Welcome To - MaCHAcK

What Are Web Browsers?

Author: P.R.O.V.I.D.E.R. // Category:
THIS CONTEXT IS CONTRIBUTED TO ME BY MY FRND +RAJ+
SO HAVE A LITTLE LOOK ON RAJ'S CONTEXT:-


A browser is an application that provides a way to look at and interact with all the information on the World Wide Web. Technically, a web browser uses HTTP to make requests of web servers throughout the Internet on behalf of the browser user. In other words, a web browser is a software application that allows one to view pages on the World Wide web.

There are different web browsers that are available and in use today and they all come with a variety of features. Some of the available web browsers include Amaya, AOL Explorer, Arachne, Arlington Kiosk, Avant, Camino, Dillo, Elinks, Epiphany, Flock, Galeon, iCab, Internet Explorer, Internet Explorer for Mac, K-Meleon, KioWare, Konqueror, Links, Lynx, Maxthon, Mosaic, Mozilla, Mozilla Firefox, Netscape, OmniWeb, SeaMonkey, Safari, Opera and Off By One. Most of these web browsers are free, but there are five of them that do have a purchase price.


Web browsers also come with some features. Some common features that are included with web browsers are spell checkers, search engine toolbars, download managing, password managing, bookmark managing, as well as form managing. Accessibility features that may be included with many web browsers include page zooming, ad filtering, pop-up blocking, tabbed browsing, incremental finding, HTML access keys, voice controls, mouse gestures, spatial navigation, text to speech, and caret navigation.

With so many web browsers being available, there are a number of different technologies that are supported. Some of them are frames, Java, XSLT, XForms, RSS, Atom, SVG, WML, VoiceXML, MathML, and XHTML. Also, with many web browsers, support for different languages is possible, and some of the different languages that are supported by web browsers include English, Slovak, Arabic, German, Dutch, Turkish, Swedish, Chinese, French, Spanish, Thai, Hebrew, Italian, Greek, Russian, Polish, Welsh, as well as hundreds more.

A web browser is a powerful tool, and isn’t just used for personal computers anymore; there are web browsers that can be used on mobile phones, handheld game systems, as well as pocket PC’s.

Web browsers can also be personalized to an individuals needs by utilizing web browser accessories that are not included with the initial browser software. These applications are referred to as “plug insâ€, and a few of the more popular ones are Beatnik, QuickTime, RealPlayer, Shockwave, VivoActive Player, as well as Adobe Acrobat Reader.

Beatnik is utilized to receive high-quality sound and audio from websites. QuickTime, which is a product of Apple, Inc., works as a delivery system for such things as 3D animation, audio, movies, MIDI soundtracks, and virtual reality. RealPlayer delivers on demand audio and video without the hassle of waiting for downloads to complete. Shockwave allows multimedia files to be viewed directly in a web browser. VivoActive allows viewing of on demand audio and video from sites that offer VivoActive content, and Adobe Acrobat Reader allows access to PDF files on the World Wide Web.

Knowing all of the web browsers and their specific uses, it will become easy to understand how choosing the right web browser can enhance the Internet experience.

Cracking Tutorial

Author: P.R.O.V.I.D.E.R. // Category:
1.)How a cracker works.
-A cracker works by repeatingly sending passwords to a Yahoo! login server or a list of servers


-Crackers require password lists (dictionay files). These are lists of words that the cracker will attempt to use as the passwords


-All a cracker does, is try different passwords,until the correct password to the username is entered. (Crackers work on the possibility that one of the passwords you load in the password list is the correct password for the usernames they are trying to crack.)




2.) Basics you need to know.
-Cracker's use either servers or proxies in cracking.


-A Crackers are basically a program that simplfies and speeds up exactly what you do when you login to a Yahoo site.


-There are three types of crackers. Server crackers , Proxy crackers and Forwards crackers.


-Server crackers typically get patched (quit working) very quickly because Yahoo moniters it's servers and they pick up any increased bandwidth (alot of extra login attempts than normal). When they see these extra logins attempts they run some tests and find out what login method is being tried. They then goto work and patch the login method, which basically means that it will ban you after 50 - 100 login tries on a single IP.


-Proxy crackers are much harder for Yahoo to patch. You can use patched login servers on them because by using a proxy you appear to not be just one IP trying to log in, but many hundreds of IPs. Yahoo will ban each proxy, not your main IP. The ban is only a temporary ban as well, usually for 4 - 6 hours. And once you notice your cracker slowing down (proxies getting banned) simply scan and load some new proxies into the cracker and you are back in buisness.


-Forwards crackers can be eigther Server or Proxy crackers. Most crackers run Backwards. This means that the cracker goes through the list of names as quickly as possible using the first password in the list, then goes to the next password and starts at the top of the names list again. This ensures that the names you are trying to crack do not get "locked" by Yahoo for too many login attempts one right after the other. Im sure we've all had names locked before and had to type in the "random security code" below the password to log into the name. With a Forwards cracker, the cracker stays on the first name in the list until all the passwords have been tried on it, then moves to the next name. In order for a cracker to be considered a Forwards cracker, it must not lock names for too many login attempts. So basically with a working Forwards cracker, you can enter one name in the cracker and thousands of passwords to try and crack only that one name. Forwards crackers are the rarest type of crackers because the login methods they use are very hard to find and Yahoo tries very hard to patch these methods up quickly. I have had quite a few Forwards crackers before, but as of right now, I dont know of a single working one. I love using these types of crackers when I get ahold of one.


-Alerts: when a name has been cracked, the cracker has away of alerting you, more common you will get sound alert. In other cases an Alert Window will pop up.


-Password Options: Password options can change the passwords you are using to crack with to ALL CAPS , First Letter Caps" , Sim (using the name trying to be cracked as the pass), etc. etc.


-Sockets - A cracker's speed is defined by it's number of sockets. From a begginer's stand point, you might think that setting your cracker for it's max number of sockets will allow you to crack screen names faster. This is only true if you have a very faster ISP (Internet Service Provider) like cable or DSL. If you are on dial-up I would recommend only using 5 - 10 sockets. If you are on DSL I wouldnt use more than 50. If you are on cable you can use as many as the cracker will allow you to use. Also if you are using a Proxy cracker, keep in mind that you can only crack as fast as the proxies will allow you too. Some proxies are fast and some are slow.


-Timeout: This is a feature for proxy crackers which tells the cracker how long it should wait on each proxy to attempt to log in the name. If you set the Timeout low, the cracker will skip all the slow proxies in your proxy list and only use the faster proxies. This will make it faster but you also wont find as many proxies that work. If you set the Timeout higher, the cracker will wait a second or two longer on each proxy to allow it to try and log in the name. I would recomend using a high timeout unless you have like 30,000 proxies to crack with.


-Auto save is when you crack a name. it out saves it immediately to a txt or log file. This is a good feature in case you get disconnected or your PC gets turned off by accident or unplugged.


-In cracking, people that crack names look for usernames that Yahoo no longer allows them to make, these discontinued names are called illegals (a.k.a Rares).


-You will also here about a group of cracked names called originals, example of this would be "woody, farmer, warrior , potent , Jason , Mark , Jen etc... (you get the picture hence "original")




3.) Tools you need for cracking.
-You need a cracker of course, I recommend crackers that use proxies.


-To find Proxies, you need two kinds of tools, one to find proxies (scanner or leecher), and a Proxy Phecker to check if those proxies are valid. Some crackers will record only the good proxies when it is cracking so this will eliminate the need for a Proxy Checker (x-proxy is an example of a cracker that has this feature).

