Monday, June 30, 2008

PORT SCANNER:HACKERS TOOL

HACK TO LEARN,NOT LEARN TO HACK”
What Is Port Scanner?
A port scanner is a piece of software designed to search a network host for open ports. This is often used by administrators to check the security of their networks and by hackers to compromise it. To port scan a host is to scan for multiple listening ports on a single target host. To port sweep is to scan multiple hosts for a specific listening port. The latter is typically used in searching for a specific service.
How A Scanner Works ?Each time you send or receive data through the Internet, your mail (or web, chat, or whatever) program must connect to a remote port of a remote host. Some of the services are ftp21-file transfer protocol,telnet23_Telnet,smtp25-simple mail transfer etc.
In fact, the list of services/ports is greater than the above and includes three different ports ranges:port range utilization0 - 1023 well known ports, which includes the most common services, like smtp, pop3, ftp, etc. 1024 - 49151 registered ports, which are assigned by the IANA organization49152 - 65535 dynamic and/or private ports, which can be freely used
The TCP/IP protocol is based on the OSI (Open Systems Interconnection) model, developed between 1977 and 1984. That model uses a proposal of the ISO (International Organization for Standardization), so it is well known as the ISO/OSI model also. The ISO/OSI architecture divides the network into various layers (application, presentation, session, transport, network, data-link and phisical).
The IP and TCP protocols are the ground of data transfer. The IP protocol, which works at network layer, handles the transfer of raw data between computers. At this level, each packet contains the data which must be transferred and the ip address of the sender and the receiver. The TCP protocol works at the transport layer, but the principle is the same. TCP replaces the ip address concept with the port concept. Each transferred packet contains the data and the port number, where the port number is associated with a service instead of a computer.In other words, the IP protocol moves the raw data from one computer to other, using the ip address to identify each computer of the network. Well, but when the data arrives to the destination computer, where must be leaved ? Are you browsing the WEB ? If so, the TCP protocol redirects the incoming data through the port used by the HTTP service (80). Are you using an FTP client ? The TCP protocol redirects the incoming data through the port used by the service (21), and so on.As you can see, the port and service concepts are the basic principles used during data transfer through the Internet. Now you can understand which is the main purpose of a TCP/IP scanner. If you want to know what are the services currently running on a remote host, you must scan its ports.

How Port Scanner Work

Port Scanning Basic TechniquesThe simplest port scan tries (i.e., sends a carefully constructed packet with a chosen destination port number) each of the ports from 0 to 65535 on the victim to see which ones are open.TCP connect():- The connect() system call provided by an OS is used to open a connection to every interesting port on the machine. If the port is listening, connect() will succeed, otherwise the port isn’t reachable.Strobe -A strobe does a narrower scan, only looking for those services the attacker knows how to exploit. The name comes from one of the original TCP scanning programs, though now virtually all scanning tools include this feature.The ident protocol allows for the disclosure of the username of the owner of any process connected via TCP, even if that process didn’t initiate the connection. So, e.g., one can connect to port 80 and then use identd to find out whether the HTTP server is running as root.Port Scanning Advanced TechniquesOne problem, from the perspective of the attacker attempting to scan a port, is that services listening on these ports log scans. They see an incoming connection, but no data, so an error is logged. There exist a number of stealth scan techniques to avoid this. A stealth scan is a kind of scan that is designed to go undetected by auditing tools. Obviously, this is a race between the hacker and firewall vendors - what are considered stealth scans now may not be so in a few months once the firewall vendor becomes aware of such techniques.Port scanners scan a host rapidly by firing off packets at different ports. So, scanning very slowly (taking a day or more) becomes a stealth technique. Another stealth scanning technique is “inverse mapping”, where you try to find out all hosts on a network by generating “host unreachable” ICMP-messages for those IPs that do not exist. Since these messages may be generated by any TCP/IP packet one may send meaningless packets (e.g. RST packets sent without any previous packet).Fragmented packet Port ScanThe scanner splits the TCP header into several IP fragments. This bypasses some packet filter firewalls because they cannot see a complete TCP header that can match their filter rules. Some packet filters and firewalls do queue all IP fragments, but many networks cannot afford the performance loss caused by the queuing.SYN scanThis technique is also called half-open scanning, because a TCP connection is not completed. A SYN packet is sent (as if we are going to open a connection), and the target host responds with a SYN+ACK, this indicates the port is listening, and an RST indicates a non- listener. The server process is never informed by the TCP layer because the connection did not complete.FIN scanThe typical TCP scan attempts to open connections (at least part way). Another technique sends erroneous packets at a port, expecting that open listening ports will send back different error messages than closed ports. The scanner sends a FIN packet, which should close a connection that is open. Closed ports reply to a FIN packet with a RST. Open ports, on the other hand, ignore the packet in question. This is required TCP behavior.If no service is listening at the target port, the operating system will generate an error message. If a service is listening, the operating system will silently drop the incoming packet. Therefore, silence indicates the presence of a service at the port. However, since packets can be dropped accidentally on the wire or blocked by firewalls, this isn’t a very effective scan.Other techniques that have been used consist of XMAS scans where all flags in the TCP packet are set, or NULL scans where none of the bits are set. However, different operating systems respond differently to these scans, and it becomes important to identify the OS and even its version and patch level.Bounce ScanThe ability to hide their tracks is important to attackers. Therefore, attackers scour the Internet looking for systems they can bounce their attacks through.FTP bounce scanning takes advantage of a vulnerability of the FTP protocol itself. It requires support for proxy ftp connections. This bouncing through an FTP server hides where the attacker comes from. This technique is similar to IP spoofing in that it hides where the attacker comes from. For example, badwebsitexyz.com establishes a control connection to the FTP server-PI (protocol interpreter) of say, badspiderbites.com, then requests that the server-PI initiate an active server-DTP (data transfer process) to send a file anywhere on the Internet.A port scanner can exploit this to scan TCP ports from a proxy ftp server. Thus you could connect to an FTP server behind a firewall, and then scan ports that are more likely to be blocked (e.g., port 139). If the ftp server allows reading from and writing to a directory (such as /incoming), you can send arbitrary data to ports that you do find open.The advantages to this approach are obvious (harder to trace, potential to bypass firewalls). The main disadvantages are that it is slow, and that many FTP server implementations have finally disabled the proxy “feature”.FingerMost finger servers allow commands to be forwarded through them. Finger supports recursive queries. A query such as “rob@foo@bar” will ask “bar” to resolve “rob@foo”, causing “bar” to query “foo”. This technique can be used to hide the original source of the request.E-mail: Spammers try to relay their spam through SMTP servers. As a result, probes for SMTP are commonly seen by machines on the Internet.SOCKS Allows almost any protocol to be tunneled through the intermediate machine. As a result, attackers probing for SOCKS is common scan seen on the Internet.HTTP proxy: Most web servers support proxying so that all web traffic can be directed to a single server for filtering as well as caching to improve performance. A lot of these servers are misconfigured to allow proxying of any request from the Internet, allowing attackers to relay attacks against web sites through a third party. Probes for HTTP proxies are one of the more common scans seen today.IRC BNC: Attackers love to hide their IRC identities by bouncing their connections through other machines. A particular program called “BNC” is used for this purpose on compromised machines.UDP ScanningPort scanning usually means scanning for TCP ports, which are connection-oriented and therefore give good feedback to the attacker. UDP responds in a different manner. In order to find UDP ports, the attacker generally sends empty UDP datagrams. If the port is listening, the service should send back an error message or ignore the incoming datagram. If the port is closed, then most operating systems send back an “ICMP Port Unreachable” message. Thus, you can find out if a port is NOT open, and by exclusion determine which ports are open. Neither UDP packets, nor the ICMP errors are guaranteed to arrive, so UDP scanners of this sort must also implement retransmission of packets that appear to be lost (or you will get a bunch of false positives).Also, this scanning technique is slow because of compensation for machines that implement the suggestions of RFC 1812 and limit ICMP error message rate. For example, a kernal may limit destination unreachable message generation to 80 per 4 seconds, with a 1/4 second penalty if that is exceeded.Some people think UDP scanning is pointless - not so. Sometimes for example, Rpcbind can be found hiding on an undocumented UDP port somewhere above 32770. So it doesn’t matter that port 111 is blocked by the firewall. But can you find which of the more than 30,000 high ports it is listening on? With a UDP scanner you can.ICMP ScanThis isn’t really port scanning, since ICMP does not have a port abstraction. But it is sometimes useful to determine what hosts in a network are up by pinging them all. ICMP scanning can be done in parallel, so it can be quite fast.Fingerprinting an OS:The last scanning method is called Fingerprinting. Fingerprinting is the technique of interpreting the responses of a system in order to figure out what it is. Unusual combinations of data are sent to the system in order to trigger these responses. Systems respond the same with correct data, but they rarely respond the same way for wrong data.

Machine Level Program On Windows

Learn How To Do Simple Machine Level Program On Computer
Machine Level Program are those program,which are directly understandable by the Machine.The Machine read those program and directly acts according to that.For Example,if we have to switch off a machine when its temprature is more then 100 degree celsius and keep the Machine working if temprature is below 100 degree celsius,for this we need the Machine Level programming.So,Machine Level programming is as important as other languages programms are like java programming,c++,c,perl,asp & jsp and all other.
In Machine Level programming,all the data are stored in register memory.Accumulator and Base register are most frequently used in this operations.here,they are represented by AX,and Bx.
How to move a data in register:
mov AX,0032
This,above syntax will move the Hexadecimal number 0032 in accumulator AX.
sub AX,0032
This,above syntax will subtract the Hexadecimal number 0032 from accumulator AX.
Program for converting the Farenheit temp into celsius:
formula for conversion:
c=[(c-32)*5]/9
/* open run and type cmd in it.command prompt will open.type “debug”type “a” /this will take us in assembler mode/*/
Program code:
mov AX,0098sub AX,0032mov BX,05mul BX /multiply content of BX with AX/mov BX,0009div BX /divide content of AX by BX/p /compile the program/t /show the result in AX/
*NOTE:All the value will be in Hexadecimal.

What Is VIRUS?

