Welcome everybody, Pliz use the chat bar to communicate with us directly and chat with your friends. Keep in touch with us. Thank you
Showing posts with label TIPS and TRICKS. Show all posts
Showing posts with label TIPS and TRICKS. Show all posts

Saturday, 1 September 2012

How to hack into broadband adsl modem router and get the broadband user id and password


Don’t  be excited now I am gonna show you a important topic......thats you can hack ASDL Router or Broadband. If you have any extra creativity than sure you can find many way to hack your broadband or internet .}{}{ 



First connect to your broadband, and goto
 http://whatismyip.com to know your public IP Address.




Now you need Port Scanner software, here I used a free one from RadMIN.You may download angry ipscanner for this work.Open Port Scanner after install and type your IP Range like following figure and set port range from 80 to 81.


Hit Scan button as soon as you finish above steps.



After finish scanning you have to look for the alive IP Addresses those have port 80 opened like following figure.


Here I have found IP Address with port 80 opened. No you have to open that IP Address from internet Explorer like following figure




If everything went fine, It will ask you for user id and password, and out of 10 ADSL Router, at least 6 having default password, coz no one bother to change that default password L .


So, give it a try with following ID and Pass:

ID : admin / Pass : admin (most common)
ID : admin / Pass : admin123
ID : admin / Pass : admin321
ID : root / Pass : root
ID : root / Pass : admin
ID : admin / Pass : root

Wow!! I have got the access⦠Now I can do whatever I want. But I don't want to do anything


You can access any settings on the ADSL Router.





Now you need an Asterisk Key recovery tool to get the broadband user ID and Password. 


Here password recovered successfully in a second. 


Want to get more this type of post then saty connect with us......






How To GPRS Hack For Aircel Sim & 3G Internet Trick on 2G Sim 2012



I  have been watching these type of post since I am using Internet.Tricks for getting 3G speed on 2G plan can be seen on every second Tips and Tricks site but they Don't Confirm that Trick will work or Not.
Initially it started When BSNL 2G sim was Downloading data at speed of a 3G Network but it was the fault of BSNL administration and technical problem, Which were resolved later by BSNL now we don't get 3G speed (1-10 Mbps) on Simple 2g sim of BSNL.The Pricing of 3G data plans are touching sky, so Common men like us are forced to use slow speed (10-20 KBPS) of 2G networks.

As I did it in my recent posts I searched over the Internet for most promising posts about the 3G hacks and Tricks.So I came Across two working Tricks on two different sites Which seems legit to me.
 

As You Know if you use Aircel Connection for Internet access Aircel has a 98 Rupees Plan for Unlimited Internet access and Downloading.

Check out these two Posts about latest working Hack and Trick for 3G Aircel Network.Basically it is Hacking 3G Network from a 2G sim it is Not Necessary that you have to buy a 3G sim You can use your Normal 2G sims Trick works fine on that.Try any of These and Tell us if you Find them useful.


First Trick :
Aircel is leading GPRS and internet service provider in india.Speed of Internet is very high because Providing internet access is aircel's special service.We are posting our first aircel gprs trick by which you can use free aircel 3G internet in your mobile.We have new working proxy by which you have to make new setting and get free internet access.

#Instruction to Use

Step 1: Make new setting

  • APN:aircelwap
  • PROXY:10.4.42.15
  • PORT:80
  • HOMEPAGE:Whatever you want

 Step 2: Save settings and get free gprs on mobile.you can use this trick on PC also.justconnect your mobile and try to use it.



Second Trick :

Step 1.Create New Gprs Settings In Your Mobile Phone
Step 2.Connection Name--Aircel Free Gprs
Step 3.APN (Access point name) : aircelgprs.com
Step 4.Use Proxy --Yes Enabled
Step 5.Proxy Address--192.168.35.201
Step 6.Proxy Port --80
Step 7.Homepage--www.google.com


After Creating The Setting Switch Off Mobile Phone And Restart Again Now Go Mobile's Browser And Enjoy Free 3G Aircel Gprs at zero cost 

If you like our trick please like us on facebook  

Tuesday, 21 August 2012

Why do you need to know your IP address



What is IP address ?

