Showing posts with label Information. Show all posts
Showing posts with label Information. Show all posts

Sunday, February 10, 2008

{lists}Fingerprinting and Server ID tools

Filename Filesize
p0f 2 README.txt 46.95 KB
p0f-1.8.3.exe 31.41 KB
p0f-1.8.3.tgz 29.04 KB
p0f-2.0.1.tgz 51.86 KB
p0f-2.0.2.tgz 72.78 KB
p0f-2.0.3.tgz 116.61 KB
p0f-2.0.4-win32-binary.zip 57.50 KB
p0f-2.0.4.tgz 123.91 KB
p0f-2.0.5.tgz 126.96 KB
p0f-2.0.6.tgz 128.58 KB
p0f-2.0.7.tgz 129.95 KB
p0f-2.0.8.tgz 133.67 KB
p0f-devel.tgz 133.67 KB
p0f-latest.tgz 133.67 KB
p0f-v2.0.8.tgz 133.67 KB
p0f.fp.websigs.v0.4.1.txt 153.06 KB
RemOS - OS Detection Tool by Newbieslair.rar 146.62 KB
SafeWeb Traffic Fingerprint Generator and Comparer (PERL).zip 2.09 KB
SafeWeb_Traffic_Fingerprint_Generator.pl 4.40 KB
sec_cloak–Anti-OS-Fingerprinting.rar 9.97 KB
SinFP-2.04-1.tar.gz 2.67 MB
THCoraver v0.1 - Oracle Version Fingerprinter.zip 6.13 KB

Enjoy !!!

{Lists} File Analysers

Filename Filesize
afiinst.zip 111.63 KB
an136.zip 21.75 KB
chkexe.zip 72.02 KB
es321.zip 65.40 KB
exei17xb.zip 26.43 KB
fa.zip 36.68 KB
fa16.zip 135.37 KB
fi240.zip 117.66 KB
fi243.zip 135.35 KB
fi245.zip 134.95 KB
fi249a.zip 155.76 KB
File Analyzer v1.6.01.09.2000.zip 135.37 KB
File Scanner v01.08.2002.zip 223.77 KB
File Viewer v1.0 (VB Source).zip 2.17 KB
FileAlyzer v1.4.0.0.rar 1.79 MB
filespy.zip 48.06 KB
fi_xmas.zip 132.55 KB
gt.zip 168.05 KB
gt2000.zip 151.14 KB
gtui.zip 16.89 KB
gtw.zip 176.67 KB
iexe132b.zip 27.63 KB
Lame PE Analyzer v1.02.zip 7.17 KB
language.zip 217.58 KB
mscic650.zip 42.20 KB
pe-scan14a.zip 58.21 KB
peace100.zip 41.80 KB
peid07b.zip 96.02 KB
pesnif10.zip 133.10 KB
pew110.zip 69.94 KB
Protection ID v5.1e.rar 100.07 KB
RDG_Packer_Detector_v0.6.5_Beta.rar 1.04 MB
RDG_Signaturas_Actualizables_12_de_marzo_del_2007.rar 35.15 KB
scanexec.zip 70.81 KB
typ_d32.zip 308.58 KB
typ_dos.zip 298.08 KB
unpack21.zip 465.65 KB
unpack22.zip 870.48 KB
whats203.zip 72.32 KB

Enjoy !!
Comment if you like them !!!