In Computers world,a virus is defined as a program or programming code that replicates by being copied or initiating its copying to another program, computer boot sector or document and infect the computer without permission or knowledge of the user.
Transmission of Virus
Viruses can be transmitted as attachments to an e-mail note or in a downloaded file, or be present on a diskette or CD. The immediate source of the e-mail note, downloaded file, or diskette you’ve received is usually unaware that it contains a virus. Some viruses wreak their effect as soon as their code is executed; other viruses lie dormant until circumstances cause their code to be executed by the computer. Some viruses are benign or playful in intent and effect (”Happy Birthday, Ludwig!”) and some can be quite harmful, erasing data or causing your hard disk to require reformatting. A virus that replicates itself by resending itself as an e-mail attachment or as part of a network message is known as a worm.
Classes Of Viruses:
1)File infectors:-Some file infector viruses attach themselves to program files, usually selected ‘.COM’ or ‘.EXE’ files. Some can infect any program for which execution is requested, including .SYS, .OVL, .PRG, and .MNU files. When the program is loaded, the virus is loaded as well. Other file infector viruses arrive as wholly-contained programs or scripts sent as an attachment to an e-mail note.
2)System or boot-record infectors:– These viruses infect executable code found in certain system areas on a disk. They attach to the DOS boot sector on diskettes or the Master Boot Record on hard disks. A typical scenario (familiar to the author) is to receive a diskette from an innocent source that contains a boot disk virus. When your operating system is running, files on the diskette can be read without triggering the boot disk virus. However, if you leave the diskette in the drive, and then turn the computer off or reload the operating system, the computer will look first in your A drive, find the diskette with its boot disk virus, load it, and make it temporarily impossible to use your hard disk.
3)Macro viruses:– These are among the most common viruses, and they tend to do the least damage. Macro viruses infect your Microsoft Word application and typically insert unwanted words or phrases.
First Ever Virus:
The program code called “Elk Cloner”,created in “in the wild”, that is, outside the single computer or lab,is credited with being the first computer virus to appear. Written by Richard Skrenta, in 1982,it attached itself to the Apple DOS 3.3 operating system and spread by floppy disk. This virus was originally a joke, created by the high school student and put onto a game. The game was set to play, but release the virus on the 50th time of starting the game. Only this time, instead of playing the game, it would change to a blank screen that read a poem about the virus named Elk Cloner. The computer would then be infected.The first PC virus was a boot sector virus called (c)Brain, created in 1986 by two brothers, Basit and Amjad Farooq Alvi, operating out of Lahore, Pakistan. The brothers reportedly created the virus to deter pirated copies of software they had written. However, analysts have claimed that the Ashar virus, a variant of Brain, possibly predated it based on code within the virus.The newest species of the virus family is the cross-site scripting virus. The virus emerged from research and was academically demonstrated in 2005[citation needed]. This virus utilises cross-site scripting vulnerabilities to propagate. Since 2005 there have been multiple instances of the cross-site scripting viruses in the wild, most notable sites affected have been MySpace and Yahoo.
digg story
read more

CRYPTOGRAPHY-II


MODERN CRYPTOGRAPHY
Hi Friends,in the last post we have discussed about the Traditional Cryptography.Now we’ll discuss about the Modern Cryptography.
Before Discussing this let’s know about “One-Time Pads”.
One-Time Pads
In this One-Time Pads technique,first we choose random bit string as key.Then convert the plaintext into a bit string.Finally,compute the EXCLUSIVE OR of these two strings,bit by bit.The resulting ciphertext can’t be broken,because every possible plaintext is an equally probable candidate.The ciphertext gives the cryptanalyst no information at all.
Modern Cryptography uses the same basic ideas as Traditional Cryptography,transposition and substitution,but its emphasis is different.Traditionally,cryptographers have used simple algorithms and relied on very long keys for their security.Nowadays,reverse is true:the object is to make the encryption algorithm so complex and involuted that even if the cryptanalyst acquires the encrypted data,he we’ll not be able to make any sense of it.
Secret-Key Algorithms:
With secret key cryptography, a single key is used for both encryption and decryption. As shown in Figure, the sender uses the key (or some set of rules) to encrypt the plaintext and sends the ciphertext to the receiver. The receiver applies the same key (or ruleset) to decrypt the message and recover the plaintext. Because a single key is used for both functions, secret key cryptography is also called symmetric encryption.With this form of cryptography, it is obvious that the key must be known to both the sender and the receiver; that, in fact, is the secret. The biggest difficulty with this approach, of course, is the distribution of the key.Secret key cryptography schemes are generally categorized as being either stream ciphers or block ciphers. Stream ciphers operate on a single bit (byte or computer word) at a time and implement some form of feedback mechanism so that the key is constantly changing. A block cipher is so-called because the scheme encrypts one block of data at a time using the same key on each block. In general, the same plaintext block will always encrypt to the same ciphertext when using the same key in a block cipher whereas the same plaintext will encrypt to different ciphertext in a stream cipher.
Secret key cryptography algorithms that are in use today include:
Data Encryption Standard (DES): The most common SKC scheme used today, DES was designed by IBM in the 1970s and adopted by the National Bureau of Standards (NBS) [now the National Institute for Standards and Technology (NIST)] in 1977 for commercial and unclassified government applications. DES is a block-cipher employing a 56-bit key that operates on 64-bit blocks. DES has a complex set of rules and transformations that were designed specifically to yield fast hardware implementations and slow software implementations, although this latter point is becoming less significant today since the speed of computer processors is several orders of magnitude faster today than twenty years ago.
Advanced Encryption Standard (AES): In 1997, NIST initiated a very public, 4-1/2 year process to develop a new secure cryptosystem for U.S. government applications. The result, the Advanced Encryption Standard, became the official successor to DES in December 2001. AES uses an SKC scheme called Rijndael, a block cipher designed by Belgian cryptographers Joan Daemen and Vincent Rijmen. The algorithm can use a variable block length and key length; the latest specification allowed any combination of keys lengths of 128, 192, or 256 bits and blocks of length 128, 192, or 256 bits.
International Data Encryption Algorithm (IDEA): Secret-key cryptosystem written by Xuejia Lai and James Massey, in 1992 and patented by Ascom; a 64-bit SKC block cipher using a 128-bit key. Also available internationally.The basic structure resembles of DES in that 64-bit plaintext input blocks are mangled in a sequence of parametarized iterations to produce 64-bit ciphertext output blocks.
Secure and Fast Encryption Routine (SAFER): Secret-key crypto scheme designed for implementation in software. Versions have been defined for 40-, 64-, and 128-bit keys.
Blowfish: A symmetric 64-bit block cipher invented by Bruce Schneier; optimized for 32-bit processors with large data caches, it is significantly faster than DES on a Pentium/PowerPC-class machine. Key lengths can vary from 32 to 448 bits in length. Blowfish, available freely and intended as a substitute for DES or IDEA, is in use in over 80 products.
Public-Key Cryptography
Public-key cryptography has been said to be the most significant new development in cryptography in the last 300-400 years. Modern PKC was first described publicly by Stanford University professor Martin Hellman and graduate student Whitfield Diffie in 1976. Their paper described a two-key crypto system in which two parties could engage in a secure communication over a non-secure communications channel without having to share a secret key.PKC depends upon the existence of so-called one-way functions, or mathematical functions that are easy to computer whereas their inverse function is relatively difficult to compute.Generic PKC employs two keys that are mathematically related although knowledge of one key does not allow someone to easily determine the other key. One key is used to encrypt the plaintext and the other key is used to decrypt the ciphertext. The important point here is that it does not matter which key is applied first, but that both keys are required for the process to work (Figure 1B). Because a pair of keys are required, this approach is also called asymmetric cryptography.In PKC, one of the keys is designated the public key and may be advertised as widely as the owner wants. The other key is designated the private key and is never revealed to another party. It is straight forward to send messages under this scheme.
Public-key cryptography algorithms that are in use today for key exchange or digital signatures include:
RSA: The first, and still most common, PKC implementation, named for the three MIT mathematicians who developed it — Ronald Rivest, Adi Shamir, and Leonard Adleman. RSA today is used in hundreds of software products and can be used for key exchange, digital signatures, or encryption of small blocks of data. RSA uses a variable size encryption block and a variable size key. The key-pair is derived from a very large number, n, that is the product of two prime numbers chosen according to special rules; these primes may be 100 or more digits in length each, yielding an n with roughly twice as many digits as the prime factors. The public key information includes n and a derivative of one of the factors of n; an attacker cannot determine the prime factors of n (and, therefore, the private key) from this information alone and that is what makes the RSA algorithm so secure. (Some descriptions of PKC erroneously state that RSA’s safety is due to the difficulty in factoring large prime numbers. In fact, large prime numbers, like small prime numbers, only have two factors!) The ability for computers to factor large numbers, and therefore attack schemes such as RSA, is rapidly improving and systems today can find the prime factors of numbers with more than 200 digits. Nevertheless, if a large number is created from two prime factors that are roughly the same size, there is no known factorization algorithm that will solve the problem in a reasonable amount of time; a 2005 test to factor a 200-digit number took 1.5 years and over 50 years of compute time (see the Wikipedia article on integer factorization.) Regardless, one presumed protection of RSA is that users can easily increase the key size to always stay ahead of the computer processing curve. As an aside, the patent for RSA expired in September 2000 which does not appear to have affected RSA’s popularity one way or the other.
Hash Functions
Hash functions, also called message digests and one-way encryption, are algorithms that, in some sense, use no key (Figure 1C). Instead, a fixed-length hash value is computed based upon the plaintext that makes it impossible for either the contents or length of the plaintext to be recovered. Hash algorithms are typically used to provide a digital fingerprint of a file’s contents, often used to ensure that the file has not been altered by an intruder or virus. Hash functions are also commonly employed by many operating systems to encrypt passwords. Hash functions, then, provide a measure of the integrity of a file.
google_ad_client = "pub-9306317050997018";
google_ad_width = 468;
google_ad_height = 15;
google_ad_format = "468x15_0ads_al";
google_ad_channel = "9008475602+7081782465";
google_color_border = "FFFFCC";
google_color_bg = "FFFFCC";
google_color_link = "000033";
google_color_text = "000000";
google_color_url = "008000";

AVG Internet Security Home Edition Released

Newark, Notts – May 1, 2007-The official business partner of GRISOFT, AVG UK & Ireland, makers of AVG Internet Security software, announced the immediate availability of AVG Internet Security Home Edition. This special promotion version of the flagship AVG Internet Security product is available to home users and provides complete protection against viruses, spyware, spam and unauthorised access to home computers for up to three PCs.
Users of other products in the AVG family can cross-upgrade to the new AVG IS Home Edition.
AVG Internet Security Home Edition is available online at http://www.avguk.com/ and to resellers, retailers and computer shops in the form of shrink-wrap retail box or as space saving DVD case.AVG Internet Security Home Edition has a recommended retail price (RRP) of £59.99 for a two-year licence.
About AVG UK & Irelandwww.avguk.com
GRISOFT is a leading provider of antivirus, firewall protection and security solutions for consumers and SMEs. It is one of the fastest growing companies in the industry with more than 50 million protected computers around the world.Established in 1991, GRISOFT employs some of the world’s leading experts in antivirus software, specifically in the areas of virus analysis and detection, software development, and antivirus support. GRISOFT award-winning products are distributed globally through resellers and the Internet as well as via AVG Anti-Virus Software Developer’s Kit (SDK) to interested partners.http://www.grisoft.com/

8086 MICROPROCESSOR

The 8086 is a 16-bit,N-channel,HMOS microprocessor chip designed by Intel in 1978, which gave rise to the x86 architecture.The 8086 draws 360mA on 5V.Its frequency range is 4 - 10 MHz.

