Pages

Monday, October 24, 2011

GOOGLE INTRODUCES DART, A STRONG ALTERNATIVE TO JAVASCRIPT



Google has taken the lid off an early preview of Dart, a new web programming language aimed at helping developers address what the search giant sees as the shortcomings of JavaScript, with a focus on developing apps that scale from tiny to huge.
In his Google Code blog entry, Dart software engineer Lars Bak lists the following as the new language’s design goals:


Create a structured yet flexible language for web programming.
Make Dart feel familiar and natural to programmers and thus easy to learn.
Ensure that Dart delivers high performance on all modern web browsers and environments ranging from small handheld devices to server-side execution.

Seems pretty straightforward. And, as Bak goes on to say, Dart is facilitating scenarios from a one-man development project all the way up to bigger applications that require teams of programmers by enabling you to start coding without types and add them in later.


Dart comes with its own native virtual machine, but there’s also a compiler that translates Dart to JavaScript. Between those two options, Google says that applications written in Dart can run in any modern browser. The Dart VM isn’t yet integrated with the Google Chrome browser, but Bak indicates that they’re looking into it.


The first wave of basic libraries and Dart tools are available as open source on their own site, and Bak says that Google is soliciting feedback from developers as the platform matures.



On a final note, if you’re interested in a deeper dive into Dart,there was plenty of interesting tidbits to come out of their conversation, including the roadmap to making Dart a common standard and the fact that Dart isn’t designed to make JavaScript obsolete.


TECHNO TITANS !!!!

Monday, October 17, 2011

Are Google Planning to Launch a Music Store? [INC VIDEO]




In May, a cloud-based music streaming app was launched by Google, called Google Music. This app allows users to back up their music files and also to stream them to other devices such as mobile phones. Google plans on using this to open an online MP3 store, hopefully to provide some competition for Amazon and Apple.
According to WSJ, Google have been working with major music companies, Universal Music Group Warner Music Group EMI Group and Sony Music to gain licenses for their catalogues, although this is nowhere near resolved. However Citigroup (EMI) appear to be close to making a deal possibly including the licenses for Pink Floyd, Coldplay and Kylie Minogue.
Although Google Music is still in invitation-only BETA testing mode, the New York Times stated that Google are hopeful that the store may be ready to launch within the next few weeks.
Unfortunately, the way that Google Music operates may make an online music store difficult to release. Unlike Apple, Google allows users to store music and transfer it to many different compatible devices. This means that all music, and licenses, have to be uploaded and cannot be streamed from the service. Apple have worked around this problem by having licenses that allow remote access to their online libraries so there is no need for uploading, this is much easier.
Although Google are still working on their licensing issues, they do allow users to upload their iTunes libraries into Google Music.
See this video for more information on how Google Music works and don’t forget to leave your views and ideas in our comments section.

TECHNO

Friday, October 7, 2011

Apple former CEO Steve Jobs dies after an year long fight from cancer



Steve once said -
“Remembering that I’ll be dead soon is the most important tool I’ve ever encountered to help me make the big choices in life. Because almost everything — all external expectations, all pride, all fear of embarrassment or failure — these things just fall away in the face of death, leaving only what is truly important. Remembering that you are going to die is the best way I know to avoid the trap of thinking you have something to lose. You are already naked. There is no reason not to follow your heart.”
“Your time is limited, so don’t waste it living someone else’s life. Don’t be trapped by dogma — which is living with the results of other people’s thinking. Don’t let the noise of others’ opinions drown out your own inner voice.”
These sentences are truly inspirational yet heart pounding.
Apple’s former CEO finally died today after an year long battle from a pancreatic cancer.
This is truly a sad moment fro Silicon Valley and for every single techie who uses technology is some way of the other. He was truly a legend, a great businessman, and a game changer.
For me , he was the most influential person I have ever heard and read of .
Techno Titans salutes the “GOD OF TECHNOLOGY”.
Its a loss then cant be recovered for many generations.
R.I.P

Monday, September 19, 2011

FAST DRAFT ASSEMBLY FOR BASIC REVERSE ENGINEERING




Hello friends. I have been busy these days so couldn’t bring anything new for you all. Currently I am shifting my focus from web hacking to reverse engineering. This field has been quenching me form some days as I don’t have much knowledge related to it. But many experts have advised that learning Assembly and shell coding is essential for exploit development. There are lots of vulnerabilities discovered everyday. So a big challenge lies in converting the vulnerability into exploit.

