Subscribe:
    Subscribe Twitter Facebook

    Friday, July 30, 2010

    How to show Visitors IP address - Orkut Profile /Webpage / Other social Networking Pages

    Method 1:
    create a new page, copy the text below and save it as image.php (or whatever you wish)
    
    
    All you'll need to display on other pages is the code below.
    
    
    
    
    
    
    < ? php
    $img_number = imagecreate(275,25);
    $backcolor = imagecolorallocate($img_number,102,102,153);
    $textcolor = imagecolorallocate($img_number,255,255,255);
    
    imagefill($img_number,0,0,$backcolor);
    $number = " Your IP is $_SERVER[REMOTE_ADDR]";
    
    Imagestring($img_number,10,5,5,$number,$textcolor);
    
    header("Content-type: image/jpeg");
    imagejpeg($img_number);
    ? >
    
    
    
    
    
    
    
    
    Method 2:
    
    
    You can use the gadgets
    
    
    it is free, please make sure to use the complete code.
    
    
    
    
    What's my ip address, create your own visitors IP image
    
    
    
    
    
    
    
    
    
    What's my ip address, create your own visitors IP image
    
    
    
    
    
    
    or use can use 
    
    
    Danasoft gadets.
    
    
    
    
    Sign by Danasoft - Get Your Free Sign
    .
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    you can see my orkut profile for Demo 
    
    
    http://www.orkut.co.in/Main#Profile?uid=4980250996369346869
    
    
    
    

    Thursday, July 15, 2010

    India is Developing its Own Operating System

    Indian government is busy developing its own Operating System for computers, along with anti virus softwares. The India government has focused on the said softwares owing to the continual attacks on government sites and loss of data.

    A lower level operating system and application software may be preferred to the advanced versions, which necessarily require access to internet for upgrades. The new software could be deployed in key departments that have been under constant cyber attacks.

    No sensitive information will be stored on systems connected to the internet, while ministries and departments have been told to carry out regular IT systems audits. The government has also established a Crisis Management Plan against cyber attacks to be implemented by all central ministries, state governments and critical sectors.

    Earlier CDAC developed an OS called BOSS, short for Bharat Operating System Solutions. The Indian Government has also invested in developing the famous $10 laptop, the ISRO Bhuvan, and a $200 million microprocessor.

    Why OS?

    Because too many government sites get hacked, the data is stolen so easily and building one’s own OS and anti-virus will help curb such situations.

    “A sanitised, lower level operating system and application software may be preferred to the advanced versions, which necessarily require access to internet for upgrades. The new software could be deployed in key departments that have been under constant cyber attacks. The taskforce also includes officials of the Prime Minister’s Office as well as defence, home and telecom & IT ministries.

    No sensitive information will be stored on systems connected to the internet, while ministries and departments have been told to carry out regular IT systems audits. The government has also established a Crisis Management Plan against cyber attacks to be implemented by all central ministries, state governments and critical sectors

    Sunday, May 23, 2010

    How To Install / 2003 / Vista / 7 / BartPE Using USB

    How To Install XP / 2003 / Vista / Win 7 Using USB

    How to configure firewall in linux by using iptables

    How to configure firewall in linux by using iptables - Video Tutorial

    Creating a Multi Bootable Flash Drive

    Creating a Multi Bootable Flash Drive

    Saturday, May 22, 2010

    Hackers in China infiltrate PCs of Dalai, Indian embassy


    : A vast electronic spying operation from China has infiltrated computers and stolen documents from hundreds of government and private offices around the world, including those of the Indian embassy in the US and the Dalai Lama's organization, Canadian researchers have concluded. 

    In a report to be issued shortly, the researchers said that the system was being controlled from computers based almost exclusively in China, but that they could not say conclusively that the Chinese government was involved. 

    The researchers, based at the Munk Center for International Studies at the University of Toronto, had been asked by the office of the Dalai Lama in India to examine its computers for signs of malicious software, or malware. 

    Their sleuthing opened a window into a broader operation that, in less than two years, has infiltrated at least 1,295 computers in 103 countries, including many belonging to Indian embassies as well as the Dalai Lama's Tibetan exile centres in India, Brussels, London and New York. 

    The group did not identify the Indian embassies which were targeted. 

    The researchers believed that the system, which they called GhostNet, had hacked into the computer systems at embassies of countries like Pakistan, Germany, Indonesia, Thailand and South Korea. The researchers found networks at foreign ministries of Bhutan, Bangladesh, Latvia, Indonesia, Iran and the Philippines, had been similarly hacked. 

    The spying operation is by far the largest to come to light in terms of countries affected. This is also believed to be the first time researchers have been able to expose the workings of a computer system used in an intrusion of this magnitude. 