The 8086 was intended as a temporary substitute for the ambitious iAPX 432 project in an attempt to draw attention from other manufacturers (such as Motorola, Zilog, and National Semiconductor) less delayed 16 and 32-bit processors. Both the architecture and the physical chip were therefore developed very quickly, and were based on the earlier 8080 and 8085 designs with a similar register set. The chip had around 29,000 transistors (many for microcode) and would also function as a continuation of the 8085; although not directly source code compatible, it was designed so that assembly language for the 8085 could be automatically converted into (sub-optimal) 8086 assembly source, usually with little or no hand-editing. However, the 8086 design was expanded to support full 16-bit processing instead of the fairly basic 16-bit capabilities of the Intel 8080/8085.
8086 MEMORY
Its Memory is divided into two parts:a)even bank and,b)odd bank.Program, data and stack memories occupy the same memory space. The total addressable memory size is 1MB KB. As the most of the processor instructions use 16-bit pointers the processor can effectively address only 64 KB of memory. To access memory outside of 64 KB the CPU uses special segment registers to specify where the code, stack and data 64 KB segments are positioned within 1 MB of memory.
Physical memory address pointed by segment:offset pair is calculated as:
address = ( * 16) +
Program memory - program can be located anywhere in memory. Jump and call instructions can be used for short jumps within currently selected 64 KB code segment, as well as for far jumps anywhere within 1 MB of memory. All conditional jump instructions can be used to jump within approximately +127 - -127 bytes from current instruction.
Data memory - the processor can access data in any one out of 4 available segments, which limits the size of accessible memory to 256 KB (if all four segments point to different 64 KB blocks). Accessing data from the Data, Code, Stack or Extra segments can be usually done by prefixing instructions with the DS:, CS:, SS: or ES: (some registers and instructions by default may use the ES or SS segments instead of DS segment).
Stack memory can be placed anywhere in memory. The stack can be located at odd memory addresses, but it is not recommended for performance reasons (see “Data Memory” above).
Reserved locations:
0000h - 03FFh are reserved for interrupt vectors. Each interrupt vector is a 32-bit pointer in format segment:offset.
FFFF0h - FFFFFh - after RESET the processor always starts program execution at the FFFF0h address.
General Purpose Registers
Accumulator register consists of 2 8-bit registers AL and AH, which can be combined together and used as a 16-bit register AX. AL in this case contains the low-order byte of the word, and AH contains the high-order byte. Accumulator can be used for I/O operations and string manipulation.
Base register consists of 2 8-bit registers BL and BH, which can be combined together and used as a 16-bit register BX. BL in this case contains the low-order byte of the word, and BH contains the high-order byte. BX register usually contains a data pointer used for based, based indexed or register indirect addressing.
Count register consists of 2 8-bit registers CL and CH, which can be combined together and used as a 16-bit register CX. When combined, CL register contains the low-order byte of the word, and CH contains the high-order byte. Count register can be used as a counter in string manipulation and shift/rotate instructions.
Data register consists of 2 8-bit registers DL and DH, which can be combined together and used as a 16-bit register DX. When combined, DL register contains the low-order byte of the word, and DH contains the high-order byte. Data register can be used as a port number in I/O operations. In integer 32-bit multiply and divide instruction the DX register contains high-order word of the initial or resulting number.
The following registers are both general and index registers:
Stack Pointer (SP) is a 16-bit register pointing to program stack.
Base Pointer (BP) is a 16-bit register pointing to data in stack segment. BP register is usually used for based, based indexed or register indirect addressing.
Source Index (SI) is a 16-bit register. SI is used for indexed, based indexed and register indirect addressing, as well as a source data address in string manipulation instructions.
Destination Index (DI) is a 16-bit register. DI is used for indexed, based indexed and register indirect addressing, as well as a destination data address in string manipulation instructions.
Other registers:
Instruction Pointer (IP) is a 16-bit register.
Flags is a 16-bit register containing 9 1-bit flags:
Overflow Flag (OF) - set if the result is too large positive number, or is too small negative number to fit into destination operand.
Direction Flag (DF) - if set then string manipulation instructions will auto-decrement index registers. If cleared then the index registers will be auto-incremented.
Interrupt-enable Flag (IF) - setting this bit enables maskable interrupts.
Single-step Flag (TF) - if set then single-step interrupt will occur after the next instruction.
Sign Flag (SF) - set if the most significant bit of the result is set.
Zero Flag (ZF) - set if the result is zero.
Auxiliary carry Flag (AF) - set if there was a carry from or borrow to bits 0-3 in the AL register.
Parity Flag (PF) - set if parity (the number of “1″ bits) in the low-order byte of the result is even.
Carry Flag (CF) - set if there was a carry from or borrow to the most significant bit during last result calculation.
SEGMENTS:
Code segment (CS) is a 16-bit register containing address of 64 KB segment with processor instructions. The processor uses CS segment for all accesses to instructions referenced by instruction pointer (IP) register. CS register cannot be changed directly. The CS register is automatically updated during far jump, far call and far return instructions.
Stack segment (SS) is a 16-bit register containing address of 64KB segment with program stack. By default, the processor assumes that all data referenced by the stack pointer (SP) and base pointer (BP) registers is located in the stack segment. SS register can be changed directly using POP instruction.
Data segment (DS) is a 16-bit register containing address of 64KB segment with program data. By default, the processor assumes that all data referenced by general registers (AX, BX, CX, DX) and index register (SI, DI) is located in the data segment. DS register can be changed directly using POP and LDS instructions.
Extra segment (ES) is a 16-bit register containing address of 64KB segment, usually with program data. By default, the processor assumes that the DI register references the ES segment in string manipulation instructions. ES register can be changed directly using POP and LES instructions.
It is possible to change default segments used by general and index registers by prefixing instructions with a CS, SS, DS or ES prefix.
Addressing Modes Of 8086:
Implied - the data value/data address is implicitly associated with the instruction.
Register - references the data in a register or in a register pair.
mov d,s
add bx,ax
Immediate - the data is provided in the instruction.
mov bh,32
Direct - the instruction operand specifies the memory address where data is located.
mov al,[0005]
Register indirect - instruction specifies a register containing an address, where data is located. This addressing mode works with SI, DI, BX and BP registers.
mov si,[0005]
mov al,[si]
Based - 8-bit or 16-bit instruction operand is added to the contents of a base register (BX or BP), the resulting value is a pointer to location where data resides.
mov al,[si][bx]
Indexed - 8-bit or 16-bit instruction operand is added to the contents of an index register (SI or DI), the resulting value is a pointer to location where data resides.
Based Indexed - the contents of a base register (BX or BP) is added to the contents of an index register (SI or DI), the resulting value is a pointer to location where data resides.
Based Indexed with displacement - 8-bit or 16-bit instruction operand is added to the contents of a base register (BX or BP) and index register (SI or DI), the resulting value is a pointer to location where data resides.
Instruction Set:
8086 instruction set consists of the following instructions:
Data moving instructions.
Arithmetic - add, subtract, increment, decrement, convert byte/word and compare.
Logic - AND, OR, exclusive OR, shift/rotate and test.
String manipulation - load, store, move, compare and scan for byte/word.
Control transfer - conditional, unconditional, call subroutine and return from subroutine.
Input/Output instructions.
Other - setting/clearing flag bits, stack operations, software interrupts, etc.
Interrupts:
The processor has the following interrupts:
INTR is a maskable hardware interrupt. The interrupt can be enabled/disabled using STI/CLI instructions or using more complicated method of updating the FLAGS register with the help of the POPF instruction. When an interrupt occurs, the processor stores FLAGS register into stack, disables further interrupts, fetches from the bus one byte representing interrupt type, and jumps to interrupt processing routine address of which is stored in location 4 * . Interrupt processing routine should return with the IRET instruction.
NMI is a non-maskable interrupt. Interrupt is processed in the same way as the INTR interrupt. Interrupt type of the NMI is 2, i.e. the address of the NMI processing routine is stored in location 0008h. This interrupt has higher priority then the maskable interrupt.
Software interrupts can be caused by:
INT instruction - breakpoint interrupt. This is a type 3 interrupt.
INT instruction - any one interrupt from available 256 interrupts.
INTO instruction - interrupt on overflow
Single-step interrupt - generated if the TF flag is set. This is a type 1 interrupt. When the CPU processes this interrupt it clears TF flag before calling the interrupt processing routine.
Processor exceptions: divide error (type 0), unused opcode (type 6) and escape opcode (type 7).
Software interrupt processing is the same as for the hardware interrupts.

