Friday 27 May 2011

Windows Password Length:Change your way


By default Windows accepts both short and long passwords as the Windows login password.
Some users use extremely short passwords, which can easily be brute forced. So in order to set the minimum number
of characters or the minimum length of the password, simply follow the following registry trick-:
1. Launch the Windows Registry Editor i.e. c:\windows\regedit.exe
2. Scroll down to the following registry key:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Network
3. Click on Edit > New DWORD Value.
4. Name this new DWORD value as MinPwdLen and in the data field, enter the minimum number of characters
the password has to be of. One thing to note here is that this value is in Hexadecimal.
5. Now, Press F5 and your system just became a tiny bit securer but certainly not unhackable.

Become a Hacker..!!!

What is a hacker?
A hacker is someone who likes to tinker with electronics or computer systems. Hackers like to explore and learn how computer systems work, finding ways to make them do what they do better, or do things they weren’t intended to do. There are two types of hackers:
White Hat – These are considered the good guys. White hat hackers don’t use their skills for illegal purposes. They usually become Computer Security experts and help protect people from the Black Hats.
Black Hat – These are considered the bad guys. Black hat hackers usually use their skills maliciously for personal gain. They are the people that hack banks, steal credit cards, and deface websites.
These two terms came from the old western movies where the good guys wore white hats and the bad guys wore black hats.
now if you’re thinking, “Oh boy! Being a black hat sounds awesome!”, Then I have a question for you. Does it sound cool to live in a cell the size of your bathroom and be someone’s butt buddy for many years? That’s what I thought.
Hacker Hierarchy
Script kiddies – These are the wannabe hackers. They are looked down upon in the hacker community because they are the people that make hackers look bad. Script kiddies usually have no hacking skills and use the tools developed by other hackers without any knowledge of what’s happening behind the scenes.
Intermediate hackers – These people usually know about computers, networks, and have enough programming knowledge to understand relatively what a script might do, but like the script kiddies they use pre-developed well-known exploits (- a piece of code that takes advantage of a bug or vulnerability in a piece of software that allows you to take control of a computer system) to carry out attacks
Elite Hackers – These are the skilled hackers. They are the ones that write the many hacker tools and exploits out there. They can break into systems and hide their tracks or make it look like someone else did it. You should strive to eventually reach this level.
What does it take to become a hacker?
Becoming a great hacker isn’t easy and it doesn’t happen quickly. Being creative helps a lot. There is more than one way a problem can be solved, and as a hacker you encounter many problems. The more creative you are the bigger chance you have of hacking a system without being detected. Another huge quality you must have is the will to learn because without it, you will get nowhere. Remember, Knowledge is power. Patience is also a must because many topics can be difficult to grasp and only over time will you master them.

Mozilla releases Firefox 5 beta with HTML5 & CSS support

Mozilla has released a beta version of the fifth version of the Firefox web browser for downloading and testing. 
The Firefox 5 beta includes additional support for CSS (cascading style sheet) animations, web standards including HTML5 and better desktop integration for Linux users. 
In a blog post, Mozilla wrote: "This release includes the Firefox channel switcher, performance and stability enhancements and support for the new CSS animations standard to allow developers to build more amazing web experiences." 


"The new Firefox channel switcher lets users move between Firefox Aurora, beta and release channels to test features at various levels of development, quality and polish," said Mozilla. 


The Firefox Aurora development channel is designed to support more frequent releases. The beta version of the web browser was previously tested in Firefox's "Aurora" development channel for five weeks. 


"The shift to a rapid release development cycle delivers cutting edge Firefox features, performance enhancements, security updates and stability improvements to users faster," the company added.

The final release of Mozilla Firefox is set for the end of June 2011. Download Firefox Aurora, Firefox 5 beta or Firefox mobile beta versions here

Yahoo Mail is coming out of beta with some new social-networking features




Yahoo has taken the "beta" tag off its Yahoo Mail. 
The Web giant, which introduced the beta offering of its online e-mail service in October, begins rolling out the latest version of Yahoo Mail to its 284 million users worldwide today. The service is available in 43 markets and 26 languages around the world. 
Yahoo has baked in some new social-networking features, including the ability to respond to Facebook friends from right inside an e-mail rather than jumping to Facebook. Users can also view slideshows and video from links directly inside their e-mail.

