tag:blogger.com,1999:blog-87766921903266500092023-11-16T02:59:24.305-08:00Safety Tips about Securing your NetworkThis site has information about securing your information in more secure way by providing network security,hacking tips and hacking tips for users.
They can learn securing there facebook account or hacking tips online free.
Download free android app for hacking news maheshhttp://www.blogger.com/profile/02809113713626613261noreply@blogger.comBlogger49125tag:blogger.com,1999:blog-8776692190326650009.post-56488369795458622012014-04-19T12:05:00.001-07:002014-04-19T12:05:35.549-07:00The Heartbleed Bug<div dir="ltr" style="text-align: left;" trbidi="on">
<br />
<div class="container">
<h1>
The Heartbleed Bug</h1>
<div class="row">
<div class="col-lg-4 col-md-4 col-sm-4 col-lg-push-8 col-md-push-8 col-sm-push-8" style="padding-top: 30px; text-align: center;">
<img alt="Heartbleed Bug" class="logo" src="http://heartbleed.com/heartbleed.png" />
</div>
<div class="col-lg-8 col-md-8 col-sm-8 col-lg-pull-4 col-md-pull-4 col-sm-pull-4">
The Heartbleed Bug is a serious vulnerability in the
popular OpenSSL cryptographic software library. This weakness allows
stealing the information protected, under normal conditions, by the
SSL/TLS encryption used to secure the Internet. SSL/TLS provides
communication security and privacy over the Internet for applications
such as web, email, instant messaging (IM) and some virtual private
networks (VPNs).<br />
The Heartbleed bug allows anyone on the Internet to read
the memory of the systems protected by the vulnerable versions of the
OpenSSL software. This compromises the secret keys used to identify the
service providers and to encrypt the traffic, the names and passwords of
the users and the actual content. This allows attackers to eavesdrop on
communications, steal data directly from the services and users and to
impersonate services and users.<br />
</div>
</div>
<div class="row">
<div class="col-lg-6 col-md-6 col-sm-6">
<h3>
What leaks in practice?</h3>
We have tested some of our own services from attacker's
perspective. We attacked ourselves from outside, without leaving a
trace. Without using any privileged information or credentials we were
able steal from ourselves the secret keys used for our X.509
certificates, user names and passwords, instant messages, emails and
business critical documents and communication.<br />
</div>
<div class="col-lg-6 col-md-6 col-sm-6">
<h3>
How to stop the leak?</h3>
As long as the vulnerable version of OpenSSL is in use it can be abused. <a href="https://www.openssl.org/news/secadv_20140407.txt">Fixed OpenSSL</a>
has been released and now it has to be deployed. Operating system
vendors and distribution, appliance vendors, independent software
vendors have to adopt the fix and notify their users. Service providers
and users have to install the fix as it becomes available for the
operating systems, networked appliances and software they use.<br />
</div>
</div>
<div class="row">
<div class="col-lg-12 col-md-12 col-sm-12">
<hr />
<h3>
Q&A</h3>
<h4>
What is the CVE-2014-0160?</h4>
CVE-2014-0160 is the official reference to this bug. CVE
(Common Vulnerabilities and Exposures) is the Standard for Information
Security Vulnerability Names maintained by <a href="http://cve.mitre.org/">MITRE</a>.
Due to co-incident discovery a duplicate CVE, CVE-2014-0346, which was
assigned to us, should not be used, since others independently went
public with the CVE-2014-0160 identifier.<br />
<h4>
Why it is called the Heartbleed Bug?</h4>
Bug is in the OpenSSL's implementation of the TLS/DTLS
(transport layer security protocols) heartbeat extension (RFC6520). When
it is exploited it leads to the leak of memory contents from the server
to the client and from the client to the server.<br />
<h4>
What makes the Heartbleed Bug unique?</h4>
Bugs in single software or library come and go and are
fixed by new versions. However this bug has left large amount of private
keys and other secrets exposed to the Internet. Considering the long
exposure, ease of exploitation and attacks leaving no trace this
exposure should be taken seriously.<br />
<h4>
Is this a design flaw in SSL/TLS protocol specification?</h4>
No. This is implementation problem, i.e. programming
mistake in popular OpenSSL library that provides cryptographic services
such as SSL/TLS to the applications and services.<br />
<h4>
What is being leaked?</h4>
Encryption is used to protect secrets that may harm your
privacy or security if they leak. In order to coordinate recovery from
this bug we have classified the compromised secrets to four categories:
1) primary key material, 2) secondary key material and 3) protected
content and 4) collateral.<br />
<h4>
What is leaked primary key material and how to recover?</h4>
These are the crown jewels, the encryption keys themselves.
Leaked secret keys allow the attacker to decrypt any past and future
traffic to the protected services and to impersonate the service at
will. Any protection given by the encryption and the signatures in the
X.509 certificates can be bypassed. Recovery from this leak requires
patching the vulnerability, revocation of the compromised keys and
reissuing and redistributing new keys. Even doing all this will still
leave any traffic intercepted by the attacker in the past still
vulnerable to decryption. All this has to be done by the owners of the
services.<br />
<h4>
What is leaked secondary key material and how to recover?</h4>
These are for example the user credentials (user names and
passwords) used in the vulnerable services. Recovery from this leak
requires owners of the service first to restore trust to the service
according to steps described above. After this users can start changing
their passwords and possible encryption keys according to the
instructions from the owners of the services that have been compromised.
All session keys and session cookies should be invalidated and
considered compromised.<br />
<h4>
What is leaked protected content and how to recover?</h4>
This is the actual content handled by the vulnerable
services. It may be personal or financial details, private communication
such as emails or instant messages, documents or anything seen worth
protecting by encryption. Only owners of the services will be able to
estimate the likelihood what has been leaked and they should notify
their users accordingly. Most important thing is to restore trust to the
primary and secondary key material as described above. Only this
enables safe use of the compromised services in the future.<br />
<h4>
What is leaked collateral and how to recover?</h4>
Leaked collateral are other details that have been exposed
to the attacker in the leaked memory content. These may contain
technical details such as memory addresses and security measures such as
canaries used to protect against overflow attacks. These have only
contemporary value and will lose their value to the attacker when
OpenSSL has been upgraded to a fixed version.<br />
<h4>
Recovery sounds laborious, is there a short cut?</h4>
After seeing what we saw by "attacking" ourselves, with
ease, we decided to take this very seriously. We have gone laboriously
through patching our own critical services and are dealing with possible
compromise of our primary and secondary key material. All this just in
case we were not first ones to discover this and this could have been
exploited in the wild already.<br />
<h4>
How revocation and reissuing of certificates works in practice?</h4>
If you are a service provider you have signed your
certificates with a Certificate Authority (CA). You need to check your
CA how compromised keys can be revoked and new certificate reissued for
the new keys. Some CAs do this for free, some may take a fee.<br />
<h4>
Am I affected by the bug?</h4>
You are likely to be affected either directly or
indirectly. OpenSSL is the most popular open source cryptographic
library and TLS (transport layer security) implementation used to
encrypt traffic on the Internet. Your popular social site, your
company's site, commerce site, hobby site, site you install software
from or even sites run by your government might be using vulnerable
OpenSSL. Many of online services use TLS to both to identify themselves
to you and to protect your privacy and transactions. You might have
networked appliances with logins secured by this buggy implementation of
the TLS. Furthermore you might have client side software on your
computer that could expose the data from your computer if you connect to
compromised services.<br />
<h4>
How widespread is this?</h4>
The most notable software using OpenSSL are the open source
web servers like Apache and nginx. The combined market share of just
those two out of the active sites on the Internet was over 66% according
to <a href="http://news.netcraft.com/archives/2014/04/02/april-2014-web-server-survey.html">Netcraft's April 2014 Web Server Survey</a>.
Furthermore OpenSSL is used to protect for example email servers (SMTP,
POP and IMAP protocols), chat servers (XMPP protocol), virtual private
networks (SSL VPNs), network appliances and wide variety of client side
software. Fortunately many large consumer sites are saved by their
conservative choice of SSL/TLS termination equipment and software.
Ironically smaller and more progressive services or those who have
upgraded to latest and best encryption will be affected most.
Furthermore OpenSSL is very popular in client software and somewhat
popular in networked appliances which have most inertia in getting
updates.<br />
<h4>
What versions of the OpenSSL are affected?</h4>
Status of different versions:<br />
<ul>
<li>OpenSSL 1.0.1 through 1.0.1f (inclusive) are vulnerable</li>
<li>OpenSSL 1.0.1g is NOT vulnerable</li>
<li>OpenSSL 1.0.0 branch is NOT vulnerable</li>
<li>OpenSSL 0.9.8 branch is NOT vulnerable</li>
</ul>
Bug was introduced to OpenSSL in December 2011 and has been
out in the wild since OpenSSL release 1.0.1 on 14th of March 2012.
OpenSSL 1.0.1g released on 7th of April 2014 fixes the bug.<br />
<h4>
How common are the vulnerable OpenSSL versions?</h4>
The vulnerable versions have been out there for over two
years now and they have been rapidly adopted by modern operating
systems. A major contributing factor has been that TLS versions 1.1 and
1.2 came available with the first vulnerable OpenSSL version (1.0.1) and
security community has been pushing the TLS 1.2 due to earlier attacks
against TLS (such as the <a href="http://en.wikipedia.org/wiki/Transport_Layer_Security#BEAST_attack">BEAST</a>).<br />
<h4>
How about operating systems?</h4>
Some operating system distributions that have shipped with potentially vulnerable OpenSSL version:<br />
<ul>
<li>Debian Wheezy (stable), OpenSSL 1.0.1e-2+deb7u4</li>
<li>Ubuntu 12.04.4 LTS, OpenSSL 1.0.1-4ubuntu5.11</li>
<li>CentOS 6.5, OpenSSL 1.0.1e-15</li>
<li>Fedora 18, OpenSSL 1.0.1e-4</li>
<li>OpenBSD 5.3 (OpenSSL 1.0.1c 10 May 2012) and 5.4 (OpenSSL 1.0.1c 10 May 2012)</li>
<li>FreeBSD 10.0 - OpenSSL 1.0.1e 11 Feb 2013</li>
<li>NetBSD 5.0.2 (OpenSSL 1.0.1e)</li>
<li>OpenSUSE 12.2 (OpenSSL 1.0.1c)</li>
</ul>
Operating system distribution with versions that are not vulnerable:<br />
<ul>
<li>Debian Squeeze (oldstable), OpenSSL 0.9.8o-4squeeze14</li>
<li>SUSE Linux Enterprise Server</li>
<li>FreeBSD 8.4 - OpenSSL 0.9.8y 5 Feb 2013</li>
<li>FreeBSD 9.2 - OpenSSL 0.9.8y 5 Feb 2013</li>
<li>FreeBSD 10.0p1 - OpenSSL 1.0.1g (At 8 Apr 18:27:46 2014 UTC)</li>
<li>FreeBSD Ports - OpenSSL 1.0.1g (At 7 Apr 21:46:40 2014 UTC)</li>
</ul>
<h4>
How can OpenSSL be fixed?</h4>
Even though the actual code fix may appear trivial, OpenSSL
team is the expert in fixing it properly so fixed version 1.0.1g or
newer should be used. If this is not possible software developers can
recompile OpenSSL with the handshake removed from the code by compile
time option <code>-DOPENSSL_NO_HEARTBEATS</code>.<br />
<h4>
Should heartbeat be removed to aid in detection of vulnerable services?</h4>
Recovery from this bug might have benefitted if the new
version of the OpenSSL would both have fixed the bug and disabled
heartbeat temporarily until some future version. Majority, if not almost
all, of TLS implementations that responded to the heartbeat request at
the time of discovery were vulnerable versions of OpenSSL. If only
vulnerable versions of OpenSSL would have continued to respond to the
heartbeat for next few months then large scale coordinated response to
reach owners of vulnerable services would become more feasible. However,
swift response by the Internet community in developing online and
standalone detection tools quickly surpassed the need for removing
heartbeat altogether.<br />
<h4>
Can I detect if someone has exploited this against me?</h4>
Exploitation of this bug does not leave any trace of anything abnormal happening to the logs.<br />
<h4>
Can IDS/IPS detect or block this attack?</h4>
Although the heartbeat can appear in different phases of
the connection setup, intrusion detection and prevention systems
(IDS/IPS) rules to detect heartbeat have been developed. Due to
encryption differentiating between legitimate use and attack cannot be
based on the content of the request, but the attack may be detected by
comparing the size of the request against the size of the reply. This
implies that IDS/IPS can be programmed to detect the attack but not to
block it unless heartbeat requests are blocked altogether.<br />
<h4>
Has this been abused in the wild?</h4>
We don't know. Security community should deploy TLS/DTLS
honeypots that entrap attackers and to alert about exploitation
attempts.<br />
<h4>
Can attacker access only 64k of the memory?</h4>
There is no total of 64 kilobytes limitation to the attack,
that limit applies only to a single heartbeat. Attacker can either keep
reconnecting or during an active TLS connection keep requesting
arbitrary number of 64 kilobyte chunks of memory content until enough
secrets are revealed.<br />
<h4>
Is this a MITM bug like Apple's goto fail bug was?</h4>
No, this does not require a man in the middle attack
(MITM). Attacker can directly contact the vulnerable service or attack
any user connecting to a malicious service. However in addition to
direct threat the theft of the key material allows man in the middle
attackers to impersonate compromised services.<br />
<h4>
Does TLS client certificate authentication mitigate this?</h4>
No, heartbeat request can be sent and is replied to during
the handshake phase of the protocol. This occurs prior to client
certificate authentication.<br />
<h4>
Does OpenSSL's FIPS mode mitigate this?</h4>
No, OpenSSL Federal Information Processing Standard (FIPS) mode has no effect on the vulnerable heartbeat functionality.<br />
<h4>
Does Perfect Forward Secrecy (PFS) mitigate this?</h4>
Use of Perfect Forward Secrecy (PFS), which is
unfortunately rare but powerful, should protect past communications from
retrospective decryption. Please see <a href="https://twitter.com/ivanristic/status/453280081897467905">https://twitter.com/ivanristic/status/453280081897467905</a> how leaked tickets may affect this.<br />
<h4>
Can heartbeat extension be disabled during the TLS handshake?</h4>
No, vulnerable heartbeat extension code is activated
regardless of the results of the handshake phase negotiations. Only way
to protect yourself is to upgrade to fixed version of OpenSSL or to
recompile OpenSSL with the handshake removed from the code.<br />
<h4>
Who found the Heartbleed Bug?</h4>
This bug was independently discovered by a team of security engineers (Riku, Antti and Matti) at <a href="http://www.codenomicon.com/">Codenomicon</a>
and Neel Mehta of Google Security, who first reported it to the OpenSSL
team. Codenomicon team found heartbleed bug while improving the
SafeGuard feature in Codenomicon's Defensics security testing tools and
reported this bug to the NCSC-FI for vulnerability coordination and
reporting to OpenSSL team.<br />
<h4>
What is the Defensics SafeGuard?</h4>
The SafeGuard feature of the Codenomicon's Defensics
security testtools automatically tests the target system for weaknesses
that compromise the integrity, privacy or safety. The SafeGuard is
systematic solution to expose failed cryptographic certificate checks,
privacy leaks or authentication bypass weaknesses that have exposed the
Internet users to man in the middle attacks and eavesdropping. In
addition to the Heartbleed bug the new Defensics TLS Safeguard feature
can detect for instance the exploitable security flaw in widely used
GnuTLS open source software implementing SSL/TLS functionality and the <a href="http://gotofail.com/">"goto fail;"</a> bug in Apple's TLS/SSL implementation that was patched in February 2014.<br />
<h4>
Who coordinates response to this vulnerability?</h4>
Immediately after our discovery of the bug on 3rd of April 2014, <a href="https://www.cert.fi/en/index.html">NCSC-FI</a>
took up the task of verifying it, analyzing it further and reaching out
to the authors of OpenSSL, software, operating system and appliance
vendors, which were potentially affected. However, this vulnerability
had been found and details released independently by others before this
work was completed. Vendors should be notifying their users and service
providers. Internet service providers should be notifying their end
users where and when potential action is required.<br />
<h4>
Is there a bright side to all this?</h4>
For those service providers who are affected this is a good
opportunity to upgrade security strength of the secret keys used. A lot
of software gets updates which otherwise would have not been urgent.
Although this is painful for the security community, we can rest assured
that infrastructure of the cyber criminals and their secrets have been
exposed as well.<br />
<h4>
What can be done to prevent this from happening in future?</h4>
The security community, we included, must learn to find
these inevitable human mistakes sooner. Please support the development
effort of software you trust your privacy to. <a href="https://www.openssl.org/support/donations.html">Donate money to the OpenSSL project.</a><br />
<h4>
Where to find more information?</h4>
This Q&A was published as a follow-up to the OpenSSL
advisory, since this vulnerability became public on 7th of April 2014.
The OpenSSL project has made a statement at <a href="https://www.openssl.org/news/secadv_20140407.txt">https://www.openssl.org/news/secadv_20140407.txt</a>. NCSC-FI published an advisory at <a href="https://www.cert.fi/en/reports/2014/vulnerability788210.html">https://www.cert.fi/en/reports/2014/vulnerability788210.html</a>.
Individual vendors of operating system distributions, affected owners
of Internet services, software packages and appliance vendors may issue
their own advisories.<br />
<h4>
References</h4>
<ul>
<li>CVE-2014-0160</li>
<li>NCSC-FI case# 788210</li>
<li><a href="https://www.openssl.org/news/secadv_20140407.txt">OpenSSL Security Advisory</a> <small>(published 7th of April 2014, ~17:30 UTC)</small></li>
<li><a href="http://blog.cloudflare.com/staying-ahead-of-openssl-vulnerabilities">CloudFlare: Staying ahead of OpenSSL vulnerabilities</a> <small>(published 7th of April 2014, ~18:00 UTC)</small></li>
<li><a href="http://heartbleed.com/">heartbleed.com</a> <small>(published 7th of April 2014, ~19:00 UTC)</small></li>
<li><a href="http://www.ubuntu.com/usn/usn-2165-1/">Ubuntu / Security Notice USN-2165-1</a></li>
<li><a href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:06.openssl.asc">FreeBSD / SA-14:06.openssl</a></li>
<li><a href="http://www.freshports.org/security/openssl/">FreshPorts / openssl 1.0.1_10</a></li>
<li><a href="https://blog.torproject.org/blog/openssl-bug-cve-2014-0160">Tor Project / OpenSSL bug CVE-2014-0160</a></li>
<li><a href="https://rhn.redhat.com/errata/RHSA-2014-0376.html">RedHat / RHSA-2014:0376-1</a></li>
<li><a href="http://lists.centos.org/pipermail/centos-announce/2014-April/020249.html">CentOS / CESA-2014:0376</a></li>
<li><a href="https://lists.fedoraproject.org/pipermail/announce/2014-April/003205.html">Fedora / Status on CVE-2014-0160</a></li>
<li><a href="http://www.kb.cert.org/vuls/id/720951">CERT/CC (USA)</a></li>
<li><a href="https://www.cert.fi/en/reports/2014/vulnerability788210.html">NCSC-FI (Finland)</a></li>
<li><a href="https://www.cert.at/warnings/all/20140408.html">CERT.at (Austria)</a></li>
<li><a href="http://www.circl.lu/pub/tr-21/">CIRCL (Luxembourg)</a></li>
<li><a href="http://www.cert.ssi.gouv.fr/site/CERTFR-2014-ALE-003/index.html">CERT-FR (France)</a></li>
<li><a href="https://www.jpcert.or.jp/at/2014/at140013.html">JPCERT/CC (Japan)</a></li>
<li><a href="https://www.cert.se/2014/04/ny-sarbarhet-i-openssl-1-0-1">CERT-SE (Sweden)</a></li>
<li><a href="https://www.nsm.stat.no/Arbeidsomrader/Internettsikkerhet-NorCERT/Forsideartikler-NorCERT/Alvorlig-sarbarhet-i-SSL/">NorCERT (Norway)</a></li>
<li><a href="https://www.ncsc.nl/dienstverlening/expertise-advies/factsheets/factsheet-heartbleed-ernstige-kwetsbaarheid-in-openssl.html">NCSC-NL (Netherlands)</a></li>
<li><a href="http://www.cert.org.cn/publish/main/9/2014/20140410091311360563426/20140410091311360563426_.html">CNCERT/CC (People's Republic of China)</a></li>
<li><a href="http://www.publicsafety.gc.ca/cnt/rsrcs/cybr-ctr/2014/av14-017-eng.aspx">Public Safety Canada</a></li>
<li><a href="https://cert.litnet.lt/lt/dokumentai/heartbleed-openssl-pazeidziamumas">LITNET CERT (Lithuania)</a></li>
<li><a href="http://www.mycert.org.my/en/services/advisories/mycert/2014/main/detail/963/index.html">MyCERT (Malaysia)</a></li>
<li><a href="http://www.cert.org.mx/boletin/?vulne=6487">UNAM-CERT (Mexico)</a></li>
<li><a href="http://www.singcert.org.sg/alerts/21-latest/607-singcert-openssl-heartbleed-bug">SingCERT (Singapore)</a></li>
<li><a href="http://www.qcert.org/sites/default/files/public/alert_details_9042014_heartbleed.pdf">Q-CERT (Qatar)</a></li>
</ul>
<br /><small>Heartbleed logo is free to use, rights waived via <a href="http://creativecommons.org/publicdomain/zero/1.0/">CC0</a>.
<span class="download"><a href="http://heartbleed.com/heartbleed.svg">[download logo in SVG format]</a></span></small><br />
<div class="timestamp">
Page updated 2014-04-15 12:10 UTC. </div>
</div>
</div>
</div>
<footer class="container">
<a class="codenomicon" href="http://www.codenomicon.com/" title="Codenomicon - April 2014">Codenomicon - April 2014</a><br />
</footer>
</div>
maheshhttp://www.blogger.com/profile/02809113713626613261noreply@blogger.com0tag:blogger.com,1999:blog-8776692190326650009.post-76191068319976406532014-03-23T07:57:00.001-07:002014-03-23T08:00:41.781-07:00How Hackers Capture Passwords Across The Air - Network Traffic Analysis<div dir="ltr" style="text-align: left;" trbidi="on">
<h3 class="post-title entry-title">
How Hackers Capture Passwords Across The Air - Network Traffic Analysis
<!-- Begin BidVertiser code -->
<script language="JavaScript1.1" src="http://bdv.bidvertiser.com/BidVertiser.dbm?pid=596586&bid=1489273" type="text/javascript"></script>
<noscript><a href="http://www.bidvertiser.com/bdv/BidVertiser/bdv_xml_feed.dbm">xml api</a></noscript>
<!-- End BidVertiser code -->
</h3>
<!-- Begin BidVertiser code -->
<script language="JavaScript1.1" src="http://bdv.bidvertiser.com/BidVertiser.dbm?pid=596586&bid=1489273" type="text/javascript"></script>
<noscript><a href="http://www.bidvertiser.com/bdv/BidVertiser/bdv_xml_feed.dbm">xml api</a></noscript>
<!-- End BidVertiser code -->
<br />
<div class="post-header-line-1">
<table border="0"><tbody>
<tr><td></td>
<td><div style="margin-right: 25px;">
</div>
</td>
<td><div style="margin-right: 5px;">
</div>
</td>
<td><div class="addthis_toolbox addthis_default_style ">
</div>
</td>
</tr>
</tbody></table>
<div style="text-align: left;">
<div class="separator" style="clear: both; text-align: center;">
<img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgdM_Svdro6ObTFcZDyj0t_0YifNv4zvMGaUfvPimvqfZ-_IW30gcFOMmraPj-5w2W51x3dQRPnrLCZaDW3m5BPmbj-9NsOgxBQ1i4DJjIiSTTyEhgDojI3Q4n_C1nXhPYb2nsJcQWntUM/s400/untitled.JPG" height="240" width="400" /></div>
<b><br /></b>
<b><br /></b>
<b>ABSTRACT</b></div>
<div style="text-align: left;">
<b><br /></b></div>
It is known that WireShark is a powerful tool that goes far beyond a
simple sniffer. What many do not know is that there are several ways to
harness the potential of this tool and this is what this article aims
at introducing the readers. We will learn to sniff the network
effectively, create filters to find only the information we want, see it
as a black hat would use this tool to steal passwords, and finally how
to use WireShark to diagnose network problems or if a firewall is
blocking packets correctly.<br />
<a href="https://www.blogger.com/blogger.g?blogID=8776692190326650009" name="more"></a><br />
<b>INTRODUCTION</b><br />
<div style="text-align: left;">
<b><br /></b></div>
Today it is very unlikely that your password will be brute forced.
You use the internet regularly and one day you're surprised to receive
allegations of an intrusion. Evidence indicates that the intruders third
party accounts departed from your account, and you have no idea what is
happening. Someone may have made use of your account and performed such
acts as you. How could this have happened? A strong possibility is that
you have become the victim of an attack via "sniffer".<br />
<br />
<!-- Begin BidVertiser code -->
<script language="JavaScript1.1" src="http://bdv.bidvertiser.com/BidVertiser.dbm?pid=596586&bid=1489273" type="text/javascript"></script>
<noscript><a href="http://www.bidvertiser.com/bdv/BidVertiser/bdv_xml_feed.dbm">xml api</a></noscript>
<!-- End BidVertiser code -->
<div style="text-align: left;">
<b>UNDERSTAND THE MAIN CONCEPT</b></div>
<div style="text-align: left;">
<b><br /></b></div>
What are "sniffers"? The main purpose of a sniffer is to capture
network traffic. They are used for network analysis purposes, however
they can also be used by malicious hackers to capture your passwords,
and even IDS systems are based on network sniffers.<br />
<br />
These programs also allow you to monitor network activity recording
data (usernames, passwords; ect.) each time they access other computers
on the network.<br />
<br />
These programs aim at monitoring ("sniffing") network traffic to
capture access to network services, such as remote mail service (IMAP,
POP3), remote access (telnet, rlogin, etc.), file transfer (FTP) etc..
accesses made, capturing packets. Always aimed at getting the most
relevant information.<br />
When we called the HUB computer and send information from one computer
to another, in reality this data is for all ports of the HUB, and
therefore for all machines. It turns out that only the machine on which
the information was intended to send the operating system.<br />
<br />
If a sniffer were running on other computers, even without these
systems sending data it travels there for the operating system, the
sniffer will intercept at the network layer, capturing the data and
displaying them to the user, in an unfriendly way. Generally the data is
organized by type of protocol (TCP, UDP, FTP, ICMP, etc...) and each
package read may have show your content.<br />
<br />
<br />
<div style="text-align: left;">
<b>YOUR PASSWORD CAN BE CAPTURED BY SNIFFERS!</b></div>
<div style="text-align: left;">
<b><br /></b></div>
Many local area networks (LANs) are configured sharing the same
Ethernet segment. Virtually any computer of the network can run a
"sniffer" program to "steal" users passwords. "Sniffers" work monitoring
the flow of communication between computers on the network to find out
when someone uses the network services previously mentioned. Each of
these services uses a protocol that defines how a session is
established, such as your account is identified and authenticated and
how to use the service.<br />
To have access to these services, you first have to have a "log
in". The login sequence - is part of the authentication protocol, which
occurs at the beginning of each session - the "sniffers" are concerned
about this, because it is this part that is your password. Therefore, it
is only the filter "strings" keys that the password is obtained.<br />
<br />
<br />
<div style="text-align: left;">
<b>STEP BY STEP</b></div>
<br />
Currently, almost all environments use switches and not hubs, which
makes sniffing a little more difficult because the switches do not send
the data to all ports as a hub does, it sends directly to the port
where the host destination is. So if you try to sniff a network switch
you will only hear what is broadcast, or its own connection. To be able
to hear everything without being the gateway of the network, an ARP
spoof attack (aka ARP poisoning) is necessary, or burst the CAM table of
the switch.<br />
<br />
<b>Basic Usage</b><br />
Now let's get our hands dirty: I'm assuming you already have the
program (WireShark) installed, if you do not then download it. When
starting WireShark, the displayed screen will look something like Figure
1:<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEijVRQ0NaaIBIlghN_3sE513VJKQW4GeQOnozkPJVmA4z2_1OIFpWCzPCpbkJcAI837GOW4rUBzA43gQdSyQzPS0s3AZ2fs_3y4M4-l9WlQ8esu3wO6Fg-NOUdc20VCCtLxgMR43ve1nUk/s640/untitled1.JPG" height="326" width="577" /></div>
<br />
Figure 1) Wireshark.<br />
<br />
Before you can start capturing packets, we have to define which
interface will "listen" to the traffic. Click Capture > Interfaces<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhzI02tqduAW55stqhc-7sj1Y2PStARli3LArvVA51y6ZACVEDGWkLy0_Ma-ZX7lGW-OM23zy5DMCAob6kjOmIKHTvHwoqFlO-_ZYUYFw2adssuIHGIxQK3KDDaKc6b10FlpGFzx7N1wSI/s1600/untitled2.JPG" /></div>
<br />
Figure 2) Interfaces.<br />
<br />
From there, a new window will appear with the list of automatically
detected interfaces, simply select the desired interface by clicking
the box next to the name of the interface, as in figure 3:<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj_4Dti2zBN8FDuBf0RYztdkxippoEKlVfYT97RTu-Mnf7i8PNQprN_-4LOoFF0I179dNrdf29kQGSd16EhaMBLE6rSS_StQSYBkMLe9D9OmqT-_M0Bbar-coXaxGcMQ1jG1sCwAQpxDSM/s640/untitled3.JPG" height="171" width="577" /></div>
<br />
<b>Figure 3) Capture Interfaces.</b><br />
<br />
If you click Start, it will begin automatically capturing packets.