(Here are some proxy sites you can use to get some proxies)
Rob's Daily Updated Proxy List
http://www.multiproxy.org/txt_anon/proxy.txt
http://www.socklabs.com/proxylist.txt
http://www.cybers yndrome.net/pld_tmp.html
http://www.digitalcybersoft.com/Prox...oxy-list.shtm l
http://phpfi.com/43027


-You need names lists (a list of scanned names you want to try and crack), and password lists and a Proxy list before you start up the cracker.


-Now you need some names to crack. Compile this either by using a name generator and scanner, or you can find a room grabber and use it. This is a program that sends a bot into a list of rooms and grabs the usernames from the room....these are then saved as another .txt file. However you decide to do it, you should compile a list of at least 500 names to start




4.) How to find out if your cracker works...
-To make sure it still works, load up proxies and add some bot names and passwords to the name and passwords list, if it cracks the names, then it works!


Thats all for now. I hope this has helped some of you to understand how a cracker works and what tools you will need to be a successfull cracker. Keep in mind, cracking is alot like fishing. Dont expect to crack a ton of name when you first start. Sometimes you will crack for days without cracking a single name, sometimes even weeks. It really depends on how good your passwords are that you are using. It's alot of luck and cracking isnt for everyone. It takes alot of patience and determination to do it. If you are willing to tough it out then you can count on cracking some names in

The True Origin of Hacking

Author: P.R.O.V.I.D.E.R. // Category:
"DID YOU KNOW? If a hacker successfully penetrates your telephone
system's security, you could be billed for OVER $10,000 PER HOUR for
FRAUDULENT CALLS?"

The above quote was taken from an AT&T sales letter hawking security
systems to businesses. It was reprinted in the quarterly publication
2600, a sort of Popular Mechanics for, um, midnight technicians.

These days, most people think of hackers as anti-social types who
break into business phone lines, ATM machines, cable, and government
computers. Hackers are the new hi-tech outlaws.

Though the idea of hacker as outlaw has some truth, much of it is
certainly hyperbole ($10,000 an hour?). The overuse and misuse of the
word hacker has been chafing against me of late. I've always
understood a more benign definition.

Time for some schooling. According to Steven Levy's seminal 1984 book
Hackers, the idea of a "hack" came from the M.I.T.'s Tech Model
Railroad Club. In the late 1950s, the members of the club would use
the term to denote any project that was undertaken just for the "wild
pleasure taken in mere involvement." Those who took pride in building
better connections between relays were called hackers.

Wireheads that they were, it's no surprise that when a new mainframe
computer, the TX-O arrived on campus, many from TMRC were instantly
drawn to it.

To most people then, computers were bulky unfriendly machines that
took up entire rooms and crunched numbers for insurance companies or
scientists. They had no relation to the public at large.

To these hackers though, these computers presented a whole new realm
of possibilities. In the ensuring decade, they prodded the TX-O, and,
later, the PDP-6 to play chess, hum Bach, emulate ping pong, act as a
adding machine, and play space war games.

All these applications were called hacks. Such work was seen as
frivolous. These programs were written for no other reason than to be
simply to have them be admired and improved upon by other programmers.
In hindsight, its obvious these hackers were radically rethinking the
way computers could be used.

But hacking provided an addictive high. As Levy writes,

When you programmed a computer you had to be aware of where all the
thousands of bits of information were going from one instruction to
the next, and be able to predict--and exploit-- the effect of all that
movement. When you had all that information glued to your cerebral
being, it was almost as if your own mind had merged into the
environment of the computer. Sometimes it took hours to build up to
the point where your thoughts could contain that total picture, and
when you did get to that point, it was such a shame to waste it that
you tried to sustain it by marathon bursts.

To better suit such cerebral thunder runs, these misplaced geniuses
would slip into 32-hour days fueled by cokes and lemon jelly wedges.
For a dedicated few, outside norms were considered irrelevant -
fashion, college degrees, even personal hygiene. One particularly
notorious hacker, Richard Greenblatt would get so caught up in
projects that he'd neglect to bathe. As a result, whenever Greenblatt
would rub his hands together over the keyboard, little chunks of dirt
fell on the keys, called "blatties" by other annoyed users.

Eventually a philosophy emerged from M.I.T. known as the Hacker Ethic.
The one and all-holy central tenet was this: information should be
free. Hackers believed in free information the way hippies believed in
free love.

And oddly enough, at the time, it made sense. The way information
works is strange. Keep it for yourself, and no one else will expound
upon it, use it, or employ it in their own designs. If it's obscure,
it's worthless.

But if you leave information for others to tinker with, say a program
you wrote, it will take hold, become stronger, better, and, at least
in some small way, add to the collective knowledge of humankind.

This is why for years so much software was placed in the public
domain. If anyone saw a way to improve, say Xmodem, a program for
downloading, they were free to do so. Copyrighting a program was
considered heresy. In those early years at M.I.T., programs were left
around for others to tinker with, the creators admitting someone could
easily improve upon their design.

The idea made perfect sense in the collegial atmosphere of M.I.T..
Outside the campus, however, this ethic has since caused headaches for
companies, such as Bell Atlantic, that don't particularly appreciate
people taking a curiosity in how their systems work, having them
improved upon, or having it hacked for free phone calls.

The hubbub you hear these days is sound of the Hacker Ethic rubbing
against corporate propriety.

As maligned as the word means, its easy to forget how valuable hacking
is. It has made the Internet largely what is today: People doing stuff
with no promise of financial gain, but simply because it would be
interesting to do it. The word has been tagged with an unfair rap. I
just hope curiosity and inventiveness won't be taken out with it.

How To Catch A Hacker

Author: P.R.O.V.I.D.E.R. // Category:
Tip One

Hackers cover their tracks, Experienced hackers cover them more
thoroughly, but amateur hackers sometimes leave things behind, Don't
expect them to leave any really big evidence behind, expect more of
little things here and there you might find surprising, For example,
if you are writing a term paper and a black hat hacker accidently
saved it when he took a paragraph out, that's suspicious, Where did
that paragraph go ? Well, for one thing, now you know he was in that
area, Check the folders surrounding the file you might find something

Tip Two

Decipher between the type of hackers that are attacking you,
Experienced hackers will have a more in depth look around when they
penetrate your system, They won't touch much because they know that
they won't add too much to their knowledge, But if you know a hacker's
been in, and some files are messed with, and you have a log of someone
guessing passwords to a file or something of that sort, its probably
some newbie who's just starting out, These are the easiest hackers to
catch, They usually get so caught up in thoughts like "Iam in" that
they forget the basics, such as work behind a proxy

Tip Three

Don't go crazy if you lose data, Chances are, if it was that
important, you would have backed it up anyway, Most hackers nowadays
wish they were back in 1989 when they could use a Black Box and having
a Rainbow Book actually meant something, Most hackers aren't black
hat, they are white hat, and some even grey hat, But in the end, most
hackers that are in systems aren't satisfied by looking around, From
past experiences, I have concluded that many hackers like to remember
where have they been, So what do they do ? They either press delete
here and there, or copy some files on to their systems, Stupid hackers
(yes, there are plenty of stupid hackers) send files to e-mail
addresses Some free e-mail companies will give you the IP of a certain
e-mail address's user if you can prove that user has been notoriously
hacking you. But most of the time, by the time you get the e-mail adds
it's been unused for weeks if not months or years, and services like
hotmail have already deleted it