Yahoo has also prioritized contacts in the service, pushing e-mail from those in your address book to the top of unread messages. Users can also text and instant message from inside the e-mail program. And all instant messages and text messages are archived by default.

And Yahoo has included some apps in its e-mail service from third parties, such as the mega-file sending service YouSendIt, and the invitation application Evite.

"Yahoo's vision for online communications brings together all the tools that people use to connect--e-mail, chat, SMS, and social updates--and makes it easier for them to share content and engage in conversations with the people that matter most to them," Yahoo chief product officer Blake Irving said in a statement.

Antivirus for Mac: It's time

 

For years, Mac owners have laughed at the frantic efforts of their PC neighbors to fend off attack by viruses, Trojans, rootkits, and other malware. Given that PCs are a vastly greater segment of the market, it's cost-effective for the bad guys to concentrate on PC attacks. And yes, it's true that Apple's operating system is tougher to crack than Windows. But the days of Mac complacency may be ending. First, some threats are completely platform-independent. If a phishing email can fool you into entering your credit card data on a fraudulent site, it doesn't matter if you're running Windows, Mac OS, Linux, or DR-DOS. You're hosed.

In addition, some of the bad guys have ventured into the Mac realm, creating Mac-specific attacks like the recent MAC Defender. Delivered via poisoned search engine results, this bogus application claims to protect users, but actually harms them. It opens porn Web pages at intervals and convinces gullible users that they're infected. Naturally the only "cure" is to register MAC Defender.
 In addition, some Macs run Windows as well as Mac OS X, a volatile combination. A Mac running Windows is vulnerable to the innumerable Windows-based attacks already swarmin
g the Web.

We haven't yet observed any true surge in viruses, Trojans, or other active malware targeting the Mac, but it couldn't hurt to be prepared. Many of the major security vendors offer Mac products; some offer combined protection for Mac OS X and Windows running on the Mac. And a few will scan the URLs you visit to help fend off phishing attacks.

You don't even have to pay for Mac antivirus protection. Sophos offers a fully functional home edition of its Mac antivirus for free. If you'd rather go with a different vendor, or if you need features Sophos doesn't offer, consider one of the choices from the chart below.


The Next-Generation Browser: No URL Bar

Netbook and tablet users looking for more screen space to display content from their favorite websites are getting some help from a pair of popular Internet browsers. 
Google and Mozilla are testing versions of the Chrome and Firefox browsers that hide the bar used to show the URL of websites you visit. The features are experimental and it's unclear if they will become part of the mainstream. Web surfers who want to always know where they are may have security concerns. 


In the latest build of Chrome Canary, an early stage version aimed at developers, you can enable ‘Compact Navigation'. Once enabled, you can right-click on any tab and select ‘Hide the toolbar.' The URL will disappear. To see the address bar again, click on an open tab and the URL bar will appear underneath.


  
In Chrome Canary 13, just enter "about:flags" in the URL bar, select Compact Navigation and restart the browser.

Mozilla is also experimenting with a similar feature for the Firefox browser. A new add-on for Firefox 4 called LessChrome HD will hide all the toolbars below your open tabs whenever they're not in use. The toolbars reappear when you move your cursor over a tab, or when you switch tabs. LessChrome HD can be installed from the Firefox Add-ons page.

The advantage: Hiding the URL allows users of netbooks and tablets to have a bit more space to display the content of a website.
The drawback: The tradeoff can be dangerous when users don't see the URL of a page -- making them easier targets of phishing attacks.

Wolfgang Gruener of Conceivably Tech notes that once you are at the web site you want, there's no need to permanently display the address, unless you are worried about security.