 See the thing that differentiates HackingAlert from other hacking and network security websites is that I believe in not just delivering you some hack by making a video with some fancy music or provide you a direct hack without even understanding the basic of it. So the focus of my few articles from now will be on assembly, Shell coding, exploits and Reverse Engineering.
Even I am new to Assembly and still shaping my knowledge in this field. I have made some studies in past few days(though very less due to shortage of time) and would encourage my readers that they should also start considering this area. Fun doesn’t lies in using what is made, instead it lies in making things that others can use.
Teaching you entire assembly is beyond my scope so I would suggest you all to refer some good books and material that is available for free on the internet and have a basic idea of what exactly Assembly is all about.
Here I will share a quick reference guide that can help you with the process of beginning Assembly.
A short and well explained tutorial that I found on the internet. Its quiet helpful to begin with.
Keep your research going to find out more. In the next post we will see how we can use a debugger to Reverse Engineer a software along with some Assembly basics.
Here is the Assembly tutorial  - DOWNLOAD 
TECHNO TITANS!!!!!!

Monday, June 20, 2011

THC Hydra v.6.4 released | network logon cracker





If you want to crack password of various networking protocols to access remote logon, Hydra is the best tool for that. Hydra is a parallized login cracker which supports numerous protocols to attack. New modules are easy to add, beside that, it is flexible and very fast. Version 6 was tested to compile cleanly on Linux, windows/Cygwin, Solaris 11, FreeBSD 8.1 and OSX.

Currently this tool supports:
TELNET, FTP, HTTP, HTTPS, HTTP-PROXY, SMB, SMBNT, MS-SQL, MYSQL, REXEC, RSH, RLOGIN, CVS, SNMP, SMTP-AUTH, SOCKS5, VNC, POP3, IMAP, NNTP, PCNFS, ICQ, SAP/R3, LDAP2, LDAP3, Postgres, Teamspeak, Cisco auth, Cisco enable, AFP, Subversion/SVN, Firebird, LDAP2, Cisco AAA (incorporated in telnet module). For HTTP, POP3, IMAP and SMTP, several login mechanisms like plain and MD5 digest are supported.



This tool is a proof of concept code, to give researchers and security consultants the possiblity to show how easy it would be to gain unauthorized access from remote to a system.


Disclaimer
1. This tool is for legal purposes only!
2. The GPLv3 applies to this code.
3. A special license expansion for OpenSSL is included which is required for the debian people


Changelog:

  •  Update SIP module to extract and use external IP addr return from server error to bypass NAT
  •  Update SIP module to use SASL lib
  •  Update email modules to check clear mode when TLS mode failed
  •  Update Oracle Listener module to work with Oracle DB 9.2
  •  Update LDAP module to support Windows 2008 active directory simple auth
  •  Fix to the connection adaptation engine which would loose planned attempts
  •  Fix make script for CentOS, reported by ya0wei
  •  Print error when a service limits connections and few pairs have to be tested
  •  Improved Mysql module to only init/close when needed
  •  Added patch from the FreeBSD maintainers
  •  Module usage help does not need a target to be specified anymore
  •  configure script now honors /etc/ld.so.conf.d/ directory 
 
Download Here
 
 
TECHNO TITANS !!!!!

How to Easily Backup All Your Google Docs Documents with GDocBackup

If you have many documents hosted in Google Docs, it is recommended that you create a backup copy of these files on your computer. You can do this manually via the home page of your Google Docs account, or simply use a tool called GDocBackup to easily download all your files on your computer.

GDocBackup Use

1. Download and install GDocBackup from here.

2. Launch the application and under the Main tab, submit your username and password you use to sign in to your Google Account, then select a backup directory where you want to store your files.

3. Open now the Export format tab, check on Enable multi-export, then check on all available extensions. When done, click Save.

4. In the main interface of GDocBackup, click Exec to start the backup process.

5. Wait now while the application downloads all your Google Docs files, click OK when the backup is completed.

6. The downloaded files will be now accessible in the selected backup directory. To sign in using a different username and password, then open Action > Config.