You can select the interface and only then it will start the capture if
necessary.<br />
When the capture process starts, you will see several packets
traversing the screen WireShark (varying according to the traffic of
your machine / network). Will look something like the figure 4:<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgd4caVuHOQl3wwuQItnetRM5g-U6twx-1ERDbXZewB8E4Qm3GFRSUgB3EwxmVp7C_lWMhFcLGXwEca6VeHU55AwRr5bVYqFfFit2uIgDar3oJIwiP1bqia4hJbrTEnGINL7I0mv19XusA/s640/untitled4.JPG" height="321" width="577" /></div>
<br />
<b>Figure 4) Capturing.</b><br />
<br />
To stop the capture, simply click the button, "Stop the running live capture".<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEidUnHyv4-CuA1v3CeBUgLt7fZgmAy7GoE-dOvKJqFxPBaw7sFVU7TjAnsR00J0L2c-xPZYkl1S_to_5XVIm-IeNw02pz8dYeyey-Z9hKn9QMazwzgpYhGLv93ph4Si7Uw9BTgvmy0hiAs/s640/untitled5.JPG" height="323" width="577" /></div>
<br />
<b>Figure 5) Stop.</b><br />
<br />
It is important to remember that you must take care if your network
is busy, the data stream may even lock your machine, then it is not
advisable to leave the WireShark to capture for a long time, as we will
see, we will leave it running only during the process to debug a
connection. The greater the amount of packets, the longer it takes to
apply a filter, find a package, etc.<br />
<br />
With this we have the basics of the program, we can set the capture
interface, start and stop the capture. The next step is to identify
what interests among many packages. For this, we will start using
filters.<br />
<br />
<b>Using Filters</b><br />
<br />
There are a plethora of possible filters, but at this moment we
will see just how to filter by IP address, port and protocol.<br />
The filters can be constructed by clicking on "Filter", then selecting
the desired filter (there is a short list of pre-defined filters), or by
typing directly into the text box. After you create your filter, just
click "Apply", if you wanted to see the entire list of packages again
just click "Clear", this will remove the filter previously applied.<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhgYMQK02ydAIG7vAeFFt64E0J6k4m_GQH4r48H3UHWEKvU1yn1fnXIp97wMCbwWNqG5YPYx8roJ0ltBvSvc6MicxoHXXz3Q7R6SDTC7ktgvW67mpN8DHA1GjTu2zj7rG4-jaWyBQw9-TA/s640/untitled6.JPG" height="323" width="577" /></div>
<br />
Figure 6) Filter.<br />
<br />
<br />
I will use a small filter list as an example:<br />
<br />
<!-- Begin BidVertiser code -->
<script language="JavaScript1.1" src="http://bdv.bidvertiser.com/BidVertiser.dbm?pid=596586&bid=1489273" type="text/javascript"></script>
<noscript><a href="http://www.bidvertiser.com/bdv/BidVertiser/bdv_xml_feed.dbm">xml api</a></noscript>
<!-- End BidVertiser code -->
<div class="separator" style="clear: both; text-align: center;">
<img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi9d6Zoyg9xJjQLI5zubW2pblUk20Iu3jz9noTK008bqShN-O_ADh2do4ltPRSOy-tSuujTTVn2kY2fNiZ-1IhUHqd8SHGWNn5gnwFVr6x1QyKXC3M5ce7VeF50CN5wlND7rjctzoa0st4/s640/untitled7.JPG" height="568" width="577" /></div>
<br />
<b>Figure 7) Example by Rafael Souza (RHA Infosec).</b><br />
<br />
<br />
It is also possible to group the filters, for example:<br />
<span style="color: red;">ip.src == 10.10.10.1 && tcp.dstport==80 OR ip.src == 10.10.10.1 and tcp.dstport==80</span><br />
<span style="color: red;"><br /></span>
<span style="color: red;">Source address 10.10.10.1 </span><br />
<span style="color: red;">And destination port 80</span><br />
<br />
<br />
<div style="text-align: left;">
<b>CAPTURING PASSWORDS</b></div>
<br />
Now we will see how you can capture passwords easily, just by
listening to traffic. For this example we will use the POP3 protocol,
which sends the data in clear text over the network. To do this, start
capturing packets normally and start a session with your POP3 email
server. If you use a safer protocol like IMPAPS or POP3 and I just
wanted to see the functioning of the mechanism, it is possible to
connect via telnet to POP3 without having to add / modify your account,
simply run the following:<br />
<br />
<span style="color: red;">telnet serveremail.com 110</span><br />
<span style="color: red;">user user@rhainfosec.com</span><br />
<span style="color: red;">pass rhainfosecpasswd</span><br />
<br />
Now stop the capture, filter and put "pop" and then click "Apply".
now thats done, you see only the packets of POP3 connection. Now click
on any of them right, and then click "Follow TCP Stream".<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhtUu_bp4bftR-L5Gvjklv37nfo61UMN6Lu_XBQnR4nyaWA8P0ckH53bq3aeaP57Pi0nigDJf2G07O14NfRZ4MA5bsQcxXtD0bclxG4arr2yjnp35WyqlsrddxN2O-WQGrXzn-UqrPtF5w/s640/untitled8.JPG" height="324" width="577" /></div>
<br />
Figure POP3.<br />
With this we will open a new window with the entire contents of the
ASCII connection. As the POP3 protocol sends everything in plain text,
you can see all the commands executed, including the password.<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjkZngF8KYi4tVtNlzWgHa1yu4mD0E-GsOWHeZ6pCi6Vf-C4m0RZwRstJ0kPQ05DdOcxuQgjBeC5sfsgxdl_CK-7Q0FqfwG486nwrAi31WPfaUagM45SiJPn0-xsknf1W1HnUfrNyesHV4/s640/untitled9.JPG" height="472" width="577" /></div>
<br />
Figure 9) Pass.<br />
<br />
This can be transported to any connection in plain text, such as
FTP, Telnet, HTTP, etc.. Just to let you change the filter and examine
the contents of the connection.<br />
<br />
<b>Importing External Captures</b><br />
<br />
Usually in servers, there is no graphical environment installed and
with that you cannot use WireShark directly. If you want to analyze
traffic on this server and you cannot install WireShark, so you have to
capture this traffic elsewhere, the best one can do is write traffic
with TCPdump locally and then copy this dump to a machine with WireShark
from where a more detailed analysis is made.<br />
<br />
We will capture everything that comes and goes from the host 10.10.10.1 with destination port 80 and save content in <span style="color: red;">capturerafaelsouzarhainfosec.pcap</span> file from the local folder where the command was executed. Run the server:<br />
<span style="color: red;"><br /></span>
<span style="color: red;">tcpdump -i eth0 host 10.10.10.1 and dst </span><br />
<span style="color: red;">port 80 -w </span><br />
<span style="color: red;">capturerafaelsouzarhainfosec.pcap</span><br />
<br />
Once you're finished capturing, simply use CTRL + C to copy the
file to the machine WireShark capture and import by clicking on File
-> Import. Once imported, you can use the program normally as if the
capture had occurred locally.<br />
<br />
<br />
<b>What TO DO:</b></div>
<div class="post-header-line-1">
<b><span style="color: lime;">Why steal your password?</span></b><br />
<br />
There are various reasons that lead people to steal passwords from
simply to annoy someone (sending email as you) up to perform illegal
activities (invasion on other computers, theft of information, etc.) An
attraction to crackers is the ability to use the identity of others in
these activities.<br />
<br />
One of the main reasons that attackers try to break systems and
install "sniffers" is the ability to quickly capture the maximum number
accounts. Thus, the more accounts this attacker has , the easier it is
to hide your stash.<br />
<br />
<b><span style="color: lime;">How can you protect yourself?</span></b><br />
<br />
Do not think that "sniffers" can make all the whole internet
insecure. It is not so. You need to be aware of where the risk is , when
you're at risk and what to do to be safe .<br />
<br />
When you have your credit card stolen or suspect that someone may
be using it improperly, you cancel the card. Likewise, as passwords can
be stolen, it's critical that you replace it regularly. This precaution
limites the amount of time that a stolen password can be used by an
attacker.<br />
<br />
Never share your password with others. This sharing makes it
difficult to know where your password is being used (exposed) and is
harder to detect unauthorized use. A password is like a tooth brush
never share it and change it regularly.<br />
<br />
Never give your password to anyone that is claiming they need
access to fix your account problem or wanting to investigate the breach
of a system. This trick is one of the most effective methods of hacking,
known as "social engineering."<br />
<br />
<span style="color: lime;"><b>Use networks you can trust</b></span><br />
<br />
Another aspect you should take into consideration is what network
you can trust and which you cannot. If you are traveling and need to
access an organizations computer remotely have a great level of
assurance that the network is secure. For example, pick any file in your
home directory that you share is it available to a "LanHouse" or
network of another organization . Are you sure you can trust the
network?<br />
<!-- Begin BidVertiser code -->
<script language="JavaScript1.1" src="http://bdv.bidvertiser.com/BidVertiser.dbm?pid=596586&bid=1489273" type="text/javascript"></script>
<noscript><a href="http://www.bidvertiser.com/bdv/BidVertiser/bdv_xml_feed.dbm">xml api</a></noscript>
<!-- End BidVertiser code -->
<br />
If you have no alternative for secure remote access and only have
available resources such as telnet, for example, you can "mitigate" this
effect by changing the password at the end of each session. Remember
that only the first packet (200-300 bytes)of each session carry
information from your "login". Therefore, to always change your password
before logging out, this will not be captured and password before it
that were exposed to the network are no longer valid. Of course it is
possible to capture everything going across the network, but the
attacker has no intention of filling their file system quickly and
becoming so easily discovered.<br />
<br />
<span style="color: lime;"><b>Why are networks so vulnerable to "sniffers"?</b></span><br />
<br />
There are several reasons and there is no quick solution to the problem.<br />
<br />
Part of the problem is that companies tend to invest in more new
features rather than add security. New security features can create the
most difficult systems to configure and less convenient to use. Remember
companies try to adhere to the C.I.A. triangle (confidentiality,
integrity, and availability). New features create unintended effects on
availability when this happens policy is overlooked creating a new
vulnerability in itself.<br />
<br />
Another part of the problem is related to added costs for Ethernet
switches, hubs, network interfaces that do not support the particular
"promiscuous" that sniffers can use.<br />
<br />
<br />
<b>CONCLUSION</b><br />
<br />
The question that remains is how can we protect ourselves from this threat...<br />
<br />
<br />
<b>i) </b>Network cards that cannot be put into "promiscuous" mode. Thus, computers cannot be mastered and transformed into "sniffers".<br />
<span class="Apple-tab-span" style="white-space: pre;"><br /></span>
<span class="Apple-tab-span"><b>ii)</b></span><span class="Apple-tab-span" style="white-space: pre;"> </span>Typically,
the Ethernet interface only passes packets to the highest level
protocol that are intended for local machine. Switching this interface
into promiscuous mode allows all packets that are accepted and passed to
the higher layer of the protocol stack. This allows the selection you
want.<br />
<span class="Apple-tab-span" style="white-space: pre;"><br /></span>
<span class="Apple-tab-span" style="white-space: pre;"><b>iii)</b> </span>Packages that encrypt data in transit over the network, thus avoiding to flow passwords "in the clear".<br />
<br />
I would remind you that the safest thing to adopt and encourage the
use of is software which enables remote access encrypted sessions, they
help to make your environment much more secure.<br />
<br />
One fairly common encryption technology currently in secure
communication between remote machines SSH (Secure Shell). SSH is
available for different platforms. Its use does not prevent the password
captured, but as this is not an encrypted service to the attacker. SSH
negotiates connections using RSA algorithm. Once the service is
authenticated, all subsequent traffic is encrypted using IDEA
technology. This type of encryption is very strong.<br />
<br />
In the future, security will be increasingly intrinsic to the
systems and infrastructure networks. No use having all the "apparatus"
of security if you need, but do not use them. Security is not something
that can be completely secure.</div>
<div class="post-header-line-1">
</div>
<!-- Begin BidVertiser code -->
<script language="JavaScript1.1" src="http://bdv.bidvertiser.com/BidVertiser.dbm?pid=596586&bid=1489273" type="text/javascript"></script>
<noscript><a href="http://www.bidvertiser.com/bdv/BidVertiser/bdv_xml_feed.dbm">xml api</a></noscript>
<!-- End BidVertiser code -->
<div class="post-header-line-1">
<span style="background-color: red;"> Remember, no one is 100% secure.</span></div>
</div>
<!-- Begin BidVertiser code -->
<script language="JavaScript1.1" src="http://bdv.bidvertiser.com/BidVertiser.dbm?pid=596586&bid=1489273" type="text/javascript"></script>
<noscript><a href="http://www.bidvertiser.com/bdv/BidVertiser/bdv_xml_feed.dbm">xml api</a></noscript>
<!-- End BidVertiser code -->maheshhttp://www.blogger.com/profile/02809113713626613261noreply@blogger.com0tag:blogger.com,1999:blog-8776692190326650009.post-11302319056287370062014-03-21T10:37:00.000-07:002014-03-21T10:37:48.582-07:00How Hackers Hack Paypal In some days ago<div dir="ltr" style="text-align: left;" trbidi="on">
<h4>
If you know something about javascript,jquery language and html then you can understand this easily.</h4>
<h4>
<span style="color: red;"> Don't try it on paypal try on other site use jqurey knowledge and see what happens...</span></h4>
<h4>
because of <span style="color: orange;">Rafay Baloch</span>
is an Independent security researcher, An Internet marketer, An
Enterprenuer and a SEO consultant, Rafay got famous after finding a <b>Remote Code Execution </b>bug inside Paypal for which Paypal awarded him a sum of 10,000$, Along with it Paypal also offered him a job as a <b>security Ninja</b>. This story was published in multiple news papers such as Tribune, Brecorder and other internet security magazines.</h4>
<h4>
<span style="background-color: orange;">Here is an Example:</span></h4>
<h4>
Here is an attack that is used in this days rapidly by Hackers.. </h4>
<h4 style="color: red;">
A Vulnerable Example from W3schools </h4>
<div class="separator" style="clear: both; text-align: left;">
The worsed part about DOM Based xss apart from it's complexity is the
fact that lots of learning references and guides teach developers to
code things in an insecure way i.e. in a way that would introduce
vulnerabilities automatically. The following screenshot is taken from
the jquery learning section of w3schools. The website needs no
introduction, it is the most commonly referred websites for beginners to
learn various programming language.</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgBJpO-xHQ57dAk_RuzOWwz66W5_7zbo0pOtUksTQBXwcPw8gRM3NXT3sdr4rzL-3fIjWYqkmOfVguthC41lRXZuW7cO9KrpgZTpD4zzcpRuKotMDPOp6vJUWxzus2HLDPIw18UoRTrpP4/s1600/4.png" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="360" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgBJpO-xHQ57dAk_RuzOWwz66W5_7zbo0pOtUksTQBXwcPw8gRM3NXT3sdr4rzL-3fIjWYqkmOfVguthC41lRXZuW7cO9KrpgZTpD4zzcpRuKotMDPOp6vJUWxzus2HLDPIw18UoRTrpP4/s1600/4.png" width="577" /></a></div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: left;">
The code uses the html() function inside of jquery to output html,
however the problem is that html() is not a safe jquery function and is
represented as a dangerous sink as per <a href="https://code.google.com/p/domxsswiki/wiki/jQuery" rel="nofollow" target="_blank">DOM Based XSS Wiki</a>.
In case, where a user controlled input outputted through html() sink
without sanitization would lead to a DOM Based xss. The html() function
inside of jquery is the equivalent to the innerHTML function inside of
javascript. The fundamental problem is that the developers are not
advised to use a safe function. Therefore, in my opinion w3schools shall
be renamed to w3fools. </div>
<div class="separator" style="clear: both; text-align: left;">
<b> </b></div>
<div class="separator" style="clear: both; text-align: left;">
<b>How they do it:</b> </div>
<div class="separator" style="clear: both; text-align: left;">
Here is an subdomain of paypal<b> financing.paypal.com</b> it is used in attack.</div>
<div class="separator" style="clear: both; text-align: left;">
<b>https://financing.paypal.com/ppfinportal/adGenerator/webcopy?460*80</b></div>
<div class="separator" style="clear: both; text-align: left;">
The above will shows an output with 460*80 but when when we change it with the following code then what happened let's see.</div>
<div class="separator" style="clear: both; text-align: left;">
Here is the code to put into that domain <b><svg/onload=prompt(1)>.</b></div>
<div class="separator" style="clear: both; text-align: left;">
The code becomes <br /><div class="separator" style="clear: both; text-align: left;">
<b>https://financing.paypal.com/ppfinportal/adGenerator/webcopy?</b><b><svg/onload=prompt(1)></b></div>
<div class="separator" style="clear: both; text-align: left;">
What happens when we goto this site it will show an dialog box that is DDOS XSS attack we do it and hackers also do it similarly.</div>
<div class="separator" style="clear: both; text-align: left;">
</div>
<div class="separator" style="clear: both; text-align: left;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhjcd3XYWPOKbRHLr-NGgL2LlFlPSixNggy96GPBQyixUfhKsr-0RXPYjZR-HryNiK4guoE_V7JZm2M9YnXd7Rw0TbsrnTzLrXLlJkYy7vNwXkOOnzSTZEg_889_LYxe8rOHdWskJtBUnXw/s1600/domxss.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhjcd3XYWPOKbRHLr-NGgL2LlFlPSixNggy96GPBQyixUfhKsr-0RXPYjZR-HryNiK4guoE_V7JZm2M9YnXd7Rw0TbsrnTzLrXLlJkYy7vNwXkOOnzSTZEg_889_LYxe8rOHdWskJtBUnXw/s1600/domxss.png" height="320" width="320" /></a></div>
<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiALHJZQyBV2dqUl_yNWgI2W7ExuofHBvhdl8iyRLjyTNl4pHYJYFtEG8ZsveMu8dW4ThHaG8ABwyHxPa-CixXFektIZk_z2RyjsCASPyj5orFwi6vGotZPT3uDQNMvjcRpzYhbs24nVxQ0/s1600/5.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiALHJZQyBV2dqUl_yNWgI2W7ExuofHBvhdl8iyRLjyTNl4pHYJYFtEG8ZsveMu8dW4ThHaG8ABwyHxPa-CixXFektIZk_z2RyjsCASPyj5orFwi6vGotZPT3uDQNMvjcRpzYhbs24nVxQ0/s1600/5.png" height="320" width="320" /></a></div>
<div class="separator" style="clear: both; text-align: left;">
<b> </b></div>
</div>
</div>
maheshhttp://www.blogger.com/profile/02809113713626613261noreply@blogger.com0tag:blogger.com,1999:blog-8776692190326650009.post-7798243958891684022014-03-13T11:49:00.001-07:002014-03-13T11:49:18.538-07:00The World's Richest Ex-Hackers<div dir="ltr" style="text-align: left;" trbidi="on">
<h1>
The World's Richest Ex-Hackers</h1>
<figure class="featured_image">
<img alt="" height="360" src="http://blogs-images.forbes.com/andygreenberg/files/2014/03/0303_whatsapp-jan-koum-1_1024x576.jpg" width="640" /> <figcaption></figcaption>
</figure>
<br />
Long before he was the two-hundred-and-second richest person on the planet, Jan Koum was just another curious kid with a wardialer.<br />
Koum, whose net worth suddenly jumped to $6.8 billion last month when his startup WhatsApp was acquired by Facebook,
began his tech career as a teenage immigrant from Ukraine and fan of
the 1995 film ‘Hackers.’ From the privacy of his Mountain View, Calif.
bedroom, he’d use his wardialer—a machine that cycles through phone
numbers, dialing them on a modem to find open connections—to probe the
global Internet and explore faraway networks.<br />
“The Internet was so insecure back then,” he told my colleague Parmy Olson during her reporting for Forbes’ recent cover story on Koum’s $19 billion dollar startup. “Servers on the fringes of the Internet with <a href="http://en.wikipedia.org/wiki/Root_user">root account</a>
and no passwords…The challenging part was finding these systems where
you have to learn your way around. There were no manuals.”<br />
Koum says his intentions were never malicious. He was careful not to
delete anything and never participated in the distributed denial of
service attacks that plagued websites in the late 90s by flooding them
with junk traffic. “It was more curiosity, how can I figure it out, more
of a challenge,” he says.<br />
Once, Koum admits, he found his way onto the network of the computer
graphics giant Silicon Graphics, a story that the 38-year-old CEO is
careful to leave unfinished. “At some point I connected to the server,”
he says. “And that’s as much as I’m going to say.”<br />
Add Koum’s name to the growing list of ultra-successful entrepreneurs
whose paths to billions started on the wilder side of the hacker
frontier. In fact, founders of <a href="http://www.forbes.com/companies/apple/">Apple</a> , <a href="http://www.forbes.com/companies/microsoft/">Microsoft</a> ,
Facebook and Twitter all flirted with activities that might today be
called illegal hacking before going on to found Silicon Valley’s most
successful companies, a trend worth remembering as the tech world and <a href="http://www.forbes.com/washington/">Washington</a> grapple over how to apply–or restrict–the controversial Computer Fraud and Abuse Act.<br />
In the late 60s, a teenage Bill Gates and his Microsoft co-founder
Paul Allen, for instance, were caught with unauthorized access to an
administrator account at Computer Center Corporation and even rummaged
through its Dumpster for printouts of source code, according to Allen’s
memoir. In 2004, Zuckerberg used login records on TheFacebook.com to
break into the email accounts of Harvard Crimson reporters, <a href="http://www.businessinsider.com/how-mark-zuckerberg-hacked-into-the-harvard-crimson-2010-3">according to reporting by Business Insider’s Nicholas Carlson</a>.
Twitter co-founder Jack Dorsey got his first job by breaking into the
network of the dispatch company he hoped would hire him to show the
company its security vulnerabilities.<br />
Jan Koum’s hacking adventures played a similar role in his <a href="http://www.forbes.com/sites/parmyolson/2014/02/19/exclusive-inside-story-how-jan-koum-built-whatsapp-into-facebooks-new-19-billion-baby/">unlikely rise from welfare to a top spot on the most recent Forbes billionaire list released earlier this month</a>.
Koum was a noted member of the 1990s hacker group w00w00, which also
included Napster co-founder Sean Fanning and, occasionally Napster
co-founder and Facebook investor Sean Parker. Gordon “Fyodor” Lyon
remembers Koum as a vital contributor to the development of the Nmap
security scanner, a tool used today by both attackers and defenders of
networks to suss out vulnerabilities. “He was particularly helpful in
training Nmap to recognize FreeBSD machines,” Lyon writes to me in an
email, referring to a common open-source operating system. “We lived
nearby and used to hang out from time to time. This tremendous WhatsApp
success truly could not have happened to a nicer person!”<br />
When Koum was working at Yahoo! years later, it was the same w00w00
crowd that he turned for advice in fending off an unprecedented denial
of service attack hitting the company’s websites, <a href="http://www.reuters.com/article/2014/03/07/us-whatsapp-w00w-idUSBREA260KF20140307">according to Reuters’ Joseph Menn</a>.
And when his startup WhatsApp was acquired for a shocking $19 billion
dollars in February, the same group of hackers assembled for a
spontaneous celebration, Menn reports.<br />
Career paths like Koum’s should be taken as evidence of how
prosecuting harmless young hackers under the Computer Fraud and Abuse
Act can hamper innovation, says Hanni Fakhoury, an attorney with the
Electronic Frontier Foundation. “[The CFAA] is definitely creating a
chilling effect on researchers, tinkerers and innovators,” says
Fakhoury. “At the EFF, we get phone calls weekly from researchers who
have an idea, have done some preliminary testing, and want to look
deeper but are worried about CFAA liability. The volume of those calls
has gone up.”<br />
Fakhoury points to the case of Aaron Swartz, the coding prodigy,
activist and early employee of the social news site Reddit. Swartz was
prosecuted under the CFAA in 2011 after using an automated script to
download millions of files from the academic journal website JSTOR.
Facing seven-figure legal bills and decades in prison, the 26-year-old
committed suicide. His story is told in a <a href="http://www.youtube.com/watch?v=3izOJ7zX5I0">soon-to-be-released documentary</a> titled “The Internet’s Own Boy.”<br />
“Zuckerberg, Steve Jobs, Bill Gates, Wozniak, Paul Allen, all have
told stories or written in autobiographies about how when were younger
they engaged in legally questionable activities, and how they used those
mostly harmless experiences to create the biggest tech companies in the
world,” says Fakhoury. “They were fortunate that they were spared the
fate of Aaron Swartz.”<br />
No one, perhaps, has better captured the importance of hacker
experimentation for innovation better than the late Steve Jobs, who once
partnered with Apple co-founder Steve Wozniak to sell “Blue Boxes,”
tools that skirted the phone companies’ security measures to allow free
calls. “If it hadn’t been for the Blue Boxes,” Jobs told his biographer
Walter Isaacson before his death, “There would have been no Apple.”<br />
And if there had been no wardialer, there may have never been Whatsapp.<br />
Here’s the full list of the world’s richest former hackers.</div>
maheshhttp://www.blogger.com/profile/02809113713626613261noreply@blogger.com0tag:blogger.com,1999:blog-8776692190326650009.post-35978528998246079022014-03-11T19:22:00.000-07:002014-03-11T19:22:33.030-07:00DRDO, armed forces' computers hacked<div dir="ltr" style="text-align: left;" trbidi="on">
<br />
<div style="float: right; width: 217px;">
<div style="margin: 0; padding: 5px 0 0 10px; width: 217px;">
<div style="float: left;">
<a class="thickbox" href="https://www.blogger.com/blogger.g?blogID=8776692190326650009" id="mod-article-image-link" target="_blank"><img alt="hacked" border="0" id="articleimg1" src="http://timesofindia.indiatimes.com/thumb/msid-31596969,width-217,resizemode-4/hacked.jpg" style="cursor: pointer;" title="hacked" vspace="0" width="217" /></a></div>
<div style="clear: both; color: black; font-size: 10px; line-height: 15px; padding: 5px 0; width: 217px;">
<br /></div>
</div>
</div>
In a major security breach, around 50 computers belonging to
the armed forces and the DRDO were hacked sometime back and
classified files could have been compromised.<br /> <br /> Apparently in
view of the development, an advisory has been issued to the Services
that computers having internet facility should be kept at a distance
from those on which classified work is conducted.<br /> <br /> The security
breach took place in December and was detected by the intelligence
agencies after which a high-level probe was ordered, government sources
said here.<br /> <br />
The computers that were hacked are located in the South Block and
belong mainly to the Army along with the other two forces, they said.<br /> <br />
The security establishment fears that up to 30 files marked as
classified could have been compromised in the process, the sources said.<br /> <br />
National Security Advisor Shivshankar Menon sought to downplay the
hacking incident saying there are "various forms of compromise" and "not
every leaked password is a big threat to security.<br /> <br /> "A mere
fact that some computer is open in North Block and South Block and is
accessible, does not mean that therefore there is big gap in security."<br /> <br /> Insisting that "things are not in bad shape", he said, "We will deal with those computers which we feel are compromised."<br /> <br />
An advisory issued to the Services said that it was found that a
spyware was detected which could read the files of computers, which were
not even connected to internet, the sources said.<br /> <br /> Armed forces
have suffered a lot due to the attempts of hacking by Chinese and
Pakistani hackers as one Major posted in Andaman and Nicobar Islands was
found to have leaked critical information from his computer. </div>
maheshhttp://www.blogger.com/profile/02809113713626613261noreply@blogger.com0tag:blogger.com,1999:blog-8776692190326650009.post-2285210188561861512014-03-06T20:26:00.001-08:002014-03-06T20:26:32.966-08:00Russia-Ukraine Standoff Going Online as Hackers Attack <div dir="ltr" style="text-align: left;" trbidi="on">
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://www.bloomberg.com/image/iFMb6G4PTkws.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://www.bloomberg.com/image/iFMb6G4PTkws.jpg" height="360" width="640" /></a></div>
<br />
Cyberspace is fast becoming a battlefield for Ukrainian and Russian
partisans even as ground troops from the two countries continue their
military standoff. <br />
Hackers have launched attacks on the websites
of state agencies and publications on both sides. A Russian government
watchdog has ordered a shutdown of the social-network pages of Ukrainian
nationalist groups. And a Ukrainian phone company said its network in
parts of the Crimean peninsula was damaged as unidentified men took over
communication centers. <br />
“We’re going to see a very large cyber
component to whatever happens” in Ukraine, said Rodney Joffe, senior
vice president at Neustar Inc., a technology research firm near
Washington, D.C. “The damage can be quite debilitating.”<br />
<br />
U.S. intelligence analysts are closely watching the roles hackers are playing in the Ukraine conflict for clues to how Russia
and others might employ cyber capabilities in future conflicts, said
two U.S. officials who spoke on condition of anonymity to discuss
intelligence issues. The officials said cyberspace is quickly rivaling
traditional battlefields as a place where wars may be won or lost. <br />
Russia
Today, an English-language website backed by the government of
President Vladimir Putin, said hackers on March 2 added the word “Nazi”
to headlines. The sites of Russian newspaper Vedomosti, news agency RIA
Novosti, and several TV and radio stations have been hit with attacks
meant to block readers, though none have been pushed offline, according
to Group-IB, a Russian online security company. <br />
<br />
<h2>
Anonymous Video </h2>
“There has definitely been an increase in
malicious activity,” said Ilya Sachkov, Group-IB’s chief executive
officer. “But the difference isn’t as intense as, for example, what we
saw during the most recent elections for Moscow mayor or the Russian
parliament.” <br />
In Ukraine,
newswires Unian and Gordon said they had been attacked by hackers, the
latter asserting that the culprits were Russian. And a group claiming to
be affiliated with Anonymous, a loose collection of Internet activists,
posted a video on sharing site Vimeo that said it was targeting Russian
websites due to the conflict in Ukraine. <br />
Russia’s foreign
ministry declined to immediately comment on preparations for cyber
warfare. The defense ministry didn’t return phone calls. Ukraine’s
computer security agency said it had registered attacks on websites and
phone networks in the country. The security police didn’t answer
repeated phone calls.<br />
<h2>
Hacked Phones </h2>
Russian state television channels yesterday
reported a leaked phone call between EU Foreign Policy Chief Catherine
Ashton and Estonian Foreign Minister Urmas Paet, who recently returned
from Ukraine. In the hacked call, according to the reports, Paet said
that snipers who killed protesters in Kiev
had been working for the opposition, not now-deposed President Viktor
Yanukovych. The Estonian Foreign Ministry said the call was authentic,
but said Paet hadn’t blamed the opposition for the shootings. <br />
And
on Feb. 23, state-funded Voice of Russia published e-mails alleged to
have been written by Vitali Klitschko, a pro-Western candidate for the
Ukrainian presidency. The documents leaked by a hacker group calling
itself Anonymous Ukraine included one in which Klitschko thanked an
adviser to Lithuania’s president for funding the Ukrainian protests. <br />
“The
fact that this was published in the Russian media hints that the
hackers may be linked to Russia,” said Andrei Soldatov, who runs a
Russian computer security website called Agentura.ru. <br />
While
there has been a cyber component in many recent armed conflicts, it’s
likely to be particularly intense in Ukraine because of the level of
programming skills in both countries. Absent a crisis, Ukrainian and
Russian Web wizards often deploy their skills against companies and
consumers, aiming to profit from stolen bank data and corporate secrets.
<br />
<h2>
Targeting Target </h2>
The theft of 40 million credit card
numbers from Target Corp. at the height of Christmas shopping season
last year has been linked by security experts to a hacker based in the
Ukrainian city of Odessa, and the U.S. Justice Department last July
indicted Russians and Ukrainians in the theft of at least 160 million
credit card numbers from several companies. <br />
The key to winning
the cyber conflict largely depends on whether the political leaders on
each side can rally the hackers to their cause, said Sean Sullivan, an
adviser at F-Secure Oyj (FSC1V), a tech consultant in Helsinki. <br />
“There’s
quite a lot of cyber crime coming out of that region, so there are a
lot of guys who know how to get around legitimate blockades,” Sullivan
said. “There’s going to be a lot of cat and mouse, for sure.” <br />
<h2>
WWII Monument </h2>
Cyber
warfare can include blocking websites with so-called distributed denial
of service attacks, in which millions of computers bombard servers with
communication requests, causing them to shut down. More sophisticated
-- and damaging -- techniques include switching off a phone network or
remotely damaging oil refineries, said Costin Raiu, director of research
at Kaspersky Lab, a computer security company in Moscow. <br />
Estonia
was hit by attacks that disabled the websites of the president,
parliament, ministries, banks and newspapers in 2007 during a dispute
with Russia over the relocation of a World War II monument. Estonian
authorities at the time said computers around the world were used to
overload servers with a barrage of access requests coordinated in
Russia. <br />
<h2>
Georgia Attacks </h2>
In 2008, hackers targeted the website of Georgia’s
president in the weeks leading up to a military conflict with Russia.