HACKING THROUGH WEB BROWSER

WEB BROWSER SECURITY
“Sorry dear readers,could not post new topics for the long time.I was really very busy those days.I get the time today to write something interesting,but i’m, still very busy,but I promise,I’ll come back soon with a lot of new and interesting topics for all of our readers.”
Now,come to our topic,friends,the web browsers like Internet Explorer,Mozilla etc can be used to fetch your secret documents and files.Now,let’s learn this is possible.
A Web browser is a software application that enables a user to display and interact with text, images, and other information typically located on a Web page at a website on the World Wide Web or a local area network.Web browsers communicate with Web servers primarily using HTTP (hypertext transfer protocol) to fetch webpages. HTTP allows Web browsers to submit information to Web servers as well as fetch Web pages from them. The most commonly used HTTP is HTTP/1.1, which is fully defined in RFC 2616. HTTP/1.1 has its own required standards that Internet Explorer does not fully support, but most other current-generation Web browsers do.
HOW THIS COULD BE USEDPasco (the Latin word for “Browse”) is a command line tool that runs on Unix or Windows and can reconstruct the internal structures for IE Index.dat files. Pasco accepts an Index.dat file, reconstructs the data, and outputs the information in a delimited text file format. This format is useful when you need to import the data into a spreadsheet such as Microsoft Excel. Figure 1 shows Pasco in action.Pasco shows that IE saves the following fields from a single web site visit in the Index.dat file: The record type - Pasco signifies the activity is either a URL that was browsed or a website that redirected the user’s browser to another site.
>The URL - The actual website that the user visited.
>Modified Time - The last moment in time the website was modified.
>Access Time - The moment in time the user browsed the website.
>Filename - The local file name that contains a copy of the URL listed.
>Directory - The local directory you can find the “Filename” above.
>HTTP Headers - The HTTP headers the user received when he browsed the URL.
Nowdays,most websites use CGI scripts .These scripts are located in the /cgi-bin directory.These scripts can be downloaded for further examination or even use these scripts to steal passwords to access password protected parts of the website.
So,simply type the following in the location bar of your browser,and observe what you get-
ftp://www.hostname.com/cgi-bin
The most common way to get the password file is to FTP anonymously and check if it in the /etc directory access to the passwd is restricted or not.If it is not restricted then download the file and firstly unshadow it and then crack it.First you need to find a box t hat is running the cgi-bin/phf file on their system. A great way to find out without trial and error is to go to http://www.altavista.com/ and just search on cgi-bin AND perl.exe or cgi-bin AND phf.
>>Finger box hacking: Lets say you wanted to break into somewhere like …. hmmmm AOL. The first thing we would do is type in their web site in the URL: http://www.aol.com./ The next thing we would do is add /cgi-bin/finger to the web URL so it would look like thisHttp://www.aol.com/cgi-bin/finger. If the finger gateway is operational a box should appear for you to enter the name you want to finger. If it is operational you have a chance to receive the etc/passwd file. Next thing you will probably want to do is search for a mailto on the web page… just scan the page for any mailto refs. Go back to the finger box and type in this query……
nobody@nowhere.org This email address is being protected from spam bots, you need Javascript enabled to view it ; /bin/mail
me@junk.org This email address is being protected from spam bots, you need Javascript enabled to view it <>

LINUX-I

LINUX BASICS
Linux is an open source,free software operating system that was initially created as a hobby by a young student, Linus Torvalds, at the University of Helsinki in Finland. Linus had an interest in Minix, a small UNIX system, and decided to develop a system that exceeded the Minix standards. He began his work in 1991 when he released version 0.02 and worked steadily until 1994 when version 1.0 of the Linux Kernel was released. The kernel, at the heart of all Linux systems, is developed and released under the GNU General Public License and its source code is freely available to everyone. It is this kernel that forms the base around which a Linux operating system is developed. There are now literally hundreds of companies and organizations and an equal number of individuals that have released their own versions of operating systems based on the Linux kernel. More information on the kernel can be found at our sister site, LinuxHQ and at the official Linux Kernel Archives. The current full-featured version is Red Hat 9 is coming..
The GNU Project was launched in 1984 to develop a complete Unix-like operating system which is free software: the GNU system. Variants of the GNU operating system, which use the kernel called Linux, are now widely used; though these systems are often referred to as “Linux”, they are more accurately called GNU/Linux systems.
What is Free Software?
“Free software” is a matter of liberty, not price. Free software is a matter of the users’ freedom to run, copy, distribute, study, change and improve the software. More precisely, it refers to four kinds of freedom, for the users of the software:•The freedom to run the program, for any purpose (freedom 0).•The freedom to study how the program works, and adapt it to your needs (freedom 1). Access to the source code is a precondition for this.•The freedom to redistribute copies so you can help your neighbor (freedom 2).•The freedom to improve the program, and release your improvements to the public, so that the whole community benefits (freedom 3). Access to the source code is a precondition for this.
Linux vs. Windows Design
•Windows has only recently evolved from a single-user design to a multi-user model. Linux is based on a long history of well fleshed-out multi-user design.•Windows is monolithic, not modular, by design but Linux is mostly modular by design.•Windows depends too heavily on an RPC model, Linux does not depend upon RPC to function, and services are usually configured not to use RPC by default.•Linux servers are ideal for headless non-local administration, whereas Windows focuses on its familiar graphical desktop interface.

E-MAIL DETAILS

Friends, after reading this article you’ll be able to know,who is sending you the message or the forge mail.Where Email Comes FromSuperficially, it appears that email is passed directly from the sender’s machine to the recipient’s. Normally, this isn’t true; a typical piece of email passes through at least four computers during its lifetime.
This happens because most organizations have a dedicated machine to handle mail, called a “mail server”; it’s normally not the same machine that users are looking at when they read their mail. In the common case of an ISP whose users dial in from their home computers, the “client” computer is the user’s home machine, and the “server” is some machine that belongs to the ISP. When a user sends mail, she normally composes the message on her own computer, then sends it off to her ISP’s mail server. At this point her computer is finished with the job, but the mail server still has to deliver the message. It does this by finding the recipient’s mail server, talking to that server and delivering the message. It then sits on that second mail server until the recipient comes along to read his mail, when he retrieves it onto his own computer, normally deleting it from the mail server in the process.
How to know email headers
Steps to open headers for various email clients and services like Outlook, Hotmail, Yahoo, AOL,…
Yahoo Mail• Log into your Yahoo! Mail account.• Click the “Options” link on the navigation bar.• Click the “General Preferences” link.• Go to the paragraph titled Messages and Locate the Show Headers heading and select “All.”• Click the “Save” button to put your new settings into effect.
GmailLog into your Gmail Account
open the Email whose headers you want to view
Click on the more options link in the message next to the date of the email. If the link says hide options then do not worry u have alreadyclicked on the more options link.
Now click the link called show original.
This will bring up a new window with headers and the body of the message.
Hotmail• Log into Hotmail.• Click on “Options” tab on the top navigation bar.• Click on the “Mail” link on the navigation bar on the left.• Click on the “Mail Display Settings” link.• Change the “Message Headers” option to “Full”.• Click the “OK” button.
AOL Mail
If the email is sent from anywhere OTHER then AOL, and you are receiving it in AOL, then open the email you want to trace, or have your client open the email, and look for the link Details. This link is usually just below the To:email in the email message. If the email is sent from an AOL user to another AOL user then our Reverse AOL Screenname search can get you the sender’s information.
Outlook Express 4, 5 and 6Start by opening the message in its own window (or when viewing the message in the preview pane). Then:With the keyboard:CTRL-F3 (Message Source Window)CTRL-A (select all)CTRL-C (copy)ALT-F4 (close)With the mouse:Click the “File” menuClick “Properties”Click the “Details” tabClick “Message Source”Highlight, copy and paste everything from this window (Ctrl-A, Ctrl-C)With viruses, worms and trojans being spread via email, many users now work with the preview screen in Outlook Express turned off. Viewing the contents of email in the preview screen is no different than opening the message. If the email has malicious content, it may execute in the preview screen.
The Importance of Received: Headers
In the above examples ,we’ve seen that the Received: headers provide a detailed log of a message’s history, and so make it possible to draw some conclusions about the origin of a piece of email even when other headers have been forged. This section explores some details associated with these singularly important headers, and in particular how to circumvent common forgery techniques.Unquestionably, the single most valuable forgery protection in the Received: headers is the information logged by the receiving host from the sender. Recall that the sender can lie about its identity (by putting garbage in its HELO command to the receiver); fortunately, modern mail transfer programs are able to detect such false information and correct it.