If you aren't sure what IP address is, IP (Internet Protocol) address is a unique address that identifies a computer or a device on the Internet. It contains 32 bits or 4 bytes (octets) and is written in four sets of decimal numbers separated by a period (or dot) in between. Each set of decimal numbers represents a byte (i.e. 8 bits) and can not exceed 255, that is when all the eight bits are 1 (or 11111111). Example of IP address: 202.60.80.1
An IP address is comparable to a telephone number that uniquely identifies an individual or a business on the telephone network.

The anatomy of IP address

Every computer or device on the Internet is part of a network (e.g. ISP, corporate, or home network). That's why IP address body (i.e. xxx.xxx.xxx.xxx where x is a decimal number) consists of network identity (ID) and host (i.e. node/device) ID. A subnet mask value which resembles an IP address is usually given along with an IP address to help identify which part of the address refers to network ID or host ID. Subnet is logical grouping of hosts in a network that functions to segregate traffic.
In a class A IP address, the first byte refers to network ID and the last three bytes refer to host ID. In a class B IP address, the first two bytes refer to network ID and the last two bytes refer to host ID. In class C IP address, the first three bytes refer to network ID and the last byte refers to host ID. Class A IP addresses are used by very big networks, class B by medium to large networks, while class C by small networks.

From
To
Default subnet mask
Class A
0.0.0.0
127.255.255.255
255.0.0.0
Class B
128.0.0.0
191.255.255.255
255.255.0.0
Class C
192.0.0.0
223.255.255.255
255.255.255.0

Example, if your computer IP address is 192.168.1.3 (a class C IP address), it must belong to a network (LAN) with this network address 192.168.1.0 and its host ID is 3.

What is my IP address?

A IP address is looks like * *.9 *.2 * 1.* 6 *     ( * means digit )
When your computer (be it a desktop PC, laptop/notebook, netbook, tablet, handheld/PDA, or smart phone) accesses the Internet, it has an IP address that is assigned to it by your ISP or a broadband router in your home or company network. IP address is different with MAC address. A MAC address or physical address was assigned to a device by its manufacturer and stays the same during its lifetime while IP address depends on the network or service provider through which your computer or device gets an Internet connection.
For example, if you use Windows XP, to check your IP address, do one of the following:
1) double-click your Internet connection icon on the taskbar and click the Details tab.
2) open the Command Prompt window and type this command : ipconfig or ipconfig /all. You can go to the Command Prompt through Start > All Programs > Accessories > Command Prompt. [To find Command Prompt in Windows Vista or Windows 7, just click Start button and type cmd in the search box and press Enter.]
3) go to Network Connections folder, click on your Internet connection name, and see your IP address on the Details pane on the bottom left of the folder. You can go to the Network Connections folder through Start > Connect To > Show all connections or through Control Panel. [In Windows Vista or Windows 7, right click a connection icon on the taskbar/system tray, select Network and Sharing Center. On the left pane, selectManage network connections to open Network Connections folder. Right click an active connection, select Status, and click Details.]

Dynamic IP address vs. static IP address

When your computer connects to your ISP, your ISP assigns an IP address to it. In the case of dial-up access over telephone line or broadband access (e.g. DSL or cable modem) using PPPoE/PPPoA that requires log-in, your computer will get a different IP address each time it connects to the ISP and makes an Internet connection through it. This address is called dynamic IP address. The IP address is assigned by a DHCPserver at your ISP. This this the most common case since every ISP has limited IP addresses stock. On the other hand, using an always-on broadband connection, your computer is usually given the same IP address all the time by the ISP. This address is called static IP address.
Dynamic IP address is assigned to your computer by a broadband router (or residential gateway) if your computer is on a LAN (home or office network) and accesses the Internet through a broadband router. But this address is for internal use only, it gets converted to a public IP address when communicating over the Internet. Dynamic IP address assignment is handled by a DHCP server at the router. The DHCP server can be set to reserve an IP address for a computer during a connection or change it periodically at a predefined interval. The router also handles the network address translation (NAT), i.e. converting private IP address assigned by the DHCP to a public IP address assigned by the ISP.
This is your IP address  or you may see your IP in the bottom-left side of our site. Thanks for reading this article ........