The attacks were more intense than those that hit Estonia, according to
Internet security firm Arbor Networks. Russian officials at the time
declined to comment on whether the government was involved. <br />
On
March 3, Roskomnadzor, Russia’s telecommunications watchdog, ordered
social-networking site VKontakte to block access to the online
communities of 13 Ukrainian nationalist organizations. The agency said
the Ukrainian groups had called on Russians to participate in terrorist
activities and illegal gatherings. VKontakte complied with the order in
Russia, but the groups can still be accessed by users in Ukraine,
according to the St. Petersburg-based social network. <br />
Ukrainian
phone carrier Ukrtelecom said yesterday that its operations in parts of
Crimea have been limited since Feb. 28 because of takeovers at several
switching centers. Though there have been no communications failures on
the peninsula, the carrier said, some traffic had to be redirected. <br />
</div>
maheshhttp://www.blogger.com/profile/02809113713626613261noreply@blogger.com0tag:blogger.com,1999:blog-8776692190326650009.post-60258867446277495662014-03-06T20:21:00.002-08:002014-03-06T20:21:34.273-08:00DDOS Attack on Meetup<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="http://postmediavancouversun.files.wordpress.com/2014/03/meetup-logo.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://postmediavancouversun.files.wordpress.com/2014/03/meetup-logo.jpg" /></a></div>
<br />
After a rocky week spent recovering from a massive attack by a hacker extortionist, the popular meetup organizing website <a href="http://meetup.com/" target="_blank">Meetup</a> is back to normal.
<br />
And Meetup co-founder and CEO Scott Heiferman is assuring users no personal data was accessed or stolen in the attack.<br />
That should come as good news to consumers, who are an increasing
number of apologetic emails from businesses ranging from Adobe to Target
telling them that personal data including passwords and even credit
card info has been compromised. It’s getting to be such a regular
occurrence that the credit monitoring agencies must be seeing their
business skyrocket.<br />
In a message to Meetup users, Heiferman wrote: ”You may have had
trouble accessing Meetup in the past week, and you may have heard that
we were hit by a massive attack on our servers — a DDoS attack, which is
a barrage of traffic intended to make services unavailable.<br />
“I’m happy to report that Meetup is up and running! And no personal data was accessed or stolen.”<br />
Heiferman said it “was amazing to see how many people were rooting for Meetup.<br />
<br />
<a href="http://meetupblog.meetup.com/post/78413031007/no-doubt-this-has-been-a-tough-weekend-for" target="_blank"> See for more details</a><br />
<br /></div>
maheshhttp://www.blogger.com/profile/02809113713626613261noreply@blogger.com0tag:blogger.com,1999:blog-8776692190326650009.post-26150286602189608032014-03-01T07:43:00.001-08:002014-03-01T07:43:17.900-08:00Tips about How to Secure Your WebBrowser From Hackers<div dir="ltr" style="text-align: left;" trbidi="on">
<h1 class="title" id="page-title">
Securing Your Web Browser</h1>
<h2 style="text-align: left;">
Why Secure Your Browser</h2>
Today,
web browsers such as Internet Explorer, Mozilla Firefox, and Apple
Safari (to name a few), are installed on almost all computers. Because
web browsers are used so frequently, it is vital to configure them
securely. Often, the web browser that comes with an operating system is
not set up in a secure default configuration. Not securing your web
browser can lead quickly to a variety of computer problems caused by
anything from spyware being installed without your knowledge to
intruders taking control of your computer.<br />
Ideally, computer users
should evaluate the risks from the software they use. Many computers
are sold with software already loaded. Whether installed by a
computer manufacturer, operating system maker, Internet Service
Provider, or by a retail store, the first step in assessing the
vulnerability of your computer is to find out what software is installed
and how one program will interact with another. Unfortunately, it is
not practical for most people to perform this level of analysis.<br />
There
is an increasing threat from software attacks that take advantage of
vulnerable web browsers. We have observed a trend whereby new software
vulnerabilities are exploited and directed at web browsers through use
of compromised or malicious websites. This problem is made worse by a
number of factors, including the following:<br />
<ul class="bulleted">
<li>Many users have a tendency to click on links without considering the risks of their actions.</li>
<li>Web page addresses can be disguised or take you to an unexpected site.</li>
<li>Many web browsers are configured to provide increased functionality at the cost of decreased security.</li>
<li>New security vulnerabilities may have been discovered since the software was configured and packaged by the manufacturer.</li>
<li>Computer
systems and software packages may be bundled with additional software,
which increases the number of vulnerabilities that may be attacked.</li>
<li>Third-party software may not have a mechanism for receiving security updates.</li>
<li>Many websites require that users enable certain features or install more software, putting the computer at additional risk.</li>
<li>Many users do not know how to configure their web browsers securely.</li>
<li>Many users are unwilling to enable or disable functionality as required to secure their web browser.</li>
</ul>
As a result, exploiting vulnerabilities in web browsers has become a popular way for attackers to compromise computer systems.<br />
<br />
<h2 style="text-align: left;">
Web Browser Features and Risks</h2>
It
is important to understand the functionality and features of the web
browser you use. Enabling some web browser features may lower security.
Often, vendors will enable features by default to improve the computing
experience, but these features may end up increasing the risk to the
computer.<br />
Attackers focus on exploiting client-side systems (your
computer) through various vulnerabilities. They use these
vulnerabilities to take control of your computer, steal your
information, destroy your files, and use your computer to attack other
computers. A low-cost way attackers do this is by exploiting
vulnerabilities in web browsers. An attacker can create a malicious web
page that will install <a class="offsite" href="http://www.cert.org/advisories/CA-1999-02.html">Trojan</a>
software or spyware that will steal your information. Additional
information about spyware is available in the following document: <a class="offsite" href="http://www.cert.org/archive/pdf/spyware2005.pdf">http://www.cert.org/archive/pdf/spyware2005.pdf</a>.
Rather than actively targeting and attacking vulnerable systems, a
malicious website can passively compromise systems as the site is
visited. A malicious HTML document can also be emailed to victims. In
these cases, the act of opening the email or attachment can compromise
the system.<br />
Some specific web browser features and associated
risks are briefly described below. Understanding what different features
do will help you understand how they affect your web browser's
functionality and the security of your computer.<br />
<strong><a href="https://www.blogger.com/blogger.g?blogID=8776692190326650009" id="activex" name="activex"></a>ActiveX</strong> is
a technology used by Microsoft Internet Explorer on Microsoft Windows
systems. ActiveX allows applications or parts of applications to be
utilized by the web browser. A web page can use ActiveX components that
may already reside on a Windows system, or a site may provide the
component as a downloadable object. This gives extra functionality to
traditional web browsing, but may also introduce more severe
vulnerabilities if not properly implemented.<br />
ActiveX has been
plagued with various vulnerabilities and implementation issues. One
problem with using ActiveX in a web browser is that it greatly increases
the attack surface, or “attackability,” of a system. Installing any
Windows application introduces the possibility of new ActiveX controls
being installed. Vulnerabilities in ActiveX objects may be exploited via
Internet Explorer, even if the object was never designed to be used in a
web browser (<a class="offsite" href="http://www.kb.cert.org/vuls/id/680526">VU#680526</a>). In 2000, the CERT/CC held a workshop to analyze security in ActiveX. The results from that workshop may be viewed at <a class="offsite" href="http://www.cert.org/reports/activeX_report.pdf">http://www.cert.org/reports/activeX_report.pdf</a>.
Many vulnerabilities with respect to ActiveX controls lead to severe
impacts. Often an attacker can take control of the computer. You can
search the Vulnerability Notes Database for ActiveX vulnerabilities at <a class="offsite" href="http://www.kb.cert.org/vuls/byid?searchview&query=activex">http://www.kb.cert.org/vuls/byid?searchview&query=activex</a>.<br />
<span style="font-weight: bold;"><a href="https://www.blogger.com/blogger.g?blogID=8776692190326650009" id="java" name="java"></a>Java</span> is
an object-oriented programming language that can be used to develop
active content for websites. A Java Virtual Machine, or JVM, is used to
execute the Java code, or “<a class="offsite" href="http://www.us-cert.gov/redirect?url=http%3A%2F%2Fjava.sun.com%2Fapplets%2F" target="_blank">applet</a>,”
provided by the website. Some operating systems come with a JVM, while
others require a JVM to be installed before Java can be used. Java
applets are operating system independent.<br />
Java applets usually execute within a “<a class="offsite" href="http://www.us-cert.gov/redirect?url=http%3A%2F%2Fjava.sun.com%2Fj2se%2F1.4.2%2Fdocs%2Fguide%2Fsecurity%2Fspec%2Fsecurity-spec.doc1.html%2318313" target="_blank">sandbox</a>”
where the interaction with the rest of the system is limited. However,
various implementations of the JVM contain vulnerabilities that allow an
applet to bypass these restrictions. Signed Java applets can also
bypass sandbox restrictions, but they generally prompt the user before
they can execute. You can search the Vulnerability Notes Database for
Java vulnerabilities at <a class="offsite" href="http://www.kb.cert.org/vuls/byid?searchview&query=java">http://www.kb.cert.org/vuls/byid?searchview&query=java</a>.<br />
<strong><a href="https://www.blogger.com/blogger.g?blogID=8776692190326650009" id="plug-ins" name="plug-ins"></a>Plug-ins</strong>
are applications intended for use in the web browser. Netscape has
developed the NPAPI standard for developing plug-ins, but this standard
is used by multiple web browsers, including Mozilla Firefox and Safari.
Plug-ins are similar to ActiveX controls but cannot be executed outside
of a web browser. Adobe Flash is an example of an application that is
available as a plug-in.<br />
Plug-ins can contain programming flaws such as <a class="offsite" href="http://www.cert.org/homeusers/buffer_overflow.html">buffer overflows</a>, or they may contain design flaws such as cross-domain violations, which arises when the <a class="offsite" href="http://www.mozilla.org/projects/security/components/same-origin.html">same origin policy</a> is not followed.<br />
<strong><a href="https://www.blogger.com/blogger.g?blogID=8776692190326650009" id="cookies" name="cookies"></a>Cookies</strong> are
files placed on your system to store data for specific websites. A
cookie can contain any information that a website is designed to place
in it. Cookies may contain information about the sites you visited, or
may even contain credentials for accessing the site. Cookies are
designed to be readable only by the website that created the cookie.
Session cookies are cleared when the browser is closed, and persistent
cookies will remain on the computer until the specified expiration date
is reached.<br />
Cookies can be used to uniquely identify visitors of a
website, which some people consider a violation of privacy. If a
website uses cookies for authentication, then an attacker may be able to
acquire unauthorized access to that site by obtaining the cookie.
Persistent cookies pose a higher risk than session cookies because they
remain on the computer longer.<br />
<strong><a href="https://www.blogger.com/blogger.g?blogID=8776692190326650009" id="javascript" name="javascript"></a>JavaScript</strong>,
also known as ECMAScript, is a scripting language that is used to make
websites more interactive. There are specifications in the JavaScript
standard that restrict certain features such as accessing local files.<br />
<strong><a href="https://www.blogger.com/blogger.g?blogID=8776692190326650009" id="vbscript" name="vbscript"></a>VBScript</strong> is
another scripting language that is unique to Microsoft Windows Internet
Explorer. VBScript is similar to JavaScript, but it is not as widely
used in websites because of limited compatibility with other browsers.<br />
The
ability to run a scripting language such as JavaScript or VBScript
allows web page authors to add a significant amount of features and
interactivity to a web page. However, this same capability can be abused
by attackers. The default configuration for most web browsers enables
scripting support, which can introduce multiple vulnerabilities, such as
the following:<br />
<ul class="bulleted">
<li><strong><a href="https://www.blogger.com/blogger.g?blogID=8776692190326650009" id="xss" name="xss"></a>Cross-Site Scripting</strong> Cross-Site
Scripting, often referred to as XSS, is a vulnerability in a website
that permits an attacker to leverage the trust relationship that you
have with that site. For a high-level description of XSS attacks, please
see the whitepaper published at <a class="offsite" href="http://www.cert.org/archive/pdf/cross_site_scripting.pdf">http://www.cert.org/archive/pdf/cross_site_scripting.pdf</a>.
Note that Cross-Site Scripting is not usually caused by a failure in
the web browser. You can search the Vulnerability Notes Database for
Cross-Site Scripting vulnerabilities at <a class="offsite" href="http://www.kb.cert.org/vuls/byid?searchview&query=cross-site+scripting">http://www.kb.cert.org/vuls/byid?searchview&query=cross-site+scripting</a>.</li>
<li><strong><a href="https://www.blogger.com/blogger.g?blogID=8776692190326650009" id="cross-domain" name="cross-domain"></a>Cross-Zone and Cross-Domain Vulnerabilities</strong>Most
web browsers employ security models to prevent script in a website from
accessing data in a different domain. These security models are
primarily based on the Netscape Same Origin Policy: <a class="offsite" href="http://www.mozilla.org/projects/security/components/same-origin.html">http://www.mozilla.org/projects/security/components/same-origin.html</a>. Internet Explorer also has a policy to enforce security zone separation: <a class="offsite" href="http://www.us-cert.gov/redirect?url=http%3A%2F%2Fwww.microsoft.com%2Fwindows%2Fie%2Fie6%2Fusing%2Fhowto%2Fsecurity%2Fsetup.mspx" target="_blank">http://www.microsoft.com/windows/ie/ie6/using/howto/security/setup.mspx</a>.<br />
Vulnerabilities
that violate these security models can be used to perform actions that a
site could not normally perform. The impact can be similar to a
cross-site scripting vulnerability. However, if a vulnerability allows
for an attacker to cross into the local machine zone or other protected
areas, the attacker may be able to execute arbitrary commands on the
vulnerable system. You can search the Vulnerability Notes Database for
cross-zone and cross-domain vulnerabilities at <a class="offsite" href="http://www.kb.cert.org/vuls/byid?searchview&query=cross-domain">http://www.kb.cert.org/vuls/byid?searchview&query=cross-domain</a>.</li>
<li><strong><a href="https://www.blogger.com/blogger.g?blogID=8776692190326650009" id="evasion" name="evasion"></a>Detection Evasion </strong>Anti-virus,
Intrusion Detection Systems (IDS), and Intrusion Prevention Systems
(IPS) generally work by looking for specific patterns in content. If a
“known bad” pattern is detected, then the appropriate actions can take
place to protect the user. But because of the dynamic nature of
programming languages, scripting in web pages can be used to evade such
protective systems.</li>
</ul>
<h2>
<a href="https://www.blogger.com/blogger.g?blogID=8776692190326650009" id="how_to_secure" name="how_to_secure"></a>How to Secure Your Web Browser</h2>
Some
software features that provide functionality to a web browser, such as
ActiveX, Java, Scripting (JavaScript, VBScript, etc.), may also
introduce vulnerabilities to the computer system. These may stem from
poor implementation, poor design, or an insecure configuration. For
these reasons, you should understand which browsers support which
features and the risks they could introduce. Some web browsers permit
you to fully disable the use of these technologies, while others
may permit you to enable features on a per-site basis.<br />
This
section shows you how to securely configure a few of the most popular
web browsers and how to disable features that can cause vulnerabilities.
We encourage you to visit the vendor's website for the browser you use
to learn more. If a vendor does not provide documentation on how to
secure the browser, we encourage you to contact them and request more
information.<br />
Multiple web browsers may be installed on your
computer. Other software applications on your computer, such as email
clients or document viewers, may use a different browser than the one
you normally use to access the web. Also, certain file types may be
configured to open with a different web browser. Using one web browser
for manually interacting with websites does not mean other applications
will automatically use the same browser. For this reason, it is
important to securely configure each web browser that may be installed
on your computer. One advantage to having multiple web browsers is that
one browser can be used for only sensitive activities such as online
banking, and the other can be used for general purpose web browsing.
This can minimize the chances that a vulnerability in a web browser,
website, or related software can be used to compromise sensitive
information.<br />
Web browsers are frequently updated. Depending on the version of your software, the features and options may move or change.<br />
<h3>
<a href="https://www.blogger.com/blogger.g?blogID=8776692190326650009" id="Internet_Explorer" name="Internet_Explorer"></a>Microsoft Internet Explorer</h3>
Microsoft
Internet Explorer (IE) is a web browser integrated into the Microsoft
Windows operating system. Removal of this application is not practical.<br />
<a href="https://www.blogger.com/blogger.g?blogID=8776692190326650009" id="ieactivex" name="ieactivex"></a>
In addition to supporting Java, scripting and other forms of active
content, Internet Explorer implements ActiveX technology. While any
application is potentially vulnerable to attack, it is possible to
mitigate a number of serious vulnerabilities by using a web browser that
does not support ActiveX controls. However, using an alternate browser
may affect the functionality of some sites that require the use of
ActiveX controls. Note that using a different web browser will not
remove IE, or other Windows components from the system. Other software,
such as email clients, may use IE, the WebBrowser ActiveX control
(WebOC), or the IE HTML rendering engine (MSHTML). Results from the
CERT/CC ActiveX workshop in 2000 are available at <a class="offsite" href="http://www.cert.org/reports/activeX_report.pdf">http://www.cert.org/reports/activeX_report.pdf</a>.<br />
Here
are steps to disable various features in Internet Explorer 7. Note that
menu options may vary between versions of IE, so you should adapt the
steps below as appropriate.<br />
In order to change settings for Internet Explorer, select <span style="font-weight: bold;">Tools</span> then <strong>Internet Options…</strong><br />
<img alt="Screen shot of Internet Explorer Tools menu" src="http://www.us-cert.gov/sites/default/files/images/securing_browser/tools_internet_options_ie7.png" style="height: 384px; width: 302px;" /><br />
Select the <span style="font-weight: bold;">Security</span>
tab. On this tab you will find a section at the top that lists the
various security zones that Internet Explorer uses. More information
about Internet Explorer security zones is available in the Microsoft
document <a class="offsite" href="http://www.us-cert.gov/redirect?url=http%3A%2F%2Fwww.microsoft.com%2Fwindows%2Fie%2Fusing%2Fhowto%2Fsecurity%2Fsetup.mspx" target="_blank">Setting Up Security Zones</a>. For each of these zones, you can select a Custom Level of protection. By clicking the <span style="font-weight: bold;">Custom Level</span> button, you will see a second window open that permits you to select various security settings for that zone. The <span style="font-weight: bold;">Internet</span>
zone is where all sites initially start out. The security settings for
this zone apply to all the websites that are not listed in the other
security zones. We recommend the <span style="font-weight: bold;">High</span>
security setting be applied for this zone. By selecting the High
security setting, several features including ActiveX, Active scripting,
and Java will be disabled. With these features disabled, the browser
will be more secure. Click the <strong>Default Level</strong> button and then drag the slider control up to <strong>High</strong>.<br />
<img alt="Screen shot of Internet Explorer Internet Options dialog with security level set to High" src="http://www.us-cert.gov/sites/default/files/images/securing_browser/ie7_internet_zone_high.png" style="height: 519px; width: 413px;" /><br />
For a more fine-grained control over what features are allowed in the zone, click the <span style="font-weight: bold;">Custom Level</span>
button. Here you can control the specific security options that apply
to the current zone. For example ActiveX can be disabled by selecting <span style="font-weight: bold;">Disable</span> for <span style="font-weight: bold;">Run ActiveX controls and plug-ins</span>. Default values for the High security setting can be selected by choosing <strong>High</strong> and clicking the <strong>Reset</strong> button to apply the changes.<br />
<img alt="Screen shot of Internet Explorer Security Settings dialog with Run ActiveX controls and plug-ins disabled and Reset custom settings set to High" src="http://www.us-cert.gov/sites/default/files/images/securing_browser/ie7_high_security.png" style="height: 479px; width: 417px;" /><br />
The <span style="font-weight: bold;">Trusted sites</span> zone is a <a class="offsite" href="http://www.us-cert.gov/redirect?url=http%3A%2F%2Fwww.microsoft.com%2Fwindows%2Fie%2Fie6%2Fusing%2Fhowto%2Fsecurity%2Fsettings.mspx" target="_blank">security zone</a>
for sites that you think are safe to visit. You believe that the site
is designed with security in mind and that it can be trusted not to
contain malicious content. To add or remove sites from this zone, you
can click the <span style="font-weight: bold;">Sites…</span> button.
This will open a secondary window listing the sites that you trust and
permitting you to add or remove them. You may also require that only
verified sites (HTTPS) can be included in this zone. This gives you
greater assurance that the site you are visiting is the site that it
claims to be.<br />
<img alt="Screen shot of Internet Explorer Internet Options dialog with Trusted sites highlighted, Security level set to medium-high, and the Default level button highlighted" src="http://www.us-cert.gov/sites/default/files/images/securing_browser/ie7_trusted_sites.png" style="height: 519px; width: 413px;" /><br />
<img alt="Screen shot of Internet Explorer Trusted sites dialog with Websites list highlighted" src="http://www.us-cert.gov/sites/default/files/images/securing_browser/ie7_trusted_sites_details.png" style="height: 342px; width: 384px;" /><br />
We recommend setting the security level for the <span style="font-weight: bold;">Trusted sites</span> zone to <span style="font-weight: bold;">Medium-high</span> (or <span style="font-weight: bold;">Medium</span> for Internet Explorer 6 and earlier). When the Internet Zone is set to <span style="font-weight: bold;">High</span>,
you may encounter websites that do not function properly due to one or
more of the associated security settings. This is where the <span style="font-weight: bold;">Trusted sites</span>
zone can help. If you trust that the site will not contain malicious
content, you can add it to the list of sites in the Trusted sites zone.
Once a site is added to this zone, features such as ActiveX and Active
scripting will be enabled for the site. The benefit of this type of
configuration is that IE will be more secure by default, and sites can
be “whitelisted” in the Trusted sites zone to gain extra functionality.<br />
<a href="https://www.blogger.com/blogger.g?blogID=8776692190326650009" id="privacy" name="privacy"></a> The <span style="font-weight: bold;">Privacy</span>
tab contains settings for cookies. Cookies are text files placed on
your computer by various sites that you visit either directly
(first-party) or indirectly (third-party) through ad banners, for
example. A cookie can contain any data that a site wishes to store. It
is often used to track your computer as you move through a website and
store information such as preferences or credentials. We recommend that
you select the <span style="font-weight: bold;">Advanced</span> button and select <span style="font-weight: bold;">Override automatic cookie handling</span>. Then select <span style="font-weight: bold;">Prompt</span>
for both first and third-party cookies. This will prompt you each time a
site tries to place a cookie on your machine. If the number of cookie
prompts is too excessive, the option to <span style="font-weight: bold;">Always allow session cookies</span>
can be enabled. This will allow non-persistent cookies to be accepted
without user interaction. Session cookies have less risk than persistent
cookies.<br />
<img alt="Screen shot of Internet Explorer Internet Options dialog with Sites button and Advanced button highlighted" src="http://www.us-cert.gov/sites/default/files/images/securing_browser/privacy.png" style="height: 459px; width: 406px;" /><br />
<img alt="Screen shot of Internet Explorer Advanced Privacy Settings dialog with Override automatic cookie handling option checked, First-party Cookies prompt option selected, and Third-party Cookies prompt option selected" src="http://www.us-cert.gov/sites/default/files/images/securing_browser/advanced_privacy.png" style="height: 302px; width: 378px;" /><br />
You
can then evaluate the originating site, whether you wish to accept or
deny the cookie, and what action to take (allow or block, with the
option to remember the decision for all future cookies from that
website). For example, if visiting a website causes a cookie prompt from
a web domain that is associated with advertising, you may wish to click
<span style="font-weight: bold;">Block Cookie</span> to prevent that domain from being able to set cookies on your computer, for privacy reasons.<br />
<img alt="Screen shot of Internet Explorer Privacy Alert dialog" src="http://www.us-cert.gov/sites/default/files/images/securing_browser/ie7_cookie_details.png" style="height: 442px; width: 405px;" /><br />
By selecting the <span style="font-weight: bold;">Sites...</span>
button, you can manage the cookie settings for specific sites. You can
add or remove sites, and you can change the current settings for
existing sites. The bottom section of this window will specify the
domain of the site and the action to take when that site wants to place a
cookie on your machine. You can use the upper section of this window to
change these settings.<br />
<img alt="Screen shot of Internet Explorer Per Site Privacy Actions dialog with Address of Web site area highlighted and Managed Web sites selection highlighted" src="http://www.us-cert.gov/sites/default/files/images/securing_browser/per_site_privacy.png" style="height: 468px; width: 441px;" /><br />
Alternatively,
if you do not wish to receive warning dialogs when a site attempts to
set a cookie, you can use Internet Explorer's pre-set privacy rules.
Click the <span style="font-weight: bold;">Default</span> button and then drag the slider up to <span style="font-weight: bold;">High</span>. Note that some websites may fail to function properly with the <span style="font-weight: bold;">High</span> setting. In such cases, you may add the site to the list of sites for which cookies are allowed, as described above.<br />
<img alt="Screen shot of Internet Explorer Internet Options dialog with high Internet zone privacy selected and the Default button highlighted" src="http://www.us-cert.gov/sites/default/files/images/securing_browser/ie7_cookies_high.png" style="height: 519px; width: 413px;" /><br />
The <span style="font-weight: bold;">Advanced</span> tab contains settings that apply to all of the security zones. We recommend that you <span style="font-weight: bold;">disable</span> the <span style="font-weight: bold;">Enable third-party browser extensions</span>
option. This option includes tool bars and Browser Helper Objects
(BHOs). While some add-ons can be useful, they also have the ability to
violate your privacy. For example, a browser add-on may monitor your web
browsing habits, or even change the contents of web pages in an attempt
to gather personal information.<br />
<img alt="Screen shot of Internet Explorer Internet Options dialog with Enable third-party browser extensions unchecked" src="http://www.us-cert.gov/sites/default/files/images/securing_browser/ie7_advanced_thirdparty.png" style="height: 519px; width: 413px;" /><br />
Internationalized
Domain Names (IDN) can be abused to allow spoofing of web page
addresses. This can allow phishing attacks to be more convincing. More
details about IDN spoofing can be found in Vulnerability Note <a class="offsite" href="http://www.kb.cert.org/vuls/id/273262">VU#273262</a>. To protect against IDN spoofing in Internet Explorer, enable the <span style="font-weight: bold;">Always show encoded addresses</span>
option. This will cause IDN addresses to be displayed in an encoded
form in the Internet Explorer address bar and status bar, which will
remove the visual similarity to the spoofing target address. <br />
We also recommend that you <span style="font-weight: bold;">disable</span> the <span style="font-weight: bold;">Play sounds in webpages</span>
option. Sounds in web pages are rarely integral to web page content,
and may also introduce security risks by having the browser process
additional untrusted data. This option is for Internet Explorer's
ability to natively handle sounds. It will not interfere with other
software, such as Adobe Flash or Apple QuickTime.<br />
<img alt="Screen shot of Internet Explorer Internet Options dialog with Always show encoded addresses checked and Play sounds in webpages unchecked" src="http://www.us-cert.gov/sites/default/files/images/securing_browser/ie7_advanced_idn.png" style="height: 519px; width: 413px;" /><br />
Under the <span style="font-weight: bold;">Programs</span>
tab, you can specify your default applications for viewing websites,
email messages and various other network related tasks. You can also
disable Internet Explorer from asking you if you would like it to be
your default web browser here.<br />
<img alt="Screen shot of Internet Explorer Internet Options dialog with Internet programs area and Default web browser area highlighted" src="http://www.us-cert.gov/sites/default/files/images/securing_browser/ie7_internet_options_programs.png" style="height: 519px; width: 413px;" /><br />
<h3>
<a href="https://www.blogger.com/blogger.g?blogID=8776692190326650009" id="Mozilla_Firefox" name="Mozilla_Firefox"></a>Mozilla Firefox</h3>
Mozilla
Firefox supports many features of the same features as Internet
Explorer, with the exception of ActiveX and the Security Zone model.
Mozilla Firefox does have the underlying support for configurable
security policies (<a class="offsite" href="http://www.mozilla.org/projects/security/components/ConfigPolicy.html">CAPS</a>),
which is similar to Internet Explorer's Security Zone model, however
there is no graphical user interface for setting these options. We
recommend looking in the <span style="font-weight: bold;">Help</span>, <span style="font-weight: bold;">For Internet Explorer Users</span> menu to help users understand how terminology differs between the two applications.<br />
The
following are some steps to disable various features in Mozilla
Firefox. Note that some menu options may change between versions or may
appear in different locations depending on the host operating system.
You should adapt the steps below as appropriate.<br />
To edit the settings for Mozilla Firefox, select <span style="font-weight: bold;">Tools</span>, then <span style="font-weight: bold;">Options</span>.<br />
<img alt="Screen shot of Mozilla Firefox Tools menu with Options highlighted" src="http://www.us-cert.gov/sites/default/files/images/securing_browser/f2_tools_options.png" style="height: 245px; width: 464px;" /><br />
You
will then see an Options window that has a Category row at the top and
the features for that category below. The first category of interest is
the <span style="font-weight: bold;">General</span> category. Under this section, you can set Firefox as your default browser. Also select the option <span style="font-weight: bold;">Always ask me where to save files</span>. This will make it more obvious when a web page attempts to save a file to your computer.<br />
<img alt="Screen shot of Mozilla Firefox Options dialog with the Always ask me where to save files option selected and the Check Now button highlighted" src="http://www.us-cert.gov/sites/default/files/images/securing_browser/f2_default.png" style="height: 472px; width: 469px;" /><br />
Under the <span style="font-weight: bold;">Privacy</span> category, you will find options for browser History and Cookies. In the History section, disable the option to <span style="font-weight: bold;">Remember what I enter in forms and the search bar</span>.
If the browser remembers these options, it can be a privacy violation,
especially if the browser is used in a shared environment. Visited page
and download history can be disabled here too.<br />
In the Cookie section, select <span style="font-weight: bold;">ask me every time</span>. This will help make it clear when a website is attempting to set a cookie.<br />
<img alt="Screen shot of Mozilla Firefox Options dialog with the Remember what I enter in forms and the search bar option unchecked and the Cookies Keep until option set at ask me every time" src="http://www.us-cert.gov/sites/default/files/images/securing_browser/f2_cookies.png" style="height: 472px; width: 469px;" /><br />
When the user is prompted, the contents of the cookie can be viewed and the user can select whether to <span style="font-weight: bold;">Deny</span>, <span style="font-weight: bold;">Allow for Session</span>, or <span style="font-weight: bold;">Allow</span>
the cookie. This gives the user more information about what sites are
using cookies and also gives more granular control of cookies as opposed
to globally enabling them. Select <span style="font-weight: bold;">Use my choice for all cookies from this site</span> to have the browser remember your decision so that you will not be prompted each time you return to the site. Clicking the <span style="font-weight: bold;">Allow for Session</span>
button will cause the cookie to be cleared when the browser is
restarted. If prompting for each cookie is too excessive, the user may
wish to select the <span style="font-weight: bold;">Keep until: I close Firefox</span> option. This will prevent websites from being able to set persistent cookies.<br />
<img alt="Screen shot of Mozilla Firefox Confirm setting cookie dialog with Allow for Session button highlighted" src="http://www.us-cert.gov/sites/default/files/images/securing_browser/f2_cookie_details.png" style="height: 222px; width: 404px;" /><br />
Many
web browsers will offer the ability to store login information. In
general, we recommend against using such features. Should you decide to
use the feature, ensure that you use the measures available to protect
the password data on your computer. Under the <span style="font-weight: bold;">Security</span> category, the <span style="font-weight: bold;">Passwords</span> section contains various options to manage stored passwords, and a <span style="font-weight: bold;">Master Password </span>feature
to encrypt the data on your system. We encourage you to use this option
if you decide to let Mozilla Firefox manage your passwords.<br />
The <span style="font-weight: bold;">Warn me when sites try to install add-ons</span> option will display a warning bar at the top of the browser when a website attempts to take such an action.<br />
<img alt="Screen shot of Mozilla Firefox Options dialog with the Warn me when sites try to install add-ons option checked and the Use a master password option checked" src="http://www.us-cert.gov/sites/default/files/images/securing_browser/f2_security.png" style="height: 472px; width: 469px;" /><br />
The <span style="font-weight: bold;">Content</span> category contains an option to <span style="font-weight: bold;">Enable Java</span>. Java is a programming language that permits website designers to run applications on your computer. We recommend <span style="font-weight: bold;">disabling</span>
this feature unless required by the trusted site you wish to visit.