    Still going strong, the operation continues to invade and monitor more than a dozen new computers a week, the researchers said in their report, Tracking GhostNet: Investigating a Cyber Espionage Network. They said they had found no evidence that United States government offices had been infiltrated, although a NATO computer was monitored by the spies for half a day and computers of the Indian Embassy in Washington were infiltrated. 

    The malware is remarkable both for its sweep in computer jargon ^ it has not been merely `phishing' for random consumers information but `whaling' for particular important targets ^ and for its big brother-style capacities. It can, for example, turn on the camera and audio-recording functions of an infected computer, enabling monitors to see and hear what goes on in a room. The investigators say they do not know if this facet has been employed. 

    The researchers were able to monitor the commands given to infected computers and to see the names of documents retrieved by the spies, but in most cases the contents of the stolen files have not been determined. Working with the Tibetans, however, the researchers found that specific correspondence had been stolen and that the intruders had gained control of the electronic mail server computers of the Dalai Lama's organization. 

    The electronic spy game has had at least some real-world impact, they said. For example, they said, after an email invitation was sent by the Dalai Lama's office to a foreign diplomat, the Chinese government made a call to the diplomat discouraging a visit. And a woman working for a group making internet contacts between Tibetan exiles and Chinese citizens was stopped by Chinese intelligence officers on her way back to Tibet, shown transcripts of her online conversations and warned to stop her political activities. 

    The Toronto researchers said they had notified international law enforcement agencies of the spying operation, which in their view exposed basic shortcomings in the legal structure of cyberspace. The FBI declined to comment on the operation. 

    Although the Canadian researchers said that most of the computers behind the spying were in China, they cautioned against concluding that China's government was involved. The spying could be a non-state, for-profit operation, for example, or one run by private citizens in China known as patriotic hackers. 

    "We're a bit more careful about it, knowing the nuance of what happens in the subterranean realms," said Ronald J Deibert, a member of the research group and an associate professor of political science at Munk. "This could well be the CIA or the Russians. It's a murky realm that we're lifting the lid on." 

    A spokesman for the Chinese consulate in New York dismissed the idea that China was involved. "These are old stories and they are nonsense," the spokesman, Wenqi Gao, said. "The Chinese government is opposed to and strictly forbids any cybercrime." 

    The Toronto researchers are publishing their findings in Information Warfare Monitor, an online publication associated with the Munk Center. 

    At the same time, two computer researchers at Cambridge University in Britain who worked on the part of the investigation related to Tibetans, are releasing an independent report. They do fault China, and warned that other hackers could adopt the tactics used in the malware operation. 

    "What Chinese spooks did in 2008, Russian crooks will do in 2010 and even low-budget criminals from less developed countries will follow in due course," the Cambridge researchers, Shishir Nagaraja and Ross Anderson, wrote in their report, The Snooping Dragon: Social Malware Surveillance of the Tibetan Movement. 

    In any case, it was suspicions of Chinese interference that led to the discovery of the spy operation. Last summer, the office of the Dalai Lama invited two specialists to India to audit computers used by the Dalai Lama's organization. The specialists, Greg Walton, the editor of Information Warfare Monitor, and Nagaraja, a network security expert, found that the computers had indeed been infected and that intruders had stolen files from personal computers serving several Tibetan exile groups. 

    Back in Toronto, Walton shared data with colleagues at the Munk Center's computer lab. 

    One of them was Nart Villeneuve, 34, a graduate student and self-taught white hat hacker with dazzling technical skills. 

    Last year, Villeneuve linked the Chinese version of the Skype communications service to a Chinese government operation that was systematically eavesdropping on users’ instant-messaging sessions. 

    Early this month, Villeneuve noticed an odd string of 22 characters embedded in files created by the malicious software and searched for it with Google. It led him to a group of computers on Hainan Island, off China, and to a website that would prove to be critically important. 

    In a puzzling security lapse, the web page that Villeneuve found was not protected by a password, while much of the rest of the system uses encryption. 

    Villeneuve and his colleagues figured out how the operation worked by commanding it to infect a system in their computer lab in Toronto. On March 12, the spies took their own bait. Villeneuve watched a brief series of commands flicker on his computer screen as someone presumably in China rummaged through the files. Finding nothing of interest, the intruder soon disappeared. 

    Through trial and error, the researchers learned to use the system's Chinese-language dashboard ^ a control panel reachable with a standard web browser by which one could manipulate the more than 1,200 computers worldwide that had by then been infected. 

    Infection happens two ways. In one method, a user's clicking on a document attached to an email message lets the system covertly install software deep in the target operating system. Alternatively, a user clicks on a web link in an email message and is taken directly to a poisoned website. 