AUTOMATIC TELLER MACHINE

As is often the case with inventions, many inventors contribute to the history of an invention. In the case of the ATM, Don Wetzel invented the first successful and modern ATM in the USA, however he was not first inventor to create an ATM. In 1939, Luther George Simjian started patenting an earlier and not-so-successful version of an ATM. Read about Luther George Simjian here.
There are 3 major types of Automatic teller machines.
1> IBM
The first of these (and the most popular) is the IBM model. This is easilydistinguised from the others by the IBM logo in the top right hand corner ofthe front of the machine.This unit features a touch sensitive keypad and a 1 line display with a visorthat moves up and down. (The newer models have a 5 line display)..
2> NCR
The second unit is the NCR unit, which is MUCH smaller than than the IBM frontpanel. This unit has a small VDU as well as a touch sensitive keypad. The onlybanks that seem to be using this unit in Australia is the ‘STATE BANK’ ofVictoria, so you will not see many of them around.
3> PHILIPS
The third and final unit is made by Philips as is only used by the creditunions or Building Societys. This is usually known as ‘CASHCARD’. These unitsfeature a push-button keyboard and a VDU (like the NCR).
All these above units provide the same functions…
>>How Do ATMs Work?
An ATM is simply a data terminal with two input and four output devices. Like any other data terminal, the ATM has to connect to, and communicate through, a host processor. The host processor is analogous to an Internet service provider (ISP) in that it is the gateway through which all the various ATM networks become available to the cardholder (the person wanting the cash). Most host processors can support either leased-line or dial-up machines. Leased-line machines connect directly to the host processor through a four-wire, point-to-point, dedicated telephone line. Dial-up ATMs connect to the host processor through a normal phone line using a modem and a toll-free number, or through an Internet service provider using a local access number dialed by modem. Leased-line ATMs are preferred for very high-volume locations because of their thru-put capability, and dial-up ATMs are preferred for retail merchant locations where cost is a greater factor than thru-put. The initial cost for a dial-up machine is less than half that for a leased-line machine. The monthly operating costs for dial-up are only a fraction of the costs for leased-line. The host processor may be owned by a bank or financial institution, or it may be owned by an independent service provider. Bank-owned processors normally support only bank-owned machines, whereas the independent processors support merchant-owned machines.
>>Parts of the MachineYou’re probably one of the millions who has used an ATM. As you know, an ATM has two input devices:
1>> Card reader - The card reader captures the account information stored on the magnetic stripe on the back of an ATM/debit or credit card. The host processor uses this information to route the transaction to the cardholder’s bank.
2 >>Keypad - The keypad lets the cardholder tell the bank what kind of transaction is required (cash withdrawal, balance inquiry, etc.) and for what amount. Also, the bank requires the cardholder’s personal identification number (PIN) for verification. Federal law requires that the PIN block be sent to the host processor in encrypted form. And an ATM has four output devices:
1) Speaker - The speaker provides the cardholder with auditory feedback when a key is pressed. 2) Display screen - The display screen prompts the cardholder through each step of the transaction process. Leased-line machines commonly use a monochrome or color CRT (cathode ray tube) display. Dial-up machines commonly use a monochrome or color LCD.
3) Receipt printer - The receipt printer provides the cardholder with a paper receipt of the transaction.
4) Cash dispenser - The heart of an ATM is the safe and cash-dispensing mechanism. The entire bottom portion of most small ATMs is a safe that contains the cash.
>>Sensing Bills The cash-dispensing mechanism has an electric eye that counts each bill as it exits the dispenser. The bill count and all of the information pertaining to a particular transaction is recorded in a journal. The journal information is printed out periodically and a hard copy is maintained by the machine owner for two years. Whenever a cardholder has a dispute about a transaction, he or she can ask for a journal printout showing the transaction, and then contact the host processor. If no one is available to provide the journal printout, the cardholder needs to notify the bank or institution that issued the card and fill out a form that will be faxed to the host processor. It is the host processor’s responsibility to resolve the dispute. Besides the electric eye that counts each bill, the cash-dispensing mechanism also has a sensor that evaluates the thickness of each bill. If two bills are stuck together, then instead of being dispensed to the cardholder they are diverted to a reject bin. The same thing happens with a bill that is excessively worn, torn, or folded. The number of reject bills is also recorded so that the machine owner can be aware of the quality of bills that are being loaded into the machine. A high reject rate would indicate a problem with the bills or with the dispenser mechanism.
>>ATM SecurityATMs keep your personal identification number (PIN) and other information safe by using encryption software such as Triple DES (Data Encryption Standard). But there are lots of things that you can do to protect your information and your money at an ATM.Many banks recommend that you select your own PIN. Visa offers the following PIN tips:Don’t write down your PIN. If you must write it down, do not store it in your wallet or purse. Make your PIN a series of letters or numbers that you can easily remember, but that cannot easily be associated with you personally. Avoid using birth dates, initials, house numbers or your phone number. Visa also recommends the following tips for safe ATM usage:Store your ATM card in your purse or wallet, in an area where it won’t get scratched or bent. Get your card out BEFORE you approach the ATM. You’ll be more vulnerable to attack if you’re standing in front of the ATM, fumbling through your wallet for your card. Stand directly in front of the ATM keypad when typing in your PIN. This prevents anyone waiting to use the machine from seeing your personal information. After your transaction, take your receipt, card and money away. Do not stand in front of the machine and count your money. If you are using a drive-up ATM, get your vehicle as close to the machine as possible to prevent anyone from coming up to your window. Also make sure that your doors are locked before you drive up to the machine. Do not leave your car running while using a walk-up ATM. Take your keys with you and lock the doors before your transaction. If someone or something makes you uncomfortable, cancel your transaction and leave the machine immediately. Follow up with your bank to make sure the transaction was cancelled and alert the bank to any suspicious people. Many retail merchants close their store at night. It is strongly recommended that they pull the money out of the machine when they close, just like they do with their cash registers, and leave the door to the security compartment wide open like they do with an empty cash-register drawer. This makes it obvious to any would-be thief that this is not payday.It’s important to use a well-lit, public ATM machine at night. For safety reasons, ATM users should seek out a machine that is located in a well-lighted public place. Federal law requires that only the last four digits of the cardholder’s account number be printed on the transaction receipt so that when a receipt is left at the machine location, the account number is secure. However, the entry of your four-digit personal identification number (PIN) on the keypad should still be obscured from observation, which can be done by positioning your hand and body in such a way that the PIN entry cannot be recorded by store cameras or store employees. The cardholder’s PIN is not recorded in the journal, but the account number is. If you protect your PIN, you protect your account.
Information on the Plastic Cards
The Plastic Cards that you put into these cash carrying monsters have a Numberthat is printed on the front of the card (which is also the same number, thatis stored on the MAGNETIC STRIP on the back of the card.)What do these numbers mean????? Well here is some information on them…The Numbers are split up into 2 groups, the first group ALWAYS containsSIX numbers while the second group contains anywhere between 6 to 13 numbers.EG) 560192 3012565214782\ /\ / __ This 3 digit number identifies the Bank. __ This is the Australian ID code and ALL banks have this.Some ID’s for banks…………
018 - State Bank of India
192 - Westpac Banking Corporation
251 - National Australia Bank
220 - Commenwealth Bank
The Second part of the number seems to be a jumble of digits for 6 to 13, whichonly seem to make sense to the banks computer.The banks computer simply looks the second number up in a Table and finds outyour assigned PIN number (A password for your card consisting of 4 digits), and any other information. eg) Your savings account no. Cheque a/c etc.Since the four Digit PIN (Personal Identification Numbers) range from 0000 to9999, then more than one person has the same PIN number for his card. (Banks dohave more that 10,000 customers !!)Okay now that we have some simple background information we can learn how to’defeat’ the system..

Block A Website

BLOCK UNWANTED SITE ON YOUR COMPUTER
Hey Friends,want to block any site from opening on your computer.If you want to block some site in windows O.S. to be browse from your computer.
Then do following steps………
open the location..C:\WINDOWS\system32\drivers\etcyou will find a hosts file.First backup the hosts file.Open hosts file there, from the notepad.At the end of the line you can see as per below.
127.0.0.1 localhost
Append the following line at the end127.0.0.1 BlockSitename.com Replace the BlockSitename.com with the site name that you want to block.
example……If you want to restrict http://www.yahoo.com/ then in the hosts file do this….127.0.0.1 http://www.yahoo.com/or0.0.0.0 http://www.yahoo.com/
as ip 0.0.0.0 means nothing.
Then go to Start->Run-> type: ipconfig /flushdns to restart the network.
Note: That will only stop the domain name to go to the website but if you know the IP address of the site from the gnsstuff or whois then you can brose your site.

