.

Saturday, 2 March 2013

Auto Scroll the Web Page Whilst You're Reading



Here we have bought a trick which enables you to make a bookmarklet that automatically scrolls the webpage for you, so you can carry on reading long articles without having to manually scroll down. 
STEPS-
Create a new bookmark in your browser and set this as its address (make sure you include the "javascript" part at the beginning).
javascript:var isScrolling; var scrolldelay; function pageScroll() { window.scrollBy(0,1); scrolldelay = setTimeout('pageScroll()',25); isScrolling = true; } if(isScrolling != true) { pageScroll(); } else { isScrolling = false; clearTimeout(scrolldelay); }
To increase or decrease the speed, you can change the 25 insetTimeout(‘pageScroll()’,25) to however many milliseconds you want to pass before updating the page. If you change it to 100, for example, it will scroll more slowly so the lower the number the faster it will scroll.
Drag this bookmark to your browser's bookmark bar for easy access. Pressing it once will start scrolling and pressing it again will stop.
Been using this on other long articles (works on any site) and it makes it quite nice to read whilst still being able to eat at the same time :D

Turbo C++ For Windows 7 & Above

Download

Turbo C++ was a C++ compiler and integrated development environment and computer language originally from Borland. Most recently it was distributed by Embarcadero Technologies, which acquired all of Borland's compiler tools with the purchase of its CodeGear division in 2008. The original Turbo C++ product line was put on hold after 1994, and was revived in 2006 as an introductory-level IDE, essentially a stripped-down version of their flagship C++Builder. Turbo C++ 2006 was released on September 5, 2006 and was available in 'Explorer' and 'Professional' editions. The Explorer edition was free to download and distribute while the Professional edition was a commercial product. In October 2009 Embarcadero Technologies discontinued support of its 2006 C++ editions. As such, the Explorer edition is no longer available for download and the Professional edition is no longer available for purchase from Embarcadero Technologies. Turbo C++ is succeeded by C++Builder.


Snapshot of the Turbo C++


Sony Announces MDR-XO5 on-ear compact headphones

Sony has unveiled the newest addition to its X line of headphones, the MDR-X05. These compact headphones feature over-the-ear swivel cups, and are boasted as offering excellent sound reproduction in an attractive, colorful body. Check out a couple pictures of the headset, as well as its specs and other particulars, after the jump. 


The X05 utilize 40mm drivers, meaning you won’t find yourself complaining about lack of bass. The cups are surrounded by memory foam pads, which means they will adhere to the shape of the wearer’s ears, helping to avoid the discomfort that can result from typical over-the-ear headsets. In addition, this also provides a great deal of noise isolation, so you won’t have to worry about disturbances.
The cable on the X05 headphones is specially designed to avoid tangles and similar problems that can result with long cords. This is achieved by using grooved surface serrations to “eliminate” friction. The headset includes an Apple 3-button control as well, and is available in silver, black on red, red on black, red on silver, black on silver, and whilte on silver. They’ll be available on March 22 for $199.
Sony’s Personal Audio Group Vice President Andrew Sivori had this to say: “When Sony teamed up with Simon Cowell, our goal was to create the best sounding headphones in the world for today’s most popular music– allowing listeners to experience the full spectrum of audio that artists and producers hear in recording studios. With the newest X Headphones, now we’re delivering that experience in a more compact and portable design.

TECH SPECS

HARDWARE

ColorRed / Silver, Red / Black, Black / Red, White / Silver, Black / Silver
DesignOn-ear
Physical attachmentVertical
In-line remoteYes
Makes phone callsYes


BASIC SPECS

DesignOn-ear
Physical attachmentVertical



Thursday, 27 December 2012

THE SWITCHBLADE RAZER PROJECT

AFTER THE CONCEPT OF THE 'FIONA', RAZER HAS COME OUT WITH ANOTHER BREAKTHROUGH CONCEPT OF THE SWITCHBLADE.  POWERED BY THE NEXT GEN INTEL ATOM PROCESSOR, IT IS EQUIPPED WITH AN ULTRA-SENSITIVE MULTI-TOUCH SCREEN WITH A KEYBOARD WHICH IMPROVISES THE KEYS DEPENDING ON THE GAME.