{List}Cryptography and Stegano Tools


Filename Filesize
2c2.tgz 13.26 KB
2Mosaic_0_2_2.zip 75.23 KB
4c-0001.tgz 42.53 KB
A.R.C.S. Algorithm.tar.gz 6.63 KB
A.R.C.S. for Windows.rar 33.09 KB
Atanator_Cypher.pl 2.86 KB
base64-1.3.tar.gz 173.10 KB
base64.zip 14.78 KB
BitCrypt v4.1.3.280.zip 1.09 MB
Block Ciphers and Cryptanalysis by Fauzan Mirza.pdf 241.10 KB
Camouflage v1.0 including Source Code - Hide your files in MP3 files.zip 236.45 KB
ClipRot (clipboard utility with ROT13).zip 17.68 KB
Cotse’s ctunnel.zip 2.04 MB
Cracking DES.zip 172.37 KB
Crypt CD v3.3 Full.zip 511.44 KB
CrypText.exe 201.00 KB
Crypto Glossary - May-6-2006.pdf 3.66 MB
Cryptography - GPG Crypto From Gnu Manual.pdf 199.59 KB
Cryptography - Handbook Of Applied Cryptography.pdf 11.72 MB
Cryptography - High-Speed RSA Implementation.pdf 497.64 KB
Cryptography - Informationstheorie Codierung und Kryptographie.pdf 1.09 MB
Cryptography - Intro To Cryptography.pdf 1.14 MB
Cryptography - Key Agreement and Key Transport Using Elliptic Curve Cryptography.pdf 820.77 KB
Cryptography - Kryptologie - Eine Einfuhrung.pdf 1.08 MB
Cryptography -Encryption Technologies for Communications Designers.pdf 8.36 MB
Cryptography - Number Theory An Related Alghoritm In Cryptography.pdf 250.06 KB
Cryptography - Practical Cryptography.pdf 614.23 KB
Cryptography - RAS Suggestion to Random Number Generation in Software.pdf 262.36 KB
Cryptography - Rechtsfragen der Kryptographie und der digitalen Signatur.pdf 120.38 KB
Cryptography - Report Advanced Cryptography Standard AES.pdf 383.41 KB
Cryptography - RSA Encryption Algorithm in a Nut Shell.pdf 392.22 KB
Cryptography - RSA Hardware Implementation.pdf 279.13 KB
Cryptography - RSA Labs FAQ 4.0.pdf 1.17 MB
Cryptography - tecCHANNEL - Kryptographie Grundlagen.pdf 233.08 KB
Cryptography - Theory And Practice.pdf 16.82 MB
Cryptography - Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems.pdf 206.71 KB
Cryptography - Twenty Years of Attacks on the RSA Cryptosystem.pdf 303.41 KB
Cryptography, C - Applied Cryptography 2nd Edition Protocols, Algorthms, And Source Code In C.pdf 2.77 MB
Cryptography, Java - Introduction To Cryptography With Java Applets.pdf 9.69 MB
Cryptography, Java - Java Cryptography.pdf 1.47 MB
CryptoSuite v1.100 Full.rar 2.27 MB
CypherGuard v3.2 Build 234 for Windows with SERIAL.rar 2.69 MB
dcsmd5.zip 23.52 KB
Digital Invisible Ink Toolkit - diit-1.5.jar 343.56 KB
diit-1.5-source.jar 176.78 KB
Douglass Stinson - Cryptography - Theory and Practice.pdf 16.83 MB
encrypt.js 38.21 KB
enigmail-0.92.0-tb-win32.xpi 289.95 KB
enigmail-de-0.9x [German Language Pack].xpi 27.36 KB
Federal Information Processing Standard 197 (FIPS-197).pdf 272.91 KB
Freenet v0.5.2.8 - Web Install.exe 116.22 KB
GHOST RC6 cryptor v1.01 incl SFX.zip 95.06 KB
GnuPG v1.4.2 - Win32 Client.exe 1.39 MB
Handbook of Applied Cryptography chap1.pdf 335.01 KB
Handbook of Applied Cryptography chap10.pdf 309.25 KB
Handbook of Applied Cryptography chap11.pdf 514.50 KB
Handbook of Applied Cryptography chap12.pdf 391.10 KB
Handbook of Applied Cryptography chap13.pdf 332.48 KB
Handbook of Applied Cryptography chap14.pdf 362.42 KB
Handbook of Applied Cryptography chap15.pdf 207.96 KB
Handbook of Applied Cryptography chap2.pdf 294.34 KB
Handbook of Applied Cryptography chap3.pdf 387.71 KB
Handbook of Applied Cryptography chap4.pdf 323.54 KB
Handbook of Applied Cryptography chap5.pdf 201.27 KB
Handbook of Applied Cryptography chap6.pdf 267.85 KB
Handbook of Applied Cryptography chap7.pdf 480.34 KB
Handbook of Applied Cryptography chap8.pdf 296.38 KB
Handbook of Applied Cryptography chap9.pdf 470.70 KB
Handbook of Applied Cryptography Sources.rar 2.56 MB
Hide Secret Files v1.02 Full and Serial Regged-ARN.rar 800.87 KB
JavaScrypt Encryption and Decryption.mht 82.98 KB
JavaScrypt Tutorial.mht 27.20 KB
JavaScrypt.zip 333.24 KB
JPHS for Windows - Hide a Data file in a JPEG file.zip 383.73 KB
Learning Cryptography through handcyphers - Shaping a digital future with ancient wisdom.wmv 52.54 MB
LetterDrop v2.01.zip 457.42 KB
Making a Faster Cryptanalytic Time-Memory Trade-Off by Philippe Oechslin.pdf 236.93 KB
Masker v7.0.6 Full.rar 2.68 MB
MD5 GUI 99g.zip 100.19 KB
Md5 Yapici.rar 152.47 KB
md5.zip 66.96 KB
md5sum.exe 27.50 KB
moomoo Encode - Decode C Sources.rar 8.82 KB
MP3Stego_1_1_18.zip 770.82 KB
NATO Phonetic Alphabet.mht 8.12 KB
openssl-0.9.8.tar.gz 3.11 MB
Pass Phrase Generator.mht 244.38 KB
Password Crypt v1.0.exe 1.95 MB
PGP Desktop Enterprise v9.0.2 Full.rar 15.15 MB
PGP Stealth v2.01.zip 54.71 KB
PGP Stealth v2.01b.tar.gz 49.33 KB
PGP Universal Server 200 v2.0 GPL Source.tar.tar 7.14 MB
PGP v6.5.8 for Win95-98-NT-2000.rar 7.51 MB
PGPfone v2.1-win.zip 1.03 MB
PGPfone v2.1-win.zip.sig 66 B
Pretty Good Privacy v2.6.2i.zip 272.78 KB
PrivateShell v2.0.1.1731 Full.rar 3.31 MB
qprint-1.0.tar.gz 243.04 KB
qprint.zip 16.69 KB
Routing in The Dark -Scalable Searches in Dark P2P Networks by Clarke & Sandberg (The Freenet Project).pdf 861.96 KB
RSA Algorithm - Python Source.rar 1.95 KB
SaltGrinder v1.0 Preview - Filter for DES Crypted Passfiles.zip 149.63 KB
SCrypt v0.25.3.rar 268.06 KB
SecureFX v2.1.8 Build 140 with PATCH.rar 2.73 MB
Seguro v3.3 - Encrypt and Protect Apps.rar 484.63 KB
SSH Client v5.2 Build 11 F-Secure Full with Serial.rar 5.48 MB
SSH SecureCRT v3.0b1 win9xnt.rar 1.66 MB
SSH SecureCRT v4.09 Build 460 with PATCH.rar 2.97 MB
Steganos Safe v7.1 Full and KeyGen by DIGERATI.tar 8.69 MB
Steghide - manual.pdf 45.85 KB
Steghide - spanish manual.pdf 47.71 KB
Steghide Dependencies List.pdf 35.51 KB
steghide-0.5.1-1.i386.rpm 185.79 KB
steghide-0.5.1-1.src.rpm 466.73 KB
steghide-0.5.1-win32.zip 1.73 MB
steghide-0.5.1.tar.bz2 383.56 KB
steghide-0.5.1.tar.gz 464.97 KB
steghide-0.5.1.zip 662.10 KB
Stego! Text Steganography.mht 483.61 KB
Steve’s RHCE Study Guide stunnel.txt 2.55 KB
StirMarkBenchmark_4_0_129.zip 3.16 MB
StirMarkBenchmark_manual.doc 383.00 KB
Stunnel Config Utility.zip 30.93 KB
Stunnel Server Certificate Generator.mht 37.45 KB
Stunnel v4.11.rar 1.06 MB
stunnel-4.15-installer.exe 549.40 KB
stunnel-4.15-installer.exe.asc 189 B
stunnel.pdf 151.87 KB
tcp-access.tar.gz 3.89 KB
Win32 OpenSSL ID.chm 29.71 KB
Win32 OpenSSL v0.9.8.exe 3.36 MB
WinCipher v3.1 German.zip 459.97 KB
Zero Emission Pad v2.0.zip 385.93 KB
Zero_Emission_Pad_v2.txt 1.29 KB

Enjoy !!!!

Comment if you like them !!!

Friday, February 8, 2008

Compiz Fusion

comipz_fusion.jpg


If you’re using a new Nvidia or ATI graphic card, you will most likely have to install a proprietary driver for it which you can do under System > Administration > Restricted Drivers Manager. If you are not sure, please try to get Compiz Fusion working without a proprietary driver first, and if it doesn’t work, install the proprietary driver for your graphic card using the Restricted Drivers Manager.



1)Open the Synaptic Package Manager (System > Administration > Synaptic Package Manager)


2)Use the Search function and search for compizconfig.


3)You should find the package compizconfig-settings-manager in the results. Click on it and select Mark for Installation.


4)Accept that package’s dependencies by clicking on Mark.


5)Afterwards, you should also select the packages emerald and gnome-compiz-manager for installation (you can use the Search fuction again to find them).


6) Accept that package’s dependencies by clicking on Mark


7)Next, click on the Apply button.


8)Confirm your selection by clicking on Apply again.


9)Afterwards, the packages are being downloaded and installed.


10)After all packages have been installed, you can close the Synaptic Package Manager.



Now :


Enabling Compiz Fusion



  • To make sure that Compiz Fusion is enabled, go to System > Preferences > Appearance.

  • In the Appearance Preferences window, go to the Visual Effects tab and make sure that Custom is selected. That’s it already. To configure Compiz Fusion, you can click on the Preferences button.



You can do the same by going to System > Preferences > Advanced Desktop Effects Settings.



  • In both cases the CompizConfig Settings Manager opens where you can define the behaviour of Compiz Fusion.


Keyboard Shortcuts



Here’s a list of the most common Compiz Fusion keyboard shortcuts:



  1. SUPER+SHIFT+DRAG LEFT MOUSE = draw fire

  2. SUPER+SHIFT+C = clear fire

  3. CTRL+ALT+DRAG LEFT MOUSE = rotate cube

  4. CTRL+ALT+LEFT ARROW = rotate cube


  5. CTRL+ALT+DOWN ARROW = flat desktop

  6. SHIFT+ALT+UP = initiate window picker

  7. CTRL+ALT+DOWN = unfold cube

  8. ALT+TAB = window switch

  9. SUPER+TAB = flip switcher or ring switcher, depending on which is enabled.


  10. ALT+F7 = initiate ‘move windows’

  11. SHIFT+F9 = water effect

  12. SHIFT+F10 = slow animations

  13. CTRL+ALT+D = show desktop

  14. For Grouping and Tabbing:


  15. SUPER+S = select single window

  16. SUPER+T = tab group

  17. SUPER+Left = change left tab

  18. SUPER+Right = change right tab

  19. SUPER+G = group windows


  20. SUPER+U = ungroup windows

  21. SUPER+R = remove group window

  22. SUPER+C = close group

  23. SUPER+X = ignore group

  24. Hold the SUPER button then select the windows you want to group and then hit SUPER+G.



The SUPER key is the Windows key on most keyboards.