Tip Four

Save information, Any information that you get from a log file (proxy
server IP, things like "14P", e-mail addresses that things were sent
to, etc) should be saved to a floppy disk (they are not floppy
anymore, I wish I could get out of the habit of calling them that) in
case there's a next time, If you get another attack, from the same
proxy, or with similar e-mail addresses (e.g: one says Blackjack
123@something.whatever and the other says
Black_jack_45@something.znn.com) you can make an assumption that these
hackers are the same people, In that case, it would probably be worth
the effort to resolve the IP using the proxy and do a trace route
Pressing charges is recommended if this is a repeat offender

Tip Five

Don't be stupid, If you've been hacked, take security to the next
level, Hackers do talk about people they have hacked and they do post
IPs and e-mail addresses, Proof ? Take a look at Defcon Conventions,
I've never gone to one, but I have seen the photos, The "Wall of
Shame" type of boards I've seen have IPs and e-mail addresses written
all over them in fat red, dry-erase ink, Don't be the one to go
searching the Defcon web site and find your e-mail address posted on
the Wall of Shame board

Tip Six

Don't rely on luck, Chances are, sometime or another, you're going to
be targeted for an attack, Here you can rely on luck, Maybe they'll
forget ? Maybe they don't know how to do it ? If you think this way, a
surprise is going to hit your face very hard, Another way you could
stupidly rely on luck is by saying this: It's probably just a white
hat, On the contrary, my friend, it's probably just a black hat, A
black hat with knowledge stored in his head, ready to be used as an
ax, It's your data, You take the chance

How to become Hacker

Author: P.R.O.V.I.D.E.R. // Category:
How to become Hacker....

1) First know difference between Hacker,Cracker and Script Kiddy....

2)The only only only Hackers Guru is Google...
Remember no one knows than more than 'GOOGLE'

3) Unless u know(very Strong,talk,sleep,eat) more than 1 Programming lang.....u vll never be called as Hacker

Ghost Nick In Chatroom

Author: P.R.O.V.I.D.E.R. // Category:
1. Login to Yahoo Messenger
2. Click log in, then click "My account info"
3. Re-enter ur password the Account info window will come out
4. Look Member information then click the link EDIT
5. Scroll down and find general information
6. Click the blue link " preffered content" Yahoo U.S.
7. Choose "Yahoo china" on drop down menu
8. Click finished
9. In new window, scroll down then click the left button which is the accept TOS
You'll be back again in Account information window
10. Click the blue link ( on right side of window ) under your screen name
11. Then choose which Sn you want to be in invisible ( click the third link on right )
12. Click the upper link which is ur edit profile
13. Then put this " " on second box or saying nickname
14. Scroll down and click the small box
15. Then click the bottom button on right side
You are now again in edit profile window
16. Click the bottom button which is the OK
17. Click the log out link ( far right of the window )
18. Then click exit ( you need to exit for this to work )
19. Click again the lg in button on YM and click log out
20. Now wait 5 sec and re-enter again, and you have now the invisible nickname.

this works...

Disable yahoo from tracking you

Author: P.R.O.V.I.D.E.R. // Category:
Disable yahoo from tracking you


As you all know, Yahoo! upgraded its features and the capacities of the mail accounts have grown to 2GB. That's good for sure, but the "monitoring" methods that we all have been far too familiar with in the last couple of years have been renewed with this move also. Yahoo! is now keeping track of which sites its members that are getting into groups or using Yahoo! services are visiting and storing this data with a method called "Web Beacons". The aim is to give these statistics to the partner companies arranged by agreement and to improve the "advertisement guiding" function.

However, those who are bothered by this and do not want to be kept track of have still a choice. Yahoo! has hidden this option way deep inside somewhere but I'm declaring it here in case there are people who want it anyway:

1. Go to the address

CODE:
[url]http://privacy.yahoo.com/privacy[/url]

and click the "Cookies" link under the "Special Topics" column.

2. Click the "Web Beacons" link under the "Reference Links" Column.

3. On this page, click the "click here to opt out" link toward the end of the third paragraph under the "Outside the Yahoo! Network" title.

4. After a while, a page that says you have been out of the monitoring program will load. Without doing anything, close that page or continue your usual surfing by typing another address in the address bar. (Do NOT click the "Cancel Opt-out" button, your action will be cancelled!)

5. You're done! Now Yahoo! will not record what you're doing during surfing.

You can let your friends that might be interested know about this; since no matter how "innocent" it may seem, it's still a violation of privacy

Top ten Best Hacks

Author: P.R.O.V.I.D.E.R. // Category:
Here is a list off the top 10 hacks of all time.
Early 1990s

Kevin Mitnick, often incorrectly called by many as god of hackers, broke into the computer systems of the world's top technology and telecommunications companies Nokia, Fujitsu, Motorola, and Sun Microsystems. He was arrested by the FBI in 1995, but later released on parole in 2000. He never termed his activity hacking, instead he called it social engineering.
November 2002

Englishman Gary McKinnon was arrested in November 2002 following an accusation that he hacked into more than 90 US military computer systems in the UK. He is currently undergoing trial in a British court for a "fast-track extradition" to the US where he is a wanted man. The next hearing in the case is slated for today.
1995

Russian computer geek Vladimir Levin effected what can easily be called The Italian Job online - he was the first person to hack into a bank to extract money. Early 1995, he hacked into Citibank and robbed $10 million. Interpol arrested him in the UK in 1995, after he had transferred money to his accounts in the US, Finland, Holland, Germany and Israel.
1990

When a Los Angeles area radio station announced a contest that awarded a Porsche 944S2 for the 102nd caller, Kevin Poulsen took control of the entire city's telephone network, ensured he is the 102nd caller, and took away the Porsche beauty. He was arrested later that year and sentenced to three years in prison. He is currently a senior editor at Wired News.
1983

Kevin Poulsen again. A little-known incident when Poulsen, then just a student, hacked into Arpanet, the precursor to the Internet was hacked into. Arpanet was a global network of computers, and Poulsen took advantage of a loophole in its architecture to gain temporary control of the US-wide network.
1996

US hacker Timothy Lloyd planted six lines of malicious software code in the computer network of Omega Engineering which was a prime supplier of components for NASA and the US Navy. The code allowed a "logic bomb" to explode that deleted software running Omega's manufacturing operations. Omega lost $10 million due to the attack.
1988

Twenty-three-year-old Cornell University graduate Robert Morris unleashed the first Internet worm on to the world. Morris released 99 lines of code to the internet as an experiment, but realised that his program infected machines as it went along. Computers crashed across the US and elsewhere. He was arrested and sentenced in 1990.
1999

The Melissa virus was the first of its kind to wreak damage on a global scale. Written by David Smith (then 30), Melissa spread to more than 300 companies across the world completely destroying their computer networks. Damages reported amounted to nearly $400 million. Smith was arrested and sentenced to five years in prison.
2000

MafiaBoy, whose real identity has been kept under wraps because he is a minor, hacked into some of the largest sites in the world, including eBay, Amazon and Yahoo between February 6 and Valentine's Day in 2000. He gained access to 75 computers in 52 networks, and ordered a Denial of Service attack on them. He was arrested in 2000.
1993

They called themselves Masters of Deception, targeting US phone systems. The group hacked into the National Security Agency, AT&T, and Bank of America. It created a system that let them bypass long-distance phone call systems, and gain access to the pbx of major carriers.