PHYSIQUE 


THE 172mm x 115mm x 25mm PC-CUM-TABLET IS AVAILABLE BOTH IN 3G AS WELL AS IN Wi-Fi.
THE SMALL YET POWERFUL DEVICE WILL RUN ON WINDOWS 7 OS WITH :

  • A MINI HDMI PORT.
  • A USB 3.0 PORT.
  • STANDARD HEADPHONE & MIC PORTS.






THE DYNAMIC TACTILE KEYBOARD

"THE DYNAMIC TACTILE KEYBOARD" SOUNDS RATHER GRAND AND IT IS. TO WHAT IT EXACTLY MEANS IS THAT THE KEYS ARE TOUCH DEPENDENT AND TRANSPARENT WITH A DISPLAY PANEL UNDERNEATH, WHICH CHANGES ACCORDING TO THE REQUIREMENT OF THE GAME. ALSO DEPENDING ON THE IN-GAME SITUATION, THE KEYBOARD CHANGES TO GIVE YOU THE CONTROLS ONLY NEEDED. 










THE BEAUTY OF THE KEYBOARD CAN BE SEEN IN THE VIDEO BELOW











Wednesday, 26 December 2012

PROJECT FIONA- THE CONCEPT

PROJECT FIONA, THE NEXT BIG THING IN GAMING, IS A CONCEPT TABLET BY RAZER,  WHICH RUNS ON A NEXT GEN INTEL PROCESSOR ENABLING YOU TO PLAY YOUR FAVOURITE PC GAMES ON THE GO. THIS PROJECT IS IN ITS ADVANCED STAGES, RUNNING HEAVY APPLICATIONS ON AN ULTRA PORTABLE FORM FACTOR.



TECHNICAL SPECIFICATIONS:

  • IT USES A HYBRID USER INTERFACE FOR PC GAMING.
  • INTEL CORE i7
  • 10.1" 1280x800 DISPLAY
  • FULL-SCREEN USER INTERFACE SUPPORTING MULTI-TOUCH
  • 3-AXIS GYRO, MAGNETOMETER, ACCELERROMETER
  • FORCE FEEDBACK
  • DOLBY 7.1 SURROUND SOUND
  • WiFi 802.11b/g/n
  •  BLUETOOTH 3.0






THE FIONA IS EQUIPPED WITH INTEGRATED DUAL CONTROLLERS ALONG WITH THE MULTI-TOUCH SCREEN, IT GIVES YOU A TOTAL HARDCORE PC GAMING EXPERIENCE ON THE GO.




Thursday, 16 August 2012

Network Hacking (Penetrating) (Perl)

Perl



  Running Perl exploit scripts is just as easy as running PHP scripts.




1. Download and install the appropriate version of ActivePerl

2. Next the hacker would find an exploit for vulnerability. In this example we will use the following example: Milw0rm for WinFTP Server 2.3.0. This is also a Denial of Service (DoS) exploit.

3. Edit the options like the target server and others as needed. Then save the file as “exploit.pl”. As you can see Pearl exploits begin with !/usr/bin/perl.

4. Open CMD or Terminal and change into the directory with the exploit using the CD (change directory command). Then run the exploit by typing:
perl exploit.pl. The attack has begun. Simple, eh?


Tuesday, 24 July 2012

Network Hacking (Penetrating) (PHP)

Penetrating

So now you might be wondering: Once the hacker finds the right exploit, how does he go about running it against the target and penetrating the server? This will all be explained in this post.
As you search Milw0rm or any of the other couple exploit database websites provided in this post, you will notice that the exploits are created in many different types of programming languages. Below I will list a few of the most common programming languages used, and how a hacker would compile and run them against a server.

PHP

PHP exploits are very common. PHP exploit code usually starts with <?php and ends in ?> . Let’s say the hacker wanted to do some temporary damage to a server running FTP Server 0.9.20. If he was to search milw0rm he would come up with the following DOS exploit:
PHP
http://milw0rm.com/exploits/2901 and run it against the server. Below are the steps the hacker would take.

1. First the hacker would need to install PHP onto his computer. WAMP is a free web server that comes with PHP. If you are using a Mac then you must install MAMP . Next, paste the PHP exploit into notepad or any word processor and save it as “exploit.php”.
You will have to know a little PHP to edit the target address. On line 13 of this exploit you will see:
$address = gethostbyname(‘192.168.1.3’); here you will have to edit in the IP address of the target. Every exploit is different. Some you have to know what to edit and some have runtime instructions. Save this edited file into the PHP directory on your server that contains the PHP executable file. In WAMP the directory would be C:\wamp\bin\php\php5.2.5 , of course the last directory version number changes with newer versions.