Firefox and Chrome hold together 43 percent of the browser market (StatCounter), so they could push for a less ubiquitous URL bar. But Microsoft, which holds the other half of the market with Internet Explorer, is showing no intention to let you hide the URL bar any time soon.

Doodle 4 Google 2011 Winner 7 Year Old From San Francisco

Google on Thursday chose San Francisco, California second grader Matteo Lopez’s space-inspired doodle as the winner of Doodle 4 Google 2011, taking home a $15,000 college scholarship and a $25,000 technology grant for his school, San Francisco’s Monte Verde Elementary.
Marissa Mayer, VP of Product Management, wrote in a blog post, “Matteo’s doodle of the Google logo artfully depicts a trip to space, walking on the moon, and even making friends with aliens. Matteo has already soared to great heights, rising to the top of the more than 107,000 submissions sent in from all over the country.” 




Google also picked out three finalists: fourth grader Joseph Eugene Miller from Wilmington, NC, who also selected a space theme; seventh grader Justas Varpucanskis from Mokena, IL, who depicted an underwater universe; and high school junior Hannah Newsom from Fayetteville, AR, who would like to be an illustrator.

The three finalists will be receiving a $5,000 scholarship grant each.

All 40 doodles that reached the finals will be on display at the Whitney Museum of American Art in New York through June 16 and at SFMOMA in San Francisco from May 20 through July 19

Saturday 21 May 2011

Rename the "Recycle Bin"...!!!!

 I am going to write some old but good tricks for those who want to learn some tricks on windows. This trick will tell you the way to rename your Recycle Bin. I think no need to introduce recycle bin. :P


Steps to rename 


1. Click Start and then Run.


2. In run option type regedit.


3. Goto HKEY_CLASSES_ROOT -> CLSID -> {645FF040-5081-101B-9F08-00AA002F954E} -> ShellFolder.


4. In the ShellFolder, change the data value from “40 01 00 20” to “70 01 00 20“ in Attributes.


5. Restart your computer and you will be able to rename Recycle Bin.

List of facebook Shortcut keys



Shortcut keys are very useful for fast navigation in a website and software. Today i have some shortcuts for facebook. facebook is now the part of your life. These shortcut keys will surely improve your surfing speed in fb.


List of facebook shortcut keys



  • Alt+/: Search
  • Alt+m: Compose a new message
  • Alt+1: Home page
  • Alt+2: Your profile page
  • Alt+3: Friend requests
  • Alt+4: Your messages
  • Alt+5: Notifications
  • Alt+6: Account page
  • Alt+7: Privacy
  • Alt+8: Facebook's Facebook page
  • Alt+9: Facebook Terms/Agreement
  • Alt+0: Facebook help center

Increase Hard Disk speed in Windows

This is a simple trick to boost the speed of your hard disk. If you like to increase your Hard Disk read/write speed without buying expensive software, just follow next steps. With doing these steps you will increase Hard disk speed. It also depends on manufacture and specification of your hard disk. The most speed improvement is visible with IDE drives; however there are reports that this tweak also does good for SCSI disks.


In any case, it won’t harm your system


Steps:


1. Run SYSEDIT.EXE from the start & then Run command.
2. Expand the system.ini file window.
3. Scroll down almost to the end of the file untill you find a line called [386enh].
4. Press Enter to make one blank line, and in that line type
5. Irq14=4096 (note: This line IS CASE SENSITIVE)
6. Click on the File menu, then choose Save.
7. Close SYSEDIT and reboot your computer.
8. Restart windows!


The speed improvement will be noticed just after the system reboots, any system info. software can be used to check the improvement.

disable the right click on the desktop

This registry trick is very useful mostly for home users who want to protect their system default settings against unwanted changes that other users can make. For example changes in system desktop appearance, themes, and screen saver as well as other display settings. Using registry editor, you can disable the right click functionality on desktop to access the “Display Properties” dialog box and this will also prevent users to access windows explorer.


Follow the given steps:


1: Click Start button and type regedit in Run option then press Enter for next.