    The researchers said they avoided breaking any laws during three weeks of monitoring and extensively experimenting with the systems unprotected software control panel. They provided, among other information, a log of compromised computers dating to May 22, 2007. 

    They found that three of the four control servers were in different provinces in China ^ Hainan, Guangdong and Sichuan ^ while the fourth was discovered to be at a web-hosting company based in southern California. 

    Beyond that, said Rafal A Rohozinski, one of the investigators, attribution is difficult because there is no agreed upon international legal framework for being able to pursue investigations down to their logical conclusion, which is highly local. 

    Tuesday, February 16, 2010

    Google hack attack code hits the web

    The code used in the recent Google hack to exploit a vulnerability in Microsoft’s Internet Explorer browser has been published on the internet, raising the possibility of more attacks.

    In a blog posting, McAfee chief technology officer George Kurtz explained that researchers for the firm have seen references to the code on mailing lists and that it has been published on at least one web site.

    An attacker could use the flaw to gain control over a user’s system by tricking them into visiting a rigged web page, he said.

    “The public release of the exploit code increases the possibility of widespread attacks using the Internet Explorer vulnerability,” warned Kurtz.

    “The now public computer code may help cybercriminals craft attacks that use the vulnerability to compromise Windows systems. Popular penetration testing tools are already being updated to include this exploit. This attack is especially deadly on older systems that are running XP and Internet Explorer 6.”

    Microsoft issued a security advisory on Thursday admitting that Internet Explorer could be used to allow remote code execution, and said it may release an out-of-cycle patch for the flaw.

    “At this time, we are aware of limited, targeted attacks attempting to use this vulnerability against Internet Explorer 6. We have not seen attacks against other versions of Internet Explorer. We will continue to monitor the threat environment and update this advisory if the situation changes,” noted the security update.

    The flaw has been taken very seriously by organisations across the globe, with the German government recommending its citizens use an alternative browser to IE until the vulnerability is patched.



    source : http://www.itnews.com.au/News/164937,google-hack-attack-code-hits-the-web.aspx

    Chinese hacker school Black Hawk Safety Net shut down

    China Daily has reported that Chinese law enforcement officials raided a hacker training and resource operation in Hubei province with 12,000 members, shut it down and arrested three members,The authorities seized a number of web servers, five computers and a car.

    The paper said: “The three, who ran Black Hawk Safety Net, are suspected of offering others online attacking programs and software, a crime recently added to the Criminal Law. A total of 1.7 million yuan ($249,000) in assets were also frozen.

    “Hubei province named Black Hawk Safety Net as the largest hacker training site in China, which openly recruited members and disseminated hacker techniques through lessons, Trojan software and online forum communications.


    “Since it was established in 2005, the site had recruited more than 12,000 VIP members and collected more than 7 million yuan ($1.03 million) in membership fees. More than 170,000 people registered for free membership.”

    The story also said: “According to a report released by the National Computer Network Emergency Response Coordination Center of China, the hacker industry in China caused losses of 7.6 billion yuan ($1.1 billion) in 2009.”



    China Daily story here.

    New York Times story here.



    source : http://www.itnews.com.au/News/166699,chinese-hacker-school-shut-down.aspx

    Wednesday, January 6, 2010

    Make a BackTrack Linux Flash Drive in Windows

    How to Make a BackTrack Linux Flash Drive using Windows. BackTrack is a Live Linuxdistribution based on SLAX that is focused purely on penetration testing. Distributed by remote-exploit.org, BackTrack is the successor to Auditor. It comes prepackaged with security tools including network analyzers, password crackers, wireless tools and fuzzers. Although originally designed to Boot from a CD or DVD, BackTrack contains USB installation scripts that make portable installation to a USB device a snap. In the following tutorial, we cover the process of installing BackTrack to a USB flash drive from within a working Windows environment.



    BackTrack Desktop Screenshot:
    BackTrack in action running from USB
    How to install BackTrack to a USB device:
    Note: USB installation of BacktTack performs like the Live CD. Currently a persistence BackTrack feature is outside the scope of this tutorial.
    1. Download the (Portable Backtrack) USB BackTrack (Extended)version
    2. Extract the Boot and BT3 folders to the root of your USB device
    3. Navigate to the Boot folder on your "USB device" and clickbootinst.bat (click continue if the following error appears)
    4. BackTrack Error
    5. Follow the onscreen instructions to make the device bootable
    6. Once the USB install script has finished, reboot your computer and set your BIOS or Boot Menu to boot from the USB device

    How to boot OS from a USB drive


    1. Download Win32 Disk Imager

    Win32 Disk Imager a free piece of software that does the whole job for you. You can download it from here. Extract the zip file. After that, plug in your USB drive and run Win32DiskImager.exe.