2. Next open up the command prompt or terminal if you are using a Mac, and go to the PHP directory by using the CD (change directory) command followed by the directory location.


3. Now it’s time to run the exploit. To run it simple type in “php exploit.php” and hit enter. You should get a couple errors.


4. When skilled hackers create exploits, they sometimes insert mistakes or extra code so that script kiddies with no programming knowledge wouldn’t be able to use them. The above is a simple example. If you go to line 18 of this exploit , will see the line
$junk.=”../../../sun-tzu/../../../sun-tzu/../../../sun-tzu”;
This line was inserted to throw off the script kiddies and by simply removing it, the error will disappear. Just another reason why it’s helpful to learn how to program.
Also every now and then you will receive other errors such as the one the second picture shows above. These errors have to do with the server configurations. Now as a hacker, you have to learn a lot on your own. By going around asking simple questions like this all the time will make you look bad and the most common response you will receive: www.google.com . Google is your friend, so take advantage of it! So starting now, begin to use Google, and if you are still stuck, then you can ask help on community forums.

5. Once the errors are fixed and the program is running, a DoS attack will be launched the target website up until you exit the command screen. If the target server can’t handle much, you may be able to see the affect of your exploit by going to the site and clicking around. If it is working, the site will begin to lag and it’ll take a long time to load pages. Eventually the server may go down completely.
NEXT - PERL

Network Hacking (Searching for Vulnerabilities)

Searching for Vulnerabilities 

Now that the hacker has the name of the software being used and its version number, he would take that information and search a couple vulnerability databases for an exploit. If there’s an exploit available, he will run it against the server and take complete control. If there isn’t any, he would move onto another open port and try again on a different service.

Some of the most popular exploit databases are:


Milw0rm
SecurityFoucs
osvdb

By searching “filezilla” on milw0rm, fortunately the hacker won’t find any exploits for my current version of the FTP software. Now most people would move on to another port to try and find another possible vulnerability, but this doesn’t mean every hacker will. If a skillful hacker is determined, he may try to locate a vulnerability in the current software version and develop an exploit for it. In the hacker community, this new vulnerability would be called a “0-day”. 0-day vulnerabilities are very valuable in the hacker community for a few reasons.

• No one knows about the vulnerability, so the hacker could start hacking hundreds of websites before the vulnerability is discovered and patched.
• The hacker could sell the vulnerability for thousands of dollars.
• Discovering vulnerabilities and creating an exploit for it shows that the hacker is very skillful and raises his ranks in the hacker community.

You might be wondering why 0-days are worth so much. It’s very simple. I’ll explain it with a simple equation.

Hacker + 0-Day + Company Servers = Bad Reputation = Loss of Money

Now before we get into the actual penetrations, I will discuss a couple of the common type of attacks used against discovered vulnerabilities.

Denial-of-Service (DoS) – There are many types of DoS attacks, but they all have one purpose: to make the target server unavailable for legitimate users. The most common type of DoS attack is when the hacker sends a flood of information to the target server causing it to use up all of its resources, and in return pushing it offline, or causing it to deny requests from legitimate users trying to access it. 

Buffer Overflow (BoF) – A buffer overflow happens when a program attempts to store more data into a buffer, or a data storage area, then it was meant to hold. Because the buffer was only meant to hold a certain amount of data, the extra information overflows into other buffers causing them to be overwritten with malicious code created by the hacker. Once this code is executed, the hacker can receive full control of the server.

If you search the Milw0rm exploit database, you will see that in many exploit titles it reads local exploit or remote exploit. Below are their definitions:

Local Exploit – To run a local exploit, you must first have access and privileges on the machine. Local exploits are usually used to escalate ones privileges to admin or root. In other words, it allows an ordinary user to gain root privileges.

Remote Exploit – A remote exploit is pretty much the same thing as a local exploit except that it isn’t run locally, but launched from anywhere across the internet.

A hacker usually has to use a combination of both remote and local exploits to gain full control of a system. For example, the hacker may have been able to gain regular privileges with a remote exploit attack, and then be able to escalate to root privileges with the help of a local exploit.