Disable or remove shutdown

Author: P.R.O.V.I.D.E.R. // Category:
Disable or remove shutdown




=> remove shutdown from start menu and also from all other possible options.
=> hide shutdown from start menu
=> disable shutdown all togetherDisable or remove shutdown - The Ethical Hackinglearn to do it now!!! (it takes less than a minute to do so) Disclaimer: this is an article which just brings out the fact that removing the
shut down menu option from the start menu is possible. If you however get caught
by your manager or college system administrator, and get whipped in your ass, I
cannot be held responsible. This tool is a inbuilt tool present in windows XP, just like msgconfig. So you
got to execute this command using run. 1 . Start ->run and type gpedit.msc The gpedit stands for group policy and you can do wonders using this. Also if
you a minute with your pal’s system and this pal tries to flirt your girl friend
- You can make a lot of changes to his system in the time he leaves you alone
with his system, to have him go bonkers.
2. User configuration -> administrative Templates -> start menu and taskbar -> 3. This option opens up a pane on the right hand side. Identify the option named
- Remove SHUT DOWN on the start menu . 4. Double click Remove SHUT DOWN on the start menu option 5. a small screen pops up and you may like to read about the explanation in the
EXPLAIN TAB before you change the settings. 6. Just change the radio button TO ENABLED and say apply. 7. DONE. No need to log off or restart the system. (You may however have to find
a way to restart your system.) 8. This option disables the log off option from the system. From the start menu,
also from the life saver – three buttons CTRL - ALT - DEL options. This option goes well with the HIDING THE LOG OFF FROM START MENU… (To shut down ur system:-without using frm shut down menu) The solution is that u can switch user thru task manager (alt+ctrl+del) or by
pressing winkey+L where u get the option to turn off ur compy/restart/stand
by.
or u may create a shortcut using this shortcut location to shutdown ur sys %windir%\system32\shutdown.exe -s to restart, u can use this shortcut %windir%\system32\shutdown.exe -r

Renaming The Start Button:

Author: P.R.O.V.I.D.E.R. // Category:
Renaming The Start Button:

To rename the start button, you will need a hex editor.
My preference is UltraEdit

Copy the \windows\explore.exe file to a new name (e.g. explorer_1.exe)
With the hex editor, open that file and go to offset 412b6
You will see the word start with blanks between each letter
Edit it be any 5 characters or less
Save the file
Boot to DOS
Copy the existing c:\windows\explorer.exe to explorer.org
Copy explorer_1.exe to explorer.exe
You will also need to replace the explorer.exe in the c:\windows\system32\dllcache file as well with the new one.

Note: If the partition is NTFS and you can't access the files from DOS:

Start Regedit
Go to HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon.
Change the value of Shell from Explorer.exe to explorer_1.exe

Change Yahoo messenger title bar

Author: P.R.O.V.I.D.E.R. // Category:
Hey guys you can change the yahoo messenger title bar...

For this just find the folder messenger in the drive in which the messenger is installed. Then search a file named "ymsgr". In this file just go to the end and write the following code:


[APP TITLE]

CAPTION=Red Devil


Here you can write any name in place of Red Devil... then see the fun.... You can have your own name being placed in yahoo messenger title bar.

What is hacking ?> Explained here !!

Author: P.R.O.V.I.D.E.R. // Category:
What are hackers?
Technically, a hacker is someone who is enthusiastic about computer programming and all things relating to the technical workings of a computer. Under such a definition, I would gladly brand myself a hacker. (There is in fact more to it than that - hackerdom is an entire culture in its own right.) However, most people understand a hacker to be what is more accurately known as a 'cracker'. Worryingly, people tend to prefer to use the word 'hacker' over the more technically correct 'cracker'. This means that many are afraid to use the word for its correct meaning. On this website, when I refer to a hacker, I actually mean a cracker. This is because I prefer to use language that I feel most people understand, rather than language that is technically correct. If you want to know what a cracker is, please read ahead to the next section...

What are crackers?
Crackers are people who try to gain unauthorised access to computers. This is normally done through the use of a 'backdoor' program installed on your machine. A lot of crackers also try to gain access to resources through the use of password cracking software, which tries billions of passwords to find the correct one for accessing a computer. Obviously, a good protection from this is to change passwords regularly. Another good move is the use of software that supports intruder lockout, where no further passwords are accepted after a certain number of bad passwords have tried. Even the correct password wouldn't allow access. Such blocks are normally released after a period of time has elapsed (eg 15 minutes). Of course, an even better idea is never to put security-sensitive resources on the Internet in the first place. If you don't want something to be accessed from the Internet, then make it so that it is only accessible from your local network, or even just from one computer. However, backdoor programs are programs that can expose files to the Internet that were never meant to be shared with other people. You can protect yourself from these by using a firewall and a good up-to-date anti-virus program. You would normally get such a backdoor program by opening an e-mail attachment containing the backdoor program. It is normal for such a backdoor program to send out more copies of itself to everyone in your address book, so it is possible for someone you know to unintentionally send you a malicious program. Note that this can normally only be done if you are using Microsoft Outlook or Outlook Express. A few backdoor programs can work with any e-mail program by sitting in memory and watching for a connection to a mail server, rather than actually running from within a specific mail program. If you do use Outlook or Outlook Express, and you do not have the correct security patches installed, it may be possible for a malicious program to be executed from an e-mail when you receive it, without the need for you to click on any attachments. Note that the same bug also affects Internet Explorer. A security patch is available for this, but personally I would advise that you use different mail and web browsing software. There are other ways of cracking as well, some more widespread than others.I refer to 'hackers' instead of 'crackers'. I mean 'crackers'. A cracker is someone too who does reverse eng. on programs and covers LL programming languages (like ASM 4 example) and modifies the program, mostly in aim of removing limitations !


What damage can a hacker do?
This depends upon what backdoor program(s) are hiding on your PC. Different programs can do different amounts of damage. However, most allow a hacker to smuggle another program onto your PC. This means that if a hacker can't do something using the backdoor program, he can easily put something else onto your computer that can. Hackers can see everything you are doing, and can access any file on your disk. Hackers can write new files, delete files, edit files, and do practically anything to a file that could be done to a file. A hacker could install several programs on to your system without your knowledge. Such programs could also be used to steal personal information such as passwords and credit card information. Some backdoor programs even allow a hacker to listen in on your conversations using your computer's microphone if one is attached! Hackers can do great damage to your computer. They could delete vital files from your hard disk, without which your computer could not work. However, you can re-install these from backups (you do keep backups, don't you?) In theory, the absolute worst damage a hacker could do is turn your computer into a large paperweight. It is possible - the CiH virus demonstrated how. This virus attacked your computer using the then new Flash BIOS technology. This capability was intended to be used to upgrade your computer's BIOS. (The BIOS is a program stored on a chip inside your computer. It controls quite a lot of low-level stuff and is a very vital part of your computer. It is the BIOS that does all the memory checks when you turn on, and also performs the first stage in loading your operating system.) However, the virus used this 'feature' to destroy the BIOS. Without the BIOS, the computer can't work. The only way to recover from this would be to replace your computer's motherboard. At the time of writing this, there are no backdoor programs that can do the same thing, but it is easy enough for a hacker to install a virus that does. Since the CiH virus, many BIOSs have a "flash write protect" option in BIOS setup, and/or a jumper setting on the motherboard that has a similar effect. See your motherboard manual for details.

