Sunday, February 26, 2012

How to hack Vodafone for Free GPRS ?

How to hack Vodafone for Free GPRS ?
There are a Lots of visitors who have requested and want to know that is their any way to use free gprs on vodafone prepaid and postpaid connection. Therefore I am writing this article to to help you people by hacking airtel for free gprs.

Vodafone Cellulars India LTD.

All you have to do is to Create New GPRS Setting manually from your Mobile Phone. To use this trick you should have Balance Less than Rs. 1.

Access Point ==> portalnmms

Home Page ==> wap.google.com

IP Address ==> 010.010.001.100 or 196.006.128.012

Port => 9401 or 8799

If you liked this article then please Follow Us on Facebook
By Amrut Deshmukh

Friday, February 24, 2012

How to prevent your Facebook Account from being HACKED !

How to prevent your Facebook Account from being HACKED !



Facebook is always working on their layout and design. They have also change their security settings as well. Yesterday, I was using my Facebook account then I saw that one of my friends shared that how to identify the security level of your Facebook account and how you can secure your account by making some changes from hacking on your Facebook.
I am going to tell you that how can you secure your Facebook account from hackers by making some changes in your settings on Facebook. Following are some of the useful and important steps which will help you save your account from hackers:


1- First check your URL address (the very top box on your screen), if you see “http:” instead of “https:” then this means that you don’t have a secure session & can be hacked.

2- Click on Account which is present no the top menu bar on your homepage.


3- After clicking on Account, select Account Settings from the drop down menu.


4- Now select Account Security which is present under the tab of Settings and click on change button.


5- Here you have to check box of Secure Browsing and save the changes that you have made.


Now you will see this after saving the settings from Account Security:


After following the above mentioned steps you can easily save your account from hackings and can make it secure too.

Please comment about how you felt the articles was and any better suggestions, whatever you want to tell or ask. 
If you liked this article then please Follow Us on Facebook
By Amrut Deshmukh







What is ETHICAL HACKING ?



Introduction to ETHICAL HACKING 
























Hacking and ethical hacking are often subject to much misinterpretation. 
We've tried to deconstruct some of those myths and introduce readers to 
some of the basic concepts of ethical hacking. 
The book itself can be divided into three parts, the Introduction, 
Information Security, and Hacking the web / network. 
In the Introduction to this book, we have tried to give readers a clearer 
idea of what exactly constitutes hacking. We explore the ethical lines of 
hacking, and the dissonance between ethical as a legal or moral binding. 
We question why the term even needs the prefi x “ethical”. We also take 
a look at the terms Black Hat hacker and White Hat hacker and how to 
distinguish between them.
In our second section on Information Security we deal with some of 
the most basic devices for security and access control: Passwords. In the 
chapter “Access Denied” we look at exactly what does it take for a password 
to be secure? We look at what makes a strong password strong and some of 
the technical limits to cracking password. We also look at brute force and 
dictionary attacks as means of password cracking.
In the second chapter on “Social Engineering” we explore the social 
engineering, as a concept of using social means for fi  nding passwords 
instead of purely electronic means. Here we will look at some of the 
popular modes of social engineering.
In the chapter “The ethical bit” we explore the ethical uses of knowing 
how to crack passwords. We see how knowing the processes by which 
passwords are hacked can help us pick better uncrackable passwords. We 
look at how one can have a password which is easy to remember and strong 
at the same time.
In “Hashes” we look at some of the uses of hashes in information 
security and how they can be cracked to reveal a password. The “What 
the #!” chapter then deals with what exactly a hash is, how it relates to 
passwords and how can it be hacked. We explore all these questions and 
explore the basic function and operation of hashes.
In “Of Rainbows and Salt” we look at hash chains, and rainbow tables, which are popular means of deciphering hashes.  We look at salts, which 
offer some protection against such means of hacking hashes.
The third section in this Fast Track could actually be looked at as two 
sections, on “Hacking  the network” and “Hacking  the web”. It is as such 
divided into two parts. Hacking over the network, and hacking websites 
are some of the most common attacks. We look at what goes behind an 
attack and how one can be stopped.
In the “Network hacking” part we look at hacking network 
infrastructure and the steps that need to be taken before a successful 
attack can be made. We divide the process into four steps of “Footprinting”, 
which is the preliminary research conducted based on freely available 
information; “Scanning”, which involves poking and prodding network 
systems for information on vulnerable systems; “Enumeration / Banner 
Grabbing”, where we actually connect to systems which are attackable and 
gather relevant system data; “Penetration”, is the fi nal step of exploiting 
vulnerabilities and constructing attacks based on the information gathered 
in the previous steps.
In the “Web Application Hacking” part we look at ten of the most 
common attacks  that plague the internet today. The list of attacks  is as 
featured by “OWASP Top 10 for 2010” and we use a framework called 
WebGoat for studying a few of these attacks. 
Over the course of this section we will cover in detail: “Injection”, 
“Cross-Site Scripting”, “Broken Authentication and Session Management”, 
“Insecure Direct Object References”, “Cross Site Request Forgery (CSRF)”, 
“Security Misconfi guration”, “Insecure Cryptographic Storage”, “Failure 
to Restrict URL Access”, “Insufficient Transport Layer Protection”, and 
“Unvalidated Redirects and Forwards”. 
In concluding, with  “Hacking… Anything” we look at how the world 
of hacking is not limited to only computers. We look at the advantages of 
hacking and how a hackable application is not always a bad thing. 
This Fast Track also includes a few appendices which contain some 
further information relevant to for those starting their hacking activities.
Please comment about how you felt the articles was and any better suggestions, whatever you want to tell or ask. 