TECHNO TITANS !!!!!!!




Friday, June 17, 2011

Make Pen drive bootable. free download FlashBoot 2.0b

                                                                    FlashBoot 2.0b
                                         FlashBoot is a tool to make USB disks bootable.

Its primary focus is USB Flash disks, but other types of USB devices are supported as well. Making disk bootable involves formatting and copying operating system files to it. Different operating systems are supported: Windows 7/ Vista, Windows XP, SysLinux-based disks, GRUB4DOS disks, Linux kernel etc.

You may create blank bootable USB flash with minimal set of system files and then manually tune it for your needs, or convert a full-featured bootable CD-ROM or floppy disk to bootableUSB Flash keeping all functionality.

FlashBoot can either format physical disk or write an image file. So you may create customized USB disk manually or with another tool and use FlashBoot to create image out of it and redistribute it in local network or online.

FlashBoot 2.0 is a major step forward towards improvement of the software and satisfying user needs. Its code was rewritten from the ground up since old version 1.4 released in 2006.

Download Here:
 
 
TECHNO TITANS !!!! 

Saturday, June 11, 2011

Web camera software detects motion, triggers alarm, captures snapshots, records video, and sends captured images by e-mail

Web camera software senses activity, sounds
alarm, captures images, records video, and sends captured images by email


Webcam software detects movement, triggers alarm, captures images, records video, and sends captured images by email
Web cameras
are perfect for more than just making ip communications
more practical. They can in addition be
an enormously functional device
for use in home or corporation protection.

Application

is now available that can sense movement and use
it as a trigger for various procedures.


The way that
it works is to analyze the image sent by a camera that is either attached using USB
or through a video capture device for movement. While it picks up
that motion, it can afterward acquire any number of actions,
including triggering an alarm.

An other popular software, though, is to either
send live pictures of what is happening in the field that is covered by the camera
or to even broadcast using online streaming accurately what is
happening with both audio and picture. If installed furtively,
this software could even be used for covert surveillance.

Given the
large quantity of systems that either have a webcam attached
or can support one, this is an excellent way to inexpensively and effortlessly protect
the zone around that pc
from infringement or theft.

New professional security software works with
any webcamera, Internet cameras, and major capture cards.


Web camera software detects activity, triggers siren, captures images, records video, and sends captured images by email


Security software

has become so complicated that the average
user who has been busy minding his store instead of pouring over electronics and ip
know-how articles can be easily overwhelmed when it comes time to install or renew his surveillance system.


Luckily, there is modern professional surveillance application that simplifies much of the decision making.
You don't necessarily have to get rid of a working analog closed circuit TV system in order to update to a streaming
video that can be watched from any internet connected station or 3G phone. Video capture cards can digitally convert the
pictures for broadcast. Until yesterday, there had been no real attempts to regulate the new Internet
cameras; every make and manufacturer functioned a tiny differently. And when you throw webcams into the
join, finding one application to control them all was unwieldy.



Professional security application

is now available that will work for any webcam
or IP webcam and for most capture cards as well. You can monitor anything your activity
sensors are picking up at your house or business while you can be half a world away.
The application itself may not be easy, but it can make life simpler for you.

Broadcasting online video and audio from capture device
through camera computer application


Streaming live video and sound from capture card through web camera server application


Surveillance application

If you find yourself with a need to record security video with a webcam over an area,

camera
computer application

may be the right choice for you. Using this software, it is possible to set up a
camera to detect movement and begin recording when it does.

Depending on your needs, the sights and sounds that are picked up by the webcam may be stored on a hard drive, or if the captured video
needs to be accessible off-site, can be webcast using the server's broadcasting
feature to a website.

Depending on the quality of the webcam and the viewer's video card, the picture that is recorded may be as clear as a high-definition television signal.
Using a install like this, it is possible to provide a measure of security for an area when
the economics of the situation do not justify hiring a security business or setting up a professional monitoring system.

This

do-it-yourself approach

can save money while not compromising on security.