HACKING HISTORY

HACKERS ATTACKED AGAIN
http://www.monster.com/ has been hacked by the hackers.The Hackers has always attacked the internet from time to time and most of the time they have succeeded.This time,one of the largest job search engine website has been hacked.Over 1.3 million users have been affected in this hacking.Patrick Martin, senior product manager at Symantec, said that the aim of the attack seemed to have been to gain access to user data to send more convincing spam in the hope of stealing financial information.
Great Hacks since yet.
1969Arpanet, the forerunner of the internet, is founded. The first network has only four nodes.
1971 First e-mail program written by Ray Tomlinson and used on Arpanet which now has 64 nodes.
1980In October 1980, Arpanet comes to a crashing halt by the accidental distribution of a virus.
1983The internet is formed when Arpanet is split into military and civilian sections. Wargames, a film that glamorises hacking, is released. Many hackers later claim that the movie inspired them to start playing around with computers and networks.
1986 In August, while following up a 75 cent accounting error in the computer logs at the Lawrence Berkeley Lab at the University of California, Berkeley, network manager Clifford Stoll uncovers evidence of hackers at work. A year-long investigation results in the arrest of the five German hackers who were found responsible for that.
1988Robert Morris, a graduate student at Cornell University, sets off an internet worm program that quickly replicates itself to over 6,000 hosts bringing almost the whole network to a halt. Morris is arrested soon afterwards and is punished by being fined $10,000, sentenced to three years on probation and ordered to do 400 hours of community service.Worms are different from virus.
1989Kevin Mitnick: Arrested twice for hacking.He is convicted of stealing software from Digital Equipment and codes for long-distance lines from US telephone company MCI. He is the first person convicted under a new law against gaining access to an interstate computer network for criminal purposes. He spent a one-year prison term. At the Cern laboratory for research in high-energy physics in Geneva, Tim Berners-Lee and Robert Cailliau develop the protocols that will become the world wide web.1993 Kevin Poulsen, Ronald Austin and Justin Peterson were charged for conspiring to rig a radio phone-in competition to win prizes. The trio seized control of phone lines to the radio station ensuring only their calls got through. The group allegedly netted two Porsches, $20,000 in cash and holidays in Hawaii.
1994 A 16-year-old music student called Richard Pryce, better known by the hacker alias Datastream Cowboy, is arrested and charged with breaking into hundreds of computers including those at the Griffiths Air Force base, Nasa and the Korean Atomic Research Institute. His online mentor, “Kuji”, is never found. Also this year, a group directed by Russian hackers breaks into the computers of Citibank and transfers more than $10 million from customers’ accounts. Eventually, Citibank recovered all but $400,000 of the pilfered money.
1995 In February, Kevin Mitnick is arrested for a second time. He is charged with stealing 20,000 credit card numbers. He eventually spends four years in jail and on his release his parole conditions demand that he avoid contact with computers and mobile phones.On November 15, Christopher Pile becomes the first person to be jailed for writing and distributing a computer virus. Mr Pile, who called himself the Black Baron, was sentenced to 18 months in jail. The US General Accounting Office reveals that US Defense Department computers sustained 250,000 attacks in 1995.
1996 Popular websites are attacked and defaced in an attempt to protest about the treatment of Kevin Mitnick. The internet now has over 16 million hosts and is growing rapidly.
1997Popular Internet search engine Yahoo! is hit by hackers claiming a “logic bomb” will go off in the PCs of Yahoo!’s users on Christmas Day 1997 unless Kevin Mitnick is released from prison. “There is no virus,” Yahoo! spokeswoman Diane Hunt said. Hackers pierce security in Microsoft’s NT operating system to illustrate its weaknesses.AOHell is released, a freeware application that allows a burgeoning community of unskilled hackers–or script kiddies–to wreak havoc on America Online. For days, hundreds of thousands of AOL users find their mailboxes flooded with multi-megabyte mail bombs and their chat rooms disrupted with spam messages.
1998 Anti-hacker ad runs during Super Bowl XXXII. The Network Associates ad, costing $1.3-million for 30 seconds, shows two Russian missile silo crewmen worrying that a computer order to launch missiles may have come from a hacker. They decide to blow up the world anyway.In January, the federal Bureau of Labor Statistics is inundated for days with hundreds of thousands of fake information requests, a hacker attack called “spamming.”Hackers break into United Nation’s Children Fund Web site, threatening a “holocaust” if Kevin Mitnick is not freed.Hackers claim to have broken into a Pentagon network and stolen software for a military satellite system. They threaten to sell the software to terrorists.The U.S. Justice Department unveils National Infrastructure Protection Center, which is given a mission to protect the nation’s telecommunications, technology and transportation systems from hackers.Hacker group L0pht, in testimony before Congress, warns it could shut down nationwide access to the Internet in less than 30 minutes. The group urges stronger security measures.
The hacking group Cult of the Dead Cow releases its Trojan horse program, Back Orifice–a powerful hacking tool–at Def Con. Once a hacker installs the Trojan horse on a machine running Windows 95 or Windows 98, the program allows unauthorized remote access of the machine.
1999David Smith,The Creator of the Melissa virus.In March, the Melissa virus goes on the rampage and wreaks havoc with computers worldwide. After a short investigation, the FBI tracks down and arrests the writer of the virus, a 29-year-old New Jersey computer programmer, David L Smith.
2000 In February, some of the most popular websites in the world such as Amazon and Yahoo are almost overwhelmed by being flooded with bogus requests for data.In May, the ILOVEYOU virus is unleashed and clogs computers worldwide. Over the coming months, variants of the virus are released that manage to catch out companies that didn’t do enough to protect themselves.In October, Microsoft admits that its corporate network has been hacked and source code for future Windows products has been seen.
2001DNS AttackMicrosoft becomes the prominent victim of a new type of hack that attacks the domain name server. In these denial-of-service attacks, the DNS paths that take users to Microsoft’s Web sites are corrupted. The hack is detected within a few hours, but prevents millions of users from reaching Microsoft Web pages for two days.
2004
NEW YORK (Reuters) - A 22-year-old California man pleaded guilty Thursday to hacking into the New York Times Co. computer network and entering a database containing personal information about Op-Ed page contributors.
2005
NEW YORK - Saying it’s been a bad week in the realm of information security is putting it lightly. The incident that got the most attention, mostly because it involved compromising pictures of the ever-overexposed Paris Hilton, was the ever-widening fallout from a hacking attack. The target was the servers that wireless carrier T-Mobile uses to run services for users of its Sidekick wireless devices. Paris Hilton: Her Sidekick wireless device was the target of a hacking attack, and now her friends are angry.
WASHINGTON — Cisco Systems Inc. (CSCO) said on Tuesday authorities in Sweden had detained a person for stealing its source code, the basic instructions for the machines that direct Internet traffic around the globe.“We are aware that a person has been detained in Sweden related to the IOS source code theft and are encouraged by this action,” the San Jose, Calif., company said in a statement.
2006
CHICAGO _ A computer consultant working in the FBI’s Springfield, Ill., offices used free programs available on the Internet to breach secure areas of the bureau’s computer system and find administrators’ passwords, including one belonging to FBI Director Robert Mueller. Joseph Thomas Colon, 28, who was living in Springfield was the hero.
LOS ANGELES: A Romanian man has been indicted on charges of hacking into more than 150 U.S. government computers, causing disruptions that cost NASA, the Energy Department and the Navy nearly $1.5 million (€1.1 million).
2007
CARACAS, Venezuela — A 17-year-old has been detained by Venezuelan authorities after hacking into multiple government Web sites and posting playful photos of President Hugo Chavez and his close ally, Cuba’s Fidel Castro.The boy modified 23 Web sites _ including those of the vice president’s office, the National Guard and the investigative police _ in late December, said Oswaldo Guevara, the investigative police’s head of computer-related crimes.
LONDON: A British court on Friday sentenced a tabloid journalist to four months in prison for hacking into royal officials’ voicemail systems.Judge Peter Henry Gross said he had no option but to hand a prison sentence to Clive Goodman, 49, the royal editor of the News of the World, describing his crime as “reprehensible in the extreme.”
Symantec discovers Monster hack :Hackers have stolen the personal information — including home addresses and phone numbers – of several hundred thousand users of online job portal Monster.com.According to online security firm Symantec Corp., hackers over the weekend used a Trojan Horse virus called Infostealer.Monstres to break into Monster accounts maintained by recruiters and steal their credentials. The hackers used that information to log into Monster.com as prospective employers and gleaned personal details, including names, addresses and phone numbers, from individuals who had posted resumes to the site.

PROGRAMMING TIPS

Ms Dos And Batch File Programming Tricks And Tips
DOS is basically a file caled command.com .It is this file which handles all DOS commands that we give at DOS prompt-such as copy,dir,del,etc.
Batch file programming is nothing but the windows version of unix shell programming.To perform a bulk set of commands over and over again,batch files are used.
Some Important And Hidden Dos Command1>ANSI.SYS - Defines functions that change display graphics, control cursor movement, andreassign keys. 2>ARP - Displays, adds, and removes arp information from network devices3>AT - Schedule a time to execute commands or programs.4>COLOR - Easily change the foreground and background color of the MS-DOS window.5>CONTROL - Open control panel icons from the MS-DOS prompt.6>CTTY - Change the computers input/output devices.7>EMM386 - Load extended Memory Manager.8>IFSHLP.SYS - 32-bit file manager.9>SWITCHES - Remove add functions from MS-DOS.10>SYS - Transfer system files to disk drive.
Redirection Of OUTPUT:Send the output of the dos prompt to a file on disk.This can be done using the Redirection operator,> .Example: c:\windows>net>xyz.txtc:\windows>help>>xyz.txtThis command will execute the net command and will store the results in thetext file ,xyz.txt.To print the results: c:\windows>dir*.*>prnRedirection of Input: we can also redirect input ,from .txt file to DOS prompt.Example: c:\windows> more <>
BATCH PROGRAM TO DELETE FILES:
@ECHO OFFECHO.ECHO I am going to delete the following files:ECHO %1 %2ECHO.ECHO CTRL+C to Abort ProcessPAUSEFOR %%A IN (%1 %2) DO DEL %%aECHO Killed files.Mission Accomplished By Sonu Mishra.

MMC password back

Option 1: Install and launch MMCPWD application. it will display some special characters including your password.(MMCPwd.sis)
Option 2: locate mmcstore file. install and launch System Explorer or FExplorer application. go to c:\system\ and open (using unicode/hex editor) the mmcstore file. it will display your password. NOTE: you can also copy the mmcstore file to any folder of your phone memory, rename it to mmcstore.txt and open it without using any unicode/hex editor).
Option 3:
1. open up fe explorer thingy.2. Go to C:\system\ folder and locate a file called mmcStore. Scroll down till you find it.3. Copy it to C:\nokia\others4. highlight it5. click options6. FILE>RENAME7. IT should turn blue: right click then write “.txt” (should look like “MMCSTORE.txt”8. try to open it, (that should be your password, if nothing happens then go to 9.)9. connect phone to pc10. Open the file from C:\NOKIA\OTHERS\MMCSTORE11. copy the file to your desktop12. open with Windows notepad/ microsoft word13. that should be your password
“if mmcstore is no longer available (let’s say you already formatted your phone memory so mmcstore is deleted, or you bought a password-protected MMC, or whatever reason), proceed to formatting a password-protected MMC ’cause its hopeless to recover the password anymore.”
FORMATTING PASSWORD-PROTECTED OR CORRUPTED MMC formatting a password-protected or corrupted MMC is different from formatting an ordinary working MMC. YOU CANNOT format such kind of MMC using any Nokia Series60 phone nor even the card reader. To format those kinds of MMC successfully, use a digital camera, Nokia Communicator series phones (such as N9210i), palm devices, or any MMC supported devices other than S60 phones and card readers. if all else fails, bring it to where you bought it and claim for a warranty (if not yet expired) or bring it to any certified MMC expert technician and see if he can do something about it.

Saturday, June 28, 2008

Nokia Phone Codes

MMC password recovery
[ Nokia Phone Codes ]
Serial No (IMEI number) —- *#06#
Vol. n date (Software Version) —- *#0000#
Bluetooth —- *#2820#
Warrantry (Serial Number) —- *#92702689#

Nokia Phone Format Code

T.O.P S.E.C.R.E.T F.O.R.M.A.T C.O.D.E
C.O.D.E 1: —>>*#7370#
C.O.D.E 2: —>>STEP: 1. Switch off your Nokia Mobile,STEP: 2. Press-> Call button, press-> 3, press-> *,STEP: 3. Now Switch on your Mobile.