Again, you should determine if this site is trustworthy and whether you
want to enable Java to view the site’s content. After you are finished
visiting the site, we recommend disabling Java until needed again.<br />
Press the <span style="font-weight: bold;">Advanced</span> button to disable specific JavaScript features. We recommend disabling all of the options displayed in this dialog.<br />
<img alt="Screen shot of Mozilla Firefox Options menu with the Enable JavaScript option checked, the Enable Java option unchecked, and the Advanced button highlighted" src="http://www.us-cert.gov/sites/default/files/images/securing_browser/f2_content.png" style="height: 472px; width: 469px;" /><br />
<img alt="Screen shot of Mozilla Firefox Advanced JavaScript Settings dialog with all options unchecked" src="http://www.us-cert.gov/sites/default/files/images/securing_browser/f_content_advanced.png" style="height: 205px; width: 263px;" /><br />
The <span style="font-weight: bold;">Content</span>
section has an option to modify actions taken when files are
downloaded. Any time a file type is configured to automatically open
with an associated application, this can make the browser more dangerous
to use. Vulnerabilities in these associated applications can be
exploited more easily when they are configured to automatically open.
Click the <span style="font-weight: bold;">Manage</span> button to view the current download settings and modify them if necessary.<br />
<img alt="Screen shot of Mozilla Firefox Options dialog with the Manage button highlighted" src="http://www.us-cert.gov/sites/default/files/images/securing_browser/f2_downloads.png" style="height: 472px; width: 469px;" /><br />
The
Download Actions dialog will show the file types and the currently
configured actions to take when the browser encounters such a file. For <span style="font-weight: bold;">all</span> listed file types, either select <span style="font-weight: bold;">Remove Action</span> or <span style="font-weight: bold;">Change Action...</span>
to modify the action to save the file to the computer. This increases
the amount of user action required to launch the associated
applications, and will therefore help prevent automated exploitation of
vulnerabilities that may exist in these applications.<br />
<img alt="Screen shot of Mozilla Firefox Download Actions dialog with the disabled Remove Action button and enabled Change Action button highlighted" src="http://www.us-cert.gov/sites/default/files/images/securing_browser/f_download_actions.png" style="height: 341px; width: 403px;" /><br />
<img alt="Screen shot of Mozilla Firefox Change Action dialog with the Save them on my computer option selected" src="http://www.us-cert.gov/sites/default/files/images/securing_browser/f_change_action.png" style="height: 358px; width: 403px;" /><br />
Firefox 1.5 and later include a feature to <span style="font-weight: bold;">Clear Private Data</span>. This option will remove potentially sensitive information from the web browser. Select <span style="font-weight: bold;">Clear Private Data...</span> from the <span style="font-weight: bold;">Tools</span> menu to use this privacy feature.<br />
<img alt="Screen shot of Mozilla Firefox Tools menu with the Clear private data option highlighted" src="http://www.us-cert.gov/sites/default/files/images/securing_browser/f2_tools_clear.png" style="height: 245px; width: 464px;" /><br />
<img alt="Screen shot of Mozilla Firefox Clear Private Data dialog with the Browsing History, Download History, Cache, and Authenticated sessions options checked and the Cookies option unchecked" src="http://www.us-cert.gov/sites/default/files/images/securing_browser/f2_clear_private_data.png" style="height: 247px; width: 337px;" /><br />
Because
Firefox does not have easily-configured security zones like Internet
Explorer, it can be difficult to configure the web browser options on a
per-site basis. For example, a user may wish to enable JavaScript for a
specific, trusted site, but have it disabled for all other sites. This
functionality can be added to Firefox with an <a href="https://addons.mozilla.org/">add-on</a>, such as <a href="https://addons.mozilla.org/firefox/addon/722">NoScript</a>.<br />
With
NoScript installed, JavaScript will be disabled for sites by default.
The user can allow scripts for a website by using the NoScript icon
menu. Scripts can be allowed for a site on a temporary or a more
permanent basis. If <span style="font-weight: bold;">Temporarily allow</span> is selected, then scripts are enabled for that site until the browser is closed.<br />
<img alt="Screen shot of Mozilla Firefox NoScript menu with the options for allowing websites and temporarily allowing websites highlighted" src="http://www.us-cert.gov/sites/default/files/images/securing_browser/noscript_allow.png" style="height: 217px; width: 243px;" /><br />
Because
many web browser vulnerabilities require scripting, configuring the
browser to have scripting disabled by default greatly reduces the
chances of exploitation. To extend this protection even further,
NoScript can be configured to also block Java, Flash, and other plug-ins
by default. This can help to mitigate any vulnerabilities in these
plug-in technologies. NoScript will replace these elements with a
placeholder icon, which can be clicked to enable the element. Click the
NoScript icon and then click <span style="font-weight: bold;">Options...</span> to get to the NoScript configuration screen.<br />
<img alt="Screen shot of Mozilla Firefox NoScript menu with the Options option highlighted" src="http://www.us-cert.gov/sites/default/files/images/securing_browser/noscript_icon_options.png" style="height: 217px; width: 243px;" /><br />
On the <span style="font-weight: bold;">Plugins</span> tab, select the options as follows:<br />
<img alt="Screen shot of Mozilla Firefox NoScript dialog with the options for Forbid Java, Forbid Adobe Flash, Forbid Microsoft Silverlight, Forbid other plugins, Forbid IFRAME, Apply these restrictions to trusted sites too, Show placeholder icon, and Ask for confirmation before temporarily unlocking an object all selected." src="http://www.us-cert.gov/sites/default/files/images/securing_browser/noscript_options.png" style="height: 441px; width: 513px;" /><br />
Aside
from visiting websites that are inherently malicious, users can also be
put at risk when a legitimate, trusted site is compromised. For this
reason, we recommend enabling the option to <span style="font-weight: bold;">Apply these restrictions to trusted sites too</span>. If this option is too intrusive, it can be turned off at the cost of increased risk.<br />
<h3>
<a href="https://www.blogger.com/blogger.g?blogID=8776692190326650009" id="Safari" name="Safari"></a>Apple Safari</h3>
The
Safari web browser supports many of the same features as Mozilla
Firefox. The following are some steps to disable various features in
Safari on Mac OS X. The options for Safari for Microsoft Windows may
differ slightly. Also note that some menu options may change over time,
and you should adapt the steps below as appropriate.<br />
In order to change settings for Safari, select <span style="font-weight: bold;">Safari</span> then <span style="font-weight: bold;">Preferences…</span><br />
Note
that on the Safari menu, you can also select the option “Block Pop-up
Windows”. This option will prevent sites from opening another window
through the use of scripting or active content. Be aware that while
Pop-up Windows are often associated with advertisements, some sites may
attempt to display relevant content in a new window. Therefore, setting
this option may disable the functionality of some sites.<br />
<img alt="Screen shot of Apple Safari's Safari menu with Preferences option highlighted" src="http://www.us-cert.gov/sites/default/files/images/securing_browser/s_preferences.png" style="height: 357px; width: 532px;" /><br />
Once you select the <span style="font-weight: bold;">Preferences</span> menu, the window below will open. The first tab to look at is the <span style="font-weight: bold;">General</span> tab. On this tab you can set up many options such as <span style="font-weight: bold;">Save downloaded files to:</span> and <span style="font-weight: bold;">Open “safe” files after downloading</span>. We recommend that you download files to a folder that you create for that purpose. We also recommend that you deselect the <span style="font-weight: bold;">Open “safe” files after downloading</span> option.<br />
<img alt="Screen shot of Apple Safari General dialog with the Save downloaded files to selection area highlighted and the Open safe files after downloading option unchecked" src="http://www.us-cert.gov/sites/default/files/images/securing_browser/s_general_preferred.png" style="height: 515px; width: 538px;" /><br />
The next section of interest is the <span style="font-weight: bold;">AutoFill</span>
tab. On this tab, you can select what types of forms your browser will
fill in automatically. In general, we recommend against using AutoFill
features. If someone can gain access to your machine, or the AutoFill
data files, then the AutoFill feature may allow them to use the stored
credentials to access to other sites that they would not otherwise have
the ability to access. However, if used with appropriate protective
measures, it may be acceptable to enable AutoFill. We recommend using
filesystem encryption software such as OS X <a class="offsite" href="http://www.us-cert.gov/redirect?url=http%3A%2F%2Fdocs.info.apple.com%2Farticle.html%3Fpath%3DMac%2F10.4%2Fen%2Fmh1877.html" target="_blank">FileVault</a> along with the <span style="font-weight: bold;">Use secure virtual memory</span> option to provide additional security for files that reside in a user's home directory.<br />
<img alt="Screen shot of Apple Safari AutoFill dialog" src="http://www.us-cert.gov/sites/default/files/images/securing_browser/s_autofill.png" style="height: 254px; width: 538px;" /><br />
The <span style="font-weight: bold;">Security</span> tab provides several options. The <span style="font-weight: bold;">Web Content</span>
section permits you to enable or disable various forms of scripting and
active content. We recommend disabling the first three options in this
section, and only enabling them based on site-specific cases. We
recommend selecting the <span style="font-weight: bold;">Block Pop-up Windows</span>
option. Remember that this option will prevent sites from opening
another window through the use of scripting, or active content. Again,
be aware that while Pop-up Windows are often associated with
advertisements, some sites may attempt to display relevant content in a
new window. Therefore, setting this option may disable the functionality
of some sites.<br />
It is safer to use Safari without plug-ins and Java, so we recommend <span style="font-weight: bold;">disabling</span> the options <span style="font-weight: bold;">Enable plug-ins</span> and <span style="font-weight: bold;">Enable Java</span>. It is also safer to <span style="font-weight: bold;">disable JavaScript</span>. However, many websites require JavaScript for proper operation.<br />
In
this dialog you can disable cookies and also view or remove cookies
that have been set. In general we recommend disabling cookies, and
enabling them only when you visit a site that requires their use. At
this point, you should determine if the site is trustworthy and whether
you want to enable cookies to view the site’s content. After you are
finished visiting the site, we recommend disabling cookies until needed
again. You can choose to only accept cookies from the sites that you
visit by selecting the <span style="font-weight: bold;">Only from sites you navigate to</span> option. This will permit sites that you visit to set cookies, but not third-party sites. Finally, we recommend selecting the <span style="font-weight: bold;">Ask before sending a non-secure form to a secure website</span> option. This will prompt you before sending unencrypted form data when viewing an HTTPS-secured website.<br />
<img alt="Screen shot of Apple Safari Security dialog with the options for Enable plug-ins, Enable Java, and Enable JavaScript all unchecked; the Accept Cookies option set to Only from sites you navigate to; and the option for Ask before sending a non-secure form to a secure website checked" src="http://www.us-cert.gov/sites/default/files/images/securing_browser/s_security_nojs.png" style="height: 430px; width: 538px;" /><br />
<h3>
<a href="https://www.blogger.com/blogger.g?blogID=8776692190326650009" id="Other_Browsers" name="Other_Browsers"></a>Other Browsers</h3>
Other
web browsers may have similar options to those described above. Please
refer to the browser documentation to determine which options are
available and how to make the necessary changes. For example, the links
below show where to find information for four popular web browsers:<br />
<ul class="bulleted">
<li>Opera - <a class="offsite" href="http://www.us-cert.gov/redirect?url=http%3A%2F%2Fwww.opera.com%2Fsupport%2Ftutorials%2Fsecurity" target="_blank">http://www.opera.com/support/tutorials/security</a></li>
<li>Mozilla SeaMonkey - <a class="offsite" href="http://www.mozilla.org/projects/seamonkey">http://www.mozilla.org/projects/seamonkey</a></li>
<li>Konqueror - <a class="offsite" href="http://www.konqueror.org/">http://www.konqueror.org</a></li>
<li>Netscape - <a class="offsite" href="http://www.us-cert.gov/redirect?url=http%3A%2F%2Fbrowser.netscape.com%2F" target="_blank">http://browser.netscape.com</a></li>
</ul>
Note
that official support for Netscape has ended on February 1st, 2008. If
you are using Netscape, we strongly recommend switching to a browser
that is still supported.<br />
<h2>
<a href="https://www.blogger.com/blogger.g?blogID=8776692190326650009" id="Staying_Secure" name="Staying_Secure"></a>Keeping Your Computer Secure</h2>
In
addition to selecting and securing your web browser, you can take
measures to increase protection to your computer in general. The
following are steps and links to information resources that will help
you secure your computer.<br />
<ol style="list-style-type: upper-alpha;">
<li><h4>
Read the <a class="offsite" href="http://www.cert.org/tech_tips/home_networks.html">Home Network Security</a> and <a class="offsite" href="http://www.cert.org/homeusers/HomeComputerSecurity/">Home Computer Security</a> documents</h4>
</li>
<li class="desc"><h4>
Enable automatic software updates if available</h4>
Vendors
will usually release patches for their software when a vulnerability
has been discovered. Most product documentation offers a method to get
updates and patches. You should be able to obtain updates from the
vendor's website. Read the manuals or browse the vendor's website for
more information.<br />
Some applications will automatically check for
available updates, and many vendors offer automatic notification of
updates via a mailing list. Look on your vendor's website for
information about automatic notification. If no mailing list or other
automated notification mechanism is offered, you may need to check the
vendor's website periodically for updates.</li>
<li class="desc"><h4>
Install and use antivirus software</h4>
While
an up-to-date antivirus software package cannot protect against all
malicious code, for most users it remains the best first-line of defense
against malicious code attacks. Many antivirus packages support
automatic updates of virus definitions. We recommend using these
automatic updates when available. A partial list of <a class="offsite" href="http://www.us-cert.gov/reading_room/virus.html">antivirus vendors</a> is available is available on the CERT/CC website.</li>
<li class="desc"><h4>
Avoid unsafe behavior</h4>
Additional information on this topic can be found in the <a class="offsite" href="http://www.cert.org/tech_tips/home_networks.html">Home Network Security</a> document.<br />
<ul class="bulleted">
<li>Use caution when opening email attachments or when using peer-to-peerfile sharing, instant messaging, or chat rooms.</li>
<li>Don't enable file sharing on network interfaces exposed directly to the Internet.</li>
</ul>
</li>
<li class="desc"><h4>
Follow the principle of least privilege — don't enable it if you don't need it</h4>
Consider
creating and using an account with limited privileges instead of an
'administrator' or 'root' level account for everyday tasks. Depending on
the operating system, you only need to use administrator level access
when installing new software, changing system configurations, etc. Many
vulnerability exploits (e.g., viruses, Trojan horses) are executed with
the privileges of the user that runs them — making it far more risky to
be logged in as an administrator all the time.</li>
</ol>
</div>
maheshhttp://www.blogger.com/profile/02809113713626613261noreply@blogger.com0tag:blogger.com,1999:blog-8776692190326650009.post-21893956006447273672014-02-09T10:21:00.001-08:002014-02-09T10:21:13.877-08:00How to stop hackers from getting your facebook account.<div dir="ltr" style="text-align: left;" trbidi="on">
First and foremost, the easiest way for hackers to steal your account is
by phishing schemes. All they have to do is create a legitimate looking
page telling you that they need your user name and password to log in.
There are two main ways this can happen, from within Facebook or via
email. From within Facebook, here's the thing to remember... if you are
logged in, you WON'T need to log in again short of losing your internet
connection. If someone sends you a gift app that requires you to log in
to see the gift, DON'T!!! I have made it a point to weed out the crAPPs
(as I call them) by removing people from my friends list who send them.
One crAPP posted to my wall means you're out!!<br />Via email, you may
receive a legitimate looking email saying that your account has been
compromised and have a link within the body of the email to log in.
DON'T USE THE LINK!! Instead, go directly to Facebook and attempt to log
in as usual. IF your account is truly compromised, you will receive a
message from Facebook on attempted login.<br />To comment on someone's trade note, just navigate to their
notes section and find it yourself. If they have multiple notes, ask
which one to leave a comment on.<br />Also, stay away from trading within
Facebook's chat or email. Scammers and hackers prefer to "trade" this
way because it keeps them from prying eyes... like ours at KTM!<br /><br />The
next way any hacker can get your password is by brute force. These are
simple hacking tools that use number/letter combination and try again
and again until your password is found. They might need 2 things for
this to work. 1) your user name (email account) and 2) possibly your
date of birth. These are easily found within your info page within your
profile. FIRST... hide these from prying eyes.<br /><br />Go to Account>Account Settings>Privacy Settings and change your birthday settings to "Only Me".<br />Then go back to Privacy>Contact Information and set your email to "Only Me".<br />By doing this, you have just removed the most easily accessible 2/3 of the information any hacker needs.<br /><br />The
final step is your password. This is the single-most important piece of
the equation... and you should follow this advice in ALL your important
web sites you visit, especially banking, PayPal, eBay, Credit Cards and
other critical sites. <br />MOST brute force hacking tools can only do
number/letter combinations up to 8 digits... some can do more. The key
here is the combinations of what they can do. I HIGHLY recommend the use
of special characters in your password such as _ - + = / \ | * & ^ %
$ # @ ! ~ etc. Brute force hackers CAN'T do these symbols! Also, make
your password more than 8 characters. Use number/letter/special
character combinations with the use of capital letters thrown in.<br /><br />If
you want to make sure you don't forget what it is, use common words,
like your own name, but substitute numbers for letters that look
similar.<br /> e.g. my name is David Reedy. I can do a password using my
name as an example like "Mah1_G33ri" or variations. Notice the
underscore? The likelihood of this password being hacked by brute force
is slim to none! <br />The variants make it so that if a brute force
hacking tool was used, and it was able to try a new combination every
second, it would take at least 12-billion seconds to crack it. How long
is 12-billion seconds?? Almost 380 years!!! Long enough for me to not
care less if and when they finally hack it!<br /><br />I hope that this has
given you some ideas to better safeguard your personal accounts. And
remember, if YOU get hacked, you are going to lose more than your loot
and lotto, you're going to potentially lose your well established name
and reputation. And others who have come to trust your name and
reputation will suffer also when they in turn get scammed by the hacker.<br /><br />Make
sure your personal identity; your email, birth date and password follow
the rule of The Lord of the Rings... "Keep it secret. Keep it safe"!</div>
maheshhttp://www.blogger.com/profile/02809113713626613261noreply@blogger.com0tag:blogger.com,1999:blog-8776692190326650009.post-34644214826445726372014-02-05T11:57:00.002-08:002014-03-11T11:57:03.743-07:00Top 10 Ethical Hackers in India | Best Indian Hackers | Indian Ethical Hackers<div dir="ltr" style="text-align: left;" trbidi="on">
<a class="voteuphreflink" href="https://login.live.com/login.srf?wa=wsignin1.0&wtrealm=social.microsoft.com&wreply=https%3a%2f%2fsocial.microsoft.com%2fForums%2fen-US%2f08adde61-de74-4aaf-88ac-043afa3804b0%2ftop-10-ethical-hackers-in-india-best-indian-hackers-indian-ethical-hackers%3fforum%3dacademicprojectprogram%26prof%3drequired%26stoAI%3d10&wp=MBI_FED_SSL&wlcxt=microsoft%24microsoft%24microsoft" name="voteup" title="Vote as helpful"></a><br />
<div style="font-family: Verdana,Arial,Helvetica,sans-serif; font-size: 11px; line-height: normal; list-style-type: none; outline: 0px;">
<a href="http://www.ankitfadia.in/" target="_blank"><b style="border: 0px; font-family: inherit; font-style: inherit; margin: 0px; outline: 0px; padding: 0px;"><span style="border: 0px; font-family: inherit; font-size: 20pt; font-style: inherit; font-weight: inherit; margin: 0px; outline: 0px; padding: 0px;">#1 ) Ankit Fadia</span></b></a></div>
<div style="font-family: Verdana,Arial,Helvetica,sans-serif; font-size: 11px; line-height: normal; list-style-type: none; outline: 0px;">
<b style="border: 0px; font-family: inherit; font-style: inherit; margin: 0px; outline: 0px; padding: 0px;">Ankit Fadia</b><span style="border: 0px; font-family: inherit; font-style: inherit; margin: 0px; outline: 0px; padding: 0px;"> </span>is
an independent
computer security and digital intelligence consultant with definitive
experience in the field of Internet security based out of the Silicon
Valley in California, USA. He has authored 14 internationally
best-selling books on numerous topics related to Computer
Security that have been widely appreciated by both professionals and
industry leaders the world over. His books have sold a record 10 million
copies across the globe, have been translated into Japanese, Korean,
Portuguese and Polish and are also being used
as reference textbooks in some of the most prestigious academic
institutions around the world. He was one of eight people named MTV
India's Youth Icon of the Year for the year 2008.</div>
<div style="font-family: Verdana,Arial,Helvetica,sans-serif; font-size: 11px; line-height: normal; list-style-type: none; outline: 0px;">
<br /></div>
<div style="font-family: Verdana,Arial,Helvetica,sans-serif; font-size: 11px; line-height: normal; list-style-type: none; outline: 0px;">
<a href="https://www.blogger.com/"><b style="border: 0px; font-family: inherit; font-style: inherit; margin: 0px; outline: 0px; padding: 0px;"><span style="border: 0px; font-family: inherit; font-size: 20pt; font-style: inherit; font-weight: inherit; line-height: 31px; margin: 0px; outline: 0px; padding: 0px;"><span id="goog_1328622347"></span><span id="goog_1328622363"></span><span id="goog_1328622364"></span>#2
) </span></b><b style="border: 0px; font-family: inherit; font-size: 11px; font-style: inherit; line-height: normal; margin: 0px; outline: 0px; padding: 0px;"><span style="border: 0px; font-family: inherit; font-size: 20pt; font-style: inherit; font-weight: inherit; margin: 0px; outline: 0px; padding: 0px;">Sunny
Vagh<span id="goog_1328622351"></span><span id="goog_1328622352"></span>ela</span></b></a></div>
<div style="font-family: Verdana,Arial,Helvetica,sans-serif; font-size: 11px; line-height: normal; list-style-type: none; outline: 0px;">
<b style="border: 0px; font-family: inherit; font-size: 11px; font-style: inherit; line-height: normal; margin: 0px; outline: 0px; padding: 0px;"><span style="border: 0px; font-family: inherit; font-size: 20pt; font-style: inherit; font-weight: inherit; margin: 0px; outline: 0px; padding: 0px;"><span id="goog_1328622348"></span></span></b></div>
<div style="font-family: Verdana,Arial,Helvetica,sans-serif; font-size: 11px; line-height: normal; list-style-type: none; outline: 0px;">
<b style="border: 0px; font-family: inherit; font-style: inherit; margin: 0px; outline: 0px; padding: 0px;">Sunny Vaghela</b><span style="border: 0px; font-family: inherit; font-style: inherit; margin: 0px; outline: 0px; padding: 0px;"> </span><span style="border: 0px; font-family: inherit; font-style: inherit; margin: 0px; outline: 0px; padding: 0px;">is
one of the countries pioneer Information Security & Cyber Crime
Consultant. The young and dynamic personality of Sunny has not only
assisted in solving complex cyber crime cases but has also played an
instrumental role in creating awareness about information
security and cyber crimes. During his graduation at <span style="border: 0px; font-family: inherit; font-style: inherit; margin: 0px; outline: 0px; padding: 0px;">Nirma University</span> he developed projects like SMS Based Control System, Voice Recognition
Based Control System exhibiting his sharp acumen for technology. <span style="border: 0px; font-family: inherit; font-style: inherit; margin: 0px; outline: 0px; padding: 0px;">At the age of 18</span>, Sunny exposed loopholes like <span style="border: 0px; font-family: inherit; font-style: inherit; margin: 0px; outline: 0px; padding: 0px;">SMS
& Call Forging</span> in Mobile Networks. The technology that
allowed to send SMS or Make Call to any International Number from any
number of your choice. </span>At Present<b style="border: 0px; font-family: inherit; font-style: inherit; margin: 0px; outline: 0px; padding: 0px;">, </b>He
is<b style="border: 0px; font-family: inherit; font-style: inherit; margin: 0px; outline: 0px; padding: 0px;"> <b style="border: 0px; font-family: inherit; font-style: inherit; margin: 0px; outline: 0px; padding: 0px;"><span style="border: 0px; font-family: Calibri,sans-serif; font-style: inherit; font-weight: inherit; margin: 0px; outline: 0px; padding: 0px;">Director
& Chief Technical Officer </span></b></b>at <b style="border: 0px; font-family: inherit; font-style: inherit; margin: 0px; outline: 0px; padding: 0px;"><span style="border: 0px; font-family: Calibri,sans-serif; font-style: inherit; font-weight: inherit; margin: 0px; outline: 0px; padding: 0px;">TechDefence
Consulting Pvt Ltd</span></b> which is rapidly growing security services & investigation consulting organization focusing on<b style="border: 0px; font-family: inherit; font-style: inherit; margin: 0px; outline: 0px; padding: 0px;"> <b style="border: 0px; font-family: inherit; font-style: inherit; margin: 0px; outline: 0px; padding: 0px;"><span style="border: 0px; font-family: Calibri,sans-serif; font-style: inherit; font-weight: inherit; margin: 0px; outline: 0px; padding: 0px;">Cyber
Crime Investigations,Cyber Law Consulting,Vulnerability Assessment & Penetration Testing,Information Security Training</span></b>.</b></div>
<div style="font-family: Verdana,Arial,Helvetica,sans-serif; font-size: 11px; line-height: normal; list-style-type: none; outline: 0px;">
<br /></div>
<div style="font-family: Verdana,Arial,Helvetica,sans-serif; font-size: 11px; line-height: normal; list-style-type: none; outline: 0px;">
<b style="border: 0px; font-family: inherit; font-style: inherit; margin: 0px; outline: 0px; padding: 0px;"><span style="border: 0px; font-family: inherit; font-size: 20pt; font-style: inherit; font-weight: inherit; line-height: 31px; margin: 0px; outline: 0px; padding: 0px;">#3
) </span></b><b style="border: 0px; font-family: inherit; font-style: inherit; margin: 0px; outline: 0px; padding: 0px;"><span style="border: 0px; font-family: inherit; font-size: 20pt; font-style: inherit; font-weight: inherit; margin: 0px; outline: 0px; padding: 0px;">Trishneet
Arora</span></b></div>
<b><span style="font-family: Verdana,sans-serif; font-size: 8.5pt; line-height: 115%;"></span></b><br />
<div style="line-height: normal;">
<b><span style="font-family: Verdana,sans-serif; font-size: 8.5pt;">Trishneet Arora</span></b><span style="font-family: Verdana,sans-serif; font-size: 8.5pt;"> has authored for book "<i><b>The Hacking Era</b></i>”
with several technical manuals and given countless lectures, workshops
and seminars throughout his career. He trained IPS Officers, Crime
Branch Cell, Banks and IT Experts. He solves cyber crime cases with
agencies, Trishneet Arora also known as Social
Networking Specialist, solved many cases like Fake Profiles, Tracing on
Facebook, Email Tracing and money fraud investigations. He has been
interviewed by Various Newspapers, News Channel’s, TV Channels, Blogs
and Communities Namely The Economic Times,
The Times of India, Indian Express, Dainik Bhaskar, Punjab Kesri, Daily
Post, Fastway News, PTC News, The Tribune, Dainik Jagran, Punjabi
Tribune, Punjabi Jagran and more. He is currently
<b>Chief Technical Officer at TAC Security Solutions</b>. <b>Trishneet and </b><b> Mr.Yashwant Sinha (Former Finance Minister of India) were keynote speakers at Bussines Relation Conference, Gujarat</b></span></div>
<div style="font-family: Verdana,Arial,Helvetica,sans-serif; font-size: 11px; line-height: normal; list-style-type: none; outline: 0px;">
<br /></div>
<div style="font-family: Verdana,Arial,Helvetica,sans-serif; font-size: 11px; line-height: normal; list-style-type: none; outline: 0px;">
<br /></div>
<div style="font-family: Verdana,Arial,Helvetica,sans-serif; font-size: 11px; line-height: normal; list-style-type: none; outline: 0px;">
<b style="border: 0px; font-family: inherit; font-style: inherit; margin: 0px; outline: 0px; padding: 0px;"><span style="border: 0px; font-family: inherit; font-size: 20pt; font-style: inherit; font-weight: inherit; line-height: 31px; margin: 0px; outline: 0px; padding: 0px;">#4
) Vivek Ramchandran</span></b></div>
<div style="font-family: Verdana,Arial,Helvetica,sans-serif; font-size: 11px; line-height: normal; list-style-type: none; outline: 0px;">
<b style="border: 0px; font-family: inherit; font-style: inherit; margin: 0px; outline: 0px; padding: 0px;">Vivek Ramachandran</b> is
a world renowned security researcher and evangelist. His expertise
includes computer and network security, exploit
research, wireless security, computer forensics, embedded systems
security, compliance and e-Governance. He is the author of the books – “<b style="border: 0px; font-family: inherit; font-style: inherit; margin: 0px; outline: 0px; padding: 0px;"><span style="border: 0px; font-family: Calibri,sans-serif; font-style: inherit; font-weight: inherit; margin: 0px; outline: 0px; padding: 0px;">Wireless
Penetration Testing using Backtrack</span></b>” and “<b style="border: 0px; font-family: inherit; font-style: inherit; margin: 0px; outline: 0px; padding: 0px;"><span style="border: 0px; font-family: Calibri,sans-serif; font-style: inherit; font-weight: inherit; margin: 0px; outline: 0px; padding: 0px;">The
Metasploit Megaprimer</span></b>”, both up for worldwide release
in mid 2011. Vivek is a B.Tech from and an advisor to the computer
science department’s Security Lab. In 2006, Microsoft declared Vivek as
one of the winners of the Microsoft Security
Shootout Contest held in India among an estimated 65,000 participants.
The competition was aimed at finding leading Security Experts in India.