Have Fun.


Enjoy (-:

Thursday, January 17, 2008

How Hackers Work

Introduction to How Hackers Work

Thanks to the media, the word "hacker" has gotten a bad reputation. The word summons up thoughts of malicious computer users finding new ways to harass people, defraud corporations, steal information and maybe even destroy the economy or start a war by infiltrating military computer systems. While there's no denying that there are hackers out there with bad intentions, they make up only a small percentage of the hacker community.



Hackers from around the world gather at camps to
practice their hobby and trade tips.


The term computer hacker first showed up in the mid-1960s. A hacker was a programmer -- someone who hacked out computer code. Hackers were visionaries who could see new ways to use computers, creating programs that no one else could conceive. They were the pioneers of the computer industry, building everything from small applications to operating systems. In this sense, people like Bill Gates, Steve Jobs and Steve Wozniak were all hackers -- they saw the potential of what computers could do and created ways to achieve that potential.

A unifying trait among these hackers was a strong sense of curiosity, sometimes bordering on obsession. These hackers prided themselves on not only their ability to create new programs, but also to learn how other programs and systems worked. When a program had a bug -- a section of bad code that prevented the program from working properly -- hackers would often create and distribute small sections of code called patches to fix the problem. Some managed to land a job that leveraged their skills, getting paid for what they'd happily do for free.

As computers evolved, computer engineers began to network individual machines together into a system. Soon, the term hacker had a new meaning -- a person using computers to explore a network to which he or she didn't belong. Usually hackers didn't have any malicious intent. They just wanted to know how computer networks worked and saw any barrier between them and that knowledge as a challenge.

In fact, that's still the case today. While there are plenty of stories about malicious hackers sabotaging computer systems, infiltrating networks and spreading computer viruses, most hackers are just curious -- they want to know all the intricacies of the computer world. Some use their knowledge to help corporations and governments construct better security measures. Others might use their skills for more unethical endeavors.

In this article, we'll explore common techniques hackers use to infiltrate systems. We'll examine hacker culture and the various kinds of hackers as well as learn about famous hackers, some of whom have run afoul of the law.

Hackers and Crackers
Many computer programmers insist that the word "hacker" applies only to law-abiding enthusiasts who help create programs and applications or improve computer security. Anyone using his or her skills maliciously isn't a hacker at all, but a cracker.
Crackers infiltrate systems and cause mischief, or worse. Unfortunately, most people outside the hacker community use the word as a negative term because they don't understand the distinction between hackers and crackers.



The Hacker Toolbox

The main resource hackers rely upon, apart from their own ingenuity, is computer code. While there is a large community of hackers on the Internet, only a relatively small number of hackers actually program code. Many hackers seek out and download code written by other people. There are thousands of different programs hackers use to explore computers and networks. These programs give hackers a lot of power over innocent users and organizations -- once a skilled hacker knows how a system works, he can design programs that exploit it.



The ILOVEYOU Computer Virus was a malicious program
that plagued computers worldwide and caused millions of dollars in damages.


Malicious hackers use programs to:

* Hack passwords:There are many ways to hack someone's password, from educated guesses to simple algorithms that generate combinations of letters, numbers and symbols. The trial and error method of hacking passwords is called a brute force attack,meaning the hacker tries to generate every possible combination to gain access. Another way to hack passwords is to use a dictionary attack, program that inserts common words into password fields.
*Infect a computer or system with a virus: Computer viruses are programs designed to duplicate themselves and cause problems ranging from crashing a computer to wiping out everything on a system's hard drive. A hacker might install a virus by infiltrating a system, but it's much more common for hackers to create simple viruses and send them out to potential victims via email, instant messages, Web sites with downloadable content or peer-to-peer networks.
* Log keystrokes: Some programs allow hackers to review every keystroke a computer user makes. Once installed on a victim's computer, the programs record each keystroke, giving the hacker everything he needs to infiltrate a system or even steal someone's identity.
Gain backdoor access: Similar to hacking passwords, some hackers create programs that search for unprotected pathways into network systems and computers. In the early days of the Internet, many computer systems had limited security, making it possible for a hacker to find a pathway into the system without a username or password. Another way a hacker might gain backdoor access is to infect a computer or system with a Trojan horse.
*Create zombie computers: A zombie computer, or bot, is a computer that a hacker can use to send spam or commit Distributed Denial of Service (DDoS) attacks. After a victim executes seemingly innocent code, a connection opens between his computer and the hacker's system. The hacker can secretly control the victim's computer, using it to commit crimes or spread spam.
*Spy on e-mail: Hackers have created code that lets them intercept and read e-mail messages -- the Internet's equivalent to wiretapping. Today, most e-mail programs use encryption formulas so complex that even if a hacker intercepts the message, he won't be able to read it.

Hacker Hierarchy
Psychologist Marc Rogers says there are several subgroups of hackers -- newbies, cyberpunks, coders and cyber terrorists. Newbies are hackers who have access to hacking tools but aren't really aware of how computers and programs work. Cyberpunks are savvier and are less likely to get caught than a newbie while hacking a system, but they have a tendency to boast about their accomplishments. Coders write the programs other hackers use to infiltrate and navigate computer systems. A cyber terrorist is a professional hacker who infiltrates systems for profit -- he might sabotage a company or raid a corporation's databases for proprietary information [source: Knittel and Soto]



Hackers Culture

Individually, many hackers are antisocial. Their intense interest in computers and programming can become a communication barrier. Left to his or her own devices, a hacker can spend hours working on a computer program while neglecting everything else.

Computer networks gave hackers a way to associate with other people with their same interests. Before the Internet became easily accessible, hackers would set up and visit bulletin board systems (BBS). A hacker could host a bulletin board system on his or her computer and let people dial into the system to send messages, share information, play games and download programs. As hackers found one another, information exchanges increased dramatically.

Some hackers posted their accomplishments on a BBS, boasting about infiltrating secure systems. Often they would upload a document from their victims' databases to prove their claims. By the early 1990s, law enforcement officials considered hackers an enormous security threat. There seemed to be hundreds of people who could hack into the world's most secure systems at will [source: Sterling].

There are many Web sites dedicated to hacking. The hacker journal "2600: The Hacker Quarterly" has its own site, complete with a live broadcast section dedicated to hacker topics. The print version is still available on newsstands. Web sites like Hacker.org promote learning and include puzzles and competitions for hackers to test their skills.

Super Phreak
Before computer hackers, curious and clever individuals found ways to manipulate the phone system in a phenomenon called phreaking. Through phreaking, these individuals found ways to make long distance calls for free or sometimes just played pranks on other telephone users.



When caught -- either by law enforcement or corporations -- some hackers admit that they could have caused massive problems. Most hackers don't want to cause trouble; instead, they hack into systems just because they wanted to know how the systems work. To a hacker, a secure system is like Mt. Everest -- he or she infiltrates it for the sheer challenge. In the United States, a hacker can get into trouble for just entering a system. The Computer Fraud and Abuse Act outlaws unauthorized access to computer systems [source: Hacking Laws].