How does a firewall protect me?
Basically, firewalls protect your computer from unauthorised access attempts. There are two kinds of firewall. Networked computers tend to be connected to the Internet through just one or two computers (hence only one Internet connection is required). These computers behave as firewalls by blocking any unauthorised packets. Any other packets are passed on to the computer they are intended for. This kind of firewall is called a corporate firewall. The kind of firewall you may be more familiar with is a personal firewall- this is a program that runs on your computer, and blocks any unauthorised incoming packets. Personally, I use ZoneAlarm. The great thing about ZoneAlarm is that it is easy to configure. Also, it only allows chosen programs to access the Internet- allowing you to block hackers that use standard protocols such as FTP. In case of emergency, it also has an emergency stop button, which allows you to block allfree by private individuals and charities. Businesses, governments, and educational institutions can download ZoneAlarm on the basis of a 60-day free trial.ZoneAlarm can be downloaded and used for Remember that although a firewall stops hackers from getting in, it will not remove any existing 'backdoor' software from your machine. For this, you need a good anti-virus product like Norton or Sophos. Also make sure that you use your anti-virus software regularly, and that you keep it up-to-date.

How do I report hackers?
When an access attempt occurs, if you have alert popups turned on, ZoneAlarm will tell you the IP address of the possible hacker. This looks something like 123.123.123.123 (example only). You can use this information to track down and report hackers to their ISP. Bare in mind that you are unlikely to get any response apart from a simple acknowledgement- they have to deal with hundreds of reports like yours every day. Here is a rough guide of how to report hackers (note: some of the programs referred to are only available in Windows):

1. Make a note of all the information ZoneAlarm gives you. If possible, use ZoneAlarm's text log option- many ISPs prefer text log format (personally, I supply ZoneAlarm's text log and an English translation).
2. Select Start, Run... In the Run box, type in "winipcfg" and then click OK. This will tell you what your IP address is (among other things). Write down the IP address.
3. Use an Internet tool like SamSpade's address digger to look up which ISP uses the IP address given in your firewall's log.
4. This will return a lot of technical information. Some ISPs add remarks to this information telling you where to send abuse reports to. Make a note of any such e-mail addresses. If there is no such information, look at the official name for the server (near the top), or the names of the domain name servers. To convert these to an e-mail address, remove everything before the first period, including the period itself, then add 'abuse@' in front of it.
5. Now send an e-mail to the abuse address(es) you have. If the recipient obviously isn't English (eg if the e-mail address ends in .de (Germany) or .fr (France)), write it in their language, if you know it. If not, don't worry, most people speak at least a little English, and the technical language of computers is the same almost anywhere you go!
6. Include in the message what ZoneAlarm told you. Also include your own IP address (this is what winipcfg told you), the date, the time, your time zone (in relation to GMT), and an indication of how accurate your computer's clock is (eg if you set it by the atomic clock every day, say so!)



What is a port scan?
A port scan is, quite simply, a test to see if a computer exists and responds to access attempts on a certain port (eg TCP port 80, used by the HTTP protocol). Port scans, on their own, are quite harmless and have many legitimate uses. However, they also have a malicious use, which is to test to see if any particular backdoor software is running on a computer for the purposes of then using such backdoor software. In my Internet logs, I include all unauthorised port scans of my computer. I tend to describe these port scans as hack attempts, since it is most likely that this is what they are. To be absolutely pedantic, I shouldn't really describe them as such, since there may be other explanations.


What is an IP address?
An IP address is a number that can uniquely identify any computer on the Internet. With the current Internet protocol (IPv4), an IP address is a 32-bit number. That means that as a binary number, it would be stored as 32 ones and zeroes. There are 4,294,967,296 possible IP addresses. However, we humans tend to split IP addresses into four 8-bit numbers, express these numbers using our decimal number system, and separate them with dots. With 8-bit numbers, each number must be a whole number in the range 0 to 255, inclusive. For example, an IP address of 2,071,690,107 would probably be expressed as 123.123.123.123 (example only). Some people might express an IP address in hexadecimal as well (7B7B7B7Bh in this case). The dotted IP address is by far the most common, however. As the Internet grows, plans are being made to increase the size of IP addresses. (The "next" Internet protocol, IPv6, uses 128-bit IP addresses.) The problem with that, of course, is that quite a few Internet protocols would need to be rewritten, since they are designed to work with 32-bit IP addresses. This includes the Internet Protocol itself (IP). Thankfully, Internet packets include an IP version flag, so it would be possible to have both old and new implementations of the IP communicate with each other. (The newer implementation would use the older protocol when communicating with older implementations. Implementations of the IP would know whether a computer was using the older or newer protocol from the version flag. Unfortunately, older implementations would not be able to access anything outside of the 32-bit IP range.) IP addresses can be statically or dynamically allocated. Statically allocated IP addresses always refer to the same computer. However, dynamically allocated IP addresses can refer to different computers at different times. For example, if you have a dial-up Internet connection, your IP address doesn't become unused when you hang up- it is allocated to someone else. When you reconnect, you are allocated a new IP address. This is dynamic allocation.


How can I hack?
I don't like that first person pronoun... I don't mind explaining how hackers hack, but I won't explain how you can hack. This is not a pro-hacking website. This is a computer security site. My aim is not to encourage or assist hacking in any way. I aim to try to inform people of the risks that they may be exposed to, so that they can better protect themselves from these risks. I also provide this website as a resource for those with an academic interest. If you want a rough idea of some of the cracking methods that other people (not you) use, just read on to the next section.


How can NetBIOS be harmful?
NetBIOS hacks are the worst kind, since they don't require you to have any hidden backdoor program running on your computer. This kind of hack exploits a bug in Windows 9x. NetBIOS is meant to be used on local area networks, so machines on that network can share information. Unfortunately, the bug is that NetBIOS can also be used across the Internet - so a hacker can access your machine remotely. Not all Windows computers are vulnerable to this kind of attack. If you have a firewall that blocks incoming NetBIOS packets, you are safe. Some network configurations will also be immune. To find out whether you are vulnerable, visit GRC's ShieldsUP!, and click the "Test My Shields!" image half way down the page. Note that GRC will attempt to connect to your computer using NetBIOS - this is just to test whether your computer is vulnerable. GRC will not retain any information about your computer, nor will any damage be done. NetBIOS uses TCP port 139, UDP port 137 and UDP port 138.


How can ICMP Ping be harmful?
ICMP is one of the main protocols that makes the Internet work. It standards for Internet Control Message Protocol. 'Ping' is one of the commands that can be sent to a computer using ICMP. Ordinarily, a computer would respond to this ping, telling the sender that the computer does exist. This is all pings are meant to do. Pings may seem harmless enough, but a large number of pings can make a Denial-of-Service attack, which overloads a computer. Also, hackers can use pings to see if a computer exists and does not have a firewall (firewalls can block pings). If a computer responds to a ping, then the hacker could then launch a more serious form of attack against a computer. People who do have firewalls normally don't bother to report pings, because they are innocent in themselves - allowing the hacker to continue hacking for quite a long period of time.


How can FTP be harmful?