Friday, June 3, 2011

Protect against Cookiejacking | suggestion from microsoft

Protect against Cookie-jacking | suggestion from Microsoft

Some days ago, a security researcher found a microsoft's latest security risk named cookiejacking which allows cookiestealing. Microsoft is doing all it's research to patch this vulnerability of internet explore. This bug is in all versions of internet explorer. Clickjacking and social engineering techniques are then used to trick users into dragging the contents of the rogue iframes to containers on the same page controlled by the attackers. Read more about cookiejacking attack
Microsoft's Brandon LeBlanc say that the company is working on a patch. He also suggested to use  browser's InPrivate Browsing feature. The private browsing mode prevents access to cookie files already saved on the disk, but more importantly, it stores cookies for the active session in memory. This means that a page crafted for cookiejacking cannot access neither older cookies nor active ones, because there is no path to them

TECHNO TITANS !!!!!

Thursday, May 26, 2011

Packt: A Publishing House for the Future

Since I first heard of them several years ago, I've viewed Packt as the underdog in the world of technical book publishing. In the past year or so, Packt seems to have gained greater and greater influence: their catalog continues to grow, they are attracting talented and knowledgeable engineers as authors, and their titles are things that I'm actually interested in.

Two examples of this are the books Expert Python Programming and Zenoss Core Network and System Monitoring. I received a copy of the former and blogged about my take on it. For the Zenoss book, last year I agreed to be a technical reviewer and am currently preparing a blog post on my pre- and post-publishing experiences.

In both cases, I agreed to work with Packt based solely on the technical merits of their works. However, my experience as a technical reviewer with them was so positive (I have had consistently excellent experiences with their staff over extended periods of time and on long-running conversations) that I have not only agreed to review more titles, but have read up on Packt themselves a bit. Here are some highlights from their wikipedia article:
  • They published their first book in 2004 (the same year Ubuntu started!).
  • Packt offers PDF versions of all of their books for download.
  • When a book written on an open source project is sold, Packt pays a royalty directly to that project.
  • As of March 2008, Packt's contributions to open source projects surpassed US $100,000 (I would love an updated stat on this, if anyone has a newer figure).
  • They went DRM-free in March 2009.
  • Packt supports and publishes books on smaller projects and subjects that standard publishing companies cannot make profitable.
  • Their stream-lined business model aims to give authors high royalty rates and the opportunity to write on topics that standard publishers tend to avoid.
  • Bonus: they also run the Open Source Content Management System Award.
These guys have some keys things going for them:
  • They've got what appears to be a lean approach to business.
  • They know how to effectively crowd-source, keeping their overhead low.
  • They are rewarding both the authors as well as the open source projects.
  • Their titles continue to grow in diversity and depth.
  • The have an outstanding staff.
Oh, and I really like the user account management in their website! When I log in, I see a list of owned books, source code links for them, clear/clean UI, very easy to navigate. I can't emphasize this enough to vendors, service providers, etc.: if you want a loyal user base:
  1. make a good product that lasts a long time;
  2. make simple and great tools that enhance the experience of those products, that truly improve the experience of your users.

All in all, Packt really appear to be leaders in publishing innovation, taking lessons learned from the frontier of open source software and applying that to the older industry of publication production. I would encourage folks to evaluate Packt for themselves: if you like what you see, support them in readership and authorship :-)

I, for one, will continue to review titles that appeal to me personally and that I think others would enjoy as well. I have two books in the queue and three pending blog posts for the following titles:
And who knows, if I feel like writing a technical book at some point, you may see me in the Packt catalog, too

TECHNO TITANS !!!!!!

Friday, May 20, 2011

Facebook works with Google, Yahoo and mozilla on secure session cookie

Facebook works with Google, Yahoo and Mozilla on secure session cookie

After turning on https connection for facebook users, now facebook is working with Google, Yahoo and Mozilla on a secure session cookie specification that will protect session cookie from theft even over non-encrypted connections. This new specification is MAC Access Authentication that provide cryptographic verification for certain portions of HTTP requests. Here MAC is Message Authentication Code. this prevents MAN IN THE MIDDLE attack.