DOS-DENIAL OF SERVICE ATTACK

Short for denial-of-service attack, a type of attack on a network that is designed to bring the network to its knees by flooding it with useless traffic. Many DoS attacks, such as the Ping of Death and Teardrop attacks, exploit limitations in the TCP/IP protocols. For all known DoS attacks, there are software fixes that system administrators can install to limit the damage caused by the attacks. But, like viruses, new DoS attacks are constantly being dreamed up by hackers.In a denial-of-service (DoS) attack, an attacker attempts to prevent legitimate users from accessing information or services. By targeting your computer and its network connection, or the computers and network of the sites you are trying to use, an attacker may be able to prevent you from accessing email, web sites, online accounts (banking, etc.), or other services that rely on the affected computer.The most common and obvious type of DoS attack occurs when an attacker “floods” a network with information. When you type a URL for a particular web site into your browser, you are sending a request to that site’s computer server to view the page. The server can only process a certain number of requests at once, so if an attacker overloads the server with requests, it can’t process your request. This is a “denial of service” because you can’t access that site.
What is a distributed denial-of-service (DDoS) attack?
In a distributed denial-of-service (DDoS) attack, an attacker may use your computer to attack another computer. By taking advantage of security vulnerabilities or weaknesses, an attacker could take control of your computer. He or she could then force your computer to send huge amounts of data to a web site or send spam to particular email addresses. The attack is “distributed” because the attacker is using multiple computers, including yours, to launch the denial-of-service attack.
DOS Attacks are of the following different types-: 1. Those that exploit vulnerabilities in the TCP/IP protocols suite. 2. Those that exploit vulnerabilities in the Ipv4 implementation. 3 There are also some brute force attacks, which try to use up all resources of the target system and make the services unusable. Some common vulnerabilities are Ping of Death, Teardrop, SYN attacks and Land Attacks.
Ping of Death
This vulnerability is quite well known and was earlier commonly used to hang remote systems (or even force them to reboot) so that no users can use its services. This exploit no longer works, as almost all system administrators would have upgraded their systems making them safe from such attacks. In this attack, the target system is pinged with a data packet that exceeds the maximum bytes allowed by TCP/IP, which is 65 536. This would have almost always caused the remote system to hang, reboot or crash. This DOS attack could be carried out even through the command line, in the following manner: The following Ping command creates a giant datagram of the size 65540 for Ping. It might hang the victim’s computer:
C:\windows>ping -l 65540 .
Teardrop
The Teardrop attack exploits the vulnerability present in the reassembling of data packets. Whenever data is being sent over the Internet, it is broken down into smaller fragments at the source system and put together at the destination system. Say you need to send 4000 bytes of data from one system to the other, then not all of the 4000 bytes is sent at one go. This entire chunk of data is first broken down into smaller parts and divided into a number of packets, with each packet carrying a specified range of data. For Example, say 4000 bytes is divided into 3 packets, then: The first Packet will carry data from 1 byte to 1500 bytes The second Packet will carry data from 1501 bytes to 3000 bytes The third packet will carry data from 3001 bytes to 4000 bytes These packets have an OFFSET field in their TCP header part. This Offset field specifies from which byte to which byte does that particular data packet carries data or the range of data that it is carrying. This along with the sequence numbers helps the destination system to reassemble the data packets in the correct order. Now in this attack, a series of data packets are sent to the target system with overlapping Offset field values. As a result, the target system is not able to reassemble the packets and is forced to crash, hang or reboot. Say for example, consider the following scenario-: Normally a system receives data packets in the following form, with no overlapping Offset values. (1 to 1500 bytes) (1501 to 3000 bytes) (3001 to 4500 bytes) Now in a Teardrop attack, the data packets are sent to the target computer in the following format: (1 to 1500 bytes) (1500 to 3000 bytes) (1001 to 3600 bytes) When the target system receives something like the above, it simply cannot handle it and will crash or hang or reboot.
SYN Attack
The SYN attack exploits TCP/IP’s three-way handshake. Thus in order to understand as to how SYN Attacks work, you need to first know how TCP/IP establishes a connection between two systems. Whenever a client wants to establish a connection with a host, then three steps take place. These three steps are referred to as the three-way handshake. In a normal three way handshake, what happens is that, the client sends a SYN packet to the host, the host replies to this packet with a SYN ACK packet. Then the client responds with a ACK (Acknowledgement) packet. This will be clearer after the following depiction of these steps-: 1. Client SYN Packet à Host In the first step the client sends a SYN packet to the host, with whom it wants to establish a three-way connection. The SYN packet requests the remote system for a connection. It also contains the Initial Sequence Number or ISN of the client, which is needed by the host to put back the fragmented data in the correct sequence. 2. Host SYN/ACK Packet à Client In the second step, the host replies to the client with a SYN/ACK packet. This packet acknowledges the SYN packet sent by the client and sends the client its own ISN. 3. Client ACK à Host In the last step the client acknowledges the SYN/ACK packet sent by the host by replying with a ACK packet. These three steps together are known as the 3-way handshake and only when they are completed is a complete TCP/ IP connection established. In a SYN attack, several SYN packets are sent to the server but all these SYN packets have a bad source IP Address. When the target system receives these SYN Packets with Bad IP Addresses, it tries to respond to each one of them with a SYN ACK packet. Now the target system waits for an ACK message to come from the bad IP address. However, as the bad IP does not actually exist, the target system never actually receives the ACK packet. It thus queues up all these requests until it receives an ACK message. The requests are not removed unless and until, the remote target system gets an ACK message. Hence these requests take up or occupy valuable resources of the target machine. To actually affect the target system, a large number of SYN bad IP packets have to be sent. As these packets have a Bad Source IP, they queue up, use up resources and memory or the target system and eventually crash, hang or reboot the system. Land Attacks A Land attack is similar to a SYN attack, the only difference being that instead of a bad IP Address, the IP address of the target system itself is used. This creates an infinite loop between the target system and the target system itself. However, almost all systems have filters or firewalls against such attacks.
UDP Flooding
This kind of flooding is done against two target systems and can be used to stop the services offered by any of the two systems. Both of the target systems are connected to each other, one generating a series of characters for each packet received or in other words, requesting UDP character generating service while the other system, echoes all characters it receives. This creates an infinite non-stopping loop between the two systems, making them useless for any data exchange or service provision.

Mobile phone secrets, codes and technical information for Nokia Mobile Phone

1. Code *3370# -Activate Enhanced Full Rate Codec (EFR) - Your phone uses the best sound quality but talk time is reduced my approx 5%.#3370# -Deactivate Enhanced Full Rate Codec (EFR).
2. *#4720# -Activate Half Rate Codec - Your phone uses a lower quality sound but you should gain approx 30% more Talk Time.*#4720# -Deactivate Half Rate Codec.
3. *#0000# -Displays your phones software version, 1st Line : Software Version, 2nd Line : Software Release Date, 3rd Line : Compression Type.
4. *#9999# -Phones software version if *#0000# does not work.
5. *#06# -For checking the International Mobile Equipment Identity (IMEI Number)
6. #pw+1234567890+1# -Provider Lock Status. (use the “*” button to obtain the “p,w” and “+” symbols).
7. #pw+1234567890+2# -Network Lock Status. (use the “*” button to obtain the “p,w” and “+” symbols).
8. #pw+1234567890+3# -Country Lock Status. (use the “*” button to obtain the “p,w” and “+” symbols)
9. #pw+1234567890+4# -SIM Card Lock Status. (use the “*” button to obtain the “p,w” and “+” symbols).
10. *#147# -(vodafone) this lets you know who called you last.
11. *#1471# -Last call (Only vodofone).
12. *#21# -Allows you to check the number that “All Calls” are diverted to.
13. *#2640# -Displays security code in use
14. *#30# -Lets you see the private number.
15. *#43# -Allows you to check the “Call Waiting” status of your phone.
16. *#61# -Allows you to check the number that “On No Reply” calls are diverted to.
17. *#62# -Allows you to check the number that “Divert If Unreachable (no service)” calls are diverted to.
18. *#67# -Allows you to check the number that “On Busy Calls” are diverted to.
19. *#67705646# -Removes operator logo on 3310 & 3330
20. *#73# -Reset phone timers and game scores.
21. *#746025625# -Displays the SIM Clock status, if your phone supports this power saving feature “SIM Clock Stop Allowed”, it means you will get the best standby time possible.
22. *#7760# -Manufactures code.
23. *#7780# -Restore factory settings.
24. *#8110# -Software version for the nokia 8110.
25. *#92702689# -Displays - 1.Serial Number, 2.Date Made, 3.Purchase Date, 4.Date of last repair (0000 for no repairs), 5.Transfer User Data. To exit this mode you need to switch your phone off then on again.
26. *#94870345123456789# -Deactivate the PWM-Mem.
27. **21*number# -Turn on “All Calls” diverting to the phone number entered.
28. **61*number# -Turn on “No Reply” diverting to the phone number entered.
29. **67*number# -Turn on “On Busy” diverting to the phone number entered.
30. 12345 This is the default security phone lock code.
31. press and hold # -Lets you switch between lines.
If you know any nokia codes which is not here kindly wright it in the comment box.
Nokia 3250 / N91 / N71 / E60 / E61 / N803230 / 6260 / 6600 / 6620 / 6630/38 / 6670 / 6680/81/82 / 7610 / N70 / N903650 / 3660 / 7650 / N-Gage / N-Gage QD.

FIREWALL

FIREWALLA firewall is a hardware or software device which is configured to permit, deny, or proxy data through a computer network which has different levels of trust. The most common boundary where firewalls are applied is between an organization’s internal network and the interne t. This report will provide readers with a resource for understanding firewall design principles used in network security.
So , basically, a firewall is a barrier to keep destructive forces away from your property. In fact, that’s why its called a firewall. Its job is similar to a physical firewall that keeps a fire from spreading from one area to the next.
Firewall ArchitecturesThere are two classes of firewall architectures:1)single layer and,2) multiple layer.
In a single layer architecture, one host is allocated all firewall functions. This method is usually chosen when either cost is a key factor or if there are only two networks to connect. The advantage to this architecture is any changes to the firewall need only to be done at a single host.•The biggest disadvantage of the single layer approach it provides single entry point.If this entry point is breached, the entire network becomes vulnerable to an intruder.In a multiple layer architecture the firewall functions are distributed among two or more hosts normally connected in series. This method is more difficult to design and manage, it is also more costly, but can provide significantly greater security by diversifying the firewall defense. A common design approach for this type of architecture using two firewall hosts with a demilitarized network (DMZ) between them separating the Internet and the internal network.
How does a firewall work?There are two access denial methodologies used by firewalls. A firewall may allow all traffic through unless it meets certain criteria, or it may deny all traffic unless it meets certain criteria (see figure ). The type of criteria used to determine whether traffic should be allowed through varies from one type of firewall to another. Firewalls may be concerned with the type of traffic, or with source or destination addresses and ports. They may also use complex rule bases that analyse the application data to determine if the traffic should be allowed through. How a firewall determines what traffic to let through depends on which network layer it operates at. A discussion on network layers and architecture follows.
What different types of firewalls are?
Firewalls fall into four broad categories: 1)packet filters, 2)circuit level gateways, 3)application level gateways and 4) stateful multilayer inspection firewalls.
Packet filtering firewalls work at the network level of the OSI model, or the IP layer of TCP/IP. They are usually part of a router. A router is a device that receives packets from one network and forwards them to another network. In a packet filtering firewall each packet is compared to a set of criteria before it is forwarded. Depending on the packet and the criteria, the firewall can drop the packet, forward it or send a message to the originator.
Circuit level gateways work at the session layer of the OSI model, or the TCP layer of TCP/IP. They monitor TCP handshaking between packets to determine whether a requested session is legitimate. Information passed to remote computer through a circuit level gateway appears to have originated from the gateway. This is useful for hiding information about protected networks. Circuit level gateways are relatively inexpensive and have the advantage of hiding information about the private network they protect. On the other hand, they do not filter individual packets.
Application level gateways, also called proxies, are similar to circuit-level gateways except that they are application specific. They can filter packets at the application layer of the OSI model. Incoming or outgoing packets cannot access services for which there is no proxy. In plain terms, an application level gateway that is configured to be a web proxy will not allow any ftp, gopher, telnet or other traffic through. Because they examine packets at application layer, they can filter application specific commands such as http:post and get, etc.
Stateful multilayer inspection firewalls combine the aspects of the other three types of firewalls. They filter packets at the network layer, determine whether session packets are legitimate and evaluate contents of packets at the application layer. They allow direct connection between client and host, alleviating the problem caused by the lack of transparency of application level gateways. They rely on algorithms to recognize and process application layer data instead of running application specific proxies. Stateful multilayer inspection firewalls offer a high level of security, good performance and transparency to end users. They are expensive however, and due to their complexity are potentially less secure than simpler types of firewalls if not administered by highly competent personnel