2: Here locate the location to:


HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer


3: Here in right side panel, right click to create a new DWORD value with the nameNoViewContextMenu (it is case sensitive), then assign number 1 in value data box.


4: Now close the registry editor and restart your computer after any changes to go into effect.
But next time, if you want to enable right click functionality on desktop then simply change the value of data box or delete the NoViewContextMenu DWORD item.

Google chrome secret pages


There are some hidden pages in Google chrome browser.These pages show information about the browser, its memory ,cache..etc. Just type in the bold codes in the address bar of chrome and see the magic.

about:version  - This shows the version of google chrome browser and other details such as webkit and V8 which is the javascript engine and it’s user agent

about:stats     - This shows the statistics of browser a list of internal counters and timers.It also has a very funny title “Shhh! This page is secret!”.

about:memory  - This shows the memory occupation of the browser and also of other active browsers.This can also be found out by right-clicking on the blue area at top and selecting task manager and at the bottom click on “stats for nerds”. Task manager short-cut Shift + esc

about:network  - This page is very much useful for I/O tracking

about:plugins  - This page shows a list of plugins that are available in the browser.You can also enable and disable the plugins

about:cache  - This page shows the list of webpages that google chrome has cached.It is recommended that you should regularly clear the browser cache

about:cache  - This page shows the list of webpages that google chrome has cached.It is recommended that you should regularly clear the browser cache

about:dns      - Google Chrome has the ability to prefetch the DNS records for 10 frequently visited hostnames. This is a feature which can be disabled in Options > uncheck “Use DNS pre-fetching to improve page load performance”.

about:histograms  - This lists all the histograms for google chrome browser’s internal metrices.

about:internets  - This shows the 3D pipe screensaver which gets embedded by Google chrome from windows.this is only possible if you have the file sspipes.scr in C:\Windows\System32.

about:crash  - This crashes the active tab.Google chrome displays a sad image with the text “Something went wrong while displaying this webpage. To continue, press Reload or go to another page”

Tuesday 17 May 2011

Funny Virus(s)..

Adam and Eve virus: Takes a couple of bytes out of your Apple.

Airline virus: You're in Dallas, but your data is in Singapore.

Anita Hill virus: Lies dormant for ten years.

Arnold Schwarzenegger virus: Terminates and stays resident. It'll be back.

AT&T virus: Every three minutes it tells you what great service you are getting.

The MCI virus: Every three minutes it reminds you that you're paying too much for the AT&T virus.

Bill Clinton virus: This virus mutates from region to region and we're not exactly sure what it does.

Bill Clinton virus: Promises to give equal time to all processes: 50% to poor, slow processes; 50% to middle-class processes, and 50% to rich ones. This virus protests your computer's involvement in other computer's affairs, even though it has been having one of its own for 12 years.

Congressional Virus: Overdraws your computer.

Congressional Virus: The computer locks up, screen splits erratically with a message appearing on each half blaming the other side for the problem.

Dan Quayle virus: Prevents your system from spawning any child processes without joining into a binary network.

Dan Quayle virus: Simplye addse ane ee toe everye worde youe typee..

David Duke virus: Makes your screen go completely white.

Elvis virus: Your computer gets fat, slow, and lazy and then self destructs, only to resurface at shopping malls and service stations across rural America.

Federal bureaucrat virus: Divides your hard disk into hundreds of little units, each of which do practically nothing, but all of which claim to be the most important part of the computer.

Freudian virus: Your computer becomes obsessed with marrying its own motherboard.

Gallup virus: Sixty percent of the PCs infected will lose 38 percent of their data 14 percent of the time (plus or minus a 3.5 percent margin of error).

George Bush virus: Doesn't do anything, but you can't get rid of it until November.

Government economist virus: Nothing works, but all your diagnostic software says everything is fine.

Jerry Brown virus: Blanks your screen and begins flashing an 800 number.

Madonna virus: If your computer gets this virus, lock up your dog!