Monday, 23 July 2012

Network Hacking (Banner Grabbing)

Banner Grabbing

Now that the hacker has a full list of services running on the target system, to be able to exploit them, he has to first figure out what software and version the service is. One way the hacker can get this information, is to telnet into service port. In the example below, we will use command prompt on Windows (Start -> Run -> Type “cmd” -> Enter). If you are on a Mac, you will be using the terminal. Note: If you are using Windows Vista, then telnet is not installed by default. You can install it by doing the following simple steps.

o Click Start then select Control Panel.
o Select Programs and Features.
o Select Turn Windows features on or off.
o Select the Telnet Client option and click OK.
o A box will appear to confirm installation. The telnet command should now be installed.

1. First, the hacker would choose one of the open ports that were revealed in the Nmap scan to continue with and attempt to exploit. Let’s say that when the hacker scanned his target, he found the port 21 open. As you can see on the chart above, port 21 is FTP. To find out what FTP software is running he would use telnet by running the command:
telnet www.targetsite.com 21

As you can see above, I ran this against my computer (localhost). So a hacker would insert a target URL in place of localhost.

2. Next, it would connect to the target and display a banner telling the hacker the software and its version as shown below. This is the information the hacker needs to continue and begin searching for vulnerabilities for the software discovered.


If the above method doesn’t work for you, then simply use Nmap’s full version detection option to get the information.

Sunday, 22 July 2012

Network Hacking (Port Scanning)

Port Scanning

The point of port scanning a server is to detect its open ports the port’s listening services. Once a hacker knows all the services running on your server, he could search for possible vulnerabilities they may have and exploit them to take control of your website. In the port scanning example we will use the most popular port scanner: Nmap. The Nmap Security Scanner is available for both Mac and Windows users: Here. The example will be shown using the Nmap GUI (Graphical User Interface). Otherwise known as Zenmap.

1. First the hacker would choose a target and place it in the target box. As you can see the “Command:” section gets updated as well. This is what the command would look like if you were running the CLI version. 

2. Next the hacker would choose the “Profile:”, or in other words, the scan type. A smart hacker would go with a quick and quiet scan. Full version detection scans are very loud and could raise suspicion on the other end. Stay away from those options because as you will see later on, there are other ways to get that information.

3. A sample scan result may look like the following:

4. As you can see it found a few open ports and listed the services that are run on them. Below I have a list of some of the most popular ports/services on the internet.

20 FTP data (File Transfer Protocol)
21 FTP (File Transfer Protocol)
22 SSH (Secure Shell)
23 Telnet
25 SMTP (Send Mail Transfer Protocol)
43 whois
53 DNS (Domain Name Service)
68 DHCP (Dynamic Host Control Protocol)
80 HTTP (HyperText Transfer Protocol)
110 POP3 (Post Office Protocol, version 3)
137 NetBIOS-ns 138 NetBIOS-dgm
139 NetBIOS
143 IMAP (Internet Message Access Protocol)
161 SNMP (Simple Network Management Protocol)
194 IRC (Internet Relay Chat)
220 IMAP3 (Internet Message Access Protocol 3)
443 SSL (Secure Socket Layer)
445 SMB (NetBIOS over TCP)
1352 Lotus Notes
1433 Microsoft SQL Server
1521 Oracle SQL
2049 NFS (Network File System)
3306 MYSQL
4000 ICQ
5800 VNC
5900 VNC
8080 HTTP

5. Along with finding out what ports are running, the hacker needs to also find out what operating system the server is running. There are always a lot of operating system vulnerabilities out there to choose from. So by knowing the operating system, the hacker’s chances of taking over the server go up.
As you can see, there is an option on Nmap to detect the operating system, but this scan is very loud and easily detected so it is better to avoid it if possible. A simple way to determine what the server is running is by getting a 404 error page. You can get there by going to a page that doesn’t exist. For example the hacker would put in “www.targetsite.com/asdlfjasl.php” this page will most likely not exist and bring him to the 404 page. On most sites the 404 error page displays the server operating system along with its version. Many sites nowadays don’t display this by putting up custom 404 pages so this may not always work.

6. If you are planning on using the CLI version of Nmap, or want a more in depth look at all the commands take a look at the Nmap manual: Here

7. Now that the hacker has got all the running services and open ports on the targets system, he will now have to find out what versions the server is running. This is where “Banner Grabbing ” comes in.

Twitter Delicious Facebook Digg Stumbleupon Favorites More