft Home Edition keys, Microsoft Standard edition keys and much more. Note:Due to DMCA notice I am forced to remove keys from here, So If you want to get access to the keys kindly download them from the link below: Download Microsoft 2010 Product Keys About Author This article is written by my Friend Hammas Saeed. He is coding expert. Cheer's |
| You are subscribed to email updates from Learn How to hack – Ethical Hacking and security tips To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
| Google Inc., 20 West Kinzie, Chicago IL USA 60610 | |






Niciun comentariu:
Trimiteți un comentariu