If you liked this article then please Follow Us on Facebook
By Amrut Deshmukh



Thursday, February 23, 2012

Wireless Technologies (Part 3)


Commercial Wireless Technologies and 
Examples.


Here is a list of commercial wireless technologies available 
today. 


AM radio 
Amplitude modulated radio used for long range audio 
broadcasting. For example, Akashavani.


FM radio 
Frequency modulated radio, provides better quality of sound for 
short range broadcasting. For example, Radio City.


Short wave radio 
Used for communications, handheld radios and walkie talkies. 
For example, radio handsets used by law enforcement agencies. 


TV broadcasting 
Digitally modulated signals carrying live audio and video for 
television audience. For example, Tata Sky.


Satellite communications 
Satellites in geostationary orbits are used to capture and 
rebroadcast signals for intercontinental communications. For 
example, the INSAT series.


GSM 
Global system for mobile communications is a cellular 
telephony technology based on time division and frequency 
division multiplexing. Operates at 900, 1,800 and 2,700 MHz. 
For example, Airtel, Idea, etc




CDMA 
This is a cellular telephony technology based on code division multiplexing. For example, Tata Indicom and Reliance Communications.



Infrared 
TV remote controls use this as a means of communication.
Cordless telephones 
Use radio waves to avoid the wire connecting the handset and 
the base unit.


GPS 
Satellite-based positioning service that uses radio waves.
Wireless peripherals 
Use radio waves instead of wires to connect to the PC. For 
example, wireless keyboard and mice.


Bluetooth 
5-GHz short range wireless technology that allows several types 
of equipped electronic devices to interconnect. 


Wi-Fi 
Also known as IEEE 802.11a, b, g and n, this allows wireless 
local area networks to be set up. It also allows local wireless 
internet connections called hotspots. 


RFID 
Radio frequency identification devices, in which objects/
humans/animals wear small radio tagged devices that allow 
them to be located. For example, radio collars for dogs.


If you liked this article then please Follow Us on Facebook
By Amrut Deshmukh


Wireless Technologies (Part 2)