Vivek was also awarded a Team Achievement Award by Cisco Systems for his
contribution to the 802.1x and Port Security
modules in the Catalyst 6500 series of switches. These are high end
security features used in Enterprises</div>
<div style="font-family: Verdana,Arial,Helvetica,sans-serif; font-size: 11px; line-height: normal; list-style-type: none; outline: 0px;">
</div>
<div style="font-family: Verdana,Arial,Helvetica,sans-serif; font-size: 11px; line-height: normal; list-style-type: none; outline: 0px;">
<b style="border: 0px; font-family: inherit; font-style: inherit; margin: 0px; outline: 0px; padding: 0px;"><span style="border: 0px; font-family: inherit; font-size: 20pt; font-style: inherit; font-weight: inherit; line-height: 31px; margin: 0px; outline: 0px; padding: 0px;">#5
) <span style="border: 0px; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px; outline: 0px; padding: 0px;">Koushik Dutta</span></span></b></div>
<div style="font-family: Verdana,Arial,Helvetica,sans-serif; font-size: 11px; line-height: normal; list-style-type: none; outline: 0px;">
<b style="border: 0px; font-family: inherit; font-style: inherit; margin: 0px; outline: 0px; padding: 0px;">Koushik Dutta</b> is responsible for <span style="border: 0px; font-family: inherit; font-style: inherit; margin: 0px; outline: 0px; padding: 0px;">Clockworkmod</span> recovery
and <span style="border: 0px; font-family: inherit; font-style: inherit; margin: 0px; outline: 0px; padding: 0px;">Rom Manager</span> for Android rooting and the core member of famed <span style="border: 0px; font-family: inherit; font-style: inherit; margin: 0px; outline: 0px; padding: 0px;">UnrEVOked
team<b style="border: 0px; font-family: inherit; font-style: inherit; margin: 0px; outline: 0px; padding: 0px;">.</b></span> He has been a .net developer from heart and had his internship initially at Microsoft and is a former MVP<b style="border: 0px; font-family: inherit; font-style: inherit; margin: 0px; outline: 0px; padding: 0px;">.</b> He
decided to leave Microsoft and <span style="border: 0px; font-family: inherit; font-style: inherit; margin: 0px; outline: 0px; padding: 0px;">hack Android cellphones</span>like there was no tomorrow. Sony approached him after geohot humped them like anything
but he politely declined .</div>
<div style="font-family: Verdana,Arial,Helvetica,sans-serif; font-size: 11px; line-height: normal; list-style-type: none; outline: 0px;">
</div>
<div style="font-family: Verdana,Arial,Helvetica,sans-serif; font-size: 11px; line-height: normal; list-style-type: none; outline: 0px;">
<b style="border: 0px; font-family: inherit; font-style: inherit; margin: 0px; outline: 0px; padding: 0px;"><span style="border: 0px; font-family: inherit; font-size: 20pt; font-style: inherit; font-weight: inherit; line-height: 31px; margin: 0px; outline: 0px; padding: 0px;">#6
) <span style="border: 0px; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px; outline: 0px; padding: 0px;">Aseem</span> Jakhar</span></b></div>
<div style="font-family: Verdana,Arial,Helvetica,sans-serif; font-size: 11px; line-height: normal; list-style-type: none; outline: 0px;">
<b style="border: 0px; font-family: inherit; font-style: inherit; margin: 0px; outline: 0px; padding: 0px;">Aseem</b> is
a renowned security researcher with extensive experience in system
programming, security research and consulting. He has worked
on various security software including IBM ISS Proventia UTM appliance,
Mirapoint messaging/security appliance, anti-spam engine, anti-virus
software, multicast packet reflector, Transparent HTTPS proxy with
captive portal, bayesian spam filter to name a few.
He is well known in the hacking and security community as the founder
of null - The open security community the largest security community in
India. The focus and mission of null is advanced security research,
sharing information, responsible vulnerability
disclosure and assisting Govt./private organizations with security
issues.His research includes Linux remote thread injection, automated
web application detection and dynamic web filter. He has authored
several software projects such as Jugaad, EyePee and
Kunsa due to be released under an open source license.</div>
<div style="font-family: Verdana,Arial,Helvetica,sans-serif; font-size: 11px; line-height: normal; list-style-type: none; outline: 0px;">
</div>
<div style="font-family: Verdana,Arial,Helvetica,sans-serif; font-size: 11px; line-height: normal; list-style-type: none; outline: 0px;">
<b style="border: 0px; font-family: inherit; font-style: inherit; margin: 0px; outline: 0px; padding: 0px;"><span style="border: 0px; font-family: inherit; font-size: 20pt; font-style: inherit; font-weight: inherit; line-height: 31px; margin: 0px; outline: 0px; padding: 0px;">#7
) Sai Satish</span></b></div>
<div style="font-family: Verdana,Arial,Helvetica,sans-serif; font-size: 11px; line-height: normal; list-style-type: none; outline: 0px;">
<b style="border: 0px; font-family: inherit; font-style: inherit; margin: 0px; outline: 0px; padding: 0px;">Sai Satish</b> is
an young Entrepreneur, Founder & CEO of Indian Servers.
Administrator of Andhrahackers (Top hacking awareness forum in
INDIA).Author of “HACKING SECRETS” an Internationally sold hacking
book, a renowned Ethical Hacker & Cyber Security Expert. Thousands
of college students and professionals got benefited by his lectures
which are delivered at 90+ colleges all over the
WORLD. He worked as Microsoft Student Partner, Corporate .Net Trainer .
He was rewarded by IAS officers for pentesting on government sites,
which helped to them to improve security and safe transactions and
Forensic Investigator. He was interviewed by Many
International, national and regional news channels like Dap
News(caombodia), AAjtak, The Hindu,Deccan Chronicle, Zee TV,TV9, NTV,
Eenadu , Sakshi etc.</div>
<div style="font-family: Verdana,Arial,Helvetica,sans-serif; font-size: 11px; line-height: normal; list-style-type: none; outline: 0px;">
</div>
<div style="font-family: Verdana,Arial,Helvetica,sans-serif; font-size: 11px; line-height: normal; list-style-type: none; outline: 0px;">
<b style="border: 0px; font-family: inherit; font-style: inherit; margin: 0px; outline: 0px; padding: 0px;"><span style="border: 0px; font-family: inherit; font-size: 20pt; font-style: inherit; font-weight: inherit; line-height: 31px; margin: 0px; outline: 0px; padding: 0px;">#8
) Benild Joseph</span></b></div>
<div style="font-family: Verdana,Arial,Helvetica,sans-serif; font-size: 11px; line-height: normal; list-style-type: none; outline: 0px;">
<b style="border: 0px; font-family: inherit; font-style: inherit; margin: 0px; outline: 0px; padding: 0px;">Benild Joseph</b><span style="border: 0px; font-family: inherit; font-style: inherit; margin: 0px; outline: 0px; padding: 0px;"> </span>the
20
years old world renowned Ethical Hacker | Information Security
Consultant | Speaker | Author in Indian IT Industry was born in Calicut,
A City of Kerala. Currently Acting as the Chief Executive Officer of
“Th3 art of h@ckin9“ – International IT Security Project.
He has his credit to many registered and pending patents in cyber
forensic and information security domain. He specializes in Web
Application security, Penetration testing and Forensic investigation.
His research interests include Computer Security, Networking,
Data Forensic, Virtualization, Web Application Vulnerability and
Information Security. He has been interviewed by several print and
online newspapers where he has shared his experiences relating to
Ethical Hacking, Scope in Indian Information Security field,
Cyber War and Cyber Crimes.</div>
<div style="font-family: Verdana,Arial,Helvetica,sans-serif; font-size: 11px; line-height: normal; list-style-type: none; outline: 0px;">
</div>
<div style="font-family: Verdana,Arial,Helvetica,sans-serif; font-size: 11px; line-height: normal; list-style-type: none; outline: 0px;">
<b style="border: 0px; font-family: inherit; font-style: inherit; margin: 0px; outline: 0px; padding: 0px;"><span style="border: 0px; font-family: inherit; font-size: 20pt; font-style: inherit; font-weight: inherit; line-height: 31px; margin: 0px; outline: 0px; padding: 0px;">#9
) Falgun Rathod</span></b></div>
<div style="font-family: Verdana,Arial,Helvetica,sans-serif; font-size: 11px; line-height: normal; list-style-type: none; outline: 0px;">
<b style="border: 0px; font-family: inherit; font-style: inherit; margin: 0px; outline: 0px; padding: 0px;">Falgun Rathod</b> is
one of the countries pioneer Information Security & Cyber Crime
Consultant. Falgun has solved number of complex cyber
crime cases and has also played an instrumental role in creating
awareness about information security and cyber crimes. He is a Founder
& Director of Cyber Octet Pvt Ltd - a Company providing Training on
Ethical Hacking and Information Security as well
as Cyber Crime Consultants. He has been assisting many agencies &
companies and conducted numerous workshops and seminars in the Colleges
about Information Security and Ethical Hacking. He is also the member of
OWASP (open web application security project),
invited member at ICTTF (International Cyber Threat Task Force), CSFI
(Cyber Security Forum Initiative), DSCI (Data Security Council of
India).He is also Invited Article Writer at PenTest Magazine based in
Poland. He was featured in March 2012 Issue of PenTest
Mag on the Cover Page of Magazine.</div>
<div style="font-family: Verdana,Arial,Helvetica,sans-serif; font-size: 11px; line-height: normal; list-style-type: none; outline: 0px;">
</div>
<div style="font-family: Verdana,Arial,Helvetica,sans-serif; font-size: 11px; line-height: normal; list-style-type: none; outline: 0px;">
<b style="border: 0px; font-family: inherit; font-style: inherit; margin: 0px; outline: 0px; padding: 0px;"><span style="border: 0px; font-family: inherit; font-size: 20pt; font-style: inherit; font-weight: inherit; line-height: 31px; margin: 0px; outline: 0px; padding: 0px;">#10</span></b> <b style="border: 0px; font-family: inherit; font-style: inherit; margin: 0px; outline: 0px; padding: 0px;"><span style="border: 0px; font-family: inherit; font-size: 20pt; font-style: inherit; font-weight: inherit; line-height: 31px; margin: 0px; outline: 0px; padding: 0px;">)
Rahul Tyagi</span></b> </div>
<div style="font-family: Verdana,Arial,Helvetica,sans-serif; font-size: 11px; line-height: normal; list-style-type: none; outline: 0px;">
<b style="border: 0px; font-family: inherit; font-style: inherit; margin: 0px; outline: 0px; padding: 0px;">Rahul Tyagi</b>
is a sovereign computer security consultant and has
state-of-the-art familiarity
in the field of computers. Recently Tyagi conversed with several
media channels to create consciousness in people regarding the threats
and terror of hacking. He was also invited as a speaker in the principal
ethical hacking conference DEF CON,
Chennai where he presented his research paper amongst other security
experts. His research paper has also been published globally on
exploit-db and packetstormsecurity, which are world renowned research
paper database communities. Rahul Tyagi is presently
working as the brand ambassador of TCIL-IT Chandigarh as Corporate
Ethical Hacking Trainer. He also provides his services to ‘Cyber
Security & Anti hacking Organization of India’ as Vice-President.
Additionally, he is the Technical Head of News Paper Association
of India as well.</div>
<div style="font-family: Verdana,Arial,Helvetica,sans-serif; font-size: 11px; line-height: normal; list-style-type: none; outline: 0px;">
<br /></div>
<div style="font-family: Verdana,Arial,Helvetica,sans-serif; font-size: 11px; line-height: normal; list-style-type: none; outline: 0px;">
</div>
</div>
maheshhttp://www.blogger.com/profile/02809113713626613261noreply@blogger.com0tag:blogger.com,1999:blog-8776692190326650009.post-45177589762522809772014-02-05T11:25:00.002-08:002014-02-05T11:32:26.841-08:00Snowden leaks: GCHQ 'attacked Anonymous' hackers<div dir="ltr" style="text-align: left;" trbidi="on">
<h2 class="separator" style="clear: both; text-align: center;">
Snowden leaks: GCHQ 'attacked Anonymous' hackers</h2>
<h2 class="separator" style="clear: both; text-align: center;">
<img border="0" src="http://news.bbcimg.co.uk/media/images/72777000/jpg/_72777169_anony.jpg" /></h2>
<div class="introduction" id="story_continues_1">
GCHQ disrupted
"hacktivist" communications by using one of their own techniques against
them, according to the latest Edward Snowden leaks.</div>
Documents from the whistle-blower <a href="http://msnbcmedia.msn.com/i/msnbc/sections/news/snowden_anonymous_nbc_document.pdf">published by NBC</a>
indicate UK cyberspies used a denial of service attack (DoS) in 2011 to
force a chatroom used by the Anonymous collective offline.<br />
A spokeswoman for GCHQ said all the agency's activities were authorised and subject to rigorous oversight.<br />
But others say it raises concerns.<br />
Dr Steven Murdoch, a security researcher at the University of
Cambridge, said using a DoS attack to overwhelm a computer server with
traffic would have risked disrupting other services.<br />
<div class="story-feature wide ">
<h2>
Introduction to GCHQ</h2>
The UK government's communications-focused intelligence agency, employing about 5,000 people.<br />
It stands for Government Communications Headquarters.<br />
The agency is based in Cheltenham, Gloucestershire, and also operates two smaller sites in Cornwall and North Yorkshire.<br />
Its two key roles are:<br />
<ul>
<li> To identify threats from intercepted communications. It says
these include terrorism, the spread of nuclear weapons, regional
conflicts around the world and threats to the economic prosperity of the
UK.</li>
<li> To serve as an authority on information assurance - meaning
that it advises the government and organisations running the UK's
critical infrastructure how to safeguard their systems from interference
and disruption.</li>
</ul>
The foreign secretary is answerable in Parliament for GCHQ's work.</div>
<div id="story_continues_2">
"It's quite possible that the
server was used for other purposes which would have been entirely
unrelated to Anonymous," he said.</div>
"It's also likely that most of the chat that was going on
about Anonymous was not to do with hacking because the people who join
Anonymous are fairly wide-ranging in what they think it is legitimate to
do.<br />
"Some have gone into criminality but many others just go out
and organise protests, letter-writing campaigns and other things that
are not criminal."<br />
Campaign group Privacy International is also worried.<br />
"There is no legislation that clearly authorises GCHQ to conduct cyber-attacks," said head of research Eric King.<br />
"So, in the absence of any democratic mechanisms, it appears
GCHQ has granted itself the power to carry out the very same offensive
attacks politicians have criticised other states for conducting."<br />
The UK government's Cyber Security Strategy document, <a href="https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/60961/uk-cyber-security-strategy-final.pdf">published in 2011</a>,
says officials should take "proactive measures to disrupt threats to
our information security", but also notes that any such action should be
consistent with freedom of expression and privacy rights.<br />
<span class="cross-head">Hacker arrests</span>
The latest documents are published <a href="http://www.nbcnews.com/news/investigations/war-anonymous-british-spies-attacked-hackers-snowden-docs-show-n21361">alongside an article</a> part-written by Glenn Greenwald. <br />
The journalist is one of only two people reported to have access to all whistle-blower Edward Snowden's leaked documents.<br />
<div class="caption full-width">
<img alt="GCHQ" src="http://news.bbcimg.co.uk/media/images/72777000/jpg/_72777171_cgahq.jpg" height="288" width="512" />
<span style="width: 512px;">GCHQ has not discussed the specifics of the operations included in the Snowden leaks</span>
</div>
The article highlights that the Joint Threat Research
Intelligence Group (JTRIG) is the division identified as being
responsible for the DoS attack - a unit whose existence had not
previously been publicly disclosed.<br />
The documents indicate the unit also spied on and
communicated with chatroom users to identify hackers who had stolen
information.<br />
In one case, agents are said to have tricked a hacker
nicknamed P0ke who claimed to have stolen data from the US government.
They did this by sending him a link to a BBC article entitled: "Who
loves the hacktivists?"<br />
"Sexy," P0ke is alleged to have commented. <br />
But when he clicked the link it is reported that JTRIG was
able to bypass measures he had taken to hide his identity, although it
is not clear how.<br />
<div class="caption">
<img alt="BBC article" src="http://news.bbcimg.co.uk/media/images/72777000/jpg/_72777173_iain.jpg" height="189" width="336" />
<span style="width: 336px;">GCHQ is said to have tricked one hacktivist by sending him a link to a BBC article</span>
</div>
NBC reports that P0ke - a Scandinavian college student - was never arrested despite GCHQ learning his true name.<br />
But the leaks indicate others were imprisoned as a result of JTRIG operations. <br />
One paper highlights the case of Edward Pearson - a hacker
known as GZero - who was sentenced to two years in jail in 2012 for
illegally acquiring credit and debit card details registered with
PayPal.<br />
A transcript of a chatroom conversation indicates that
Pearson had contacted GCHQ agents claiming he knew a hacktivist they
were investigating, unaware of the agents' true identity.<br />
<span class="cross-head">'Grey area'</span>
In addition to Anonymous, the documents list LulzSec, the
A-Team and the Syrian Cyber Army as hacktivist groups GCHQ was concerned
about.<br />
In one case it appears simply warning activists that carrying out their own DoS attacks was illegal had the desired effect.<br />
NBC reports that the notice was posted via Facebook, Twitter, email, instant messenger and Skype. <br />
One alleged GCHQ document states that one month later 80% of those contacted had stopped using a hacktivist chatroom.<br />
<div class="caption body-narrow-width">
<img alt="LulzSec logo" src="http://news.bbcimg.co.uk/media/images/67106000/jpg/_67106397_67106392.jpg" height="171" width="304" />
<span style="width: 304px;">Several of the Lulzsec hackers have been arrested after carrying out DoS attacks</span>
</div>
But the documents also indicate that GCHQ was willing to use
DoS attacks itself as part of an operation codenamed Rolling Thunder,
which prevented hacktivists using a chatroom for 30 hours in September
2011.<br />
GCHQ has a longstanding policy of not commenting on specific
intelligence-gathering procedures, but a spokeswoman said all its work
was "carried out in accordance with a strict legal and policy
framework".<br />
Even so, one cybersecurity expert said he had mixed feelings about the latest leaks.<br />
"We have to remember that cyberspooks within GCHQ are
equally, if not more, skilled than many black-hat hackers, and the tools
and techniques they are going to use to fight cybercrime are surely
going to be similar to that of the bad guys," said Andrew Miller, chief
operating officer at Corero Network.<br />
"Legally, we enter a very grey area here; where members of
Lulzsec were arrested and incarcerated for carrying out DoS attacks, but
it seems that JTRIG are taking the same approach with impunity."</div>
maheshhttp://www.blogger.com/profile/02809113713626613261noreply@blogger.com0tag:blogger.com,1999:blog-8776692190326650009.post-66146873247508339132014-01-22T07:18:00.001-08:002014-01-22T07:18:04.421-08:00Benefits and Risks of Free Email Services<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="field field-name-body field-type-text-with-summary field-label-hidden">
<div class="field-items">
<div class="field-item even">
<h3>
What is the appeal of free email services?</h3>
Many
service providers offer free email accounts (e.g., Yahoo!, Hotmail,
Gmail). These email services typically provide you with a browser
interface to access your mail. In addition to the monetary savings,
these services often offer other benefits:<br />
<ul class="bulleted">
<li><b>accessibility</b>
- Because you can access your account(s) from any computer, these
services are useful if you cannot be near your computer or are in the
process of relocating and do not have an ISP. Even if you are able to
access your ISP-based email account remotely, being able to rely on a
free email account is ideal if you are using a public computer or a
shared wireless hot spot and are concerned about exposing the details of
your primary account.</li>
<li><b>competitive features</b> - With so
many of these service providers competing for users, they now offer
additional features such as large amounts of storage, spam filtering,
virus protection, and enhanced fonts and graphics.</li>
<li><b>additional capabilities</b>
- It is becoming more common for service providers to package
additional software or services (e.g., instant messaging) with their
free email accounts to attract customers.</li>
</ul>
Free email
accounts are also effective tools for reducing the amount of spam you
receive at your primary email address. Instead of submitting your
primary address when shopping online, requesting services, or
participating in online forums, you can set up a free secondary address
to use (see Reducing Spam for more information).<br />
<h3>
What risks are associated with free email services?</h3>
Although
free email services have many benefits, you should not use them to send
sensitive information. Because you are not paying for the account, the
organization may not have a strong commitment to protecting you from
various threats or to offering you the best service. Some of the
elements you risk are<br />
<ul class="bulleted">
<li><b>security</b> - If
your login, password, or messages are sent in plain text, they may
easily be intercepted. If a service provider offers SSL encryption, you
should use it. You can find out whether this is available by looking for
a "secure mode" or by replacing the "http:" in the URL with "https:"
(see Protecting Your Privacy for more information).</li>
<li><b>privacy</b>
- You aren't paying for your email account, but the service provider
has to find some way to recover the costs of providing the service. One
way of generating revenue is to sell advertising space, but another is
to sell or trade information. Make sure to read the service provider's
privacy policy or terms of use to see if your name, your email address,
the email addresses in your address book, or any of the information in
your profile has the potential of being given to other organizations
(see Protecting Your Privacy
for more information). If you are considering forwarding your work
email to a free email account, check with your employer first. You do
not want to violate any established security policies.</li>
<li><b>reliability</b>
- Although you may be able to access your account from any computer,
you need to make sure that the account is going to be available when you
want to access it. Familiarize yourself with the service provider's
terms of service so that you know exactly what they have committed to
providing you. For example, if the service ends or your account
disappears, can you retrieve your messages? Does the service provider
give you the ability to download messages that you want to archive onto
your machine? Also, if you happen to be in a different time zone than
the provider, you may find that their server maintenance interferes with
your normal email routine.</li>
</ul>
</div>
</div>
</div>
</div>
maheshhttp://www.blogger.com/profile/02809113713626613261noreply@blogger.com0tag:blogger.com,1999:blog-8776692190326650009.post-23343493504330589582014-01-22T07:09:00.004-08:002014-01-22T07:09:55.009-08:00Shopping Safely Online<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="field field-name-body field-type-text-with-summary field-label-hidden">
<div class="field-items">
<div class="field-item even">
<h3>
Why do online shoppers have to take special precautions?</h3>
The
internet offers a convenience that is not available from any other
shopping outlet. From the comfort of your home, you can search for items
from countless vendors, compare prices with a few simple mouse clicks,
and make purchases without waiting in line. However, the internet is
also convenient for attackers, giving them multiple ways to access the
personal and financial information of unsuspecting shoppers. Attackers
who are able to obtain this information may use it for their own
financial gain, either by making purchases themselves or by selling the
information to someone else.<br />
<h3>
How do attackers target online shoppers?</h3>
There are three common ways that attackers can take advantage of online shoppers:<br />
<ul class="bulleted">
<li><b>Targeting vulnerable computers</b>
- If you do not take steps to protect your computer from viruses or
other malicious code, an attacker may be able to gain access to your
computer and all of the information on it. It is also important for
vendors to protect their computers to prevent attackers from accessing
customer databases.</li>
<li><b>Creating fraudulent sites and email messages</b>
- Unlike traditional shopping, where you know that a store is actually
the store it claims to be, attackers can create malicious websites that
appear to be legitimate or email messages that appear to have been sent
from a legitimate source. Charities may also be misrepresented in this
way, especially after natural disasters or during holiday seasons.
Attackers create these malicious sites and email messages to try to
convince you to supply personal and financial information.</li>
<li><b>Intercepting insecure transactions</b> - If a vendor does not use encryption, an attacker may be able to intercept your information as it is being transmitted.</li>
</ul>
<h3>
How can you protect yourself?</h3>
<ul class="bulleted">
<li><b>Use and maintain anti-virus software, a firewall, and anti-spyware software</b>
- Protect yourself against viruses and Trojan horses that may steal or
modify the data on your own computer and leave you vulnerable by using
anti-virus software and a firewall (see Understanding Anti-Virus Software and Understanding Firewalls
for more information). Make sure to keep your virus definitions up to
date. Spyware or adware hidden in software programs may also give
attackers access to your data, so use a legitimate anti-spyware program
to scan your computer and remove any of these files (see Recognizing and Avoiding Spyware for more information).</li>
<li><b>Keep software, particularly your web browser, up to date</b> - Install software updates so that attackers cannot take advantage of known problems or vulnerabilities (see Understanding Patches for more information). Many operating systems offer automatic updates. If this option is available, you should enable it.</li>
<li><b>Evaluate your software's settings</b>
- The default settings of most software enable all available
functionality. However, attackers may be able to take advantage of this
functionality to access your computer (see Evaluating Your Web Browser's Security Settings and the paper Securing Your Web Browser
for more information). It is especially important to check the settings
for software that connects to the internet (browsers, email clients,
etc.). Apply the highest level of security available that still gives
you the functionality you need.</li>
<li><b>Do business with reputable vendors</b>
- Before providing any personal or financial information, make sure
that you are interacting with a reputable, established vendor. Some
attackers may try to trick you by creating malicious websites that
appear to be legitimate, so you should verify the legitimacy before
supplying any information (see Avoiding Social Engineering and Phishing Attacks and Understanding Web Site Certificates
for more information). Attackers may obtain a site certificate for a
malicious website to appear more authentic, so review the certificate
information, particularly the "issued to" information. Locate and note
phone numbers and physical addresses of vendors in case there is a
problem with your transaction or your bill.</li>
<li><b>Take advantage of security features</b> - Passwords and other security features add layers of protection if used appropriately (see Choosing and Protecting Passwords and Supplementing Passwords for more information).</li>
<li><b>Be wary of emails requesting information</b>
- Attackers may attempt to gather information by sending emails
requesting that you confirm purchase or account information (see Avoiding Social Engineering and Phishing Attacks
for more information). Legitimate businesses will not solicit this type
of information through email. Do not provide sensitive information
through email, and use caution when clicking on links in email messages
(see the paper Recognizing and Avoiding Email Scans for more information).</li>
<li><b>Check privacy policies</b>
- Before providing personal or financial information, check the
website's privacy policy. Make sure you understand how your information
will be stored and used (see Protecting Your Privacy for more information).</li>
<li><b>Make sure your information is being encrypted</b>
- Many sites use SSL, or secure sockets layer, to encrypt information.
Indications that your information will be encrypted include a URL that
begins with "https:" instead of "http:" and a padlock icon. If the
padlock is closed, the information is encrypted. The location of the
icon varies by browser; for example, it may be to the right of the
address bar or at the bottom of the window. Some attackers try to trick
users by adding a fake padlock icon, so make sure that the icon is in
the appropriate location for your browser.</li>
<li><b>Use a credit card</b>
- There are laws to limit your liability for fraudulent credit card
charges, and you may not have the same level of protection for your
debit card. Additionally, because a debit card draws money directly from
your bank account, unauthorized charges could leave you with
insufficient funds to pay other bills. You can further minimize damage
by using a single credit card with a low credit line for all of your
online purchases.</li>
<li><b>Check your statements</b> - Keep a record
of your purchases and copies of confirmation pages, and compare them to
your bank statements. If there is a discrepancy, report it immediately
(see Preventing and Responding to Identity Theft for more information).</li>
</ul>
</div>
</div>
</div>
</div>
maheshhttp://www.blogger.com/profile/02809113713626613261noreply@blogger.com0tag:blogger.com,1999:blog-8776692190326650009.post-86117247144369554902014-01-22T07:06:00.002-08:002014-01-22T07:06:17.404-08:00Risks of File-Sharing Technology<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="field field-name-body field-type-text-with-summary field-label-hidden">
<div class="field-items">
<div class="field-item even">
<h3>
What is file sharing?</h3>
File
sharing involves using technology that allows internet users to share
files that are housed on their individual computers. Peer-to-peer (P2P)
applications, such as those used to share music files, are some of the
most common forms of file-sharing technology. However, P2P applications
introduce security risks that may put your information or your computer
in jeopardy.<br />
<h3>
What risks does file-sharing technology introduce?</h3>
<ul class="bulleted">
<li><b>Installation of malicious code</b>
- When you use P2P applications, it is difficult, if not impossible, to
verify that the source of the files is trustworthy. These applications
are often used by attackers to transmit malicious code. Attackers may
incorporate spyware, viruses, Trojan horses, or worms into the files.
When you download the files, your computer becomes infected (see Recognizing and Avoiding Spyware and Recovering from Viruses, Worms, and Trojan Horses for more information).</li>
<li><b>Exposure of sensitive or personal information</b>
- By using P2P applications, you may be giving other users access to
personal information. Whether it's because certain directories are
accessible or because you provide personal information to what you
believe to be a trusted person or organization, unauthorized people may
be able to access your financial or medical data, personal documents,
sensitive corporate information, or other personal information. Once
information has been exposed to unauthorized people, it's difficult to
know how many people have accessed it. The availability of this
information may increase your risk of identity theft (see Protecting Your Privacy and Avoiding Social Engineering and Phishing Attacks for more information).</li>
<li><b>Susceptibility to attack</b>
- Some P2P applications may ask you to open certain ports on your
firewall to transmit the files. However, opening some of these ports may
give attackers access to your computer or enable them to attack your
computer by taking advantage of any vulnerabilities that may exist in
the P2P application. There are some P2P applications that can modify and
penetrate firewalls themselves, without your knowledge.</li>
<li><b>Denial of service</b>
- Downloading files causes a significant amount of traffic over the
network. This activity may reduce the availability of certain programs
on your computer or may limit your access to the internet (see Understanding Denial-of-Service Attacks for more information).</li>
<li><b>Prosecution</b>
- Files shared through P2P applications may include pirated software,
copyrighted material, or pornography. If you download these, even
unknowingly, you may be faced with fines or other legal action. If your
computer is on a company network and exposes customer information, both
you and your company may be liable.</li>
</ul>
<h3>
How can you minimize these risks?</h3>
The
best way to eliminate these risks is to avoid using P2P applications.