Not all hackers try to explore forbidden computer systems. Some use their talents and knowledge to create better software and security measures. In fact, many hackers who once used their skills to break into systems now put that knowledge and ingenuity to use by creating more comprehensive security measures. In a way, the Internet is a battleground between different kinds of hackers -- the bad guys, or black hats, who try to infiltrate systems or spread viruses, and the good guys, or white hats, who bolster security systems and develop powerful virus protection software.



Hackers work together to create "mashups" of
Yahoo applications at Yahoo Hack Day 2006.


Hackers on both sides overwhelmingly support open source software, programs in which the source code is available for anyone to study, copy, distribute and modify. With open source software, hackers can learn from other hackers' experiences and help make programs work better than they did before. Programs might range from simple applications to complex operating systems like Linux.

There are several annual hacker events, most of which promote responsible behavior. A yearly convention in Las Vegas called DEFCON sees thousands of attendees gather to exchange programs, compete in contests, participate in panel discussions about hacking and computer development and generally promote the pursuit of satisfying curiosity. A similar event called the Chaos Communication Camp combines low-tech living arrangements -- most attendees stay in tents -- and high-tech conversation and activities.

Hackers and the Law

In general, most governments aren't too crazy about hackers. Hackers' ability to slip in and out of computers undetected, stealing classified information when it amuses them, is enough to give a government official a nightmare. Secret information, or intelligence, is incredibly important. Many government agents won't take the time to differentiate between a curious hacker who wants to test his skills on an advanced security system and a spy.

Laws reflect this attitude. In the United States, there are several laws forbidding the practice of hacking. Some, like 18 U.S.C. § 1029, concentrate on the creation, distribution and use of codes and devices that give hackers unauthorized access to computer systems. The language of the law only specifies using or creating such a device with the intent to defraud, so an accused hacker could argue he just used the devices to learn how security systems worked.



Concern about hackers reaches up to the highest levels of
government. Here, former Attorney General
Janet Reno testifies about hacker activity.

Another important law is 18 U.S.C. § 1030, part of which forbids unauthorized access to government computers. Even if a hacker just wants to get into the system, he or she could be breaking the law and be punished for accessing a nonpublic government computer [Source: U.S. Department of Justice].

Punishments range from hefty fines to jail time. Minor offenses may earn a hacker as little as six months' probation, while other offenses can result in a maximum sentence of 20 years in jail. One formula on the Department of Justice's Web page factors in the financial damage a hacker causes, added to the number of his victims to determine an appropriate punishment [Source: U.S. Department of Justice].

Other countries have similar laws, some much more vague than legislation in the U.S. A recent German law forbids possession of "hacker tools." Critics say that the law is too broad and that many legitimate applications fall under its vague definition of hacker tools. Some point out that under this legislation, companies would be breaking the law if they hired hackers to look for flaws in their security systems [source: IDG News Service].

Hackers can commit crimes in one country while sitting comfortably in front of their computers on the other side of the world. Therefore, prosecuting a hacker is a complicated process. Law enforcement officials have to petition countries to extradite suspects in order to hold a trial, and this process can take years. One famous case is the United States' indictment of hacker Gary McKinnon. Since 2002, McKinnon fought extradition charges to the U.S. for hacking into the Department of Defense and NASA computer systems. McKinnon, who hacked from the United Kingdom, defended himself by claiming that he merely pointed out flaws in important security systems. In April 2007, his battle against extradition came to an end when the British courts denied his appeal [Source: BBC News].

Hacking a Living
Hackers who obey the law can make a good living. Several companies hire hackers to test their security systems for flaws. Hackers can also make their fortunes by creating useful programs and applications, like Stanford University students Larry Page and Sergey Brin. Page and Brin worked together to create a search engine they eventually named Google. Today, they are tied for 26th place on Forbes' list of the world's most wealthy billionaires [source: Forbes].



Famous Hackers


Steve Jobs and Steve Wozniak, founders of Apple Computers, are both hackers. Some of their early exploits even resemble the questionable activities of some malicious hackers. However, both Jobs and Wozniak outgrew their malicious behavior and began concentrating on creating computer hardware and software. Their efforts helped usher in the age of the personal computer -- before Apple, computer systems remained the property of large corporations, too expensive and cumbersome for average consumers.



Steve Jobs, co-founder of
Apple and pioneer hacker


Linus Torvalds, creator of Linux, is another famous honest hacker. His open source operating system is very popular with other hackers. He has helped promote the concept of open source software, showing that when you open information up to everyone, you can reap amazing benefits.

Richard Stallman, also known as "rms," founded the GNU Project, a free operating system. He promotes the concept of free software and computer access. He works with organizations like the Free Software Foundation and opposes policies like Digital Rights Management.

On the other end of the spectrum are the black hats of the hacking world. At the age of 16, Jonathan James became the first juvenile hacker to get sent to prison. He committed computer intrusions on some very high-profile victims, including NASA and a Defense Threat Reduction Agency server. Online, Jonathan used the nickname (called a handle) "c0mrade." Originally sentenced to house arrest, James was sent to prison when he violated parole.



Hacker Kevin Mitnick, newly released from the Federal
Correctional Institution in Lompoc, California.


Kevin Mitnick gained notoriety in the 1980s as a hacker who allegedly broke into the North American Aerospace Defense Command (NORAD) when he was 17 years old. Mitnick's reputation seemed to grow with every retelling of his exploits, eventually leading to the rumor that Mitnick had made the FBI's Most Wanted list. In reality, Mitnick was arrested several times for hacking into secure systems, usually to gain access to powerful computer software.

Kevin Poulsen, or Dark Dante, specialized in hacking phone systems. He's famous for hacking the phones of a radio station called KIIS-FM. Poulsen's hack allowed only calls originating from his house to make it through to the station, allowing him to win in various radio contests. Since then, he has turned over a new leaf, and now he's famous for being a senior editor at Wired magazine.

Adrian Lamo hacked into computer systems using computers at libraries and Internet cafes. He would explore high-profile systems for security flaws, exploit the flaws to hack into the system, and then send a message to the corresponding company, letting them know about the security flaw. Unfortunately for Lamo, he was doing this on his own time rather than as a paid consultant -- his activities were illegal. He also snooped around a lot, reading sensitive information and giving himself access to confidential material. He was caught after breaking into the computer system belonging to the New York Times.

It's likely that there are thousands of hackers active online today, but an accurate count is impossible. Many hackers don't really know what they are doing -- they're just using dangerous tools they don't completely understand. Others know what they're doing so well that they can slip in and out of systems without anyone ever knowing.


(-:

Thursday, December 20, 2007

Find Orkut Files thru Google Now!!


Find Orkut Files thru Google Now... !!





Well here is one more update about orkut. Now you able to find profile from Google also. Seems Orkut doing really hard work in these days. Setting Under Privacy Settings.

ScreenShot:



Enjoy more Orkuting (-:


.

Saturday, December 8, 2007

Trojans and Ports V/s Command Prompt


Detect Trojan and Ports by Command Prompt... !!



Torjans are 1 of the most dangerous programs. They send server programs to ur computer and connect to your computer on being executed. And after that the hacker can control ur computer. Torjans like SUB 7 and OPTIX are 1 of the most powerful torjans, they can damage ur security more than any other regular torjan, they have built in keylogger and other deadly programs which records everything u do into different logs and then it email the logs back to the hackers.

Procedure to detect.