History of wireless technologies 


Though the scientific world had been aware of both electricity 

and magnetism separately for a long time, the connection 
between the two had not been noticed until the 19th century. 
Reports in the early 19th century about the connection were 
largely unnoticed by the scientific community. In 1820, Hans 
Christian Oersted accidentally discovered that a current 
carrying wire caused a magnetic needle in a compass to deflect, 
and became the first to record evidence of the relationship between electricity and magnetism. Soon various theories 
of electromagnetism, notable ones being from Andre Marie 
Ampere, etc., were in circulation. 
Yet the existence of electromagnetic waves was not even 
imagined until the 1850s, when Maxwell published his theories 
of electromagnetism. In a paper named “A dynamical theory 
of the electromagnetic field”, Maxwell published his views 
regarding the existence of electromagnetic waves. He also 
summarised all that was known about electromagnetism at 
that time into the four famous Maxwell equations. Much of the 
groundwork to his beliefs had been laid by Michael Faraday, 
who established concepts such as electromagnetic induction, 
and theorised that electric and magnetic fields extend beyond 
conductors into the space around them.
In the 1870s and the 1880s, a volley of patents were filed 
in the United States for devices that could transmit and receive 
electromagnetic waves. While many of these took huge leaps 
of imagination, some were quite close to the modern idea of 
radio. Notable among these attempts, were some by the famed 
inventor Thomas Alva Edison. 
The first major milestone towards wireless transmissions 
was achieved between 1886 and 1888 by Heinrich Rudolf Hertz, 
after whom the SI unit of frequency is today named. Hertz 
demonstrated the transmission 
and reception of radio signals 
and was the first person to 
do so. He also discovered that 
Maxwell's equations could 
be reformulated to form a 
differential equation, from 
which could be derived the   
wave equation. 
Yet the true birth of 
modern wireless can be seen 
in Nikola Tesla’s famous article 
“the true wireless”. He soon 
demonstrated the transmission 
and reception of radio waves, 
and then gave a lecture on 
the principles of wireless communication. 
This era also witnessed 
various simultaneous 
developments in this area. 
The Indian physicist Jagdish 
Chandra Bose famously used 
electromagnetic waves to 
detonate a cannon and ring 
a bell at a distance (in 1894), 
yet showed no interest in 
patenting it. The first meaningful 
communication through wireless 
was demonstrated by Oliver 
Lodge who in 1894 devised a way 
to transmit Morse code through 
radio waves. Other notable 
contributors in the field include 
the Russian inventor Alexander Popov and the New Zealander 
Earnest Rutherford. 
However the lion’s share of the credit for modern wireless 
goes to Guglielmo Marconi, who besides being the British patent 
owner for the first viable radio telecommunications system, is 
also responsible for commercially developing and deploying the 
technology. He opened a radio factory 
in England, employing fifty men.
In 1901, Marconi conducted the 
first experimental transatlantic radio 
communication transmissions. By 
1907, this had been commercialised, 
leading to the first transatlantic 
radio communication link, between 
Newfoundland and Clifden, Ireland. Marconi’s company, British 
Marconi, and its American subsidiary, American Marconi, 
soon started commercially producing ship to shore wireless 
communication systems and went on to monopolise this sector. 
The first steps towards wireless telephony were taken by the 
German company Telefunken. Founded as a joint venture of the 
Siemens & Halke company and the General Electric company 
of Germany, the company created the only semi-permanent 
wireless link between Europe and North America. 
The next significant step in the development of wireless 
communication technologies came with the invention of 
the amplitude modulated (AM) radio. This allowed radio 
transmission by various stations at the same time, using 
different frequencies, as opposed to the then popular spark gap 
technology, which covered the whole allotted spectrum. This 
was achieved by Reginald Fessenden, who also managed to 
transmit violin music and Gospel readings over the air, to the 
delight of many ships at sea. 
In 1909, the Nobel Prize in Physics was awarded to 
Guglielmo Marconi for his contributions to radio telegraphy 
technologies. 
1909 also saw the development of radio broadcasting as we 
know it, with Charles David Harrolds, a professor of electronics 
from San Jose, setting up a radio station that continuously 
transmitted music and voice. Harrolds, the son of a farmer, set 
up the definitions for the terms broadcasting and narrowcasting 
(transmissions meant for a single recipient). Today, his station 
has grown into the KCBS San Jose station. 
With the sinking of the Titanic in 1914, regulations were 
implemented that made it mandatory for all ships to have ship 
to shore radios manned 24 hours. This gave a huge boost to the 
then fledgling radio industry and propelled the world into a 
new era of radio telegraphy, and eventually radio telephony. 
In 1916, the first radio station 
to broadcast daily was established 
by Harold Powers. With his 
company American Radio and 
Research Company (AMRAD) 
the station, call-signed 1XE, 
became the first to broadcast 
dance programs, university lectures, news, weather and even 
bedtime stories. The year 1920 witnessed the birth of the first 
broadcasting station for entertainment based in Argentina. 
Significant credit for the popularisation of audio radio must be 
given to the invention of the radio audio detector that saw the 
replacement of radio telegraphy. 
In the 1920s, with the invention of the vacuum tube, the 
till then popular crystal set, based on spark gap technology, 
became obsolete. These radios, however, still have a huge fan base among niche group of 
hobbyists, notably the Boy 
Scouts of America. Radio 
technology continued to 
improve through the 1920s 
into the 1930s with the improvement of vacuum tube, the 
invention of the early ancestors of diodes, etc. Some of the 
major contributors to these achievements was Westinghouse 
laboratories, based in the USA and, as always, Marconi. 
The next great leap in the field of radio came in 1933 with 
the development of FM. This revolutionary technology insulated 
the signal from external electronic interference and allowed 
the transmission of crystal clear audio and other signals across 
radio waves. However its technological features limited its usage 
to short range (a city wide, for example) applications. 
With the end of World War 2, radio stations and devices 
spread across Europe and the rest of the world. Soon, radio 
became a commonplace device. The 1950s witnessed the rapid 
miniaturisation of radio receivers thanks to the discovery of 
transistors and diodes. Over the next 20 years, transistors 
replaced vacuum tubes in all applications except the most 
specialised.
The 1960s witnessed a new revolution in wireless 
communications with the advent of communication satellites. With 
the launch of Telstar – the first communications only satellite, it 
became possible to transmit across the world, beyond the line of 
sight. Communication satellites stay in geostationary orbit .
The late 1960s also witnessed the digitisation of radios, 
mainly in long distance telephone networks. The 1970s saw 
the advent of radio and satellite navigation systems, originating 
from attempts by the US navy to precisely navigate their ships. 
In 1987, the GPS system of satellites was launched. 
The 1990s witnessed the 
birth of various technologies 
merging computers and other 
devices such as mobile phones, 
PDAs and wireless technologies. 
Wireless LAN, Bluetooth, 
etc., are the offspring of this 
revolution. 
It is interesting to note that a form of radiotelegraphy 
survives to this day. With a high level of automation in 
encryption and decryption, Telex is a communication medium 
of choice for businesses such as the banking industry. It is 
capable of transmitting information and directly printing it.