Facebook told developers in a post detailing recent changes to its app platform, "We’re working with Yahoo!, Google and Mozilla on this specification in order to give all websites a way to ensure that session information has not been altered or tampered with". Facebook also asked developers to use SSL connection for apps by october.
Recently facebook user data was leaked by some app tokens vulnerability, so facebook is forcing all developers to use SSL. Every time the facebook got some trouble, app is the reason. So facebook is trying each and every possible way to secure it's users from scams and data theft.

TECHNO TITANS !!!!!!

Tuesday, May 17, 2011

download Ncrack - High-speed network authentication cracker

 
Ncrack - High-speed network authentication cracker

 

Ncrack is a high-speed network authentication cracking tool. It was built to help companies secure their networks by proactively testing all their hosts and networking devices for poor passwords. Security professionals also rely on Ncrack when auditing their clients. Ncrack was designed using a modular approach, a command-line syntax similar to Nmap and a dynamic engine that can adapt its behaviour based on network feedback. It allows for rapid, yet reliable large-scale auditing of multiple hosts.


Ncrack's features include a very flexible interface granting the user full control of network operations, allowing for very sophisticated bruteforcing attacks, timing templates for ease of use, runtime interaction similar to Nmap's and many more.

Ncrack was started as a "Google Summer of Code" Project in 2009. While it is already useful for some purposes, it is still unfinished, alpha quality software. It is released as a standalone tool and can be downloaded from below.

 
TECHNO TITANS !!!!!!!!!!

Thursday, May 12, 2011

Download Kaspersky Pure : Crack/ Full version

Here is a cracked version of kaspersky pure . I have also provided a video tutorial to guide you through the installation process .Read the "readme.txt" file for complete guide for installation . The download is provided at the bottom of the page .



INSTRUCTIONS

01] uninstall K-PURE if installed (use uninstaller given in [Bonus] folder)

02] Reboot >>  Restart your computer (Important)

03] Run "pure9.0.0.192en" as administrator to start Installation

04] Follow through the installation, leave everything default.       Remember to uncheck       "I agree the terms of participation in Kaspersky Security Network".

05] After Installation, Activate 30days trail version, and run update center.

06] When updates completed,

Open PURE

Go to > Settings > Self-Defense > Uncheck (Disable) Self-Defense > Apply and OK to save changes

Click on "My Computer Protection"

Go to > Settings > Protection > uncheck (Disable) Protection > Apply and Ok to save changes.

07] Reboot >> Restart your computer (Important)

08] Open K-PURE and go to license manager (click on License at right bottom)

    In license manager you can find a key like this "0577-0004CE-XXXXXXXX"

    Beside this Key there will be a red "X" mark, use it to remove existing trail License     Delete existing License message pops up - Select YES

09] Right click of K-PURE icon in taskbar (tray, Righ bottom). Click EXIT

10] Open [FIX] Folder and extract files from "New ABL-Patch.rar"

    Password : Seven7i

11] Copy 2 patch files fltlib.dll and fltlib.ini from [New ABL-Patch] folder to K-PURE Install directory.

    C:\Program Files\Kaspersky Lab\Kaspersky PURE

12] Disable Internet connect (open RUN > ncpa.cpl > Select Network > right click > Disable)

13] Open K-PURE > Click on License > Activate commercial License >

    input 11111-11111-11111-1111X, then click "Next".

    It will be unable to connect to the Activation servers. Click "Browse" and open    PURE.key given in [FIX] folder. Click "Next", then "Finish".

    Thats all, now your Licensed till year 2016. Enjoy

    Wait, Never celebrate too early (few things left to complete)    14] Open K-PURE > Click on "My computer Protection" > Settings > Threads and exclusions >     Exclisions > Settings > Exclusion Rules > click on "+ADD " > Select object

    C:\Program Files\Kaspersky Lab\Kaspersky PURE\fltlib.dll    C:\Program Files\Kaspersky Lab\Kaspersky PURE\fltlib.ini

    Click on OK to add those 2 patch files in to exclusion list, So that K-PURE    wont consider them any more.        Click Apply and Ok on Settings window (Important)

15] Turn internet back on and Enable Self-Defense and Protection in settings.    remember ?  Point 12] and 06]

16] Now every thing completed, Check your license once again in License manager



DOWNLOAD


TECHNO TITANS!!!!!!