Although new torjans are created everyday and there a lot of anti-torjan programs which detect torjans on ur PC a siimple way to find out if a torjan or any program is trying to connect or has already connected from ur computer to the Internet is -

Start
Run -> type "cmd" or "command"
then MSDOS window pops up next you
-> type "Netstat -n"
after u type "netstat -n " and hit enter u will get the list of connections from ur computer to the internet. So u can check the ports I have given below , to find out if u have any torjans.


I know this method of torjan detecting is kind of old and not very accurate but still it can give newbies some Idea .


Here are some netstat tricks :-


* -a -- Displays all connections and listening ports.
* -e -- Displays Ethernet Statistics. This may be combined with the -s option.
* -n -- Displays addresses and port numbers in numerical form.
* -p proto -- Shows connections for the protocol specified by proto; proto may be TCP or UDP. If used with the -s option to display per-protocol statistics, proto may be TCP, UDP, or IP.
* -r -- Displays the routing table.
* -s -- Displays per-protocol statistics. By default, statistics are shown for TCP, UDP and IP; the -p option may be used to specify a subset of the default.
* interval -- Redisplays selected statistics, pausing interval seconds between each display. Press Ctrl+C to stop redisplaying statistics. If omitted, Netstat will print the current configuration information once.




Full Explanation of netstat commands give above



Netstat -a will show you all the open connections on your machine (-a is for all). It will also tell you which remote systems you are connected to, the local port number, the remote port number, and the protocol. When I type Netstat -a into my command prompt, I get a number of lines. Following is the actual text returned on one of these lines. The output is in bold, my comments are in parentheses:

TCP (the protocol, in this case, Transmission Control Protocol. The protocol can also be UDP, or User Datagram Protocol. In rare cases you will see Internet Protocol or IP) morgan:1528 (my username followed by my local port #) www.google.com:80 (a site I am connected to, followed by the port on the remote system) ESTABLISHED (is the state of my connection). Here is a list of common port assignments.

Netstat -an will show you all the information above, except in numeric (-n for numeric) form. This means that in the example above, you would get an IP address instead of "morgan" and "www.google.com." Both will still be followed by the port numbers. This is one way to get your own IP address, because your username from the first example is now replaced by your numeric IP address in the second. You can also use netstat to get the IP addresses of your friends on ICQ or AIM (AIM buddies will be on port :5190).

Netstat -p TCP or Netstat -p UDP will give you all the information in the above examples, isolated by protocol.

Netstat -e will tell you general information like bytes received and sent, discards and errors.

Netstat interval (in seconds, such as netstat 10 or netstat 20) This command will retabulate and redisplay netstat information each specified interval.

Three bonus netstat tips:


1. If you ever get bored of waiting for Netstat to finish what it's doing, hit Control + C to abort the operation and go back to the command prompt.
2. You can use netstat to see if you have a Trojan. Go here for a list of ports known Trojans attack. If one of these ports is open, you can bet you've got one on your system. Your anti-virus software should also tell you if you are infected, but sometimes it is nice to see the nuts and bolts of how your computer gets attacked.
3. Sometimes Netstat generates a lot of text, too much to see in the command window. Type 'netstat -an >c:\windows\desktop\log.txt' or any other directory you please. Netstat will create a file (in this case, log.txt on my desktop) and dump the output into it. Just open the file to see your results.