    2. Copy the image file to your USB drive

    1. Click the blue folder icon and select your image file.
    2. In the Device area, select the USB drive you want to copy the image to. WARNING: All data on this drive will be deleted. Please make very sure you select the proper drive letter (verify with Explorer).
      USB 01
    3. Click Write.
    4. Win32 Disk Imager copies the file’s contents onto your USB drive. Check the progess with the progress bar.

    3. Proceed to the boot section below


    Linux

    1. Find out which device is your USB drive

    Plug in your USB drive. Open up a terminal window and type fdisk -l. You’ll see an overview of all your disks and partitions. Identify your USB drive by looking for its size. In my example below, my USB drive has a size of 65 MB and is called /dev/sda. Please make sure you identify the correct one as all data on it will be lost in the following steps. Consider yourself warned. I will refer to the USB drive as /dev/USB from now on to avoid confusion.
    USB 03

    2. Copy the image file to your USB drive

    Type dd if=image.img of=/dev/USB into your console where image.img is your image file and /dev/USB is your USB drive. Use a USB drive with a capacity of at least 4 GB.

    3. Proceed to the boot section below

    Boot

    Once you are done copying your image onto your USB stick, you can boot from it. Switch off your computer and plug in your USB stick. Switch on your computer and enter the boot menu (F11 or F12 on most machines). Select your USB drive as boot device. That’s it.

    Other Methods


    Method 1 :


    Here we assume that you are using either Vista or Windows 7 to create a bootable USB.

    1. Insert your USB (4GB+ preferable) stick to the system and backup all the data from the USB as we are going to format the USB to make it as bootable.
    2. Open elevated Command Prompt. To do this, type in CMD in Start menu search field and hit Ctrl + Shift + Enter. Alternatively, navigate to Start > All programs >Accessories > right click on Command Prompt and select run as administrator.
    3. When the Command Prompt opens, enter the following command:
    DISKPART and hit enter.
    LIST DISK and hit enter.
    Once you enter the LIST DISK command, it will show the disk number of your USB drive. In the below image my USB drive disk no is Disk 1.
    4. In this step you need to enter all the below commands one by one and hit enter. As these commands are self explanatory, you can easily guess what these commands do.
    SELECT DISK 1 (Replace DISK 1 with your disk number)
    CLEAN
    CREATE PARTITION PRIMARY
    SELECT PARTITION 1
    ACTIVE
    FORMAT FS=NTFS
    (Format process may take few seconds)
    ASSIGN

    EXIT
    Don’t close the command prompt as we need to execute one more command at the next step. Just minimize it.
    5. Insert your Windows DVD in the optical drive and note down the drive letter of the optical drive and USB media. Here I use “D” as my optical (DVD) drive letter and “H” as my USB drive letter.
    6. Go back to command prompt and execute the following commands:
    D:CD BOOT and hit enter. Where “D” is your DVD drive letter.
    CD BOOT and hit enter to see the below message.
    BOOTSECT.EXE/NT60 H:

    (Where “H” is your USB drive letter)
    7. Copy Windows DVD contents to USB.
    You are done with your bootable USB. You can now use this bootable USB as bootable DVD on any computer that comes with USB boot feature (most of the current motherboards support this feature).
    Note that this bootable USB guide will not work if you are trying to make a bootable USB on XP computer.



    Method 2 - Make your flash drive bootable using Bart's mkbt util:
    http://www.nu2.nu/mkbt/ | Alt: mkbt20.zip
    Put a bootable floppy disk in your A: drive or create one using Windows.
    Download mkbt20.zip and unpack to to new temp folder you create.
    Go to the temp folder.
    Extract the bootsector from the bootable floppy disk. eg Open a DOS Window and go to the directory where you extracted MKBT. Type:

    mkbt -c a: bootsect.bin
    The boot sectors from the bootable floppy disk have just been saved to a file in the temp folder you created.
    Format the flash drive in FAT or FAT16.
    Copy the bootsector to the flash drive. Open a DOS Window and go to the folder where you extracted MKBT. Type:
    mkbt -x bootsect.bin Z:
    "Z" represents the flash drive drive Letter. So if your flash drive has another drive letter, then change the "Z" accordingly.
    Now you can [grin] "should" be able to copy the utils you need to the pen drive.



    Tuesday, January 5, 2010

    “CrunchMode” for Windows 7 power users

    Want a one stop access point for all those extended control panel settings in Windows 7? Well, it’s easy: just use CrunchMode*.
    “CrunchMode” is really easy to set up: just create a new folder and then rename it to CrunchMode.{ED7BA470-8E54-465E-825C-99712043E01C} and then double click it and you’re rocking. This trick won’t work on 64-bit Vista, but it works like a charm on all the different versions of Win7.

    Source : http://www.crunchgear.com

    Bidvertiser