collect idea from : www.conniq.com

Monday, 20 August 2012

Lock your drive/pendrive without any software

Hello friends… many of us have to lock our folder for various purposes. For this, we use Universal shield, folder lock, folder guard etc many software. Moreover, we take help from various drive protector software to lock any drive. However, today, I am going to show you how to givepassword protection to any drive or pendrive even without any software. But you can apply this trick only on windows vista andwindows seven. I am showing that, how to apply password on windows seven: 

  • Connect your penvrive. ( in case of giving password on pendrive)
  • Right click on that drive, in which drive you want to give password. Then select the option, turn on bitlocker like the following figure.



  • After selecting the bitlocker, you will see like the following image.
  • Now follow the procedures, what is shown in the following figures.
              
              
              
  • Then the following figure will appear.
  • After the encryption is complete, the following figure will appear. Click on close button.
  • Your drive/pendrive is locked now. Whenever you want to connect to your locked drive, you will see a page like the following figure.
You would have to give password on that box. Otherwise, it will fail to unlock.

Saturday, 18 August 2012

Hacking Facebook through Social Engineering



One the way to hack Facebook is Social Engineering, but the question asked by nearly all the people who are new to hacking scene is that "What is social Engineering and how to hack a (Facebook) account by it?"
So i decided to write this article to explain what it is and give a real life example of my own.

First lets see what Wikipedia have to say:

"Social engineering is commonly understood to mean the art of manipulating people into performing actions or divulging confidential information."


According to Hacker's Jargon Dictionary:
"Social Engineering: n. Term used among crackers and samurai for cracking

techniques that rely on weaknesses in  wetware rather than software; the aim
is to trick people into revealing passwords or other information that
compromises a target  system's security.  Classic scams include phoning up a
mark who has  the required information and posing as a field service tech or a
fellow employee with an urgent access problem. "
So actually if you trick some one to give you the confidential information he is  manipulated by you. So now its clear that our beloved Phishing is also a kind of social manipulation. This might give you the size of it!

Lets get started:


So Phishing is a way to hack and its social engineering, but what are the other ways? Well apart from this you could trick the other person to give you his password. I know this might be really difficult but once you have mastered you could really make your name. Because the most wanted hacker of all times Kevin Mithnik actually used Social manipulation to hack though he himself couldn't write his own exploit!


An easy way is to guess the password from the information given, normally people use following things as their password:


  • Date of birth
  • Surname
  • Phone Number
  • School's name
  • Girl Friend's name :)
  • Favourite Movie
  • Favourite Band
  • Favourite Hero/Heroine 
  • Favourite Fruit! (I used one when I was young!)
These are only some, but if you know the other person very well these might work!

Another idea is to manipulate the other person in giving you the Answer to their security Question! This is what I am going to cover in Real Life Example! 

"THE MAIN TRICK IS TO EXPLOIT THE TRUST BASE TO HACK!"



So it means you should exploit the trust that victim have in you to get the information, the trust could be of a friend, colleague or official (If you are pretending to be a Facebook guy who need their password).


REAL LIFE EXAMPLE:


Some months back my best friend challenged me to hack his Facebook account, unfortunately he was a reader of my blog and knew all the ways like Phishing or Keylogging. So I couldn't hack him for much time every time i tried i failed. So I though of social engineering.
What I did first was to got the primary Email Address of Facebook, I got that easily by Visiting his Profile page. The email was in Hotmail!


So I opened the Hotmail password reset page > https://account.live.com/password/reset and gave his email this gave me the following page:



Here the security Question was " Name of Best Friend from Childhood?", it seemed pretty easy so started entering the name of all his friends but to my amazement the name was someone's whom i didn't knew.