Some Ports Used by Torjans


1 (UDP) - Sockets des Troie
2 Death
20 Senna Spy FTP server
21 Back Construction, Blade Runner, Cattivik FTP Server, CC Invader, Dark FTP, Doly Trojan, Fore, Invisible FTP, Juggernaut 42, Larva, MotIv FTP, Net Administrator, Ramen, Senna Spy FTP server, The Flu, Traitor 21, WebEx, WinCrash
22 Shaft
23 Fire HacKer, Tiny Telnet Server - TTS, Truva Atl
25 Ajan, Antigen, Barok, Email Password Sender - EPS, EPS II, Gip, Gris, Happy99, Hpteam mail, Hybris, I love you, Kuang2, Magic Horse, MBT (Mail Bombing Trojan), Moscow Email trojan, Naebi, NewApt worm, ProMail trojan, Shtirlitz, Stealth, Tapiras, Terminator, WinPC, WinSpy
30 Agent 40421
31 Agent 31, Hackers Paradise, Masters Paradise
41 Deep Throat, Foreplay
48 DRAT
50 DRAT
58 DMSetup
59 DMSetup
79 CDK, Firehotcker
80 711 trojan (Seven Eleven), AckCmd, Back End, Back Orifice 2000 Plug-Ins, Cafeini, CGI Backdoor, Executor, God Message, God Message Creator, Hooker, IISworm, MTX, NCX, Reverse WWW Tunnel Backdoor, RingZero, Seeker, WAN Remote, Web Server CT, WebDownloader
81 RemoConChubo
99 Hidden Port, NCX
110 ProMail trojan
113 Invisible Identd Deamon, Kazimas
119 Happy99
121 Attack Bot, God Message, JammerKillah
123 Net Controller
133 Farnaz
137 Chode
137 (UDP) - Msinit
138 Chode
139 Chode, God Message worm, Msinit, Netlog, Network, Qaz
142 NetTaxi
146 Infector
146 (UDP) - Infector
170 A-trojan
334 Backage
411 Backage
420 Breach, Incognito
421 TCP Wrappers trojan
455 Fatal Connections
456 Hackers Paradise
513 Grlogin
514 RPC Backdoor
531 Net666, Rasmin
555 711 trojan (Seven Eleven), Ini-Killer, Net Administrator, Phase Zero, Phase-0, Stealth Spy
605 Secret Service
666 Attack FTP, Back Construction, BLA trojan, Cain & Abel, NokNok, Satans Back Door - SBD, ServU, Shadow Phyre, th3r1pp3rz (= Therippers)
667 SniperNet
669 DP trojan
692 GayOL
777 AimSpy, Undetected
808 WinHole
911 Dark Shadow
999 Deep Throat, Foreplay, WinSatan
1000 Der Späher / Der Spaeher, Direct Connection
1001 Der Späher / Der Spaeher, Le Guardien, Silencer, WebEx
1010 Doly Trojan
1011 Doly Trojan
1012 Doly Trojan
1015 Doly Trojan
1016 Doly Trojan
1020 Vampire
1024 Jade, Latinus, NetSpy
1025 Remote Storm
1025 (UDP) - Remote Storm
1035 Multidropper
1042 BLA trojan
1045 Rasmin
1049 /sbin/initd
1050 MiniCommand
1053 The Thief
1054 AckCmd
1080 WinHole
1081 WinHole
1082 WinHole
1083 WinHole
1090 Xtreme
1095 Remote Administration Tool - RAT
1097 Remote Administration Tool - RAT
1098 Remote Administration Tool - RAT
1099 Blood Fest Evolution, Remote Administration Tool - RAT
1150 Orion
1151 Orion
1170 Psyber Stream Server - PSS, Streaming Audio Server, Voice
1200 (UDP) - NoBackO
1201 (UDP) - NoBackO
1207 SoftWAR
1208 Infector
1212 Kaos
1234 SubSeven Java client, Ultors Trojan
1243 BackDoor-G, SubSeven, SubSeven Apocalypse, Tiles
1245 VooDoo Doll
1255 Scarab
1256 Project nEXT
1269 Matrix
1272 The Matrix
1313 NETrojan
1338 Millenium Worm
1349 Bo dll
1394 GoFriller, Backdoor G-1
1441 Remote Storm
1492 FTP99CMP
1524 Trinoo
1568 Remote Hack
1600 Direct Connection, Shivka-Burka
1703 Exploiter
1777 Scarab
1807 SpySender
1966 Fake FTP
1967 WM FTP Server
1969 OpC BO
1981 Bowl, Shockrave
1999 Back Door, SubSeven, TransScout
2000 Der Späher / Der Spaeher, Insane Network, Last 2000, Remote Explorer 2000, Senna Spy Trojan Generator
2001 Der Späher / Der Spaeher, Trojan Cow
2023 Ripper Pro
2080 WinHole
2115 Bugs
2130 (UDP) - Mini Backlash
2140 The Invasor
2140 (UDP) - Deep Throat, Foreplay
2155 Illusion Mailer
2255 Nirvana
2283 Hvl RAT
2300 Xplorer
2311 Studio 54
2330 Contact
2331 Contact
2332 Contact
2333 Contact
2334 Contact
2335 Contact
2336 Contact
2337 Contact
2338 Contact
2339 Contact, Voice Spy
2339 (UDP) - Voice Spy
2345 Doly Trojan
2565 Striker trojan
2583 WinCrash
2600 Digital RootBeer
2716 The Prayer
2773 SubSeven, SubSeven 2.1 Gold
2774 SubSeven, SubSeven 2.1 Gold
2801 Phineas Phucker
2989 (UDP) - Remote Administration Tool - RAT
3000 Remote Shut
3024 WinCrash
3031 Microspy
3128 Reverse WWW Tunnel Backdoor, RingZero
3129 Masters Paradise
3150 The Invasor
3150 (UDP) - Deep Throat, Foreplay, Mini Backlash
3456 Terror trojan
3459 Eclipse 2000, Sanctuary
3700 Portal of Doom
3777 PsychWard
3791 Total Solar Eclypse
3801 Total Solar Eclypse
4000 SkyDance
4092 WinCrash
4242 Virtual Hacking Machine - VHM
4321 BoBo
4444 Prosiak, Swift Remote
4567 File Nail
4590 ICQ Trojan
4950 ICQ Trogen (Lm)
5000 Back Door Setup, Blazer5, Bubbel, ICKiller, Ra1d, Sockets des Troie
5001 Back Door Setup, Sockets des Troie
5002 cd00r, Shaft
5010 Solo
5011 One of the Last Trojans - OOTLT, One of the Last Trojans - OOTLT, modified
5025 WM Remote KeyLogger
5031 Net Metropolitan
5032 Net Metropolitan
5321 Firehotcker
5333 Backage, NetDemon
5343 wCrat - WC Remote Administration Tool
5400 Back Construction, Blade Runner
5401 Back Construction, Blade Runner
5402 Back Construction, Blade Runner
5512 Illusion Mailer
5534 The Flu
5550 Xtcp
5555 ServeMe
5556 BO Facil
5557 BO Facil
5569 Robo-Hack
5637 PC Crasher
5638 PC Crasher
5742 WinCrash
5760 Portmap Remote Root Linux Exploit
5880 Y3K RAT
5882 Y3K RAT
5882 (UDP) - Y3K RAT
5888 Y3K RAT
5888 (UDP) - Y3K RAT
5889 Y3K RAT
6000 The Thing
6006 Bad Blood
6272 Secret Service
6400 The Thing
6661 TEMan, Weia-Meia
6666 Dark Connection Inside, NetBus worm
6667 Dark FTP, ScheduleAgent, SubSeven, Subseven 2.1.4 DefCon 8, Trinity, WinSatan
6669 Host Control, Vampire
6670 BackWeb Server, Deep Throat, Foreplay, WinNuke eXtreame
6711 BackDoor-G, SubSeven, VP Killer
6712 Funny trojan, SubSeven
6713 SubSeven
6723 Mstream
6771 Deep Throat, Foreplay
6776 2000 Cracks, BackDoor-G, SubSeven, VP Killer
6838 (UDP) - Mstream
6883 Delta Source DarkStar (??)
6912 Shit Heep
6939 Indoctrination
6969 GateCrasher, IRC 3, Net Controller, Priority
6970 GateCrasher
7000 Exploit Translation Server, Kazimas, Remote Grab, SubSeven, SubSeven 2.1 Gold
7001 Freak88, Freak2k
7215 SubSeven, SubSeven 2.1 Gold
7300 NetMonitor
7301 NetMonitor
7306 NetMonitor
7307 NetMonitor
7308 NetMonitor
7424 Host Control
7424 (UDP) - Host Control
7597 Qaz
7626 Glacier
7777 God Message, Tini
7789 Back Door Setup, ICKiller
7891 The ReVeNgEr
7983 Mstream
8080 Brown Orifice, RemoConChubo, Reverse WWW Tunnel Backdoor, RingZero
8787 Back Orifice 2000
8988 BacHack
8989 Rcon, Recon, Xcon
9000 Netministrator
9325 (UDP) - Mstream
9400 InCommand
9872 Portal of Doom
9873 Portal of Doom
9874 Portal of Doom
9875 Portal of Doom
9876 Cyber Attacker, Rux
9878 TransScout
9989 Ini-Killer
9999 The Prayer
10000 OpwinTRojan
10005 OpwinTRojan
10067 (UDP) - Portal of Doom
10085 Syphillis
10086 Syphillis
10100 Control Total, Gift trojan
10101 BrainSpy, Silencer
10167 (UDP) - Portal of Doom
10520 Acid Shivers
10528 Host Control
10607 Coma
10666 (UDP) - Ambush
11000 Senna Spy Trojan Generator
11050 Host Control
11051 Host Control
11223 Progenic trojan, Secret Agent
12076 Gjamer
12223 Hack´99 KeyLogger
12345 Ashley, cron / crontab, Fat Bitch trojan, GabanBus, icmp_client.c, icmp_pipe.c, Mypic, NetBus, NetBus Toy, NetBus worm, Pie Bill Gates, Whack Job, X-bill
12346 Fat Bitch trojan, GabanBus, NetBus, X-bill
12349 BioNet
12361 Whack-a-mole
12362 Whack-a-mole
12363 Whack-a-mole
12623 (UDP) - DUN Control
12624 ButtMan
12631 Whack Job
12754 Mstream
13000 Senna Spy Trojan Generator, Senna Spy Trojan Generator
13010 Hacker Brasil - HBR
13013 PsychWard
13014 PsychWard
13223 Hack´99 KeyLogger
13473 Chupacabra
14500 PC Invader
14501 PC Invader
14502 PC Invader
14503 PC Invader
15000 NetDemon
15092 Host Control
15104 Mstream
15382 SubZero
15858 CDK
16484 Mosucker
16660 Stacheldraht
16772 ICQ Revenge
16959 SubSeven, Subseven 2.1.4 DefCon 8
16969 Priority
17166 Mosaic
17300 Kuang2 the virus
17449 Kid Terror
17499 CrazzyNet
17500 CrazzyNet
17569 Infector
17593 Audiodoor
17777 Nephron
18753 (UDP) - Shaft
19864 ICQ Revenge
20000 Millenium
20001 Millenium, Millenium (Lm)
20002 AcidkoR
20005 Mosucker
20023 VP Killer
20034 NetBus 2.0 Pro, NetBus 2.0 Pro Hidden, NetRex, Whack Job
20203 Chupacabra
20331 BLA trojan
20432 Shaft
20433 (UDP) - Shaft
21544 GirlFriend, Kid Terror
21554 Exploiter, Kid Terror, Schwindler, Winsp00fer
22222 Donald Dick, Prosiak, Ruler, RUX The TIc.K
23005 NetTrash
23006 NetTrash
23023 Logged
23032 Amanda
23432 Asylum
23456 Evil FTP, Ugly FTP, Whack Job
23476 Donald Dick
23476 (UDP) - Donald Dick
23477 Donald Dick
23777 InetSpy
24000 Infector
25685 Moonpie
25686 Moonpie
25982 Moonpie
26274 (UDP) - Delta Source
26681 Voice Spy
27374 Bad Blood, Ramen, Seeker, SubSeven, SubSeven 2.1 Gold, Subseven 2.1.4 DefCon 8, SubSeven Muie, Ttfloader
27444 (UDP) - Trinoo
27573 SubSeven
27665 Trinoo
28678 Exploiter
29104 NetTrojan
29369 ovasOn
29891 The Unexplained
30000 Infector
30001 ErrOr32
30003 Lamers Death
30029 AOL trojan
30100 NetSphere
30101 NetSphere
30102 NetSphere
30103 NetSphere
30103 (UDP) - NetSphere
30133 NetSphere
30303 Sockets des Troie
30947 Intruse
30999 Kuang2
31335 Trinoo
31336 Bo Whack, Butt Funnel
31337 Back Fire, Back Orifice 1.20 patches, Back Orifice (Lm), Back Orifice russian, Baron Night, Beeone, BO client, BO Facil, BO spy, BO2, cron / crontab, Freak88, Freak2k, icmp_pipe.c, Sockdmini
31337 (UDP) - Back Orifice, Deep BO
31338 Back Orifice, Butt Funnel, NetSpy (DK)
31338 (UDP) - Deep BO
31339 NetSpy (DK)
31666 BOWhack
31785 Hack´a´Tack
31787 Hack´a´Tack
31788 Hack´a´Tack
31789 (UDP) - Hack´a´Tack
31790 Hack´a´Tack
31791 (UDP) - Hack´a´Tack
31792 Hack´a´Tack
32001 Donald Dick
32100 Peanut Brittle, Project nEXT
32418 Acid Battery
33270 Trinity
33333 Blakharaz, Prosiak
33577 Son of PsychWard
33777 Son of PsychWard
33911 Spirit 2000, Spirit 2001
34324 Big Gluck, TN
34444 Donald Dick
34555 (UDP) - Trinoo (for Windows)
35555 (UDP) - Trinoo (for Windows)
37237 Mantis
37651 Yet Another Trojan - YAT
40412 The Spy
40421 Agent 40421, Masters Paradise
40422 Masters Paradise
40423 Masters Paradise
40425 Masters Paradise
40426 Masters Paradise
41337 Storm
41666 Remote Boot Tool - RBT, Remote Boot Tool - RBT
44444 Prosiak
44575 Exploiter
47262 (UDP) - Delta Source
49301 OnLine KeyLogger
50130 Enterprise
50505 Sockets des Troie
50766 Fore, Schwindler
51966 Cafeini
52317 Acid Battery 2000
53001 Remote Windows Shutdown - RWS
54283 SubSeven, SubSeven 2.1 Gold
54320 Back Orifice 2000
54321 Back Orifice 2000, School Bus
55165 File Manager trojan, File Manager trojan, WM Trojan Generator
55166 WM Trojan Generator
57341 NetRaider
58339 Butt Funnel
60000 Deep Throat, Foreplay, Sockets des Troie
60001 Trinity
60068 Xzip 6000068
60411 Connection
61348 Bunker-Hill
61466 TeleCommando
61603 Bunker-Hill
63485 Bunker-Hill
64101 Taskman
65000 Devil, Sockets des Troie, Stacheldraht
65390 Eclypse
65421 Jade
65432 The Traitor (= th3tr41t0r)
65432 (UDP) - The Traitor (= th3tr41t0r)
65534 /sbin/initd
65535 RC1 trojan