However, if you choose to use this technology, you can follow some good
security practices to minimize your risk:<br />
<ul class="bulleted">
<li><b>use and maintain anti-virus software</b>
- Anti-virus software recognizes and protects your computer against
most known viruses. However, attackers are continually writing new
viruses, so it is important to keep your anti-virus software current
(see Understanding Anti-Virus Software for more information).</li>
<li><b>install or enable a firewall</b>
- Firewalls may be able to prevent some types of infection by blocking
malicious traffic before it can enter your computer (see Understanding Firewalls for more information). Some operating systems actually include a firewall, but you need to make sure it is enabled.</li>
</ul>
</div>
</div>
</div>
</div>
maheshhttp://www.blogger.com/profile/02809113713626613261noreply@blogger.com0tag:blogger.com,1999:blog-8776692190326650009.post-2121608824405135162014-01-22T07:03:00.000-08:002014-01-22T07:03:07.123-08:00Recovering from Viruses, Worms, and Trojan Horses<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="field field-name-body field-type-text-with-summary field-label-hidden">
<div class="field-items">
<div class="field-item even">
<h3>
How do you know your computer is infected?</h3>
Unfortunately,
there is no particular way to identify that your computer has been
infected with malicious code. Some infections may completely destroy
files and shut down your computer, while others may only subtly affect
your computer's normal operations. Be aware of any unusual or unexpected
behaviors. If you are running anti-virus software, it may alert you
that it has found malicious code on your computer. The anti-virus
software may be able to clean the malicious code automatically, but if
it can't, you will need to take additional steps.<br />
<h3>
What can you do if you are infected?</h3>
<ol>
<li><b>Minimize the damage</b>
- If you are at work and have access to an IT department, contact them
immediately. The sooner they can investigate and clean your computer,
the less damage to your computer and other computers on the network. If
you are on your home computer or a laptop, disconnect your computer from
the internet. By removing the internet connection, you prevent an
attacker or virus from being able to access your computer and perform
tasks such as locating personal data, manipulating or deleting files, or
using your computer to attack other computers.</li>
<li><b>Remove the malicious code</b>
- If you have anti-virus software installed on your computer, update
the virus definitions (if possible), and perform a manual scan of your
entire system. If you do not have anti-virus software, you can purchase
it at a local computer store (see Understanding Anti-Virus Software
for more information). If the software can't locate and remove the
infection, you may need to reinstall your operating system, usually with
a system restore disk that is often supplied with a new computer. Note
that reinstalling or restoring the operating system typically erases all
of your files and any additional software that you have installed on
your computer. After reinstalling the operating system and any other
software, install all of the appropriate patches to fix known
vulnerabilities (see Understanding Patches for more information).</li>
</ol>
<h3>
How can you reduce the risk of another infection?</h3>
Dealing
with the presence of malicious code on your computer can be a
frustrating experience that can cost you time, money, and data. The
following recommendations will build your defense against future
infections:<br />
<ul class="bulleted">
<li><b>use and maintain anti-virus software</b>
- Anti-virus software recognizes and protects your computer against
most known viruses. However, attackers are continually writing new
viruses, so it is important to keep your anti-virus software current
(see Understanding Anti-Virus Software for more information).</li>
<li><b>change your passwords</b>
- Your original passwords may have been compromised during the
infection, so you should change them. This includes passwords for web
sites that may have been cached in your browser. Make the passwords
difficult for attackers to guess (see Choosing and Protecting Passwords for more information).</li>
<li><b>keep software up to date</b> - Install software patches so that attackers can't take advantage of known problems or vulnerabilities (see Understanding Patches for more information). Many operating systems offer automatic updates. If this option is available, you should enable it.</li>
<li><b>install or enable a firewall</b>
- Firewalls may be able to prevent some types of infection by blocking
malicious traffic before it can enter your computer (see Understanding Firewalls for more information). Some operating systems actually include a firewall, but you need to make sure it is enabled.</li>
<li><b>use anti-spyware tools</b>
- Spyware is a common source of viruses, but you can minimize the
number of infections by using a legitimate program that identifies and
removes spyware (see Recognizing and Avoiding Spyware for more information).</li>
<li><b>follow good security practices</b>
- Take appropriate precautions when using email and web browsers so
that you reduce the risk that your actions will trigger an infection
(see other US-CERT security tips for more information).</li>
</ul>
As a precaution, maintain backups of your files on CDs or DVDs so that you have saved copies if you do get infected again.<br />
</div>
</div>
</div>
</div>
maheshhttp://www.blogger.com/profile/02809113713626613261noreply@blogger.com0tag:blogger.com,1999:blog-8776692190326650009.post-58230984703296092532014-01-22T06:50:00.001-08:002014-01-22T06:50:15.540-08:00Malware Targeting Point of Sale Systems<div dir="ltr" style="text-align: left;" trbidi="on">
<h3>
Systems Affected</h3>
<div class="field field-name-field-alert-systems-affected field-type-text-long field-label-hidden">
<div class="field-items">
<div class="field-item even">
Point of Sale Systems</div>
</div>
</div>
<h3>
Overview</h3>
<div class="field field-name-field-alert-overview field-type-text-long field-label-hidden">
<div class="field-items">
<div class="field-item even">
<strong>Point of Sale Systems</strong><br />
When
consumers purchase goods or services from a retailer, the transaction
is processed through what are commonly referred to as Point of Sale
(POS) systems. POS systems consist of the hardware (e.g. the equipment
used to swipe a credit or debit card and the computer or mobile device
attached to it) as well as the software that tells the hardware what to
do with the information it captures.<br />
When consumers use a credit
or debit card at a POS system, the information stored on the magnetic
stripe of the card is collected and processed by the attached computer
or device. The data stored on the magnetic stripe is referred to as
Track 1 and Track 2 data. Track 1 data is information associated with
the actual account; it includes items such as the cardholder’s name as
well as the account number. Track 2 data contains information such as
the credit card number and expiration date.</div>
</div>
</div>
<h3>
Description</h3>
<div class="field field-name-body field-type-text-with-summary field-label-hidden">
<div class="field-items">
<div class="field-item even">
<strong>POS Targeting</strong><br />
For
quite some time, cyber criminals have been targeting consumer data
entered in POS systems. In some circumstances, criminals attach a
physical device to the POS system to collect card data, which is
referred to as skimming. In other cases, cyber criminals deliver malware
which acquires card data as it passes through a POS system, eventually
exfiltrating the desired data back to the criminal. Once the
cybercriminal receives the data, it is often trafficked to other
suspects who use the data to create fraudulent credit and debit cards.<br />
As
POS systems are connected to computers or devices, they are also often
enabled to access the internet and email services. Therefore malicious
links or attachments in emails as well as malicious websites can be
accessed and malware may subsequently be downloaded by an end user of a
POS system. The return on investment is much higher for a criminal to
infect one POS system that will yield card data from multiple consumers.</div>
</div>
</div>
<h3>
Impact</h3>
<div class="field field-name-field-alert-impact field-type-text-long field-label-hidden">
<div class="field-items">
<div class="field-item even">
There
are several types of POS malware in use, many of which use a memory
scraping technique to locate specific card data. Dexter, for example,
parses memory dumps of specific POS software related processes looking
for Track 1 and Track 2 data. Stardust, a variant of Dexter not only
extracts the same track data from system memory, it also extracts the
same type of information from internal network traffic. Researchers
surmise that Dexter and some of its variants could be delivered to the
POS systems via phishing emails or the malicious actors could be taking
advantage of default credentials to access the systems remotely, both of
which are common infection vectors. Network and host based
vulnerabilities, such as weak credentials accessible over Remote
Desktop, open wireless networks that include a POS machine and physical
access (unauthorized or misuse) are all also candidates for infection.</div>
</div>
</div>
<h3>
Solution</h3>
<div class="field field-name-field-alert-solution field-type-text-long field-label-hidden">
<div class="field-items">
<div class="field-item even">
<strong>POS System Owner Best Practices </strong><br />
Owners
and operators of POS systems should follow best practices to increase
the security of POS systems and prevent unauthorized access.<br />
<ul>
<li><strong>Use Strong Passwords:</strong>
During the installation of POS systems, installers often use the
default passwords for simplicity on initial setup. Unfortunately, the
default passwords can be easily obtained online by cybercriminals. It is
highly recommended that business owners change passwords to their POS
systems on a regular basis, using unique account names and complex
passwords.</li>
<li><strong>Update POS Software Applications: </strong>Ensure
that POS software applications are using the latest updated software
applications and software application patches. POS systems, in the same
way as computers, are vulnerable to malware attacks when required
updates are not downloaded and installed on a timely basis.</li>
<li><strong>Install a Firewall: </strong>Firewalls
should be utilized to protect POS systems from outside attacks. A
firewall can prevent unauthorized access to, or from, a private network
by screening out traffic from hackers, viruses, worms, or other types of
malware specifically designed to compromise a POS system.</li>
<li><strong>Use Antivirus: </strong>Antivirus
programs work to recognize software that fits its current definition of
being malicious and attempts to restrict that malware’s access to the
systems. It is important to continually update the antivirus programs
for them to be effective on a POS network.</li>
<li><strong>Restrict Access to Internet: </strong>Restrict
access to POS system computers or terminals to prevent users from
accidentally exposing the POS system to security threats existing on the
internet. POS systems should only be utilized online to conduct POS
related activities and not for general internet use.</li>
<li><strong>Disallow Remote Access: </strong>Remote
access allows a user to log into a system as an authorized user without
being physically present. Cyber Criminals can exploit remote access
configurations on POS systems to gain access to these networks. To
prevent unauthorized access, it is important to disallow remote access
to the POS network at all times.</li>
</ul>
<strong>Consumer Remediation </strong><br />
Fraudulent
charges to a credit card can often be remediated quickly by the issuing
financial institution with little to no impact on the consumer.
However, unauthorized withdrawals from a debit card (which is tied to a
checking account) could have a cascading impact to include bounced
checks and late-payment fees.<br />
Consumers should routinely change
debit card PINs. Contact or visit your financial institutions website to
learn more about available fraud liability protection programs for your
debit and credit card accounts. Some institutions offer debit card
protections similar to or the same as credit card protections.<br />
If
consumers have a reason to believe their credit or debit card
information has been compromised, several cautionary steps to protect
funds and prevent identity theft include changing online passwords and
PINs used at ATMs and POS systems; requesting a replacement card;
monitoring account activity closely; and placing a security freeze on
all three national credit reports (Equifax, Experian and TransUnion). A
freeze will block access to your credit file by lenders you do not
already do business with. Under federal law, consumers are also entitled
to one free copy of their credit report every twelve months through
AnnualCreditReport.com.<br />
<br /></div>
</div>
</div>
</div>
maheshhttp://www.blogger.com/profile/02809113713626613261noreply@blogger.com0tag:blogger.com,1999:blog-8776692190326650009.post-89102179107376829222014-01-22T06:39:00.001-08:002014-01-22T06:39:44.221-08:00DOS(Denial of Service) or DDOS(Distributed denial of service ) Attacks working and Pervention from it.<div dir="ltr" style="text-align: left;" trbidi="on">
<b>What is mean by DOS(Denial Of Service) or DDOS(Distributed Denial Of Service) Attacks?</b><br />
denial-of-service (DoS) or distributed denial-of-service (DDoS) attack is an attempt to make a machine or network resource unavailable to its intended users.
Although the means to carry out, motives for, and targets of a DoS
attack may vary, it generally consists of efforts to temporarily or
indefinitely interrupt or suspend services of a host connected to the Internet. As clarification, DDoS (Distributed Denial of Service) attacks are sent by two or more persons, or bots. (See <a href="http://en.wikipedia.org/wiki/Botnet" title="Botnet">botnet</a>) DoS (Denial of Service) attacks are sent by one person or system.<b> </b><br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgdoPiMawH9ipoo3oMM6Ke_y5jskAtwFkj9Qw9SOz7fMqchUdD086B3qFna0pq7o4q3HBnzlytHEz0NMbSsgSH4SuW0MrumRQioY9bgW11Cv26JZ6bWG2tYnd_VrbaTvGVv1GGLkICqXl0u/s1600/220px-Stachledraht_DDos_Attack.svg.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgdoPiMawH9ipoo3oMM6Ke_y5jskAtwFkj9Qw9SOz7fMqchUdD086B3qFna0pq7o4q3HBnzlytHEz0NMbSsgSH4SuW0MrumRQioY9bgW11Cv26JZ6bWG2tYnd_VrbaTvGVv1GGLkICqXl0u/s1600/220px-Stachledraht_DDos_Attack.svg.png" /></a></div>
<br />
<h3>
What is a distributed denial-of-service (DDoS) attack?</h3>
In a
distributed denial-of-service (DDoS) attack, an attacker may use your
computer to attack another computer. By taking advantage of security
vulnerabilities or weaknesses, an attacker could take control of your
computer. He or she could then force your computer to send huge amounts
of data to a website or send spam to particular email addresses. The
attack is "distributed" because the attacker is using multiple
computers, including yours, to launch the denial-of-service attack.<br />
<br />
<h3>
How do you avoid being part of the problem?</h3>
Unfortunately,
there are no effective ways to prevent being the victim of a DoS or DDoS
attack, but there are steps you can take to reduce the likelihood that
an attacker will use your computer to attack other computers:<br />
<ul class="bulleted">
<li>Install and maintain anti-virus software (see <a href="http://www.us-cert.gov/ncas/tips/st04-005">Understanding Anti-Virus Software</a> for more information).</li>
<li>Install a firewall, and configure it to restrict traffic coming into and leaving your computer (see <a href="http://www.us-cert.gov/ncas/tips/st04-004">Understanding Firewalls</a> for more information).</li>
<li>Follow good security practices for distributing your email address (see <a href="http://www.us-cert.gov/ncas/tips/st04-007">Reducing Spam</a> for more information). Applying email filters may help you manage unwanted traffic.</li>
</ul>
<br />
<h3>
How do you know if an attack is happening?</h3>
Not all
disruptions to service are the result of a denial-of-service attack.
There may be technical problems with a particular network, or system
administrators may be performing maintenance. However, the following
symptoms <i>could</i> indicate a DoS or DDoS attack:<br />
<ul class="bulleted">
<li>unusually slow network performance (opening files or accessing websites)</li>
<li>unavailability of a particular website</li>
<li>inability to access any website</li>
<li>dramatic increase in the amount of spam you receive in your account</li>
</ul>
<h3>
What do you do if you think you are experiencing an attack?</h3>
Even
if you do correctly identify a DoS or DDoS attack, it is unlikely that
you will be able to determine the actual target or source of the attack.
Contact the appropriate technical professionals for assistance.<br />
<ul class="bulleted">
<li>If
you notice that you cannot access your own files or reach any external
websites from your work computer, contact your network administrators.
This may indicate that your computer or your organization's network is
being attacked.</li>
<li>If you are having a similar experience on your
home computer, consider contacting your internet service provider (ISP).
If there is a problem, the ISP might be able to advise you of an
appropriate course of action.</li>
</ul>
</div>
maheshhttp://www.blogger.com/profile/02809113713626613261noreply@blogger.com0tag:blogger.com,1999:blog-8776692190326650009.post-91625301451657015382014-01-22T06:23:00.000-08:002014-01-22T06:23:13.285-08:00Session Hijacking How it happens Tips for it and how to avoid it <div dir="ltr" style="text-align: left;" trbidi="on">
<h2>
<div style="text-align: left;">
<b>Session hijacking sometimes called as cookie hijacking.</b></div>
</h2>
<br />
<b><br />If hackers hack your computer then he/she easily see the cookies on your computer in that cookies your username and password is stored and hacker can easily decode it.</b><br />
<b><br /></b>
<b>How TCP session hijacking is done?</b><br />
First of all learn something How TCP works like explaining below to understand the session.<br />
TCP 3-way Handshaking Connection.<br />
<b>1. Step 1 - SYN</b><br />
When a workstation wants to communicate with a server it builds a packet with<br />the SYN or synchronization bit set and then sends the packet to the server. Included in this<br />SYN packet is an initial sequence number When the client computer generates the sequence number, it uses a random number generator. Random number generators are used to help prevent communication sessions from being compromised (more on this in the next section). Sequence numbers are critical to network communications as they are used to guarantee packet delivery. Source computers use sequence numbers for tracking incoming packets and reassembling them as they arrive<br />at their destination. From the attacker’s perspective; however, the ability to predict sequence<br />numbers provides the mechanisms needed to successfully hijack a communication session.<b><br /></b><br />
<br />
<b>2. Step 2 – SYN/ACK</b><br />
When the server receives the clients SYN (synchronization) packet, it responds to the<br />workstation computer with a packet containing both the SYN and ACK (Synchronization and<br />Acknowledgement) bits set. The packet includes the server’s own randomly generated<br />sequence number (represented in the drawing by the letter P). The server also acknowledges<br />the clients sequence number by adding 1 to the sequence number sent by the client computer<br />(X + 1)<b>.</b><br />
<b> </b><br />
<b>3. Step 3 - ACK.</b><span style="font-family: Verdana,Arial,Helvetica;"></span><br />
<span style="font-family: Verdana,Arial,Helvetica;">The final phase of the three-way-handshake involves the client sending an ACK packet to the server confirming its desire to communicate. The workstation prepares a packet with the ACK (acknowledgement) bit set and includes an acknowledgement sequence number (X+ 1). When the packet arrives at the destination server, the communication session is established and communication can now begin. An active communication session will be maintained until one of the machines sends a RST (Reset) or FIN (Finish) packet to the other<br />computer </span><br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<span style="font-family: Verdana,Arial,Helvetica;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjM-P78OTycN_5b5ldGG6JIPT36wOT2NzpIZHyGg6_f42rSONFv1zY2QlUNXpis1-lmxuFZAJdksMJUp90xWqr0fhrbJ-h2oD-c6G9j6gfLRX67xFm4aYCqnFlSiV5szmWPR3E2xiHeJ2YL/s1600/Session_Hijacking_2.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjM-P78OTycN_5b5ldGG6JIPT36wOT2NzpIZHyGg6_f42rSONFv1zY2QlUNXpis1-lmxuFZAJdksMJUp90xWqr0fhrbJ-h2oD-c6G9j6gfLRX67xFm4aYCqnFlSiV5szmWPR3E2xiHeJ2YL/s1600/Session_Hijacking_2.JPG" height="320" width="245" /></a></span></div>
<br />
<div class="separator" style="clear: both; text-align: center;">
<span style="font-family: Verdana,Arial,Helvetica;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjyBudrsqd_aooIbTVD0SsMPlYT7RuqEWAgTHgriayGaRfWzzrzj_HCva6QhGC1UPQO2OcM6sgrvZwaLyyHiDPDJtycj6KPeNk8-5G10Bsf2dQ8PaZoBf_-ORnnTOSt2Q3O7CIDpqb2_gkP/s1600/Session_Hijacking_3.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjyBudrsqd_aooIbTVD0SsMPlYT7RuqEWAgTHgriayGaRfWzzrzj_HCva6QhGC1UPQO2OcM6sgrvZwaLyyHiDPDJtycj6KPeNk8-5G10Bsf2dQ8PaZoBf_-ORnnTOSt2Q3O7CIDpqb2_gkP/s1600/Session_Hijacking_3.JPG" height="320" width="245" /></a></span></div>
<br />
<span style="font-family: Verdana,Arial,Helvetica;">A popular method is using
<a href="http://en.wikipedia.org/wiki/Source_routing" target="_blank">source-routed</a> IP packets. This allows a hacker at point A on the network
to participate in a conversation between B and C by encouraging the IP
packets to pass through its machine. </span><br />
<span style="font-family: Verdana,Arial,Helvetica;"> If <a href="http://en.wikipedia.org/wiki/Source_routing" target="_blank">source-routing</a> is turned
off, the hacker can use <b>"blind" hijacking</b>(, whereby it guesses the
responses of the two machines. Thus, the hacker can send a command, but
can never see the response. However, a common command would be to set a
password allowing access from somewhere else on the net. </span><br />
<span style="font-family: Verdana,Arial,Helvetica;"> A
hacker can also be "inline" between B and C using a sniffing program to
watch the conversation. This is known as a "man-in-the-middle attack". </span><br />
<br />
<br />
<span style="font-family: Verdana,Arial,Helvetica;">
A common component of such an attack is to execute a denial-of-service
(DoS) attack against one end-point to stop it from responding. This
attack can be either against the machine to force it to crash, or
against the network connection to force heavy packet loss. </span><br />
<br />
<b><span style="font-family: Verdana,Arial,Helvetica;"> What Makes the Attack so Dangerous?</span></b><br />
<span style="font-family: Verdana,Arial,Helvetica;">Why is the session hijack attack so dangerous? Should security professionals really be concerned? the risks resulting from session hijack attacks can not be eliminated by software patches, complex passwords, or multi-factor authentication. The root cause of the attack lies with design limitations inherent to the TCP/IP protocol. In addition, all machines regardless of operating system or hardware architecture are vulnerable to the session hijack attack provided they are running TCP/IP.</span><b><span style="font-family: Verdana,Arial,Helvetica;"> </span></b><br />
<span style="font-family: Verdana,Arial,Helvetica;">The attacker has the ability to read and modify data, violating the confidentiality and integrity portion of the model. Availability is also affected by the session<br />hijack attack due to ARP storms and denial of service conditions that are a byproduct of the attack.</span><br />
<br />
<span style="font-family: Verdana,Arial,Helvetica;"><b>Detecting Session Hijack Attacks</b></span><br />
<span style="font-family: Verdana,Arial,Helvetica;">There are two primary technologies that assist in session hijack detection. The more manual of the two methods is packet sniffing software which can be used to scan for signatures of an attack. Intrusion detection systems (IDS) and intrusion prevention systems (IPS) provide a more automated method of detection, but they can also create more analysi work for the security administrator.Session hijack attacks are very difficult to detect on busy networks. There are tell tale signs, like computers getting disconnected from the network or periodic network congestion, but these signs usually get ignored by users as “typical network problems”. There are several steps a network administrator can take to preemptively protect their network. Remember,<br />defense in depth is critical to an effective security plan, and when possible, multiple layers of protection should be implemented.<b> </b> </span><br />
</div>
maheshhttp://www.blogger.com/profile/02809113713626613261noreply@blogger.com0tag:blogger.com,1999:blog-8776692190326650009.post-56944284185015005612013-12-16T00:02:00.003-08:002013-12-16T00:02:58.455-08:00Airtel Hack for free internet<div dir="ltr" style="text-align: left;" trbidi="on">
<!--[if gte mso 9]><xml>
<w:WordDocument>
<w:View>Normal</w:View>
<w:Zoom>0</w:Zoom>
<w:TrackMoves/>
<w:TrackFormatting/>
<w:PunctuationKerning/>
<w:ValidateAgainstSchemas/>
<w:SaveIfXMLInvalid>false</w:SaveIfXMLInvalid>
<w:IgnoreMixedContent>false</w:IgnoreMixedContent>
<w:AlwaysShowPlaceholderText>false</w:AlwaysShowPlaceholderText>
<w:DoNotPromoteQF/>
<w:LidThemeOther>EN-US</w:LidThemeOther>
<w:LidThemeAsian>X-NONE</w:LidThemeAsian>
<w:LidThemeComplexScript>X-NONE</w:LidThemeComplexScript>
<w:Compatibility>
<w:BreakWrappedTables/>
<w:SnapToGridInCell/>
<w:WrapTextWithPunct/>
<w:UseAsianBreakRules/>
<w:DontGrowAutofit/>
<w:SplitPgBreakAndParaMark/>
<w:DontVertAlignCellWithSp/>
<w:DontBreakConstrainedForcedTables/>
<w:DontVertAlignInTxbx/>
<w:Word11KerningPairs/>
<w:CachedColBalance/>
</w:Compatibility>
<w:BrowserLevel>MicrosoftInternetExplorer4</w:BrowserLevel>
<m:mathPr>
<m:mathFont m:val="Cambria Math"/>
<m:brkBin m:val="before"/>
<m:brkBinSub m:val="--"/>
<m:smallFrac m:val="off"/>
<m:dispDef/>
<m:lMargin m:val="0"/>
<m:rMargin m:val="0"/>
<m:defJc m:val="centerGroup"/>
<m:wrapIndent m:val="1440"/>
<m:intLim m:val="subSup"/>
<m:naryLim m:val="undOvr"/>
</m:mathPr></w:WordDocument>
</xml><![endif]--><br />
<!--[if gte mso 9]><xml>
<w:LatentStyles DefLockedState="false" DefUnhideWhenUsed="true"
DefSemiHidden="true" DefQFormat="false" DefPriority="99"
LatentStyleCount="267">
<w:LsdException Locked="false" Priority="0" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Normal"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="heading 1"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 2"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 3"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 4"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 5"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 6"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 7"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 8"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 9"/>
<w:LsdException Locked="false" Priority="39" Name="toc 1"/>
<w:LsdException Locked="false" Priority="39" Name="toc 2"/>
<w:LsdException Locked="false" Priority="39" Name="toc 3"/>
<w:LsdException Locked="false" Priority="39" Name="toc 4"/>
<w:LsdException Locked="false" Priority="39" Name="toc 5"/>
<w:LsdException Locked="false" Priority="39" Name="toc 6"/>
<w:LsdException Locked="false" Priority="39" Name="toc 7"/>
<w:LsdException Locked="false" Priority="39" Name="toc 8"/>
<w:LsdException Locked="false" Priority="39" Name="toc 9"/>
<w:LsdException Locked="false" Priority="35" QFormat="true" Name="caption"/>
<w:LsdException Locked="false" Priority="10" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Title"/>
<w:LsdException Locked="false" Priority="1" Name="Default Paragraph Font"/>
<w:LsdException Locked="false" Priority="11" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Subtitle"/>
<w:LsdException Locked="false" Priority="22" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Strong"/>
<w:LsdException Locked="false" Priority="20" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Emphasis"/>
<w:LsdException Locked="false" Priority="0" Name="Normal (Web)"/>
<w:LsdException Locked="false" Priority="59" SemiHidden="false"
UnhideWhenUsed="false" Name="Table Grid"/>
<w:LsdException Locked="false" UnhideWhenUsed="false" Name="Placeholder Text"/>
<w:LsdException Locked="false" Priority="1" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="No Spacing"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 1"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 1"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 1"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 1"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 1"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 1"/>
<w:LsdException Locked="false" UnhideWhenUsed="false" Name="Revision"/>
<w:LsdException Locked="false" Priority="34" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="List Paragraph"/>
<w:LsdException Locked="false" Priority="29" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Quote"/>
<w:LsdException Locked="false" Priority="30" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Intense Quote"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 1"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 1"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 1"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 1"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 1"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 1"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 1"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 1"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 2"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 2"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 2"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 2"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 2"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 2"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 2"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 2"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 2"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 2"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 2"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 2"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 2"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 2"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 3"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 3"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 3"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 3"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 3"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 3"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 3"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 3"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 3"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 3"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 3"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 3"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 3"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 3"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 4"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 4"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 4"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 4"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 4"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 4"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 4"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 4"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 4"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 4"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 4"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 4"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 4"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 4"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 5"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 5"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 5"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 5"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 5"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 5"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 5"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 5"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 5"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 5"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 5"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 5"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 5"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 5"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 6"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 6"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 6"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 6"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 6"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 6"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 6"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 6"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 6"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 6"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 6"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 6"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 6"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 6"/>
<w:LsdException Locked="false" Priority="19" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Subtle Emphasis"/>
<w:LsdException Locked="false" Priority="21" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Intense Emphasis"/>
<w:LsdException Locked="false" Priority="31" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Subtle Reference"/>
<w:LsdException Locked="false" Priority="32" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Intense Reference"/>
<w:LsdException Locked="false" Priority="33" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Book Title"/>
<w:LsdException Locked="false" Priority="37" Name="Bibliography"/>
<w:LsdException Locked="false" Priority="39" QFormat="true" Name="TOC Heading"/>
</w:LatentStyles>
</xml><![endif]--><!--[if gte mso 10]>
<style>
/* Style Definitions */
table.MsoNormalTable
{mso-style-name:"Table Normal";
mso-tstyle-rowband-size:0;
mso-tstyle-colband-size:0;
mso-style-noshow:yes;
mso-style-priority:99;
mso-style-qformat:yes;
mso-style-parent:"";
mso-padding-alt:0in 5.4pt 0in 5.4pt;
mso-para-margin:0in;
mso-para-margin-bottom:.0001pt;
mso-pagination:widow-orphan;
font-size:11.0pt;
font-family:"Calibri","sans-serif";
mso-ascii-font-family:Calibri;
mso-ascii-theme-font:minor-latin;
mso-fareast-font-family:"Times New Roman";
mso-fareast-theme-font:minor-fareast;
mso-hansi-font-family:Calibri;
mso-hansi-theme-font:minor-latin;
mso-bidi-font-family:"Times New Roman";
mso-bidi-theme-font:minor-bidi;}
</style>
<![endif]-->
<br />
<span lang="EN" style="mso-ansi-language: EN;">Airtel Hack for free internet</span><br />
<span lang="EN" style="mso-ansi-language: EN;">These are all the tricks i know
so far</span><br />
<span lang="EN" style="mso-ansi-language: EN;">You need a PC or a Laptop and the
required connectivity tools ,ie.,</span><br />
<span lang="EN" style="mso-ansi-language: EN;">Serial/USB cable OR Infrared
Device OR Bluetooth dongle</span><br />
<span lang="EN" style="mso-ansi-language: EN;">1) Activate Airtel Live! ( Itís
FREE so no probs)</span><br />
<span lang="EN" style="mso-ansi-language: EN;">2) Create TWO Airtel gprs data
accounts (yep TWO) and select the</span><br />
<span lang="EN" style="mso-ansi-language: EN;">FIRST as the active profile.</span><br />
<span lang="EN" style="mso-ansi-language: EN;">3) Connect your mobile to the PC
(or Laptop) and install the driver for</span><br />
<span lang="EN" style="mso-ansi-language: EN;">your mobileís modem.</span><br />
<span lang="EN" style="mso-ansi-language: EN;">4) Create a new dial-up
connection using the NEW CONNECTION</span><br />
<span lang="EN" style="mso-ansi-language: EN;">WIZARD as follows</span><br />
<span lang="EN" style="mso-ansi-language: EN;">Connecting Device : Your mobileís
modem</span><br />
<span lang="EN" style="mso-ansi-language: EN;">ISP Name : Airtel (or anything