So I went to the Chat and manipulated him. Following is some text from chat:
====================================================
Me: Hello, how are you/
He: Fine. whatsup!
Me: Nothing, just getting ready for your party.
He: Ohh great, it is going to be fun!
Me: Yah i know, who else is comming?
He: Only you and [He named some which were not the answer]
Me: Hey havent you called you old friends? I wanted to meet them.
He: Nupp!!!
Me: Are in contact with them, BTW who is your best friend apart from our group?
He : Ohh my best friend apart form you people is Arslan.
Me: ohh great looking forward to the party! bye.
====================================================


So those people who don't know ARSLAN is a name and to my Good Luck it was also the password! So I hacked his email and from their I hacked his Facebook account,


Don't worry no harm was done I just showed him that i did it and returned him the account because it is unethical to hack people to harm them. Real Hackers don't do this and I for my self only hack my dearest friends (who don't mind) for fun that all for me!
So from this example you people might have learn that how easy it is to hack through Social Engineering. But ALAS! the success rate is very low, but still where nothing 
works this works!



Friday, 10 August 2012

How to Choose a Perfect Mouse



Size and Ergonomics

Undoubtedly the most important factor in choosing a mouse is how it feels. If you  have a good mouse that works with you can still make a huge difference. For the most part, this involves two things: size and grip. Size is mostly personal preference (plus how portable you want your mouse to be), but certain mice are better for certain types of grips. The three main grips are:


Palm Grip: With this style of a grip, you lay your entire hand on the mouse, using your palm to move the mouse around. You'll feel this most in your wrist and forearm. It's faster than the other grips, albeit less precise, so not always the best for gamers that require very precise movements. It's also the more comfortable of the two, so if you have RSI problems, you're probably better off with a mouse that encourages this type of grip. Usually these mice have a bigger bump on the back end for your palm to rest. Examples include the Razer Lachesis and the Microsoft IntelliMouse Explorer.


Claw Grip: The claw grip gets its name from the way your hand looks when you hold the mouse—your palm may still rest on the back, but your top fingers are arched in a claw-like fashion, and you may use your thumb, ring finger, and pinky to give you a bit more control over the mouse. It's more precise than the palm grip, but can be a bit more straining too. These mice are usually longer and have lipped edges, so you can pick the mouse up and move it. This is kind of in between the palm and fingertip grip, though, so you can use a ton of different mice with it, depending on where you fall in the spectrum. The Razer DeathAdder and Logitech G9x are popular gaming mice for this grip, while the Logitech Performance Mouse MX (my personal mouse of choice) is great for regular PC users.

Fingertip Grip: This is the complete opposite end of the spectrum of the palm grip. With this, your palm doesn't rest on the end at all, you control the mouse entirely with your fingertips. This is the most precise of all the grips, but can also be the most taxing. Many people find it also has the steepest learning curve (since the palm grip is what most people use naturally), so if you have issues with RSI, you might want to avoid this grip. These mice tend to be smaller and flatter, like the Razer Abyssus or the Logitech Marathon Mouse M705.
The above images are from Razer's mouse ergonomics guide, which I recommend checking out. It's mainly written for gamers, but can apply to anyone. I also recommend checking out NCIX Tech Tips' guide to mouse ergonomics if you want more information on figuring out your grip and what mice are good for it. Note also that the mice listed above are just guidelines. Everyone's hands are different, and you probably use a combination of the above grips, or lie somewhere in between. The size of your hands can also influence which types of mice work with which types of grips. If you have smaller than average hands, for example, don't be afraid to venture outside the above recommendations to see if your claw grip works with a mouse designed for a palm grip. The best advice I can give is go to the store and try them out—these aren't the kinds of things you can tell when ordering a mouse online.