So Remove is manually..if AV not work


.

Search all GMail friends on ORKUT


One More Most wanted Option is OUT on Orkut... !!



Well Orkut is doing lots hard work these days. . in last 2-3 months it launch really Cool and useful updates well.

Latest one is Invite or Search all your Gmail E-Mail friends to Orkut now.

Snap Shot:





So now lets see how many friends you have on orkut..(-:

Hope Orkut also try to Update it as Yahoo! and Hotmail. . and some other (-:


SnapShot Credits: ALI



Enjoy More Orkuting


.

Sunday, December 2, 2007

ihound


Trace Your Lost Mobile, MP3, Camra or USB... !!



We’re in an age of portability in our gadgets. USB flash drives are the rage, as are other forms of portable storage like memory cards and MP3 players that can double as a storage drive. The only problem with these small, portable gadgets is the high incidences of loss or theft. If you use them to carry around sensitive, personal information on them like a lot of people do, what do you do when that happens to you?

The ihound Software is a free service (for up to 3 different USB drives, after that it’s a small fee) that will allow you to monitor when your portable drives have been connected to another computer. From the website:



What happens if my device is lost or stolen? Your Device Is Located:

You will know where your device is at all times via ihound Software’s “Device Tracker”. See your device’s location on a map and “Get your digital life back”.

You’re Alerted Instantly:

ihound Software will alert you via email as soon as someone else tries to connect your device to a computer.

You Can Print a Report:

Once your device has been located, you can print a report for the authorities that contains your device’s information as well as the location where your device has been tracked.

The software works on most USB devices that you need to connect to your computer to update. (MP3 players, Flash Cards, Jump Drives, Phones, iPods, etc.) They have a full list of supported devices on their website. Pretty cool stuff.

Visit iHound Software




.

Friday, November 30, 2007

Keyless Keyboard


Keyless Keyboard... !!





Sounds Freaky. . .is it?

But its true...its orbiTouch®Keyless Ergonomic Keyboard

This device leaves me completely skeptical about how it works, but I believe that is severely needed. Considering we are a society that is addicted to computers, their current state makes every one of us an easy target for carpal tunnel/repeated wrist syndrome.

Perhaps that is why Blue Orb has created the orbiTouch, a keyboard mouse combination that is really unique, and possibly needed. Instead of keyboards and things that slide around your desk, the orbiTouch uses two round domes that control the actions.

I believe the left dome is the keyboard control, and the user has to use some kind of sliding system in order to get the letters and numbers. As for the right dome, that is a mouse like we are used to.

The potential for the orbiTouch is enormous, and I can totally see it changing the world we live in. After all, we need better computers for our body structures, but I anticipate that it will be a slow transition before these become standard keyboards. However, considering that teenagers can text almost as fast as they can write or type, I believe people can adapt pretty easily.

I definitely want to get my hands on one just so I can figure out how long it will take for me to relearn how to type. If you want to try it, feel free to order it from their site for about $400.

Offialsite and More Info:
http://www.keybowl.com/






.

Wednesday, November 28, 2007

Upcoming Update in Orkut New Scraps Alerts


New Update in Orkut >> New Scraps Alerts... !!




Posted by:Scott Kirkwood, Software Engineer
Publised on: Orkut Blog


We all love receiving scraps, but constantly checking back to your scrapbook page can be tedious. How many of us have our scrapbook page open and are clicking refresh on it constantly!

With scrap alerts you can be on any orkut page and find out that you have received a scrap - that very minute. You could be browsing your friend's photos, and find out "hey! I just got a new scrap." Then you can click on the "Scrapbook" link to reply on the spot. This way you'll be free to explore all of orkut, comforted in the knowledge that when you have received a new scrap, you'll know about it that moment.

We'll be rolling this feature out over the new few days for all users, but If you really prefer clicking the refresh button all day long, you can go to settings to disable to the feature.