FTP is a standard Internet protocol, standing for File Transfer Protocol. You might use it for file downloads from some websites. If you have a web page of your own, you might use FTP to upload it from your home computer to the web server. However, FTP can also be used by some hackers... FTP normally requires some form of authentication for access to private files, or for writing to files. Hackers can get round this by using programs called "backdoor programs". You wouldn't know if you had one of these, unless you used an up-to-date virus scanner regularly. You could get a backdoor program by opening an infected E-mail attachment. FTP backdoor programs, such as Doly Trojan, Fore, and Blade Runner, simply turn your computer into an FTP server, without any authentication. Using a known protocol such as FTP is easier for hackers because the protocol is already defined - not so much new software needs to be written to use it (a normal FTP client could be used - the hacker wouldn't need any specialist software). Also, since FTP has legitimate uses, many firewalls do not block it. Luckily, ZoneAlarm does.


How can rpc.statd be harmful?
This is a problem specific to Linux and Unix. I am not too sure with what precisely rpc.statd should be used for. I do, however, know that it is used by hackers. rpc.statd is typically used as a 'file locking status monitor' (whatever that is) on local area networks. Not all versions of Linux/Unix use it, and some versions have had the security glitch I am about to describe fixed. The problem is the infamous unchecked buffer overflow problem. This is where a fixed amount of memory is set aside for storage of data. If data is received that is larger than this buffer, the program should truncate the data or send back an error, or at least do something other than ignore the problem. Unfortunately, the data overflows the memory that has been allocated to it, and the data is written into parts of memory it shouldn't be in. This can cause crashes of various different kinds. However, a skilled hacker could write bits of program code into memory that may be executed to perform the hacker's evil deeds. That is the problem. rpc.statd uses TCP ports 111 and 9704.


How can lpr be harmful?

This is a similar problem specific to Linux and Unix. lpr is typically used as a printing system. Not all versions of Linux/Unix use it, and some versions have had the security glitch I am about to describe fixed. The problem is the infamous unchecked buffer overflow problem (again). Basically, the result of this problem is that data can be written into parts of memory it shouldn't be written to. A skilled hacker could write program code into memory to perform his evil deeds. lpr uses TCP port 515.


How can HTTP be harmful?
HTTP stands for HyperText Transfer Protocol. It is one of the main protocols used on the Internet- it is what you are using right now to view this web page. HTTP hacks can only be harmful if you are using Microsoft web server software, such as Personal Web Server. There is a bug in this software called an 'unchecked buffer overflow'. If a user makes a request for a file on the web server with a very long name, parts of the request get written into parts of memory that contain active program code. A malicious user could use this to run any program they want on the server. The Code Red worm takes advantage of this. This worm even managed to infect the Microsoft Windows Update site at one point. Despite what I have just said, it is still possible for home users to become infected with such worms, since some people install Personal Web Server without knowing what it is. Some computers even have PWS pre-installed when you buy them. To see if PWS is running on your computer, hover your mouse over each of the icons in the bottom right corner of your screen, until a small description appears. If one of the icons is PWS, right-click it and choose to exit. Then, use Add/Remove Programs in Control Panel to remove the program from your system. Microsoft Personal Web Server is used to serve web pages directly from your computer to the rest of the world. Of course, you would need to be connected to the Internet 24 hours a day in order to do this. Most people will tend to upload Internet material to their ISP, rather than provide access to it directly from their own computer. And just to clear up any remaining confusion: Microsoft Personal Web Server is not required to surf the Internet- all you need to surf the Internet is a web browser and an Internet connection (such as dial-up).

HTTP uses TCP port 80. I am not sure if Microsoft has released a patch to correct the problems

Turning On or Off features like IIS, MSMQ and Print Services

Author: P.R.O.V.I.D.E.R. // Category:
Recently I configured IIS on my Windows Vista Operating System. I first tried following the Windows XP process of going to Start-->Settings-->Control Panel-->Add Remove Program, but at last wondered to see all new user interfaces.

As there are many changes in the user interface I took almost 10 minutes to identify the control panel application which allows me turn on or off windows features like IIS, MSMQ, Printer Services, Indexing Services, etc.

I wanted to share how to locate the program which allows you to turn on or off windows applications with you people as it might be helpful to you

1. Select Control Panel from your Start Menu
2. Local the icon Programs in the Control Panel and click on Programs


3. Click on Turn Windows features on or off link

4. The Turn Windows features on or off application allows you to configure the applications like IIS, MSMQ, Printer Server

Displaying a Custom Interactive Logon Message

Author: P.R.O.V.I.D.E.R. // Category:

Displaying a custom interactive logon message on Windows Vista is very simple. The Local Security Policies of Vista operating system has options that allows you to create a message text that will appear when a user attempts to login to the system. You may use this option to display usage policy message in your office or any other shared computers.

Follow these simple steps to configure a custom interactive logon message

  1. Click on start menu
  2. Then select All Programs -->Administrative Tools --> Local Security Policy( alternatively type Local Security Policy in the search bar available in start menu and select the application)
  3. In the left side panel navigate to Security Settings-->Local Policies-->Security Options.
  4. In the details panel of right side locate & open Interactive logon:Message title for users attempting to logon and enter title of the custom logon message
  5. In the details panel of right side locate & open Interactive logon:Message text for users attempting to logon and enter text of the custom logon message
  6. Now logoff your windows session to view how the custom message is displayed.

Windows Vista Trick - Configuring a custom logon message

Capture Screens Using Built in Windows Vista's Application - Snipping Tool

Author: P.R.O.V.I.D.E.R. // Category:

Microsoft Windows Vista comes with a built in application called Snipping Tool to capture screens. The Snipping Tool allows you to capture a screen shot of any object on your screen and then annotate, save, or share the image through e-mails.

The application can be launched by selecting Start Menu-->All Programs-->Accessories-->Snipping Tool. User interface of the application is very simple and elegant with handy options to capture different display areas of the screen easily.

You can use a mouse or tablet pen to capture full screen, window, required rectangular section or even a custom shape. After you capture the image it is automatically copied to an edit window where you can annotate, save or share the image. The edit windows provides Highlighter and Pen options to highlight an area and to write on or around the image.

This application has a decent functionality which helps small bloggers and technical document writers to capture simple screen shots with out spending money for purchasing third party applications like SnapIt and FastStone Capture.




Unable to find out Run command in Vista? Here is a quick fix for this important option.

Author: P.R.O.V.I.D.E.R. // Category:
By default, windows vista doesn't have the Run command on the start menu.You can restore that to your Windows Vista Start menu with the simple step-by-step instructions. Just right-click your Start menu and click Properties.

Then with the Start menu tab active, click the Customize button located in the top right, and tick the checkbox next to Run command.

Your command will now appear in the lower-right corner of the Start menu.Then again, you can always get to the Run prompt with the useful Windows-R keyboard shortcut.

Turbo Charge Your Windows Vista Start Menu Search Feature

Author: P.R.O.V.I.D.E.R. // Category:
One of my favourite features in Microsoft Windows Vista is the new Start menu interface. The excellent search feature of Vista Start menu allows users to easily find required programs by just start typing the first few letters.

That said, concerns about this feature is performance. Certain times when the letters which we typed in the search box does not match with any application or document names, Vista takes long time to tell no items match your search.

This is because of the default behaviour which additionally searches documents, emails and other network places when program names does not match with the input letters.

To make this search feature work better and display results very fast, you can have Vista only search your programs.

  1. Right-click the Start Menu and select Properties
  2. Select "Start Menu" and click Customize...
  3. Scroll to the bottom and locate Search related options.
  4. Unselect "Search communications", "Search favorites and history", and under "Search files", select "Don't search for files". Make sure "Search programs" is selected.
  5. Click OK twice to save the settings and exit the properties window.