Wired vs. Wireless
One of the other big deciding factors in your mouse decision is going to be whether you want a wireless mouse or one with a cable attached. In general, wireless mice tend to be more convenient, since the cable can't catch on your desk or get in the way. However, wireless mice can also carry some lag (usually about 8ms), which can feel like an hour if you're in the middle of an intense gaming session. Furthermore, they can sometimes interfere with other wireless devices in your home, like a wireless G router, or 2.4 GHz cordless phones. Wireless mice also require batteries, which can be a pain if you forget to charge them or pick up some AAs at the store.
Also keep in mind that if you're going to go wireless, you have a few different choices—namely Bluetooth and RF. RF mice are usually a bit more responsive and have a longer range, but they require a USB receiver, so they'll still take up a USB port on your machine. They're also more likely to interfere with other wireless devices, as I mentioned before. Bluetooth mice are a bit rarer, but will pair with many computers on their own (if your computer has Bluetooth built-in). Finding a good Bluetooth mouse can be hard, since RF is much more common—so unless you're really short on USB ports, I wouldn't recommend being too picky about Bluetooth versus RF.


Extra Buttons
Extra buttons aren't just for gamers anymore, folks. You can map your spare buttons to any function, like back and forward in your browse, or to a function like Mac OS X's Exposé. Some Logitech mice even have an awesome "fast scroll" button that'll make your scroll wheel move fast, smoothly, and with momentum, which is great for scrolling through long pages quickly. I wouldn't base my entire decision on how many buttons a mouse has, but getting something with a few extra buttons on the side can be really nice for those features you use extra often. Have to copy and paste a lot of text in your day? Map those to some of your extra buttons. Switch between a ton of virtual desktops to manage your windows? The arrow buttons on the side of many Logitech mice are perfect for that. You're only limited by your imagination with this, so think of the more painstaking keyboard shortcuts you use and map them right to your mouse buttons. You'd be surprised how much of a difference it can make.


Sensitivity
I briefly mentioned this above, but if you're doing something that requires precise movements—like gaming or image editing—make sure you get a mouse that has relatively high sensitivity. Your mouse's sensitivity determines how small of a movement you need to make for your cursor to move. Perhaps you've noticed that with some mice, your cursor will get "stuck" if you move your mouse to slightly, and you have to jerk it out of place. High sensitivity mice don't have this problem, since slighter movements yield small movements in your cursor.
Sensitivity is calculated in dots per inch (DPI). Most medium- to high-end mice come with high sensitivities, usually 1200 DPI or higher, which should be more than enough. Just make sure that you aren't getting a cheap 400 DPI mouse if you're doing precision-oriented tasks. Some mice even have buttons on them that let you switch between different sensitivities without opening up their control panel, which is great if you want to quickly switch to a high sensitivity for image editing or gaming, then switch back when you go to do normal work.

What We Use
While we encourage you to do your own research and shopping, here are a few of the Lifehacker staff's favorite mice to get you started:
  • At least four of us use the Logitech Performance Mouse MX (formerly known as the MX Revolution), and we're all in love with it. It perfectly contours to your hand, has a few extra buttons that you can remap to whatever you want, and has the amazing momentum scrolling feature I mentioned earlier. While it's designed for more of a palm or claw grip, it'll really work with any grip you want, in my experience. This is a great place to start if you're looking for a good wireless mouse (though it isn't exactly portable, as it's huge).
  • On the other end of the spectrum is the Microsoft Wireless Mouse 5000, which is Dachis' favorite external mouse (he's usually a trackpad kind of guy). It's simple, inexpensive, wireless, and portable enough to carry around with you.
  • For gaming, Jason is currently digging the Razer Naga, who's main draw is a big panel of twelve—count them—thumb buttons. It's designed for massively multiplayer games like World of Warcraft, but you can map them to functions in any game you want (or even on the desktop, if you're the adventurous type).
Don't forget, comfort and health will come first. You possibly spend lots of time sitting your desk with these peripherals, and the more unlikely you are to formulate strain injuries, the better—the rest is definitely a subject of benefit.
So be careful about this ........and keep connect with us<~~~~~~~~~~~~~~







Related Posts Plugin for WordPress, Blogger...

 
Design by Free WordPress Themes | Bloggerized by Lasantha - Premium Blogger Themes | Blogger Templates