Thanks Orkut to Such a Nice Update.


(-:




.

Talk to Gtalk friends from Yahoo!


Talk to Gtalk Friends from Yahoo!... !!



Trick by: Aciid B0mb3r
Posted in: OUG

► Add gtalk2voip011 to your message list.
► Its a bot so don't say hi hello or whatever.
► Then send message to Gtalk user type IM gtalk:< hisid@gmail.com > < msg >
► Then u will get error Like the person is not online or something like that.
► But the request to add will be sent to him, as soon as he accepts it, u will be able to talk with him with this command , and he/she can reply by simply typing the message.

Tip: press up arrow to prevent typing command again and again


Here is official site http://www.gtalk2voip.com/


Thanks to Aciid B0mb3r

Enjoy!!


(-:



.

In Side Google Office/ Google's Intranet


Have a Look in Google Office/ Google's Intranet



What do around 16,000 Google employees stare at in the morning when they’ve arrived at the office? They might be looking at Moma, the name for the Google intranet. The meaning of the name of “Moma” is a mystery even to some of the employees working on it, we heard, but Moma’s mission is prominently displayed on its footer: “Organize Google’s information and make it accessible and useful to Googlers.” A “Googler,” as you may know, is what Google employees call themselves (they have other nicknames for specific roles; a noogler is a new Google employee, a gaygler is a gay one, a xoogler is an ex-one, and so on).


A Google employee in Hamburg (photo taken in mid-2007)

Moma “was designed by and for engineers and for the first couple of years, its home page was devoid of any aesthetic enhancements that didn’t serve to provide information essential to the operation of Google. It was dense and messy and full of numbers that were hard to parse for the uninitiated, but high in nutritional value for the data hungry.

Here’s a picture of the Moma homepage that we got hold of – please note that large areas have been grayed out or whitened out:



On the top of the Google intranet homepage, you’ll find the logo reading “Moma - Inside Google.” Next to it is a search box allowing you to find information from Moma in general, information on specific Google employees, information on availability of meeting rooms, building maps and more. You can choose to include secure content or not via a checkbox. Another checkbox offers you to use “Moma NEXT" for a more experimental variant of search results.

To the top right, there’s an option to switch to iMoma, an iGoogle-style tool prepared by the company which allows further customization of the intranet start page. This way, employees may be able to select their own news and service widgets of interest to be displayed when they log-in.

The actual content of the homepage in the picture is split up into 4 columns. To the left, there’s a “My Office” section, with information for employees and a way to choose your own office for more relevant links. It’s followed by the sections “Survival Kit” and “My shortcuts.” In the middle columns, news gadgets are headlined “Welcome to Google!,” “Communications,” “HR” (human resources), “Company Info” and “Internal Google news,” all in common soft shades of Google base colors. The right column is listing Google teams.

Searching Moma



When you perform a search on Moma, you will see a result similar to the following; this screenshot, which was edited by Google to include comments, has been published by the Google Enterprise Blog in a post of theirs in July to show-case the kind of functionality available:



On the image, you will see a “universal search" style result including employee information, bookmark results, documents hosted on Google’s intranet, and a list of related queries. Users get to choose between ordering by date or by relevance. One can also limit the results to different segments like “Tech,” “Official,” or “Community.” Google in their blog said the use the Google Search Appliance to power this service.

Ex-employee Doug Edwards mentioned how he came to take for granted everything was available on the intranet, “from the status of products in development to the number of employees at any point in the company’s history.” He adds that the transparency was also a motivator, as “Your failures are also visible to everyone in the company, which provides an even greater motivator to continuously improve performance in the areas for which you are responsible.” These days however, as Doug writes, Google “clamped down on who had access the complete state of the business.

The following photo shows a result for what seems to be an employee search. The photo is used with permission from Zach at HannaCabana.com, though Zach tells me it had been anonymously submitted to him (note we added blurring to the phone numbers of the zoom version):



On the employee results page, everyone is listed with their name, a photo, their job title, telephone number and more. Clicking through to an employee lands you on their full profile page. Ex-Googler Doug Edwards remembers how many Google employees used “alternative images and titles" for their Moma listing. “I recall photos of samurai warriors and masked figures with titles like ’Shadow Ops’ and ’Black Ops.’ These were later weeded out as part of an upgrade”.

Employee data may also be rendered in different forms. Below is a screenshot we first posted on in February of an internal application called Google Percent:



This service simply shows how many employees are newer than a particular other employee (some areas in the image have been blackened out).


How employees access the intranet




Photo courtesy of Zach, again.

The dialog reads, “Many internal apps. One login page.” The input boxes ask for the user’s LDAP (Lightweight Directory Access Protocol) credentials.

A Google employee can log-in to the intranet from within the office, or with a so-called Virtual Private Network (VPN) connection. This connection comes pre-installed on laptops Google hands out, and can be reached via a desktop icon. A Google employee is required to authenticate their sign-in with account credentials.

From within a Google building, an employee may likely reach the intranet via the address corp.google.com. We previously found out Google additionally uses many sub-domains in their intranet, like album.corp.google.com, agency.corp.google.com, alien.corp.google.com, karma.corp.google.com, periscope.corp.google.com, pineapple.corp.google.com. You may also likely just enter e.g. “m” (which maps to “http://m” which is “http://m.corp.google.com”) to be taken to a service like your Gmail-powered email account.

Externally, like from a laptop at a conference – or if you’re one of the employees mainly working from home, as there are some – employees can access the VPN servers located on sites like Mountain View or Dublin, Ireland, with different hostnames each like man....ext.google.com or de....ext.google.com (we depleted part of the hostname).

Google “eating their own dog food”



Google employees use many of the tools Google produces. They even have launched an internal “dogfood” campaign in 2006. But what they see may be newer versions of the services than those released to the outside.


Andrew Hitchcock

from July, Creative Commons-licensed(edited for brightness/ contrast).

If you work in a team for a product, you may also get a prototypical version of the service. Below for instance is a screenshot from a nightly build of Google Spreadsheets – codename “Trix” – which we were able to take a look at (note several areas in this image have been grayed out):



In above image you can see the disclaimer “Warning: This is NOT production. Data can be lost.” Special links to debug windows are offered to developers as well, one of them being opened in the screenshot. Google employees also get to see previews of completely unreleased tools, such as wiki service JotSpot (which is being integrated into Google Apps), or Platypus, the internal Gdrive client for file-sharing.

For code reviews, Google created Mondrian, a “Perforce backend with some custom Google wrappers on top,” as Nial Kennedy, who shot the following photo Creative Commons-licensed, notes:



And the following image shows Google in-house tool Trax (this is part of a larger photo by Google employee Andrew from Flickr, but it is not available anymore; we’re not quite sure how this tool works or what it achieves):



But, Google doesn’t just use their own tools. For instance, we came across information indicating that many Google employees prefer social network Facebook.com to their own production, Orkut (e.g. some Google employees considered Orkut too spammy, or too buggy in the past).

If a Google employee encounters trouble with any Google tool, they can call their internal support hotline named “Tech Stop.” The hotline promises 24-hour availability. Numbers like +1 877... (last part depleted) are partly toll-free and partly with toll, and accessible from all over the world. Internally, a Google employee may also simply press 3-HELP (3-4357). Tech Stop centers aren’t just located in the US, but also in places like Hyderabad, India.


Hope Your Like this Post. .

Your Comments Help me to Improve ma Work (-:



(-:


.
(-:

Recent Comments