Done Deal! Big Deal. Smart Deal? Microsoft Buys Skype For $8.5 Billion In Cash

The deal is done. Microsoft is buying Skype for $8.5 billion in cash in its first sizeable acquisition since August 2008, when the Redmond software giant spent $486 million on Greenfield Online.



In fact, this is Microsoft’s biggest financial bet to date in terms of M&A, trumping its $6 billion+ purchase of aQuantive, which dates back to May 2007, in size.



The purchase price includes the assumption of Skype’s debt.



The agreement has been approved by the boards of directors of both Microsoft and Skype.





Skype will become a new business division within Microsoft, and its current chief executive Tony Bates will assume the title of president of the Microsoft Skype Division, reporting directly to Microsoft CEO Steve Ballmer.



The deal was first reported by GigaOM‘s Om Malik (he does that sometimes) and later confirmed by the Wall Street Journal, who cited people familiar with the matter.



The $8.5 billion question: did Microsoft overpay for Skype?



Perhaps, perhaps not. Only time will tell. As always with these things, the many tech industry pundits and analysts will look at this deal from all possible angles and then some, and still only a handful will end up being somewhat accurate when we look back in a couple of years.



From a non-financial point of view, the acquisition makes a ton of sense today, though.



Skype digitally connects dozens of millions of people on a daily basis, enabling them to communicate with each other through voice calls, chat messages and video conferencing.



There’s no doubt it’s a big brand on the Web (with both consumer and enterprise appeal, worldwide at that), and is poised to keep mattering in the next decade and beyond.



In August 2010, Skype filed to go public, expecting to raise $1 billion, but not long after appointing a new CEO, former Cisco SVP Tony Bates, the company put its IPO plans in the freezer while it looked for ways to generate more revenue from the popular service.



Skype’s 2010 revenue was $860 million, adjusted EBITDA was $264 million, and – as many are tripping over each others to point out – the company actually lost $7 million last year.



But looking ahead, chances for the business to keep growing, perhaps even acceleratingly so, are fairly big. In that sense, it’s a valuable asset to own (and to keep out of others’ hands).



The acquisition is subject to regulatory approvals and other customary closing conditions.



Microsoft and Skype said they “hope to obtain all required regulatory clearances during the course of this calendar year”.



Microsoft also pledged that it would “continue to invest in and support Skype clients on non-Microsoft platforms”.


Since its former owner eBay sold the company to a consortium of investors formed by Silver Lake Partners, Joltid (the company founded by Skype’s original founders, Niklas Zennstrom and Janus Friis), the Canada Pension Plan Investment Board and Andreessen Horowitz in November 2009, the company has been pursuing an aggressive strategy to be available everywhere, anytime, both in enterprises, the living room, even classrooms and, very importantly, on smartphones.



Microsoft, of course, has the exact same ambitions of ubiquity, and Skype and recently acquired Qik fit nicely into many of its current product offerings: think Windows Phone (combined with Nokia), Xbox and Kinect, Bing, Office 365, Windows Live Messenger and other Live products, Lync, Outlook, SharePoint, Internet Explorer, Azure, and so on.



The purchase also provides Microsoft with a wealth of p2p and collaboration technology expertise and intellectual property, an increasingly important asset to have these days.



It also brings reach: Skype’s user base is comparable to that of Facebook in terms of size (more than 600 million registered users, that is) and the social network in fact has tie-ins with Skype already on a product level.



Note that I’m not arguing in favor of the acquisition, but I can see the logic behind it.



Facebook was also said to be sniffing around Skype, according to multiple reports, but its interest in the VoIP company wasn’t nearly as profound as assumed, according to multiple sources close to the company. If you think about it, Zuckerberg and co didn’t really lose anything today (and remember: Microsoft is also a Facebook investor).

Saturday, May 7, 2011

Download Low Orbit Ion Canon - Ddos Attacking tool




Recently you must have heard about the paypal site being brought down by the wikileaks supporters . I also participated in that mass Ddos attack to support wikileaks .

During that mass attack i came across this very handy,simple yet deadly tool called Low orbit ion cannon.
LOIC is an open source network attack application, written in C#. LOIC was initially developed by Praetox Technologies, but later it was released into the public domain.
LOIC is an acronym for Low Orbit Ion Cannon, a fictional weapon in the Command & Conquer series of video games.