you like)</span><br />
<span lang="EN" style="mso-ansi-language: EN;">Phone Number : *99***2# / Try
99***1</span><br />
<span lang="EN" style="mso-ansi-language: EN;">Username and Password : blank</span><br />
<span lang="EN" style="mso-ansi-language: EN;">5) Configure your browser and
download manager to use the proxy</span><br />
<span lang="EN" style="mso-ansi-language: EN;">100.1.200.99 and port 8080.( My
advice is to use Opera since you</span><br />
<span lang="EN" style="mso-ansi-language: EN;">can browse both wap and regular
websites)</span><br />
<span lang="EN" style="mso-ansi-language: EN;">6) Connect to the dial-up
account. You will be connected at 115.2</span><br />
<span lang="EN" style="mso-ansi-language: EN;">kbps (but remember, that is a bad
joke).</span><br />
<span lang="EN" style="mso-ansi-language: EN;">7) Pick up your mobile and try to
access any site. You will get ìAccess</span><br />
<span lang="EN" style="mso-ansi-language: EN;">DeniedÖî(except for Airtel
Live!). IT DOES NOT MATTER.</span><br />
<span lang="EN" style="mso-ansi-language: EN;">Keep the mobile down.</span><br />
<span lang="EN" style="mso-ansi-language: EN;">8 ) On the PC ( or Laptop) open
your browser, enter any address ,</span><br />
<span lang="EN" style="mso-ansi-language: EN;">press ENTER andÖÖ.WAIT</span><br />
<span lang="EN" style="mso-ansi-language: EN;">9) After a few seconds the page
will start to load and you have the</span><br />
<span lang="EN" style="mso-ansi-language: EN;">WHOLE internet at your disposal.</span><br />
<span lang="EN" style="mso-ansi-language: EN;">TWO</span><br />
<span lang="EN" style="mso-ansi-language: EN;">Under DATA COMM</span><br />
<span lang="EN" style="mso-ansi-language: EN;">~~~~~~~~~~~~</span><br />
<span lang="EN" style="mso-ansi-language: EN;">APN : airtelfun.com</span><br />
<span lang="EN" style="mso-ansi-language: EN;">USERNAME : blank</span><br />
<span lang="EN" style="mso-ansi-language: EN;">PASSWORD : blank</span><br />
<span lang="EN" style="mso-ansi-language: EN;">PASS REQ : OFF</span><br />
<span lang="EN" style="mso-ansi-language: EN;">ALLOW CALLS : AUTOMATIC</span><br />
<span lang="EN" style="mso-ansi-language: EN;">IPADDRESS :</span><br />
<span lang="EN" style="mso-ansi-language: EN;">DNSADDRESS :</span><br />
<span lang="EN" style="mso-ansi-language: EN;">DATA COMP : OFF</span><br />
<span lang="EN" style="mso-ansi-language: EN;">HEADER COMP : OFF</span><br />
<span lang="EN" style="mso-ansi-language: EN;">Under INTERNET PROFILES</span><br />
<span lang="EN" style="mso-ansi-language: EN;">~~~~~~~~~~~~~~~~</span><br />
<span lang="EN" style="mso-ansi-language: EN;">INTERNET MODE : HTTP or WAP (both
worked for me)</span><br />
<span lang="EN" style="mso-ansi-language: EN;">USE PROXY : YES</span><br />
<span lang="EN" style="mso-ansi-language: EN;">IP ADDRESS : 100.1.200.99</span><br />
<span lang="EN" style="mso-ansi-language: EN;">PORT : 8080</span><br />
<span lang="EN" style="mso-ansi-language: EN;">USERNAME :</span><br />
<span lang="EN" style="mso-ansi-language: EN;">PASSWORD : </span><br />
<span lang="EN" style="mso-ansi-language: EN;">No Risk Here, Try it and Enjoy</span><br />
<span lang="EN" style="mso-ansi-language: EN;">Three</span><br />
<span lang="EN" style="mso-ansi-language: EN;">1st go to settings menu then to
connectivity tab now choose the option Data comm. then ìDATA ACCOUNTSî go to
new account now the settings r as follows</span><br />
<span lang="EN" style="mso-ansi-language: EN;">ACCOUNT TYPE:GPRS</span><br />
<span lang="EN" style="mso-ansi-language: EN;">NEW ACCOUNT NAME:A1</span><br />
<span lang="EN" style="mso-ansi-language: EN;">APN:airtelfun.com</span><br />
<span lang="EN" style="mso-ansi-language: EN;">usr name: (blank)</span><br />
<span lang="EN" style="mso-ansi-language: EN;">password: (blank)</span><br />
<span lang="EN" style="mso-ansi-language: EN;">now save it</span><br />
<span lang="EN" style="mso-ansi-language: EN;">NOW! </span><br />
<span lang="EN" style="mso-ansi-language: EN;">go to Internet Setting in
connectivity here choose intrnet profileñgo to new profile setting are as below</span><br />
<span lang="EN" style="mso-ansi-language: EN;">NAME:A1</span><br />
<span lang="EN" style="mso-ansi-language: EN;">CONNECT USING:A1(which was
created in data comm.)</span><br />
<span lang="EN" style="mso-ansi-language: EN;">save it </span><br />
<span lang="EN" style="mso-ansi-language: EN;">now u would be able to see it now
selest it and take ìmoreî option then select setting here in use proxy option
it will be selected no if it is no then change it into yes</span><br />
<span lang="EN" style="mso-ansi-language: EN;">now go to proxy adress and give
the adress as </span><br />
<span lang="EN" style="mso-ansi-language: EN;">100.1.200.99 and then the port
number as 8080</span><br />
<span lang="EN" style="mso-ansi-language: EN;">Usr name:</span><br />
<span lang="EN" style="mso-ansi-language: EN;">password:</span><br />
<span lang="EN" style="mso-ansi-language: EN;">now save all the settings u made
. come back 2 connectivity</span><br />
<span lang="EN" style="mso-ansi-language: EN;">choose streaming settings now in
connect using option choose a1 that we created leave the use proxy option as no
itself</span><br />
<span lang="EN" style="mso-ansi-language: EN;">THESE R THE SETTINGS </span><br />
<span lang="EN" style="mso-ansi-language: EN;">now access airtellive! from ur
activated SE phone goto VIDEO GALLERY OR VIDEO UNLIMITED(varies according to
states) choose live streaming then choose CNBC OR AAJTAK WHILE CONNECTING TO
MEDIA SERVER cancel AFTER 9 or 10 sec then type any web adress if it shows
access denied then once again select CNBC and wait for a few more sec than
before if its fully connected also no prob its free then cancel it or if ur
connected then stop it and the internet is ready to take of .GOOD LUCK AIRTEL USERS</span><br />
<span lang="EN" style="mso-ansi-language: EN;">PS : It is confirmed that this
hack no longer works in certain circles. You can access the net , but Airtel
will charge you.</span><br />
<div class="MsoNormal">
<br /></div>
</div>
maheshhttp://www.blogger.com/profile/02809113713626613261noreply@blogger.com0tag:blogger.com,1999:blog-8776692190326650009.post-8385667979733420802013-12-16T00:01:00.002-08:002013-12-16T00:01:37.985-08:00100 keyboard shortcuts <div dir="ltr" style="text-align: left;" trbidi="on">
<!--[if gte mso 9]><xml>
<w:WordDocument>
<w:View>Normal</w:View>
<w:Zoom>0</w:Zoom>
<w:TrackMoves/>
<w:TrackFormatting/>
<w:PunctuationKerning/>
<w:ValidateAgainstSchemas/>
<w:SaveIfXMLInvalid>false</w:SaveIfXMLInvalid>
<w:IgnoreMixedContent>false</w:IgnoreMixedContent>
<w:AlwaysShowPlaceholderText>false</w:AlwaysShowPlaceholderText>
<w:DoNotPromoteQF/>
<w:LidThemeOther>EN-US</w:LidThemeOther>
<w:LidThemeAsian>X-NONE</w:LidThemeAsian>
<w:LidThemeComplexScript>X-NONE</w:LidThemeComplexScript>
<w:Compatibility>
<w:BreakWrappedTables/>
<w:SnapToGridInCell/>
<w:WrapTextWithPunct/>
<w:UseAsianBreakRules/>
<w:DontGrowAutofit/>
<w:SplitPgBreakAndParaMark/>
<w:DontVertAlignCellWithSp/>
<w:DontBreakConstrainedForcedTables/>
<w:DontVertAlignInTxbx/>
<w:Word11KerningPairs/>
<w:CachedColBalance/>
</w:Compatibility>
<w:BrowserLevel>MicrosoftInternetExplorer4</w:BrowserLevel>
<m:mathPr>
<m:mathFont m:val="Cambria Math"/>
<m:brkBin m:val="before"/>
<m:brkBinSub m:val="--"/>
<m:smallFrac m:val="off"/>
<m:dispDef/>
<m:lMargin m:val="0"/>
<m:rMargin m:val="0"/>
<m:defJc m:val="centerGroup"/>
<m:wrapIndent m:val="1440"/>
<m:intLim m:val="subSup"/>
<m:naryLim m:val="undOvr"/>
</m:mathPr></w:WordDocument>
</xml><![endif]--><br />
<!--[if gte mso 9]><xml>
<w:LatentStyles DefLockedState="false" DefUnhideWhenUsed="true"
DefSemiHidden="true" DefQFormat="false" DefPriority="99"
LatentStyleCount="267">
<w:LsdException Locked="false" Priority="0" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Normal"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="heading 1"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 2"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 3"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 4"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 5"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 6"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 7"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 8"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 9"/>
<w:LsdException Locked="false" Priority="39" Name="toc 1"/>
<w:LsdException Locked="false" Priority="39" Name="toc 2"/>
<w:LsdException Locked="false" Priority="39" Name="toc 3"/>
<w:LsdException Locked="false" Priority="39" Name="toc 4"/>
<w:LsdException Locked="false" Priority="39" Name="toc 5"/>
<w:LsdException Locked="false" Priority="39" Name="toc 6"/>
<w:LsdException Locked="false" Priority="39" Name="toc 7"/>
<w:LsdException Locked="false" Priority="39" Name="toc 8"/>
<w:LsdException Locked="false" Priority="39" Name="toc 9"/>
<w:LsdException Locked="false" Priority="35" QFormat="true" Name="caption"/>
<w:LsdException Locked="false" Priority="10" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Title"/>
<w:LsdException Locked="false" Priority="1" Name="Default Paragraph Font"/>
<w:LsdException Locked="false" Priority="11" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Subtitle"/>
<w:LsdException Locked="false" Priority="0" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Strong"/>
<w:LsdException Locked="false" Priority="20" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Emphasis"/>
<w:LsdException Locked="false" Priority="0" Name="Normal (Web)"/>
<w:LsdException Locked="false" Priority="59" SemiHidden="false"
UnhideWhenUsed="false" Name="Table Grid"/>
<w:LsdException Locked="false" UnhideWhenUsed="false" Name="Placeholder Text"/>
<w:LsdException Locked="false" Priority="1" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="No Spacing"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 1"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 1"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 1"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 1"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 1"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 1"/>
<w:LsdException Locked="false" UnhideWhenUsed="false" Name="Revision"/>
<w:LsdException Locked="false" Priority="34" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="List Paragraph"/>
<w:LsdException Locked="false" Priority="29" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Quote"/>
<w:LsdException Locked="false" Priority="30" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Intense Quote"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 1"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 1"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 1"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 1"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 1"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 1"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 1"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 1"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 2"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 2"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 2"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 2"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 2"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 2"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 2"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 2"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 2"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 2"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 2"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 2"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 2"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 2"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 3"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 3"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 3"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 3"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 3"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 3"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 3"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 3"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 3"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 3"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 3"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 3"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 3"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 3"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 4"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 4"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 4"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 4"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 4"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 4"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 4"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 4"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 4"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 4"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 4"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 4"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 4"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 4"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 5"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 5"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 5"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 5"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 5"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 5"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 5"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 5"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 5"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 5"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 5"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 5"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 5"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 5"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 6"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 6"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 6"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 6"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 6"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 6"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 6"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 6"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 6"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 6"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 6"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 6"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 6"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 6"/>
<w:LsdException Locked="false" Priority="19" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Subtle Emphasis"/>
<w:LsdException Locked="false" Priority="21" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Intense Emphasis"/>
<w:LsdException Locked="false" Priority="31" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Subtle Reference"/>
<w:LsdException Locked="false" Priority="32" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Intense Reference"/>
<w:LsdException Locked="false" Priority="33" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Book Title"/>
<w:LsdException Locked="false" Priority="37" Name="Bibliography"/>
<w:LsdException Locked="false" Priority="39" QFormat="true" Name="TOC Heading"/>
</w:LatentStyles>
</xml><![endif]--><!--[if gte mso 10]>
<style>
/* Style Definitions */
table.MsoNormalTable
{mso-style-name:"Table Normal";
mso-tstyle-rowband-size:0;
mso-tstyle-colband-size:0;
mso-style-noshow:yes;
mso-style-priority:99;
mso-style-qformat:yes;
mso-style-parent:"";
mso-padding-alt:0in 5.4pt 0in 5.4pt;
mso-para-margin:0in;
mso-para-margin-bottom:.0001pt;
mso-pagination:widow-orphan;
font-size:11.0pt;
font-family:"Calibri","sans-serif";
mso-ascii-font-family:Calibri;
mso-ascii-theme-font:minor-latin;
mso-fareast-font-family:"Times New Roman";
mso-fareast-theme-font:minor-fareast;
mso-hansi-font-family:Calibri;
mso-hansi-theme-font:minor-latin;
mso-bidi-font-family:"Times New Roman";
mso-bidi-theme-font:minor-bidi;}
</style>
<![endif]--><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1026"/>
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1"/>
</o:shapelayout></xml><![endif]-->
<br />
<strong><span style="font-size: 18.0pt;">100 keyboard shortcuts </span></strong><b><span style="font-size: 18.0pt;"><br />
<br />
</span><strong>CTRL+C (Copy) </strong><br />
<strong>CTRL+X (Cut) </strong></b><br />
<b>CTRL+V (Paste) </b><br />
<b>CTRL+Z (Undo) </b><br />
<b>DELETE (Delete) </b><br />
<b>SHIFT+DELETE (Delete the selected item permanently without placing the item
in the Recycle Bin) </b><br />
<b>CTRL while dragging an item (Copy the selected item) </b><br />
<b>CTRL+SHIFT while dragging an item (Create a shortcut to the selected item) </b><br />
<b>F2 key (Rename the selected item) </b><br />
<b>CTRL+RIGHT ARROW (Move the insertion point to the beginning of the next
word) </b><br />
<b>CTRL+LEFT ARROW (Move the insertion point to the beginning of the previous
word) </b><br />
<b>CTRL+DOWN ARROW (Move the insertion point to the beginning of the next
paragraph) </b><br />
<b>CTRL+UP ARROW (Move the insertion point to the beginning of the previous
paragraph) </b><br />
<b>CTRL+SHIFT with any of the arrow keys (Highlight a block of text) </b><br />
<b>SHIFT with any of the arrow keys (Select more than one item in a window or
on the desktop, or select text in a document) </b><br />
<b>CTRL+A (Select all) </b><br />
<b>F3 key (Search for a file or a folder) </b><br />
<b>ALT+ENTER (View the properties for the selected item) </b><br />
<b>ALT+F4 (Close the active item, or quit the active program) </b><br />
<b>ALT+ENTER (Display the properties of the selected object) </b><br />
<b>ALT+SPACEBAR (Open the shortcut menu for the active window) </b><br />
<b>CTRL+F4 (Close the active document in programs that enable you to have
multiple documents open simultaneously) </b><br />
<b>ALT+TAB (Switch between the open items) </b><br />
<b>ALT+ESC (Cycle through items in the order that they had been opened) </b><br />
<b>F6 key (Cycle through the screen elements in a window or on the desktop) </b><br />
<b>F4 key (Display the Address bar list in My Computer or Windows Explorer) </b><br />
<b>SHIFT+F10 (Display the shortcut menu for the selected item) </b><br />
<b>ALT+SPACEBAR (Display the System menu for the active window) </b><br />
<b>CTRL+ESC (Display the Start menu) </b><br />
<b>ALT+Underlined letter in a menu name (Display the corresponding menu) </b><br />
<b>Underlined letter in a command name on an open menu (Perform the
corresponding command) </b><br />
<b>F10 key (Activate the menu bar in the active program) </b><br />
<b>RIGHT ARROW (Open the next menu to the right, or open a submenu) </b><br />
<b>LEFT ARROW (Open the next menu to the left, or close a submenu) </b><br />
<b>F5 key (Update the active window) </b><br />
<b>BACKSPACE (View the folder one level up in My Computer or Windows Explorer) </b><br />
<b>ESC (Cancel the current task) </b><br />
<b>SHIFT when you insert a CD-ROM into the CD-ROM drive (Prevent the CD-ROM
from automatically playing) </b><br />
<b>Dialog Box Keyboard Shortcuts </b><br />
<b>CTRL+TAB (Move forward through the tabs) </b><br />
<b>CTRL+SHIFT+TAB (Move backward through the tabs) </b><br />
<b>TAB (Move forward through the options) </b><br />
<b>SHIFT+TAB (Move backward through the options) </b><br />
<b>ALT+Underlined letter (Perform the corresponding command or select the
corresponding option) </b><br />
<b>ENTER (Perform the command for the active option or button) </b><br />
<b>SPACEBAR (Select or clear the check box if the active option is a check box)
</b><br />
<b>Arrow keys (Select a button if the active option is a group of option buttons)
</b><br />
<b>F1 key (Display Help) </b><br />
<b>F4 key (Display the items in the active list) </b><br />
<b>BACKSPACE (Open a folder one level up if a folder is selected in the Save As
or Open dialog box) </b><br />
<b>m*cro$oft Natural Keyboard Shortcuts </b><br />
<b>Windows Logo (Display or hide the Start menu) </b><br />
<b>Windows Logo+BREAK (Display the System Properties dialog box) </b><br />
<b>Windows Logo+D (Display the desktop) </b><br />
<b>Windows Logo+M (Minimize all of the windows) </b><br />
<b>Windows Logo+SHIFT+M (Restore the minimized windows) </b><br />
<b>Windows Logo+E (Open My Computer) </b><br />
<b>Windows Logo+F (Search for a file or a folder) </b><br />
<b>CTRL+Windows Logo+F (Search for computers) </b><br />
<b>Windows Logo+F1 (Display Windows Help) </b><br />
<b>Windows Logo+ L (Lock the keyboard) </b><br />
<b>Windows Logo+R (Open the Run dialog box) </b><br />
<b>Windows Logo+U (Open Utility Manager) </b><br />
<b>Accessibility Keyboard Shortcuts </b><br />
<b>Right SHIFT for eight seconds (Switch FilterKeys either on or off) </b><br />
<b>Left ALT+left SHIFT+PRINT SCREEN (Switch High Contrast either on or off) </b><br />
<b>Left ALT+left SHIFT+NUM LOCK (Switch the MouseKeys either on or off) </b><br />
<b>SHIFT five times (Switch the StickyKeys either on or off) </b><br />
<b>NUM LOCK for five seconds (Switch the ToggleKeys either on or off) </b><br />
<b>Windows Logo +U (Open Utility Manager) </b><br />
<b>Windows Explorer Keyboard Shortcuts </b><br />
<b>END (Display the bottom of the active window) </b><br />
<b>HOME (Display the top of the active window) </b><br />
<b>NUM LOCK+Asterisk sign (*) (Display all of the subfolders that are under the
selected folder) </b><br />
<b>NUM LOCK+Plus sign (+) (Display the contents of the selected folder) </b><br />
<b>NUM LOCK+Minus sign (-) (Collapse the selected folder) </b><br />
<b>LEFT ARROW (Collapse the current selection if it is expanded, or select the
parent folder) </b><br />
<b>RIGHT ARROW (Display the current selection if it is collapsed, or select the
first subfolder) </b><br />
<b>Shortcut Keys for Character Map </b><br />
<b>After you double-click a character on the grid of characters, you can move
through the grid by using the keyboard shortcuts: </b><br />
<b>RIGHT ARROW (Move to the right or to the beginning of the next line) </b><br />
<b>LEFT ARROW (Move to the left or to the end of the previous line) </b><br />
<b>UP ARROW (Move up one row) </b><br />
<b>DOWN ARROW (Move down one row) </b><br />
<b>PAGE UP (Move up one screen at a time) </b><br />
<b>PAGE DOWN (Move down one screen at a time) </b><br />
<b>HOME (Move to the beginning of the line) </b><br />
<b>END (Move to the end of the line) </b><br />
<b>CTRL+HOME (Move to the first character) </b><br />
<b>CTRL+END (Move to the last character) </b><br />
<b>SPACEBAR (Switch between Enlarged and Normal mode when a character is
selected) </b><br />
<b>m*cro$oft Management Console (MMC) Main Window Keyboard Shortcuts </b><br />
<b>CTRL+O (Open a saved console) </b><br />
<b>CTRL+N (Open a new console) </b><br />
<b>CTRL+S (Save the open console) </b><br />
<b>CTRL+M (Add or remove a console item) </b><br />
<b>CTRL+W (Open a new window) </b><br />
<b>F5 key (Update the content of all console windows) </b><br />
<b>ALT+SPACEBAR (Display the MMC window menu) </b><br />
<b>ALT+F4 (Close the console) </b><br />
<b>ALT+A (Display the Action menu) </b><br />
<b>ALT+V (Display the View menu) </b><br />
<b>ALT+F (Display the File menu) </b><br />
<b>ALT+O (Display the Favorites menu) </b><br />
<b>MMC Console Window Keyboard Shortcuts </b><br />
<b>CTRL+P (Print the current page or active pane) </b><br />
<b>ALT+Minus sign (-) (Display the window menu for the active console window) </b><br />
<b>SHIFT+F10 (Display the Action shortcut menu for the selected item) </b><br />
<b>F1 key (Open the Help topic, if any, for the selected item) </b><br />
<b>F5 key (Update the content of all console windows) </b><br />
<b><span style="font-family: "Times","serif";">CTRL+F10 (Maximize the active
console window) </span></b><br />
<b>CTRL+F5 (Restore the active console window) </b><br />
<b>ALT+ENTER (Display the Properties dialog box, if any, for the selected item)
</b><br />
<b>F2 key (Rename the selected item) </b><br />
<b>CTRL+F4 (Close the active console window. When a console has only one
console window, this shortcut closes the console) </b><br />
<b>Remote Desktop Connection Navigation </b><br />
<b>CTRL+ALT+END (Open the m*cro$oft Windows NT Security dialog box) </b><br />
<b>ALT+PAGE UP (Switch between programs from left to right) </b><br />
<b>ALT+PAGE DOWN (Switch between programs from right to left) </b><br />
<b>ALT+INSERT (Cycle through the programs in most recently used order) </b><br />
<b>ALT+HOME (Display the Start menu) </b><br />
<b>CTRL+ALT+BREAK (Switch the client computer between a window and a full
screen) </b><br />
<b>ALT+DELETE (Display the Windows menu) </b><br />
<b>CTRL+ALT+Minus sign (-) (Place a snapshot of the active window in the client
on the Terminal server clipboard and provide the same functionality a s
pressing PRINT SCREEN on a local computer.) </b><br />
<b>CTRL+ALT+Plus sign (+) (Place a snapshot of the entire client window area on
the Terminal server clipboard and provide the same functionality as pressing
ALT+PRINT SCREEN on a local computer.) </b><br />
<b>m*cro$oft Internet Explorer Navigation </b><br />
<b>CTRL+B (Open the Organize Favorites dialog box) </b><br />
<b>CTRL+E (Open the Search bar) </b><br />
<b>CTRL+F (Start the Find utility) </b><br />
<b>CTRL+H (Open the History bar) </b><br />
<b>CTRL+I (Open the Favorites bar) </b><br />
<b>CTRL+L (Open the Open dialog box) </b><br />
<b>CTRL+N (Start another instance of the browser with the sam e Web address) </b><br />
<b>CTRL+O (Open the Open dialog box, the same as CTRL+L) </b><br />
<b>CTRL+P (Open the Print dialog box) </b><br />
<b>CTRL+R (Update the current Web page) </b><br />
<b>CTRL+W (Close the current window)</b><br />
<br />
<div class="MsoNormal">
<br /></div>
</div>
maheshhttp://www.blogger.com/profile/02809113713626613261noreply@blogger.com0tag:blogger.com,1999:blog-8776692190326650009.post-71846367702615014862013-12-15T23:59:00.003-08:002016-07-17T19:21:22.140-07:00How to hide file in image:-<div dir="ltr" style="text-align: left;" trbidi="on">
<!--[if gte mso 9]><xml>
<w:WordDocument>
<w:View>Normal</w:View>
<w:Zoom>0</w:Zoom>
<w:TrackMoves/>
<w:TrackFormatting/>
<w:PunctuationKerning/>
<w:ValidateAgainstSchemas/>
<w:SaveIfXMLInvalid>false</w:SaveIfXMLInvalid>
<w:IgnoreMixedContent>false</w:IgnoreMixedContent>
<w:AlwaysShowPlaceholderText>false</w:AlwaysShowPlaceholderText>
<w:DoNotPromoteQF/>
<w:LidThemeOther>EN-US</w:LidThemeOther>
<w:LidThemeAsian>X-NONE</w:LidThemeAsian>
<w:LidThemeComplexScript>X-NONE</w:LidThemeComplexScript>
<w:Compatibility>
<w:BreakWrappedTables/>
<w:SnapToGridInCell/>
<w:WrapTextWithPunct/>
<w:UseAsianBreakRules/>
<w:DontGrowAutofit/>
<w:SplitPgBreakAndParaMark/>
<w:DontVertAlignCellWithSp/>
<w:DontBreakConstrainedForcedTables/>
<w:DontVertAlignInTxbx/>
<w:Word11KerningPairs/>
<w:CachedColBalance/>
</w:Compatibility>
<w:BrowserLevel>MicrosoftInternetExplorer4</w:BrowserLevel>
<m:mathPr>
<m:mathFont m:val="Cambria Math"/>
<m:brkBin m:val="before"/>
<m:brkBinSub m:val="--"/>
<m:smallFrac m:val="off"/>
<m:dispDef/>
<m:lMargin m:val="0"/>
<m:rMargin m:val="0"/>
<m:defJc m:val="centerGroup"/>
<m:wrapIndent m:val="1440"/>
<m:intLim m:val="subSup"/>
<m:naryLim m:val="undOvr"/>
</m:mathPr></w:WordDocument>
</xml><![endif]--><br />
<!--[if gte mso 9]><xml>
<w:LatentStyles DefLockedState="false" DefUnhideWhenUsed="true"
DefSemiHidden="true" DefQFormat="false" DefPriority="99"
LatentStyleCount="267">
<w:LsdException Locked="false" Priority="0" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Normal"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="heading 1"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 2"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 3"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 4"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 5"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 6"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 7"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 8"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 9"/>
<w:LsdException Locked="false" Priority="39" Name="toc 1"/>
<w:LsdException Locked="false" Priority="39" Name="toc 2"/>
<w:LsdException Locked="false" Priority="39" Name="toc 3"/>
<w:LsdException Locked="false" Priority="39" Name="toc 4"/>
<w:LsdException Locked="false" Priority="39" Name="toc 5"/>
<w:LsdException Locked="false" Priority="39" Name="toc 6"/>
<w:LsdException Locked="false" Priority="39" Name="toc 7"/>
<w:LsdException Locked="false" Priority="39" Name="toc 8"/>
<w:LsdException Locked="false" Priority="39" Name="toc 9"/>
<w:LsdException Locked="false" Priority="35" QFormat="true" Name="caption"/>
<w:LsdException Locked="false" Priority="10" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Title"/>
<w:LsdException Locked="false" Priority="1" Name="Default Paragraph Font"/>
<w:LsdException Locked="false" Priority="11" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Subtitle"/>
<w:LsdException Locked="false" Priority="22" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Strong"/>
<w:LsdException Locked="false" Priority="20" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Emphasis"/>
<w:LsdException Locked="false" Priority="59" SemiHidden="false"
UnhideWhenUsed="false" Name="Table Grid"/>
<w:LsdException Locked="false" UnhideWhenUsed="false" Name="Placeholder Text"/>
<w:LsdException Locked="false" Priority="1" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="No Spacing"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 1"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 1"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 1"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 1"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 1"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 1"/>
<w:LsdException Locked="false" UnhideWhenUsed="false" Name="Revision"/>
<w:LsdException Locked="false" Priority="34" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="List Paragraph"/>
<w:LsdException Locked="false" Priority="29" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Quote"/>
<w:LsdException Locked="false" Priority="30" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Intense Quote"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 1"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 1"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 1"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 1"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 1"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 1"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 1"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 1"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 2"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 2"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 2"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 2"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 2"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 2"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 2"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 2"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 2"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 2"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 2"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 2"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 2"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 2"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 3"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 3"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 3"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 3"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 3"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 3"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 3"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 3"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 3"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 3"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 3"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 3"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 3"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 3"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 4"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 4"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 4"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 4"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 4"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 4"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 4"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 4"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 4"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 4"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 4"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 4"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 4"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 4"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 5"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 5"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 5"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 5"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 5"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 5"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 5"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 5"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 5"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 5"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 5"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 5"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 5"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 5"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 6"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 6"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 6"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 6"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 6"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 6"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 6"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 6"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 6"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 6"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 6"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 6"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 6"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 6"/>
<w:LsdException Locked="false" Priority="19" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Subtle Emphasis"/>
<w:LsdException Locked="false" Priority="21" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Intense Emphasis"/>
<w:LsdException Locked="false" Priority="31" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Subtle Reference"/>
<w:LsdException Locked="false" Priority="32" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Intense Reference"/>
<w:LsdException Locked="false" Priority="33" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Book Title"/>
<w:LsdException Locked="false" Priority="37" Name="Bibliography"/>
<w:LsdException Locked="false" Priority="39" QFormat="true" Name="TOC Heading"/>
</w:LatentStyles>
</xml><![endif]--><!--[if gte mso 10]>
<style>
/* Style Definitions */
table.MsoNormalTable
{mso-style-name:"Table Normal";
mso-tstyle-rowband-size:0;
mso-tstyle-colband-size:0;
mso-style-noshow:yes;
mso-style-priority:99;
mso-style-qformat:yes;
mso-style-parent:"";
mso-padding-alt:0in 5.4pt 0in 5.4pt;
mso-para-margin:0in;
mso-para-margin-bottom:.0001pt;
mso-pagination:widow-orphan;
font-size:11.0pt;
font-family:"Calibri","sans-serif";
mso-ascii-font-family:Calibri;
mso-ascii-theme-font:minor-latin;
mso-fareast-font-family:"Times New Roman";
mso-fareast-theme-font:minor-fareast;
mso-hansi-font-family:Calibri;
mso-hansi-theme-font:minor-latin;
mso-bidi-font-family:"Times New Roman";
mso-bidi-theme-font:minor-bidi;}
</style>
<![endif]-->
<br />
<div align="center" class="MsoNormal" style="background: #FFFAEE; line-height: 12.0pt; margin-left: 63.0pt; mso-outline-level: 4; text-align: center;">
<b><span style="color: black; font-family: "Verdana","sans-serif"; font-size: 9.0pt;">How to
hide file in image:-</span></b></div>
<div align="center" class="MsoNormal" style="background: #FFFAEE; text-align: center;">
<span style="color: black; font-family: "Verdana","sans-serif"; font-size: 9.0pt;">1.