Now trying searching in Start menu and feel the difference. You will definitely appreciate more peformant Start Menu search now.

Google Releases iGoogle For iPhone

Author: P.R.O.V.I.D.E.R. // Category:

Google released a specialised version of iGoogle for iPhone users. This optimised iGoogle page displays all the gadgets and feeds of a tab in a single column page with easy to scroll interface. Each gadget or feed can be collapsed or expanded by clicking on the header.

Users can switch between the tabs by choosing the tab name from the drop down interface available at the bottom of the page.

To access the new iGoogle interface, point your Safari browser on iPhone to http://google.com/ig/i

Restore Accidentally Deleted Recycle Bin Icon From Desktop

Author: P.R.O.V.I.D.E.R. // Category:
Problem


When you are deleting unnecessary images, documents and shortcuts placed on the desktop, you deleted Recycle Bin icon by mistake. Now you want to restore the accidentally deleted Recycle Bin icon on to the desktop.

Solution

Follow these steps to restore Recycle Bin icon on to Desktop

  1. Right click on empty area of Desktop and choose the option Personalize; display Personalize appearance and sounds window

  1. Choose the option Change desktop icons available under Tasks in the top left side of display window; displays Desktop icon settings window

  1. Select the check box Recycle Bin
  1. Click on Ok to save the settings
  2. Return to your Desktop to see the restore

"Copy As Path" - The Hidden Windows Vista Option To Copy Full File Path

Author: P.R.O.V.I.D.E.R. // Category:
Windows Vista has a nice little hidden feature which allows us to copy full file path to clipboard. If you hold Shift Key and right click on a selected file, a new option appears in the context menu with name "Copy as Path".This option copies the full path of the selected file to clipboard.



This hidden feature comes very handy option when you want to copy and paste network file paths in emails and other documents. Can you guess why is this feature hidden in Vista?

Opening a New Tab Page With Double Click Of a Mouse Pointer

Author: P.R.O.V.I.D.E.R. // Category:
Recently we learned a tip in Firefox to open a new tab page with a single double click of mouse.

All you need to do to open a new tab page is double click on the empty area next to an existing tab page.


Also it is possible to open a new tab page with keyboard shortcut CTRL + T (Windows)

Configure Firefox to Forget Browser History Immediately After Closing It

Author: P.R.O.V.I.D.E.R. // Category:
Problem: Your are browsing your favourite web sites at office without the knowledge of your manager. One day your manage want to browse and show a web site related to work on your computer. The moment he starts typing first few characters of the web site, your Firefox browser reveals history of the websites which you visit. How to avoid such embarrassing situations by clearing the browser history automatically after closing the application?



Solution

Firefox has an useful option which automatically clears the web browser history as soon as you close the application. To enable this auto clear option

  • Select Tools-->Options--Privacy
  • Choose the option Always clear my private data when I close Firefox
  • Clear the option Ask me before clearing private
  • Click Ok to save the settings

Hold CTRL Key To Open a Link in New Tab Page

Author: P.R.O.V.I.D.E.R. // Category:

Here is a handy tip to enhance your web experience with Firefox web browser.

While browsing a web page in Firefox, if you want to open a link in a new tab page just hold the CTRL(control) key and click on the link. The link opens up as a new tab page.

This is a very handy shortcut to the traditional way of right clicking on a link and then selecting Open Link in New Tab

How To Unistall Firefox Completely

Author: P.R.O.V.I.D.E.R. // Category:
Couple of days ago Firefox released security updates (version 3.0.2) and my browser upgraded to to the latest version through auto updates. When the Firefox browser upgraded to the latest version my favorite Firefox add-ons firebug, fireuploader and AdSense Tracker stopped working.

As most of my web development and blogging activities are depending on these add-ons, I struggled a lot to work without the add-ons. To get my add-ons working I tried uninstalling and installing all the add-ons, but it does not help me. Then I decided to uninstall the Firefox browser through Add or Remove program and install latest version. Even this activity does not help me to get my add-ons working.

After Googling for couple of minutes I got information on how to remove Firefox application completely by removing settings associated with my profile. After that complete uninstall I was able to install a fresh copy of Firefox with all the required add-ons and all the add-ons are working properly.

Here are the steps to be followed to remove Firefox completely

1. Uninstall Firefox browser through Add/Remove Programs(Windows XP) or Programs & Features(Windows Vista)
2. Remove bookmarks and other settings of Firefox by deleting the folder \Firefox from the folders Documents and Settings\[username]\Application Data\Mozilla in Windows XP, or the \Users\[username]\AppData\Local\Mozilla and \Users\[username]\AppData\Roaming\Mozilla\ in Windows Vista.
3. Delete the folder \Program Files\Mozilla Firefox\ (This is the place where Firefox is installed, and on most of the PC's it is installed in the path C:\Program Files\Mozilla Firefox\)
4. The final step is to remove all registry entries of Firefox with the help of Regedit application. Launch Regedit(Start-->Run-->Regedit) and search for all the entries containing the text Firefox or Mozilla and delete them. The entries which I was able to locate and delete in my registry are

[HKEY_CLASSES_ROOT\FirefoxHTML]

[HKEY_CURRENT_USER\Software\Mozilla]

[HKEY_CURRENT_USER\Software\MozillaPlugins]

[HKEY_LOCAL_MACHINE\SOFTWARE\Mozilla]

[HKEY_LOCAL_MACHINE\SOFTWARE\MozillaPlugins]

If you are using any other Mozilla applications make sure to uninstall only Firefox related entries from Windows registry and installation folders.

Stop Firefox from Pre-Fetching Web Pages And Reduce Your Bandwidth Usage

Author: P.R.O.V.I.D.E.R. // Category:
Firefox browser has a little bandwidth hungry feature which downloads the pages which it thinks you may view. When a webpage hints Firefox that certain pages are likely to be visited, it automatically downloads them so that they can be displayed immediately when the user requests.

For example when you search Google for iMac, Google Search results webpage hints browsers to pre-fetch http://www.apple.com/imac/ webpage.



If you are highly concerned about the bandwidth usage and resources (like CPU and Memory) you can stop Firefox from pre-fetching the pages.Follow these steps to stop Firefox pre-fetching the pages

1. Type about:config in the address bar
2. Locate the configuration key network.prefetch-next (you can use filter to easily locate keys)
3. Right click on the configuration key network.prefetch-next and select Toggle to change the value to false
4. That's it done. From now onwards your Firefox browser will not download any pages unnecessarily

Whats's In a Gadget??

Author: P.R.O.V.I.D.E.R. // Category:
The Google Gadgets API consists of a few simple building blocks: XML, HTML, and JavaScript. To get started, all you need is a basic understanding of HTML.
XML is a general purpose markup language. It describes structured data in a way that both humans and computers can read and write.

XML is the language you use to write gadget specifications. A gadget is simply an XML file, placed somewhere on the internet where Google can find it. The XML file that specifies a gadget contains instructions on how to process and render the gadget. The XML file can contain all of the data and code for the gadget, or it can have references (URLs) for where to find the rest of the elements.

HTML is the markup language used to format pages on the internet. The static content of a gadget is typically written in HTML. HTML looks similar to XML, but it's used to format web documents rather than to describe structured data.

JavaScript is a scripting language you can use to add dynamic behavior to your gadgets.