LOIC performs a denial-of-service (DoS) attack (or when used by multiple individuals, a DDoS attack) on a target site by flooding the server with TCP packets, UDP packets, or HTTP requests with the intention of disrupting the service of a particular host. People have used LOIC to join voluntary botnets.
 

 
TECHNO TITANS!!!!!!

Friday, April 29, 2011

Formatting an Unformattable Pen Drive… A simple DOS Command

Perhaps these days almost all of us are well aware of pen drives and use them a lot for files transfers from one PC to another or sometimes use them to listen music or videos stored on the flash drives. But sometimes the excess use of these pen drives from one PC to another results into infection with some rare viruses which cause them to malfunction like folders missing, capacity shown less or sometime we even couldn’t format it. The reason for such a problem a virus residing in the pen drive makes the system busy so from windows environment it becomes hard to format it or access it properly. So below is the simple DOS command thru which you can easily format a pen drive :

  •      Goto Start –> Run
  •     Type Cmd & press Enter.
  •     Type the following command line
  •   Format/x G:
  •    Here G: refers to your removable disk drive letter.
  •    Press Enter.
Now I hope your problem will be solved if in any case there is still a problem then I will advise you to download the best tool for pen drives “HP Format disk Utility” which is quite a very good application that can fix a lot of pen drive related problem. Below is the download link:

TECHNO TITANS!!!!!!

Tuesday, April 26, 2011

Steps to Better Secure Your Wireless Network From Hackers




                             
                           Steps to Better Secure Your  Wireless Network From Hackers

The reason we secure a wireless network is to stop people from using the services of our network who don’t have permission to utilize them. It is harder to secure a wireless network from hackers as compared to a classic wired network. This is due to the fact that a wireless network can be accessed anywhere inside the range of its antenna.


In order to secure a wireless network from hackers, we should take proper steps to save ourselves against security issues. If you don’t secure a wireless network from hackers, you might end up without its service. The consequence might also include the utilization of our network to attack further networks. To secure a wireless network from hackers, you should follow these simple wireless networking tips:

1) Strategic antenna placement:

The first thing you have to do is to position the access point’s antenna in a place which restricts the range of its signal to go further than the required area. You should not put the antenna close to a window because glass can’t obstruct its signals. Place it in a central location of the building.

2) Use WEP:

WEP stands for Wireless encryption protocol. It’s a customary technique for encrypting traffic on a wireless network. You should never skip it as that will allow hackers to get instant access to the traffic over a wireless network.

3) Change the SSID, disable the broadcast of SSID:

SSID stands for service set identifier. It is the recognition thread utilized by the wireless access point due to which the customers are capable of starting connections. For every wireless access point arranged, select an exclusive as well as unique SSID. Also, if it’s attainable, hold back the broadcast of the SSID out over the antenna. It wont appear in the listing of offered networks, while being able to provide services as usual.

4) Disable DHCP:

By doing this, the hackers will have to decode the TCP/IP parameters, subnet mask as well as the IP address in order to hack your wireless network.

5) Disable or modify SNMP settings:

Change the private as well as public community settings of SNMP. You can also just disable it. Otherwise the hackers will be able to utilize SNMP to get significant info regarding your wireless network.

6) Utilize access lists:


For additional security of your wireless network, and if your access point support this feature, employ an access list. An access list lets us determine precisely which machinery is permitted to attach to an access point. The access points which include the access list can employ trivial file transfer protocol (TFTP) now and then in order to download modernized lists to steer clear of hackers.
 
TECHNO TITANS!!!!!!!

Monday, April 25, 2011

Hack Attack: Sony Confirms PlayStation Network Outage Caused By ‘External Intrusion’



Unfortunately for PlayStation Network andQriocity services users, it looks like the widespread network outages will continue.Since Sony’s PlayStation and music networks went down two days ago, there has been a fair amount of public speculation over the cause of the outage. (Largely due to Sony’s tight-lipped handling of public relations.) Many blamed vengeful gremlins loose in Sony’s server clusters and datacenters, while others immediately pointed the finger at Anonymous, the merry band of hackers that metastasized out of 4chan.