Gather the file you wish to bind, and the image file, and place them in a
folder. For the sake of this demonstration, I will be using C:\New Folder<br />
-The image will hereby be referred to in all examples as fluffy.jpg<br />
-The file will hereby be referred to in all examples as New Text Document.txt<br />
<br />
2. Add the file/files you will be injecting into the image into a WinRar .rar
or .zip. From here on this will be referred to as (secret.rar)<br />
<br />
3. Open command prompt by going to Start > Run > cmd<br />
<br />
4. In Command Prompt, navigate to the folder where your two files are by typing<br />
cd location [ex: cd C:\New Folder]<br />
<br />
5. Type [copy /b fluffy.jpg + secret.rar fluffy.jpg] (remove the brackets)<br />
<br />
Congrats, as far as anyone viewing is concerned, this file looks like a JPEG,
acts like a JPEG, and is a JPEG, yet it now contains your file.<br />
<br />
In order to view/extract your file, there are two options that you can take<br />
<br />
a) Change the file extension from fluffy.jpg to fluffy.rar, then open and your
file is there<br />
b) Leave the file extension as is, right click, open with WinRar and your file
is there </span></div>
<div class="MsoNormal">
<br /></div>
</div>
maheshhttp://www.blogger.com/profile/02809113713626613261noreply@blogger.com0tag:blogger.com,1999:blog-8776692190326650009.post-64189493199193697762013-12-15T23:59:00.000-08:002013-12-15T23:59:05.146-08:00HOW TO Change Windows XP Home to Windows XP Pro<div dir="ltr" style="text-align: left;" trbidi="on">
<!--[if gte mso 9]><xml>
<w:WordDocument>
<w:View>Normal</w:View>
<w:Zoom>0</w:Zoom>
<w:TrackMoves/>
<w:TrackFormatting/>
<w:PunctuationKerning/>
<w:ValidateAgainstSchemas/>
<w:SaveIfXMLInvalid>false</w:SaveIfXMLInvalid>
<w:IgnoreMixedContent>false</w:IgnoreMixedContent>
<w:AlwaysShowPlaceholderText>false</w:AlwaysShowPlaceholderText>
<w:DoNotPromoteQF/>
<w:LidThemeOther>EN-US</w:LidThemeOther>
<w:LidThemeAsian>X-NONE</w:LidThemeAsian>
<w:LidThemeComplexScript>X-NONE</w:LidThemeComplexScript>
<w:Compatibility>
<w:BreakWrappedTables/>
<w:SnapToGridInCell/>
<w:WrapTextWithPunct/>
<w:UseAsianBreakRules/>
<w:DontGrowAutofit/>
<w:SplitPgBreakAndParaMark/>
<w:DontVertAlignCellWithSp/>
<w:DontBreakConstrainedForcedTables/>
<w:DontVertAlignInTxbx/>
<w:Word11KerningPairs/>
<w:CachedColBalance/>
</w:Compatibility>
<w:BrowserLevel>MicrosoftInternetExplorer4</w:BrowserLevel>
<m:mathPr>
<m:mathFont m:val="Cambria Math"/>
<m:brkBin m:val="before"/>
<m:brkBinSub m:val="--"/>
<m:smallFrac m:val="off"/>
<m:dispDef/>
<m:lMargin m:val="0"/>
<m:rMargin m:val="0"/>
<m:defJc m:val="centerGroup"/>
<m:wrapIndent m:val="1440"/>
<m:intLim m:val="subSup"/>
<m:naryLim m:val="undOvr"/>
</m:mathPr></w:WordDocument>
</xml><![endif]--><br />
<!--[if gte mso 9]><xml>
<w:LatentStyles DefLockedState="false" DefUnhideWhenUsed="true"
DefSemiHidden="true" DefQFormat="false" DefPriority="99"
LatentStyleCount="267">
<w:LsdException Locked="false" Priority="0" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Normal"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="heading 1"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 2"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 3"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 4"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 5"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 6"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 7"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 8"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 9"/>
<w:LsdException Locked="false" Priority="39" Name="toc 1"/>
<w:LsdException Locked="false" Priority="39" Name="toc 2"/>
<w:LsdException Locked="false" Priority="39" Name="toc 3"/>
<w:LsdException Locked="false" Priority="39" Name="toc 4"/>
<w:LsdException Locked="false" Priority="39" Name="toc 5"/>
<w:LsdException Locked="false" Priority="39" Name="toc 6"/>
<w:LsdException Locked="false" Priority="39" Name="toc 7"/>
<w:LsdException Locked="false" Priority="39" Name="toc 8"/>
<w:LsdException Locked="false" Priority="39" Name="toc 9"/>
<w:LsdException Locked="false" Priority="35" QFormat="true" Name="caption"/>
<w:LsdException Locked="false" Priority="10" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Title"/>
<w:LsdException Locked="false" Priority="1" Name="Default Paragraph Font"/>
<w:LsdException Locked="false" Priority="11" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Subtitle"/>
<w:LsdException Locked="false" Priority="22" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Strong"/>
<w:LsdException Locked="false" Priority="20" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Emphasis"/>
<w:LsdException Locked="false" Priority="59" SemiHidden="false"
UnhideWhenUsed="false" Name="Table Grid"/>
<w:LsdException Locked="false" UnhideWhenUsed="false" Name="Placeholder Text"/>
<w:LsdException Locked="false" Priority="1" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="No Spacing"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 1"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 1"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 1"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 1"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 1"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 1"/>
<w:LsdException Locked="false" UnhideWhenUsed="false" Name="Revision"/>
<w:LsdException Locked="false" Priority="34" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="List Paragraph"/>
<w:LsdException Locked="false" Priority="29" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Quote"/>
<w:LsdException Locked="false" Priority="30" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Intense Quote"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 1"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 1"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 1"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 1"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 1"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 1"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 1"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 1"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 2"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 2"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 2"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 2"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 2"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 2"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 2"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 2"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 2"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 2"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 2"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 2"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 2"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 2"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 3"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 3"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 3"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 3"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 3"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 3"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 3"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 3"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 3"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 3"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 3"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 3"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 3"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 3"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 4"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 4"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 4"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 4"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 4"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 4"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 4"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 4"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 4"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 4"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 4"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 4"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 4"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 4"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 5"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 5"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 5"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 5"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 5"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 5"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 5"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 5"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 5"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 5"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 5"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 5"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 5"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 5"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 6"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 6"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 6"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 6"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 6"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 6"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 6"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 6"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 6"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 6"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 6"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 6"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 6"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 6"/>
<w:LsdException Locked="false" Priority="19" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Subtle Emphasis"/>
<w:LsdException Locked="false" Priority="21" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Intense Emphasis"/>
<w:LsdException Locked="false" Priority="31" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Subtle Reference"/>
<w:LsdException Locked="false" Priority="32" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Intense Reference"/>
<w:LsdException Locked="false" Priority="33" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Book Title"/>
<w:LsdException Locked="false" Priority="37" Name="Bibliography"/>
<w:LsdException Locked="false" Priority="39" QFormat="true" Name="TOC Heading"/>
</w:LatentStyles>
</xml><![endif]--><!--[if gte mso 10]>
<style>
/* Style Definitions */
table.MsoNormalTable
{mso-style-name:"Table Normal";
mso-tstyle-rowband-size:0;
mso-tstyle-colband-size:0;
mso-style-noshow:yes;
mso-style-priority:99;
mso-style-qformat:yes;
mso-style-parent:"";
mso-padding-alt:0in 5.4pt 0in 5.4pt;
mso-para-margin:0in;
mso-para-margin-bottom:.0001pt;
mso-pagination:widow-orphan;
font-size:11.0pt;
font-family:"Calibri","sans-serif";
mso-ascii-font-family:Calibri;
mso-ascii-theme-font:minor-latin;
mso-fareast-font-family:"Times New Roman";
mso-fareast-theme-font:minor-fareast;
mso-hansi-font-family:Calibri;
mso-hansi-theme-font:minor-latin;
mso-bidi-font-family:"Times New Roman";
mso-bidi-theme-font:minor-bidi;}
</style>
<![endif]-->
<br />
<div align="center" class="MsoNormal" style="background: #FFFAEE; line-height: 12.0pt; margin-left: 63.0pt; mso-outline-level: 4; text-align: center;">
<b><span style="color: black; font-family: "Verdana","sans-serif"; font-size: 9.0pt;">HOW TO
Change Windows XP Home to Windows XP Pro</span></b></div>
<div align="center" class="MsoNormal" style="background: #FFFAEE; text-align: center;">
<span style="color: black; font-family: "Verdana","sans-serif"; font-size: 9.0pt;">We can’t
vouch for this hack, because we are too lazy to try it (and we never, ever
violate copyrights or EULAs), but kind reader Martin explains the process for
turning an Windows XP Home install disc to a Windows XP Pro disc after the
jump.<br />
<br />
It sounds pretty simple to do (just some registry changes), but you can’t
install Service Pack 2, so you might try to slipstream in the changes to your
modified install disc (if that’s even possible).<br />
<br />
Alternately, buy XP Pro, or get a Mac.<br />
<br />
<br />
Code:<br />
yes indeed, you can’t change an installed Windows but only your Installation CD
(or even a recovery CD in case the manufacturer had not left out important
parts)<br />
<br />
Here’s the detailed breakdown you asked for.<br />
<br />
1. Copy the root directory and the i386 directory of the WindowsXP CD<br />
to your harddisk<br />
2. Extract the Bootsector of your WindowsXP CD<br />
3. Change 2 Bytes in i386\Setupreg.hiv :<br />
a) Open Regedit<br />
b) Highlight HKEY_LOCAL_MACHINE<br />
c) Menu: File -> Load Structure -> i386\Setupreg.hiv<br />
d) Assign an arbitrary name to the imported structure e.g. “Homekey”<br />
e) Goto HKEY_LOCAL_MACHINE\Homekey\ControlSet001\Services\setupdd<br />
f) edit the binary key “default” and change “01” to “00” and “02” to<br />
“00”<br />
g) Highlight “Homekey” and select menu: File -> unload structure<br />
4. Burn your new XP Pro CD<br />
5. Install WindowsXP as usual. Your XP Home Key will work.<br />
<br />
Note: You cannot apply SP2 to such a WindowsXP Pro, so step 1.b)<br />
might be to integrate SP2 in your Installation CD<br />
<br />
Please check the menu-entries as I don’t owe an English copy of<br />
XP and have to guess them. </span></div>
<div class="MsoNormal">
<br /></div>
</div>
maheshhttp://www.blogger.com/profile/02809113713626613261noreply@blogger.com0tag:blogger.com,1999:blog-8776692190326650009.post-49903577314250979452013-12-15T23:58:00.001-08:002016-07-17T19:23:24.740-07:00How do I delete an "undeletable" file?<div dir="ltr" style="text-align: left;" trbidi="on">
<!--[if gte mso 9]><xml>
<w:WordDocument>
<w:View>Normal</w:View>
<w:Zoom>0</w:Zoom>
<w:TrackMoves/>
<w:TrackFormatting/>
<w:PunctuationKerning/>
<w:ValidateAgainstSchemas/>
<w:SaveIfXMLInvalid>false</w:SaveIfXMLInvalid>
<w:IgnoreMixedContent>false</w:IgnoreMixedContent>
<w:AlwaysShowPlaceholderText>false</w:AlwaysShowPlaceholderText>
<w:DoNotPromoteQF/>
<w:LidThemeOther>EN-US</w:LidThemeOther>
<w:LidThemeAsian>X-NONE</w:LidThemeAsian>
<w:LidThemeComplexScript>X-NONE</w:LidThemeComplexScript>
<w:Compatibility>
<w:BreakWrappedTables/>
<w:SnapToGridInCell/>
<w:WrapTextWithPunct/>
<w:UseAsianBreakRules/>
<w:DontGrowAutofit/>
<w:SplitPgBreakAndParaMark/>
<w:DontVertAlignCellWithSp/>
<w:DontBreakConstrainedForcedTables/>
<w:DontVertAlignInTxbx/>
<w:Word11KerningPairs/>
<w:CachedColBalance/>
</w:Compatibility>
<w:BrowserLevel>MicrosoftInternetExplorer4</w:BrowserLevel>
<m:mathPr>
<m:mathFont m:val="Cambria Math"/>
<m:brkBin m:val="before"/>
<m:brkBinSub m:val="--"/>
<m:smallFrac m:val="off"/>
<m:dispDef/>
<m:lMargin m:val="0"/>
<m:rMargin m:val="0"/>
<m:defJc m:val="centerGroup"/>
<m:wrapIndent m:val="1440"/>
<m:intLim m:val="subSup"/>
<m:naryLim m:val="undOvr"/>
</m:mathPr></w:WordDocument>
</xml><![endif]--><br />
<!--[if gte mso 9]><xml>
<w:LatentStyles DefLockedState="false" DefUnhideWhenUsed="true"
DefSemiHidden="true" DefQFormat="false" DefPriority="99"
LatentStyleCount="267">
<w:LsdException Locked="false" Priority="0" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Normal"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="heading 1"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 2"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 3"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 4"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 5"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 6"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 7"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 8"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 9"/>
<w:LsdException Locked="false" Priority="39" Name="toc 1"/>
<w:LsdException Locked="false" Priority="39" Name="toc 2"/>
<w:LsdException Locked="false" Priority="39" Name="toc 3"/>
<w:LsdException Locked="false" Priority="39" Name="toc 4"/>
<w:LsdException Locked="false" Priority="39" Name="toc 5"/>
<w:LsdException Locked="false" Priority="39" Name="toc 6"/>
<w:LsdException Locked="false" Priority="39" Name="toc 7"/>
<w:LsdException Locked="false" Priority="39" Name="toc 8"/>
<w:LsdException Locked="false" Priority="39" Name="toc 9"/>
<w:LsdException Locked="false" Priority="35" QFormat="true" Name="caption"/>
<w:LsdException Locked="false" Priority="10" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Title"/>
<w:LsdException Locked="false" Priority="1" Name="Default Paragraph Font"/>
<w:LsdException Locked="false" Priority="11" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Subtitle"/>
<w:LsdException Locked="false" Priority="22" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Strong"/>
<w:LsdException Locked="false" Priority="20" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Emphasis"/>
<w:LsdException Locked="false" Priority="59" SemiHidden="false"
UnhideWhenUsed="false" Name="Table Grid"/>
<w:LsdException Locked="false" UnhideWhenUsed="false" Name="Placeholder Text"/>
<w:LsdException Locked="false" Priority="1" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="No Spacing"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 1"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 1"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 1"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 1"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 1"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 1"/>
<w:LsdException Locked="false" UnhideWhenUsed="false" Name="Revision"/>
<w:LsdException Locked="false" Priority="34" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="List Paragraph"/>
<w:LsdException Locked="false" Priority="29" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Quote"/>
<w:LsdException Locked="false" Priority="30" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Intense Quote"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 1"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 1"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 1"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 1"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 1"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 1"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 1"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 1"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 2"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 2"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 2"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 2"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 2"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 2"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 2"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 2"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 2"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 2"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 2"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 2"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 2"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 2"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 3"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 3"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 3"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 3"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 3"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 3"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 3"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 3"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 3"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 3"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 3"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 3"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 3"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 3"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 4"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 4"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 4"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 4"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 4"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 4"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 4"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 4"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 4"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 4"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 4"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 4"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 4"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 4"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 5"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 5"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 5"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 5"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 5"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 5"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 5"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 5"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 5"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 5"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 5"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 5"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 5"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 5"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 6"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 6"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 6"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 6"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 6"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 6"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 6"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 6"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 6"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 6"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 6"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 6"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 6"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 6"/>
<w:LsdException Locked="false" Priority="19" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Subtle Emphasis"/>
<w:LsdException Locked="false" Priority="21" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Intense Emphasis"/>
<w:LsdException Locked="false" Priority="31" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Subtle Reference"/>
<w:LsdException Locked="false" Priority="32" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Intense Reference"/>
<w:LsdException Locked="false" Priority="33" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Book Title"/>
<w:LsdException Locked="false" Priority="37" Name="Bibliography"/>
<w:LsdException Locked="false" Priority="39" QFormat="true" Name="TOC Heading"/>
</w:LatentStyles>
</xml><![endif]--><!--[if !mso]><img src="//img2.blogblog.com/img/video_object.png" style="background-color: #b2b2b2; " class="BLOGGER-object-element tr_noresize tr_placeholder" id="ieooui" data-original-id="ieooui" />
<style>
st1\:*{behavior:url(#ieooui) }
</style>
<![endif]--><!--[if gte mso 10]>
<style>
/* Style Definitions */
table.MsoNormalTable
{mso-style-name:"Table Normal";
mso-tstyle-rowband-size:0;
mso-tstyle-colband-size:0;
mso-style-noshow:yes;
mso-style-priority:99;
mso-style-qformat:yes;
mso-style-parent:"";
mso-padding-alt:0in 5.4pt 0in 5.4pt;
mso-para-margin:0in;
mso-para-margin-bottom:.0001pt;
mso-pagination:widow-orphan;
font-size:11.0pt;
font-family:"Calibri","sans-serif";
mso-ascii-font-family:Calibri;
mso-ascii-theme-font:minor-latin;
mso-fareast-font-family:"Times New Roman";
mso-fareast-theme-font:minor-fareast;
mso-hansi-font-family:Calibri;
mso-hansi-theme-font:minor-latin;
mso-bidi-font-family:"Times New Roman";
mso-bidi-theme-font:minor-bidi;}
</style>
<![endif]-->
<br />
<div align="center" class="MsoNormal" style="background: #FFFAEE; line-height: 12.0pt; margin-left: 63.0pt; mso-outline-level: 4; text-align: center;">
<b><span style="color: black; font-family: "Verdana","sans-serif"; font-size: 9.0pt;">How do I
delete an "undeletable" file?</span></b></div>
<div align="center" class="MsoNormal" style="background: #FFFAEE; text-align: center;">
<span style="color: black; font-family: "Verdana","sans-serif"; font-size: 9.0pt;">Open a
Command Prompt window and leave it open. Close all open programs. Click Start,
Run and enter TASKMGR.EXE .Go to the Processes tab and End Process on
Explorer.exe. Leave Task Manager open. Go back to the Command Prompt window and
change to the directory the AVI (or other undeletable file) is located in. At
the command prompt type DEL
where is the file you wish to delete. Go back to Task Manager, click File, New
Task and enter EXPLORER.EXE to restart the GUI shell. Close Task Manager. </span></div>
<div class="MsoNormal">
<br /></div>
</div>
maheshhttp://www.blogger.com/profile/02809113713626613261noreply@blogger.com0tag:blogger.com,1999:blog-8776692190326650009.post-49233451399013080882013-12-15T23:56:00.002-08:002016-07-17T19:24:06.722-07:00Create a Shutdown icon<div dir="ltr" style="text-align: left;" trbidi="on">
<!--[if gte mso 9]><xml>
<w:WordDocument>
<w:View>Normal</w:View>
<w:Zoom>0</w:Zoom>
<w:TrackMoves/>
<w:TrackFormatting/>
<w:PunctuationKerning/>
<w:ValidateAgainstSchemas/>
<w:SaveIfXMLInvalid>false</w:SaveIfXMLInvalid>
<w:IgnoreMixedContent>false</w:IgnoreMixedContent>
<w:AlwaysShowPlaceholderText>false</w:AlwaysShowPlaceholderText>
<w:DoNotPromoteQF/>
<w:LidThemeOther>EN-US</w:LidThemeOther>
<w:LidThemeAsian>X-NONE</w:LidThemeAsian>
<w:LidThemeComplexScript>X-NONE</w:LidThemeComplexScript>
<w:Compatibility>
<w:BreakWrappedTables/>
<w:SnapToGridInCell/>
<w:WrapTextWithPunct/>
<w:UseAsianBreakRules/>
<w:DontGrowAutofit/>
<w:SplitPgBreakAndParaMark/>
<w:DontVertAlignCellWithSp/>
<w:DontBreakConstrainedForcedTables/>
<w:DontVertAlignInTxbx/>
<w:Word11KerningPairs/>
<w:CachedColBalance/>
</w:Compatibility>
<w:BrowserLevel>MicrosoftInternetExplorer4</w:BrowserLevel>
<m:mathPr>
<m:mathFont m:val="Cambria Math"/>
<m:brkBin m:val="before"/>
<m:brkBinSub m:val="--"/>
<m:smallFrac m:val="off"/>
<m:dispDef/>
<m:lMargin m:val="0"/>
<m:rMargin m:val="0"/>
<m:defJc m:val="centerGroup"/>
<m:wrapIndent m:val="1440"/>
<m:intLim m:val="subSup"/>
<m:naryLim m:val="undOvr"/>
</m:mathPr></w:WordDocument>
</xml><![endif]--><br />
<!--[if gte mso 9]><xml>
<w:LatentStyles DefLockedState="false" DefUnhideWhenUsed="true"
DefSemiHidden="true" DefQFormat="false" DefPriority="99"
LatentStyleCount="267">
<w:LsdException Locked="false" Priority="0" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Normal"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="heading 1"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 2"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 3"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 4"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 5"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 6"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 7"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 8"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 9"/>
<w:LsdException Locked="false" Priority="39" Name="toc 1"/>
<w:LsdException Locked="false" Priority="39" Name="toc 2"/>
<w:LsdException Locked="false" Priority="39" Name="toc 3"/>
<w:LsdException Locked="false" Priority="39" Name="toc 4"/>
<w:LsdException Locked="false" Priority="39" Name="toc 5"/>
<w:LsdException Locked="false" Priority="39" Name="toc 6"/>
<w:LsdException Locked="false" Priority="39" Name="toc 7"/>
<w:LsdException Locked="false" Priority="39" Name="toc 8"/>
<w:LsdException Locked="false" Priority="39" Name="toc 9"/>
<w:LsdException Locked="false" Priority="35" QFormat="true" Name="caption"/>
<w:LsdException Locked="false" Priority="10" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Title"/>
<w:LsdException Locked="false" Priority="1" Name="Default Paragraph Font"/>
<w:LsdException Locked="false" Priority="11" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Subtitle"/>
<w:LsdException Locked="false" Priority="22" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Strong"/>
<w:LsdException Locked="false" Priority="20" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Emphasis"/>
<w:LsdException Locked="false" Priority="59" SemiHidden="false"
UnhideWhenUsed="false" Name="Table Grid"/>
<w:LsdException Locked="false" UnhideWhenUsed="false" Name="Placeholder Text"/>
<w:LsdException Locked="false" Priority="1" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="No Spacing"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 1"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 1"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 1"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 1"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 1"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 1"/>
<w:LsdException Locked="false" UnhideWhenUsed="false" Name="Revision"/>
<w:LsdException Locked="false" Priority="34" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="List Paragraph"/>
<w:LsdException Locked="false" Priority="29" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Quote"/>
<w:LsdException Locked="false" Priority="30" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Intense Quote"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 1"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 1"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 1"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 1"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 1"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 1"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 1"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 1"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 2"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 2"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 2"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 2"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 2"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 2"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 2"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 2"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 2"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 2"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 2"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 2"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 2"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 2"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 3"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 3"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 3"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 3"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 3"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 3"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 3"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 3"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 3"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 3"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 3"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 3"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 3"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 3"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 4"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 4"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 4"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 4"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 4"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 4"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 4"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 4"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 4"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 4"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 4"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 4"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 4"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 4"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 5"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 5"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 5"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 5"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 5"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 5"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 5"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 5"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 5"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 5"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 5"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 5"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 5"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 5"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 6"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 6"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 6"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 6"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 6"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 6"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 6"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 6"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 6"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 6"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 6"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 6"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 6"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 6"/>
<w:LsdException Locked="false" Priority="19" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Subtle Emphasis"/>
<w:LsdException Locked="false" Priority="21" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Intense Emphasis"/>
<w:LsdException Locked="false" Priority="31" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Subtle Reference"/>
<w:LsdException Locked="false" Priority="32" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Intense Reference"/>
<w:LsdException Locked="false" Priority="33" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Book Title"/>
<w:LsdException Locked="false" Priority="37" Name="Bibliography"/>
<w:LsdException Locked="false" Priority="39" QFormat="true" Name="TOC Heading"/>
</w:LatentStyles>
</xml><![endif]--><!--[if gte mso 10]>
<style>
/* Style Definitions */
table.MsoNormalTable
{mso-style-name:"Table Normal";
mso-tstyle-rowband-size:0;
mso-tstyle-colband-size:0;
mso-style-noshow:yes;
mso-style-priority:99;
mso-style-qformat:yes;
mso-style-parent:"";
mso-padding-alt:0in 5.4pt 0in 5.4pt;
mso-para-margin:0in;
mso-para-margin-bottom:.0001pt;
mso-pagination:widow-orphan;
font-size:11.0pt;
font-family:"Calibri","sans-serif";
mso-ascii-font-family:Calibri;
mso-ascii-theme-font:minor-latin;
mso-fareast-font-family:"Times New Roman";
mso-fareast-theme-font:minor-fareast;
mso-hansi-font-family:Calibri;
mso-hansi-theme-font:minor-latin;
mso-bidi-font-family:"Times New Roman";
mso-bidi-theme-font:minor-bidi;}
</style>
<![endif]-->
<br />
<div align="center" class="MsoNormal" style="background: #FFFAEE; line-height: 12.0pt; margin-left: 63.0pt; mso-outline-level: 4; text-align: center;">
<b><span style="color: black; font-family: "Verdana","sans-serif"; font-size: 9.0pt;">Creating
Shutdown Icon or One Click Shutdown:</span></b></div>
<div align="center" class="MsoNormal" style="background: #FFFAEE; text-align: center;">
<span style="color: black; font-family: "Verdana","sans-serif"; font-size: 9.0pt;">Creating
Shutdown Icon or One Click Shutdown:<br />
Navigate to your desktop. On the desktop, right-click and go to New, then to
Shortcut (in other words, create a new shortcut). You should now see a pop-up
window instructing you to enter a command line path.<br />
Use this path in "Type Location of the Item"<br />
SHUTDOWN -s -t 01<br />
If the C: drive is not your local hard drive, then replace "C" with
the correct letter of the hard drive. Click the "Next" button. Name
the shortcut and click the "Finish" button. Now whenever you want to
shut down, just click on this shortcut and you're done. </span></div>
<div class="MsoNormal">
<br /></div>
</div>
maheshhttp://www.blogger.com/profile/02809113713626613261noreply@blogger.com0tag:blogger.com,1999:blog-8776692190326650009.post-14950209146701581322013-12-15T23:56:00.000-08:002016-07-17T19:24:49.355-07:00Create a Hidden user Account<div dir="ltr" style="text-align: left;" trbidi="on">
<!--[if gte mso 9]><xml>
<w:WordDocument>
<w:View>Normal</w:View>
<w:Zoom>0</w:Zoom>
<w:TrackMoves/>
<w:TrackFormatting/>
<w:PunctuationKerning/>
<w:ValidateAgainstSchemas/>
<w:SaveIfXMLInvalid>false</w:SaveIfXMLInvalid>
<w:IgnoreMixedContent>false</w:IgnoreMixedContent>
<w:AlwaysShowPlaceholderText>false</w:AlwaysShowPlaceholderText>
<w:DoNotPromoteQF/>
<w:LidThemeOther>EN-US</w:LidThemeOther>
<w:LidThemeAsian>X-NONE</w:LidThemeAsian>
<w:LidThemeComplexScript>X-NONE</w:LidThemeComplexScript>
<w:Compatibility>
<w:BreakWrappedTables/>
<w:SnapToGridInCell/>
<w:WrapTextWithPunct/>
<w:UseAsianBreakRules/>
<w:DontGrowAutofit/>
<w:SplitPgBreakAndParaMark/>
<w:DontVertAlignCellWithSp/>
<w:DontBreakConstrainedForcedTables/>
<w:DontVertAlignInTxbx/>
<w:Word11KerningPairs/>
<w:CachedColBalance/>
</w:Compatibility>
<w:BrowserLevel>MicrosoftInternetExplorer4</w:BrowserLevel>
<m:mathPr>
<m:mathFont m:val="Cambria Math"/>
<m:brkBin m:val="before"/>
<m:brkBinSub m:val="--"/>
<m:smallFrac m:val="off"/>
<m:dispDef/>
<m:lMargin m:val="0"/>
<m:rMargin m:val="0"/>
<m:defJc m:val="centerGroup"/>
<m:wrapIndent m:val="1440"/>
<m:intLim m:val="subSup"/>
<m:naryLim m:val="undOvr"/>
</m:mathPr></w:WordDocument>
</xml><![endif]--><br />
<!--[if gte mso 9]><xml>
<w:LatentStyles DefLockedState="false" DefUnhideWhenUsed="true"
DefSemiHidden="true" DefQFormat="false" DefPriority="99"
LatentStyleCount="267">
<w:LsdException Locked="false" Priority="0" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Normal"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="heading 1"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 2"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 3"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 4"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 5"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 6"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 7"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 8"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 9"/>
<w:LsdException Locked="false" Priority="39" Name="toc 1"/>
<w:LsdException Locked="false" Priority="39" Name="toc 2"/>
<w:LsdException Locked="false" Priority="39" Name="toc 3"/>
<w:LsdException Locked="false" Priority="39" Name="toc 4"/>
<w:LsdException Locked="false" Priority="39" Name="toc 5"/>
<w:LsdException Locked="false" Priority="39" Name="toc 6"/>
<w:LsdException Locked="false" Priority="39" Name="toc 7"/>
<w:LsdException Locked="false" Priority="39" Name="toc 8"/>
<w:LsdException Locked="false" Priority="39" Name="toc 9"/>
<w:LsdException Locked="false" Priority="35" QFormat="true" Name="caption"/>
<w:LsdException Locked="false" Priority="10" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Title"/>
<w:LsdException Locked="false" Priority="1" Name="Default Paragraph Font"/>
<w:LsdException Locked="false" Priority="11" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Subtitle"/>
<w:LsdException Locked="false" Priority="22" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Strong"/>
<w:LsdException Locked="false" Priority="20" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Emphasis"/>
<w:LsdException Locked="false" Priority="59" SemiHidden="false"
UnhideWhenUsed="false" Name="Table Grid"/>
<w:LsdException Locked="false" UnhideWhenUsed="false" Name="Placeholder Text"/>
<w:LsdException Locked="false" Priority="1" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="No Spacing"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 1"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 1"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 1"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 1"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 1"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 1"/>
<w:LsdException Locked="false" UnhideWhenUsed="false" Name="Revision"/>
<w:LsdException Locked="false" Priority="34" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="List Paragraph"/>
<w:LsdException Locked="false" Priority="29" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Quote"/>
<w:LsdException Locked="false" Priority="30" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Intense Quote"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 1"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 1"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 1"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 1"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 1"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 1"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 1"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 1"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 2"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 2"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 2"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 2"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 2"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 2"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 2"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 2"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 2"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 2"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 2"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 2"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 2"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 2"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 3"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 3"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 3"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 3"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 3"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 3"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 3"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 3"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 3"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 3"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 3"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 3"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 3"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 3"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 4"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 4"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 4"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 4"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 4"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 4"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 4"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 4"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 4"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 4"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 4"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 4"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 4"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 4"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 5"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 5"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 5"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 5"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 5"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 5"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 5"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 5"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 5"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 5"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 5"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 5"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 5"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 5"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 6"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 6"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 6"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 6"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 6"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 6"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 6"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 6"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 6"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 6"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 6"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 6"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 6"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 6"/>
<w:LsdException Locked="false" Priority="19" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Subtle Emphasis"/>
<w:LsdException Locked="false" Priority="21" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Intense Emphasis"/>
<w:LsdException Locked="false" Priority="31" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Subtle Reference"/>
<w:LsdException Locked="false" Priority="32" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Intense Reference"/>
<w:LsdException Locked="false" Priority="33" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Book Title"/>
<w:LsdException Locked="false" Priority="37" Name="Bibliography"/>
<w:LsdException Locked="false" Priority="39" QFormat="true" Name="TOC Heading"/>
</w:LatentStyles>
</xml><![endif]--><!--[if gte mso 10]>
<style>
/* Style Definitions */
table.MsoNormalTable
{mso-style-name:"Table Normal";
mso-tstyle-rowband-size:0;
mso-tstyle-colband-size:0;
mso-style-noshow:yes;
mso-style-priority:99;
mso-style-qformat:yes;
mso-style-parent:"";
mso-padding-alt:0in 5.4pt 0in 5.4pt;
mso-para-margin:0in;
mso-para-margin-bottom:.0001pt;
mso-pagination:widow-orphan;
font-size:11.0pt;
font-family:"Calibri","sans-serif";
mso-ascii-font-family:Calibri;
mso-ascii-theme-font:minor-latin;
mso-fareast-font-family:"Times New Roman";
mso-fareast-theme-font:minor-fareast;
mso-hansi-font-family:Calibri;
mso-hansi-theme-font:minor-latin;
mso-bidi-font-family:"Times New Roman";
mso-bidi-theme-font:minor-bidi;}
</style>
<![endif]-->
<br />
<div align="center" class="MsoNormal" style="background: #FFFAEE; text-align: center;">
<span style="color: black; font-family: "Verdana","sans-serif"; font-size: 9.0pt;">Create A
Hidden User Account<br />
This tweak allows an account that is normally displayed on the Welcome screen
to be hidden from view. To log on using the account it's necessary to use the
Log On To Windows dialog box similar to the one in Windows 2000<br />
<br />
<br />
#[Start] [Run] [Regedit]<br />
#Registry Key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\<br />
Winlogon\SpecialAccounts\UserList<br />
#Modify/Create the Value Data Type(s) and Value Name(s) as detailed below.<br />
#Data Type: REG_DWORD [Dword Value] // Value Name: Type Name of Account to be
Hidden<br />
#Setting for Value Data: [0 = Account is Hidden / 1 = Enabled]<br />
#Exit Registry and Reboo </span></div>
<div class="MsoNormal">
<br /></div>
</div>
maheshhttp://www.blogger.com/profile/02809113713626613261noreply@blogger.com0