MOBILE HACK TIPS

Mobile Security tips
1)To check Mobile name and date of manufacture: *#0000#
2)To check Serial Number: *#06#
3)To Format the cell phone(Restore all original setting): *#7370#
Check Mobile Quality:
You can easily check your mobile is original or not,to know this ,do the following:
1)Find the serial number of your mobile by pressing: *#06#2)Check the 7th and 8th digit of the serial number.
1 2 3 4 5 6 7 8 9 10 11 12 13 14
A) IF the Seventh & Eighth digits are 02 or 20 this means your cell phone was assembled in Emirates which is very Bad quality.B) IF the Seventh & Eighth digits are 08 or 80 this means your cell phone was manufactured in Germany which is fair quality.C) IF the Seventh & Eighth digits are 01 or 10 this means your cell phone was manufactured in Finland which is very Good.D) IF the Seventh & Eighth digits are 00 this means your cell phone was manufactured in original factory which is the best Mobile Quality.E) IF the Seventh & Eighth digits are 13 this means your cell phone was assembled in Azerbaijan which is very Bad quality and also dangerous for your health.

Watch video for Bluesnarfing

BlueSnarf exploits weak OBEX implementation on mobile phoneBlueSnarfexploitsweakOBEXimplementationonmobilephonesOPP: Object push profile, unauthorised access, for vCardOPP:Objectpushprofile,unauthorisedaccess,for vCardsSYNCH: Profile for exchange of private dataSYNCH:ProfileforexchangeofprivatedataCalendar, contacts, pictures, …Calendar,contacts,pictures,…Authorised access!Authorisedaccess!.Adv connects to OBEX push profileNo authentication, no pairing needed .invisible connection .In vulnerable implementations:.SYNCH profile exists parallel to OPP .Adv: retrieve files via filenames .Unauthorised, via OPP profile !!! .e.g. GET telecom/pb.vcf (contacts) Bluetooth being short range technology: NO security feature!
MethodIn order to perfom a BlueSnarf attack, the attacker needs to connect to the OBEX Push Profile (OPP), which has been specified for the easy exchange of business cards and other objects. In most of the cases, this service does not require authentication. Missing authentication is not a problem for OBEX Push, as long as everything is implemented correctly. The BlueSnarf attack connects to an OBEX Push target and performs an OBEX GET request for known filenames such as ‘telecom/pb.vcf’ for the devices phone book or ‘telecom/cal.vcs’ for the devices calendar file. (There are many more names of files in the IrMC Specification). In case of improper implementation of the device firmware, an attacker is able to retrieve all files where the name is either known or guessed correctly.

BLUESNARFING-Another Hacking Technique

Bluesnarfing-Mobile Hacking What is Bluesnarfing?Ans:Bluesnarfing is the unauthorized access of information from a wireless device through a bluetooth connection, often between phones, desktops, laptops, and PDAs that allows access to calendar, contact list, emails and text messages, and on some phones users can steal pictures and private videos,from Mobile or any other bluetooth device.

MOBILE HACKS

Blocking Cell Phone Number From Seen in Caller IDs
Freinds after reading this article you will be able to block your cell phone number from showing up on other people’s caller IDs. It’s very simple to block your cell phone number. You have two options: you can permanently block your phone number or you can block your number on a call by call basis.
Blocking Your Cell Phone Number Permanently:
The most permanent solution is to request a “line block” from your cell phone carrier.
1) To do this you simply need to call the customer service for your specific provider and they can block your number. When you do this your number will never show up to anyone.
2) To call your customer service to block your cell phone number, just dial 611 from your cell phone and you will reach them.
3) If there is a situation where you want your number to show up, you will still have an option. When you have a permanent block on your cell phone number you will need to dial *82 before dialing the number you are calling. When you do this your phone number will show up just once for that specific call. Ex: *82 (555) 555-5555.
Blocking Your Cell Phone Number Temporarily:
Sometimes you may want to block you number for a specific call. You might not want someone to know that you are trying to reach them for the 15th time in a row, or you might be calling a business and might not want them to know your number.
1) If you want to block your cell phone number on a call by call basis you need to dial *67 before dialing the number. Ex *67 (555) 555-5555.
2) When you do this you will not have any feedback that it worked. If you want to test this, just call your home phone, or anther phone that has a caller ID from your cell to confirm that your phone number is blocked.
NOTE:One important thing to remember is that your number will not be blocked from emergency services or any toll free numbers.
How to Find the Owner of a Cell Phone Number:
If you want to identify and unidentified phone number you can with reverse phone number search websites. You can do free reverse phone number search at http://www.infospace.com/ but if you want to find out who owns a cell phone number then use http://www.cellreversesearch.com/.
Steps1 Step OneGo to www.cellreversesearch.com2 Step TwoEnter any phone number3 Step ThreeHit Search4 Step FourCheck Results5 Step FiveSign up for owner’s name, address and cell phone account history information

Skill of Jackie

While not afraid to do his own stunts, he confesses that, like many, he is afraid of needles and hates taking shots. Unlike injuries that may come from a failed stunt, with a shot he “knows that it’s coming.”
· Though Chan’s willingness to do his own stunts was originally the trademark feature of his movies, he has sustained various injuries over the years which render him incapable of performing certain stunts. He tries to avoid stunts where he may suffer severe head trauma due to a near fatal incident that occurred while shooting Armour of God. He has also broken his left ankle so many times, he can no longer rely on it while pushing for a jump and must use his right foot instead. Over the years, he has been forced to use body doubles on various occasions. He has also broken his fingers, toes, nose and ribs on numerous occasions while filming.
· His final fight with Benny Urquidez in Wheels on Meals is considered to be one of the finest fights of the movie genre.
· He knows Kung Fu, and has trained under GrandMaster Leung Ting in Wing Tsun, as well as numerous other masters in Tong Long (Mantis), Bak Mei (White Eyebrow), as well as the traditional northern Shaolin Kung Fu he learned in opera school. Jackie has also learned numerous other styles of martial arts to help his screen fighting, including Hapkido, Boxing, Judo, Taekwondo and Hei Long (Under Master G.J. Torres). Jackie’s personal style is said to be a mixture of Boxing, Wing Chun, Hapkido and Judo. He stated that some of his martial arts training has been attributed to Jin Pal Kim, a Korean hapkido stylist.
· While performing his own stunts, he has broken his nose three times, his ankle, most of the fingers in his hand, both cheekbones and his skull.
· Chan has won several awards including The American Choreography Award, The World Stunt Award and has a Star on the Hollywood Walk of Fame, along with several awards from Hollywood, Hong Kong, Montreal World and Fant-Asia Film Festivals; but he has never won an Oscar. Currently there is a campaign underway to award him an Honorary Lifetime Achievement Academy Award.

* Was voted 41st in a poll of the 100 Greatest Movie Stars on Channel 4 in the UK.Chan appeared with, and was quickly “killed” by martial arts legend Bruce Lee in 1973’s Enter the Dragon in a very short scene where Chan plays one of Kahn’s guards.The character Lei Wulong from the Tekken video game series is heavily based on Jackie Chan, due to his looks and similar fighting style.
· A videogame called Jackie Chan Stuntmaster for the Playstation was made, of course with his name. Previously, an NES game called Jackie Chan’s Action Kung Fu was released.
· A television show, Jackie Chan Adventures, was based on Jackie Chan, his niece, and his uncle, as well as a shopkeeper. Videogames have also been made based on the show.
· He is the central subject of UK band Ash’s song Kung Fu, which is used for the end credits of the UK and US versions of Rumble in the Bronx.
· The Pokémon Hitmonchan is named after him (similar in style to how the Pokémon Hitmonlee is named after Bruce Lee).
· He helped to open Hong Kong Disneyland Resort in 2005.
· Chan had planned to star as Vin Diesel’s role in the movie The Pacifier, but due to busy arrangements, did not take the role.
· He was asked to play Wah Sing Ku in the Mel Gibson film Lethal Weapon 4 but turned down the part as he would have to play a criminal, Chan often says he doesn’t like to play real criminals as it is bad for his image, although he doesn’t mind playing either comical criminals or anti-heroes as in his newest film Rob-B-Hood. The part of Wah Sing Ku was later played by Jet Li.
· Although he did not voice the part, a likeness of him appeared in the Family Guy episode, Breaking Out Is Hard to Do, when Peter Griffin said, “Oh my god, it’s Jackie Chan!” three different times to three different asian people in Asiantown.
· He has appeared along side bodybuilder turned actor turned governor, Arnold Schwarzenegger in a government advert to combat piracy, which can be viewed here.In both the anime and manga series of Dragon Ball, a martial artist named Master Roshi disguises himself and uses the alias “Jackie Chun” to take part in a few martial arts tournaments to secretly test out the powers and abilities of Goku, the main character of the series.
· Appeared in 2 Diet Pepsi commercial in 2006.
· In the Internet movie The Ultimate Showdown, a likeness of him fought Shaquille O’ Neal, but was defeated by a Care Bear.
· Sung a duet of the Nat King Cole song Unforgettable with Ani DiFranco.
· He has declared that it is almost certain that he will, for the first time, partner another kung fu cinema legend Jet Li in an upcoming film that will start filming in spring 2007. The film has be dubbed The J&J Project.
· His nickname to the people of Hong Kong is Big Brother .
· He holds the record for the most number of takes for a single shot in a film, over 2900. (Dragon Lord for the marathon 20 minute fight that is the grand finale of the film.)
· In an interview unlocked in the videogame Jackie Chan Stunt master (A game where he was motion captured for game animations), Chan stated that he likes to play video games .