Thankfully, after 24+ hours of communication silence, Sony has updated its blog and ended the speculation. According to the electronics colossus, “an external intrusion” is responsible for the ongoing outages of the PlayStation Network and Qriocity. (It probably sounded like this at Sony headquarters. Or this.)As to who these nefarious “intruders” are: It seems that Sony does not yet know who is responsible for the breach, or if it does, it is instead smartly spending its time sealing areas of vulnerability and trying to get the network back up and running. And though reports of PlayStation’s outage began heating up early Thursday morning, Sony reports that it in fact self-defensively shut down the Network sometime Wednesday evening.According to the network’s blog, “An external intrusion on our system has affected our PlayStation Network and Qriocity services. In order to conduct a thorough investigation and to verify the smooth and secure operation of our network services going forward, we turned off PlayStation Network & Qriocity services on the evening of Wednesday, April 20th. Providing quality entertainment services to our customers and partners is our utmost priority. We are doing all we can to resolve this situation quickly, and we once again thank you for your patience. We will continue to update you promptly as we have additional information to share.”

TECHNO TITANS!!!!!!!!

Saturday, April 2, 2011

What Is Ddos Attack And How Does It Work?



Many of  people in illusions that Website hacking and Attacking is very Difficult and only some hackers and professionals can Do It... Now that's absolutely wrong thinking... Its as Easy as alphabetic. 


First of all We all should know What are the Different Methods Of attacking Websites...
There are Generally Three Methods of Attacking an Website...

1. Ddos Attack
2. Shell Scripts Attack

3. Javascript Attack or Attack through Scripting.

Note: SQL and other techniques comes in the Hacking Websites Part Not in attacking Part. Attacking is simply for fun or intentionally causing damage to the Website.. 
  
Ddos Attack


What is a Distributed Denial of Service (DDoS) attack?

Have you ever tried to make a telephone call but couldn't because all the telephone circuits were busy? This may happen on a major holiday and often happens on Diwali,New year etcc.

The reason you couldn't get through is because the telephone system is designed to handle a limited number of calls at a time. 

So upto now you will Got an Idea What is Ddos(Distibuted Denial of Service) Attack.
Basically Ddos attack is an attack which makes the Network So congested such that no further Requests are delivered.

This is Done by making a number of connections to the Websites through Different Computer or Networks. Also can be done from One Computer by making Connections through Different Ports as there are 64k ports available in WindowsOS.


How Attacker Launch a Ddos Attack?

Over past years Denial of service attack has made huge amount of damage,Many of the have been victimed of this attack

Its Real,On February 6th, 2000, Yahoo portal was shut down for 3 hours. Then retailer Buy.com Inc. 
(BUYX) was hit the next day, hours after going public. By that evening, eBay(EBAY)Amazon.com (AMZN), and CNN (TWX) had gone dark. And in the morning, the mayhem continued with online brokerE*Trade (EGRP) and others having traffic to their sites virtually choked off.

This attack also recently hit twitter on 6th August 2009,lot of people had trouble on logging on twitter,It was brought down by denial of service attack,They tired up there server so no one can get on log on it.Websites likefacebook, eBay etc have also been victim of this attack.

First, Attackers build a network of computers that will be used to produce the volume of traffic needed to deny services to computer users. We'll call this an "attack network".

 To build this attack network, Attackers look for computers that are poorly secured, such as those that have not been properly patched, or those with out-of-date or non-existent anti-virus software. When the Attackers find such computers, they install new programs on the computers that they can remotely control to carry out the attack.

These days, however, the process of building an attack network has been automated through self-propagating programs. These programs automatically find vulnerable computers, attack them, and then install the necessary programs. The process begins again as those newly compromised computers look for still other vulnerable computers. 

Once an attack network is built, the intruder is ready to attack the chosen victim or victims. Some informationsecurity experts believe that many attack networks currently exist and are dormant, passively waiting for the command to launch an attack against a victim's computers. Others believe that once a victim has been identified, the attack network is built and the attack launched soon afterward.

So guys i think this is enough for today hope you all now familer with Ddos attack in future post will we show how to do Ddos attacks with various hacking tools like Serve Attack Pro and LOIC (Low Orbit Ion Cannon) and other exploits. 

TECHNO TITANS!!!!!!

share