Mario Cuomo virus: It would be a great virus, but it refuses to run.

Michael Jackson virus: Hard to identify because it is constantly altering its appearance. This virus won't harm your PC, but it will trash your car.

New World Order virus: probably harmless, but it makes a lot of people really mad just thinking about it.

Nike virus: Just Does It!

Ollie North virus: Turns your printer into a document shredder.

Oprah Winfrey virus: Your 200MB hard drive suddenly shrinks to 80MB, and then slowly expands back to 200MB.

Pat Buchanan virus: Shifts all your output to the extreme right of your screen.

Paul Revere virus: This revolutionary virus does not horse around. It warns you of impending hard disk attack---once if by LAN, twice if by C:.

Paul Tsongas virus: Pops up on December 25 and says, "I'm not Santa Claus."

PBS virus: Your PC stops every few minutes to ask for money.

Politically correct virus: Never calls itself a "virus", but instead refers to itself as an "electronic microorganism".

Richard Nixon virus: Also known as the "Tricky Dick Virus", you can wipe it out but it always makes a comeback.

Right To Life virus: Won't allow you to delete a file, regardless of how old it is. If you attempt to erase a file, it requires you to first see a counselor about possible alternatives.

Ross Perot virus: Activates every component in your system, just before the whole thing quits.

Ted Kennedy virus: Crashes your computer but denies it ever happened.

Ted Turner virus: Colorizes your monochrome monitor.

Terry Randle virus: Prints "Oh no you don't" whenever you choose "Abort" from the "Abort, Retry, Fail" message.

Texas virus: Makes sure that it's bigger than any other file.

UK Parliament virus: Splits the screen into two with a message in each half blaming other side for the state of the system.

Warren Commission virus: Won't allow you to open your files for 75 years.

Top Most Hackers Of The World...




Gary McKinnon, 40, accused of mounting the largest ever hack of United States government computer networks -- including Army, Air Force, Navy and NASA systems -- listens to a reporter's question outside the Bow Magistrates Court in central London Wednesday May 10, 2006. The court has recommended that McKinnon be extradited to the United States to face charges of illegally accessing 97 computers, causing US$700,000 (400,000 pounds; euro 588,000) in damage. British Home Secretary John Reid will make the final decision on extradition but if he approves it, McKinnon will appeal to the High Court, the alleged hacker said. (AP Photo/Lefteris 









In this undated photo released by the Haaretz daily newspaper Sunday May 29, 2005, Michael Haephrati, 41, left, is seen in with his wife, Ruth Brier-Haephrati, 28, right. The two have been arrested in Britain last week and are both wanted in Israel on suspicion of computer hacking offenses involving the use of a so-called Trojan horse software program, which sits in the victim's computer and gives the hacker full access to the machine over the Internet. (AP Photo/Haaretz Daily) Pitarakis)



Sarah Palin is shown in Anchorage, Alaska, Aug. 8, 2002. Palin never thought of herself as an investigator. Yet there she was, hacking uncomfortably into Randy Ruedrich's computer, looking for evidence that the state Republican Party boss had broken the state ethics law while a member of the Alaska Oil & Gas Conservation Commission. (AP Photo/Al Grillo)












 

British music student   ->>> Richard Pryce outside Bow Street Magistrates' Court in London Monday Sept. 11, 1995. The teenager faces 12 charges of unlawfully gaining access to the computer systems of the US Air Force and Lockheed missile systems based in the USA. (AP Photo/Rebecca Naden)
















Jerome Heckenkamp, 21, leaves the Federal Building in Albuquerque, N.M., after appearing before a U.S. magistrate Thursday, Jan. 11, 2001. Heckenkamp, a Los Alamos National Laboratory employee charged with hacking into six company Web sites prior to his employment at the lab, was ordered to appear in two district courts in California on computer-tampering charges. (AP Photo/Jake Schoellkopf)








































About Shubham..

My photo
Jamshedpur, Jharkhand, India
A cant-live-without-technology type of teen...Blogger by hobby...