Note: Gadgets were formerly called modules, which is why the word "Module" appears throughout the API

Some Computer Facts Which U Never Heard..

Author: P.R.O.V.I.D.E.R. // Category:
Part 1:

(1). An Amd 1400 chip running without a heatsink gets as hot as 370 degrees.

(2). Seagate introduced the first hdd for pcs in 1979.It held 5 M.B of data.

(3). If u opened up the case of the original Macintosh, u will find 47 signatures
one for each member of Apple's Macintosh divison as of 1982.

(4). The first computer company to register for a domain name was digital
equipment corporation.

(5). Did u know Apple & Sun came very close to a merger in 1996.

(6). The technology contained in a single game boy unit in 2000 exceeds all
the computing power that was used to put the first man on moon in 1969.

(7). Hewlett Packard was started at a garage in Palo Alto in 1939.




Part 2:

1).Tetris has sold over 40 million copies worldwide, since it began in 1982.That provided the creator 800 million in revenues.

2).The superflop (LOL!) sega dreamcast, released in 1999, was the first console game machine to sport a 128 Bit architecture.

3).The most expensive game ever developed was "ShenMue" for sega dreamcast.It costs $20 million.

4).The QWERTY keyboard layout is 129 years old.

5).South korea's SK telecom offers an inaudible ring tone to its customers which, it claims, can repel mosquitoes.

6).In 1971, the first speech recognition software named, "Hearsay" was developed in India.

7).Macquariums are aquariams made from old macintosh computers.




Part 3:

1).The servers r in denmark.The software is from Estonia.The domain is registered in Australia & the corporation is in south pacific island.Ths Kazaa the p2p software.

2).Bill gates & Paul Allen started a company called Traf-O-Data to monitor traffic flow.

3).The four largest software makers in the world are:-

(a) Microsoft
(b) Adobe
(c) Sap
(d) Computer Associates.

(4)Top Ten Supercomputers of Today:-

Arranged according to the speed:-

1. Bluegene/L DD2 Beta-system(IBM).

2. Columbia (NASA).

3. Earth Simulator (NEC).

4. MareNostrum(Barcelona Supercomputer Center).

5. Thunder (Lawrence Livermore National Laboratory).

6. ASCI Q(Los Alamos National Laboratory).

7. System X(Virgina Tech).

8. Blugene/L DD1 Prototype(IBM).

9. eServer pSeries 655 cluster(Naval Oceanographic Office).

10. Tungsten(National Center For Supercomputing Applications).

5). According to university of california 1,693,000 terabytes of information are
produced & stored magnetically per year.

6).Hard drives in the near future are expected to have a track density of
about 100,000 tracks/inch.This means that tracks are spaced 10 millionths
of an inch apart.

7).One terabyte(1000 gigabytes) is equivalent to storing a stack of
documents that is more than 16 times the height of New York's empire
state building



Part 4:

1. The 4004 was the first microprocessor of intel.

2. The nVidia GeForce 6800 ultra has 222 million transistors which is the
record for the max. no. transistors on a chip.

3. James Gosling created java at sun microsystems.He came up with the
name Java while debating over it at a coffee shop.

4. The first ISP was Compuserve, established in 1969 which is now under
AOL.

5. The Palm O.S fits in less than 100 K,which is less than one percent the size
of Windows 98 or Mac O.S.

6. What does 50 G.B of storage really mean?It means we can stack 3 piles of
single spaced type written pages taller than the Eiffel tower and data to
support this information is about 50 gigabytes.

7. The code name for the 12 engineers who designed the IBM pc was :-
'The dirty dozen'.

8. When the cd was invented, it was decided that a cd should be long
enough to hold beethoven's Ninth Symphony at any tempo which was
precisely 72 minutes.



Part 5:

1)128 bit SSL encryption is so strong that it would take much , much longer than the age of universe to crack a message encrypted using it.Even 20 years from now, if computers are a million times faster. it would still take longer than the age of the universe to crack it.

2)Bill Gates math SAT score was a perfect 800.

3)Disk drive recording head fly height (gap between the head and disc when the drive is spinning ) is less than 1 microinch while:-

A red blood cell is 300 microinches is diameter.
A particle of tobacco smoke is 250 microinches.
A particle of smog is 100 microinches.
A human hair is 4000 microinches.

4)When Windows 3.1 was launched, 3 million copies were sold in the first two
months.

5)Windows 95 can run on 386DX at 20 Megahertz, with just 4 M.B of RAM.

6)David Bradley wrote the code for [Ctr]+[Alt]+[Delete] key sequence.

Unknown Facts of google

Author: P.R.O.V.I.D.E.R. // Category:
Google started in January, 1996 as a research project at Stanford University, by Ph.D. candidates Larry Page and Sergey Brin when they were 24 years old and 23 years old respectively.

The prime reason the Google home page is so bare is due to the fact that the founders didn’t know HTML and just wanted a quick interface. In fact it was noted that the submit button was a long time coming and hitting the RETURN key was the only way to burst Google into life.

Google is a mathematical term 1 followed by one hundred zeroes. The term was coined by Milton Sirotta, nephew of American mathematician Edward Kasne.

Gmail was used internally for nearly 2 ears prior to launch to the public. They discovered there was approximately 6 types of email users, and Gmail has been designed to accommodate these 6.

It consisted of over 450,000 servers, racked up in clusters located in data centers around the world.

The Google search engine receives about a billion search requests per day.

Google's index of web pages is the largest in the world, comprising of eight billions(2005) of web pages. Google searches this immense collection of web pages often in less than half a second.

Google has a tradition of creating April Fool's Day jokes - such as Google MentalPlex, which allegedly featured the use of mental power to search the web. Some thought the announcement of Gmail in 2004 around April Fool's Day was a joke.

Google receives daily search requests from all over the world, including Antarctica.

Users can restrict their searches for content in 35 non-English languages. To date, no requests have been received from beyond the earth's orbit, but Google has a Klingon interface just in case.

Google has a world-class staff of 9,378 full-time employees known as Googlers. The company headquarters is called the Googleplex located at Mountain View at 1600 Amphitheatre Parkway.

Google translates billions of HTML web pages into a display format for WAP and i-mode phones and wireless handheld devices.

"I feel lucky" is nearly never used. It was a comfort button which actually takes to the first web page returned by the search results.

Google use the unique 20%/5% rules. That is ,if at least 20% of people use a feature, then it will be included. At least 5% of people need to use a particular search preference before it will make it into the 'Advanced Preferences'.

Employees in Google are encouraged to use 20% of their time working on their own projects. That's why we have GMail,Google News and Orkut now.

Google Groups comprises more than 845 million Usenet messages, which is the world's largest collection of messages or the equivalent of more than a terabyte of human conversation.

The basis of Google's search technology is called PageRank™, and assigns an "importance" value to each page on the web and gives it a rank to determine how useful it is. However, that's not why it's called PageRank. It's actually named after Google co-founder Larry Page.

Googlers are multifaceted. One operations manager, who keeps the Google network in good health is a former neurosurgeon. One software engineer is a former rocket scientist. And the company's chef formerly prepared meals for members of The Grateful Dead and funkmeister George Clinton.

Google’s Orkut is very popular in Brazil and India. It was the brainchild of a Google engineer who was given free reign to run with it.

In a 2006 report of the world's richest people, Forbes reported that Sergey Brin was #26 with a net worth of $12.9 billion, and Larry Page was #27 with a net worth of $12.8 billion