If you liked this article then please Follow Us on Facebook

By Amrut Deshmukh


Wireless Technologies (Part 1)


Wireless Technologies

Introduction

The modern office or home, as far as electrical/electronic
appliances are concerned, differs primarily from one ten years
ago by the fact that wires have almost disappeared for all
practical purposes. Gone is the age of desks cluttered with
tangled wires. Today, except for power transmission wires, all
wires can be done away with. The internet is wireless, phones
are wireless, computer peripherals are wireless. The last
frontier, wireless power transfer, is soon about to be breached.
The time seems ripe for us to delve into the world of wireless
technologies, and the first logical question in this direction
seems to be to ask the exact definition of wireless.

What is wireless?

Put simply – a wireless technology is any technology in which
wires have been eliminated in areas where wires were required
before. Almost all wireless applications have been in the field of
communication (more specifically, in transferring signals and
not just communication between humans). Examples range
from radio and TV broadcasting to mobile phones, Bluetooth
and wireless LAN.
While almost all developments in this direction have been
made possible using electromagnetic waves (explained in detail
later), some very specific applications have also been developed
using ultrasonic (high frequency sound) and infrasonic (low
frequency sound) waves.
Before we go into how exactly wireless communication takes
place, let us take a brief look at its history.

If you liked this article then please Follow Us on Facebook

By Amrut Deshmukh

Glenn Steven Mangham Sentenced 8 Months Imprisonment For Hacking Into Facebook Server

Glenn Steven Mangham Sentenced 8 MonthsImprisonment For Hacking Into Facebook Server




A 26 year aged British student named Glenn Steven Mangham sentenced to eight months of prison for hacking to Facebook server. The attack cost the company $200,000, and resulted in an investigation by the FBI and British law enforcement. Judge Alistair McCreath said his actions had “real consequences and very serious potential consequences” which could have been “utterly disastrous” for Facebook. “He acted with determination, undoubted ingenuity and it was sophisticated, it was calculating,” prosecutor Sandip Patel told a London court. He also said Mangham stole “invaluable” intellectual property and that the attack “represents the most extensive and grave incident of social media hacking to be brought before the British courts.”
Facebook runs a Puzzle server to allow computer programmers to test their skills and Mangham broke int that server, attempted to hack into a Facebook mailman server run that manages email distribution lists, as well as trying to gain access to the Facebook phabricator server, which offers tools for third-party app developers. Earlier in June 2011 he was arrested by the Metropolitan Police's Central e-Crime Unit for breaching the social network’s security systems between April 27 and May 9. After spending 2months he was released on bail. Four conditions were attached to his bail, including that he live and sleep at his home address, not access the Internet, and not have any devices in the house that can access the Web.

TechnoSaber Review:-
The twist of irony here is that Facebook founder Mark Zuckerberg’s inspiration for creating the site came from his hacking into Harvard’s internal servers. If Zuckerberg can get sympathy then why not Steven Mangham ??No user data have been compromised while this attack and nor the system get infiltrated. So our question is where is the justice? While creating facebook Zuckerberg can breach the Harvard’s internal servers and stole sensitive user data but if another guy did something little wrong to whom who is already did guilty is facing law and order and 8 months of imprisonment. What a justice???!!!!!  

If you liked this article then please Follow Us on Facebook

NSA Is Suspecting That Anonymous Could Shutdown The Entire U.S. Power Grid

NSA Is Suspecting That Anonymous Could Shutdown The Entire U.S. Power Grid



Earlier we have covered that Researchers at the Massachusetts Institute of Technology told that U.S. power grid needs cyber security protection. Now the US Govt is suspecting that 'Hactivist' Anonymous may target this vulnerable point and shut down the entire U.S. power grid within the next two years. General Keith Alexander The head of the National Security Agency has warned- that the hacker collective group Anonymous may be able to bring about a limited national power outage through a cyber attack. In the meeting at White House has relayed his concerns. Though he has not publicly expressed his concerns about the potential for Anonymous to disrupt power supplies, he has warned publicly about an emerging ability by cyber attackers to disable or even damage computer networks. Still Anonymous has never indicated to perform cyber attack against US power grid, but in the last week they have calledOperation Global Blackout, a plan to shut down the Internet on March 31. And the security experts are suspecting that while executing that attack Anon may target the US power grid.


If you liked this article then please Follow Us on Facebook
Related Posts Plugin for WordPress, Blogger...

Share Anywhere