Powered By Blogger

Friday, December 23, 2011

In Sweden, the Fiber optic up to 120 GBPS.....!!!!

In Sweden, a new record is being built around fiber optic ...

In Sweden, a scale experiment is taking place right now. Cisco and Telia (Swedish ISP) test a fiber network to go up to 120 Gbps! They even made an application for deposit in the Guinness Book to be recognized as the largest LAN parties in the world ...


To be eligible, it will exceed the 20,000 customers who are connected to the first phase and 750 000 for the second phase. This fiber will be drawn to a length of 300 km between Stockholm and Jönköping, thus taking all subscribers of this operator between the two cities. Telia is responsible for the fiber and equipment such as Cisco CRS-3, high-speed router that can handle up to 322 Tb / s.

Both partners explain that if the test is successful, it will be a new record for the networks and a new perspective for the use of new technologies. This will allow the 750,000 lucky to eg download a movie in high definition (legally, of course) in just 0.05 seconds! Subscribers' computers, however, should become limiting factors, the world upside down?!

And we, during that time, we dream of the widespread 100 Mbps FTTH throughout ...



NOTE: THE AUTHOR IS NOT RESPONSIBLE FOR ANY DAMAGE DONE USING INFORMATION IN THIS ARTICLES.THIS ARTICLES IS FOR EDUCATIONAL PURPOSE ONLY. SHARE YOUR CYBER KNOWLEDGE FOR HUMANITY.

FIGHT AGAINST CYBER TERRORISM. 

JAI HIND......

FROM:KRUNAL UPADHYAY

Wednesday, December 21, 2011

How to implement Encryption/Decryption on data?

Data encryption is a method in which highly important and sensitive data is converted into unreadable form before its storage or transmission over the LAN/WAN. You can read encrypted data or decrypt it, if you have access to password or secret key.

Case Study: MCS folder have two files name mcs-morning and mcs-evening. User A wants to secure mcs-morning file from user B and all other users in the network. But user B also wants to secure mcs-evening file from user A and all other users in the network.
To implement this, first make a folder with name MCS folder and set NTFS permission as only administrator, user A, user B access MCS folder and administrator have full rights and user A and user B have modify permission on MCS folder. Now to secure files, login with user A and follow the given steps.
First open the MCS folder and right click on mcs-morning file then click on properties.
  • Now click on advance button then check to encrypt content to secure data.
  • Click Ok button then apply.
  • Here system will ask you to secure the parent file and folder or only this file to secure data.
  • Now click Ok button to finish the user A settings.
  • Now to secure files, login with user B and follow the given steps.
  • First open the MCS folder and right click on mcs-evening file then click on properties.
  • Now click on advance button then check to encrypt content to secure data.
  • Click Ok button then apply.
  • Here system will ask you to secure the parent file and folder or only file to secure data.
  • Now click Ok button to finish the user B settings.
  • After implement encryption, user A can not read mcs-evening file and user B can not read the mcs-morning file.
Decryption of data
  • First open the MCS folder and right click on mcs-morning file then click on properties.
  • Now click on advance button then uncheck to encrypt content to secure data.
  • Click Ok button then apply.
  • Here your computer will ask you to decrypt the parent file and folder to insecure data then press Ok button to finish process.

NOTE: THE AUTHOR IS NOT RESPONSIBLE FOR ANY DAMAGE DONE USING INFORMATION IN THIS ARTICLES.THIS ARTICLES IS FOR EDUCATIONAL PURPOSE ONLY. SHARE YOUR CYBER KNOWLEDGE FOR HUMANITY.

FIGHT AGAINST CYBER TERRORISM.

JAI HIND...... 

FROM:KRUNAL UPADHYAY

Tuesday, December 20, 2011

All OS Transformation pack download now..........

Click on the Link below or Copy paste in your browser then download all transformation pack like Windows seven, Windows Vista, Windows 8, MAC OSX Leopard, Linux, Ubuntu, Vienna Six, Snow Leopard.......






NOTE: THE AUTHOR IS NOT RESPONSIBLE FOR ANY DAMAGE DONE USING INFORMATION IN THIS ARTICLES.THIS ARTICLES IS FOR EDUCATIONAL PURPOSE ONLY. SHARE YOUR CYBER KNOWLEDGE FOR HUMANITY.

FIGHT AGAINST CYBER TERRORISM.

JAI HIND...... 

FROM:KRUNAL UPADHYAY

How to Speed Up Windows Seven OS ?

With the release of Windows 7, Microsoft may just have introduced the fastest operating system in the world. For those speed junkies who are never satisfied, we have provided a few tips that will help you make your PC even faster.

Disable Automatic Disk Defragmentation

The Automatic Disk Defragmentation feature in Windows is designed to maintain the health of the operating system. However, it also makes Windows run a little slower. You can put an end to this by disabling the feature and manually running at your leisure. To do so, click “Start” and select “Computer.” Next, right click on your primary hard drive and select “Properties.” Lastly, select the “Tools” tab, click “Defragment Now” and uncheck the “Run on a schedule” option.

Utilize ReadyBoost

ReadyBoost is a built-in Windows 7 feature that allows you to use a USB flash drive to enhance system performance. How is this possible? The drive itself acts as additional computer memory!
In order to make use of this feature, you will need a USB drive with at least 2 GB of space. From there, you simply connect the drive to your computer, click “Start” and select “Computer.” Next, click on the USB drive and select “ReadyBoost.” Lastly, select “Use this device” and choose as much capacity as possible below on the “Space to reserve for system speed” slide.

Disable Windows Transparency

The transparency of windows is a great perk from a presentation aspect, but this may not be the case for those with older hardware as it can drastically impact performance. The good thing is that transparency can be disabled with ease. Simply right-click on your desktop, select “Personalize,” choose the active theme and then navigate to “Windows Color.” Finally, uncheck the “Enable Transparency” option.

Disable Unwanted Features

There may be numerous Windows 7 features that you really don’t need. These same features could also slow down your computer. To disable them, click on “Start,” choose “Control Panel” and then select “Programs and features.” Next, select the “Turn Windows features on or off” option, navigate through the list and uncheck all the features you want to disable. Once you are done, simply click “OK” to remove those features.

Disable Startup Services

Startup services are notorious for slowing down performance in XP and Vista. The same holds true for Windows 7. You can disable unwanted services by hitting “Start,” typing “msconfig” in the search bar and clicking “Enter.” Click the “Services Tab” on the next window and deselect the services you do not want to automatically run at startup. While this all depends on preference, services that impact performance the most include “Offline Files,” “Tablet PC Input Services,” Terminal Services,” “Fax” and “Windows Search.”

Disable Minimizing/Maximizing Animations

Many users have already fallen in love with the minimizing and maximizing animation effects of windows. However, some may find it irritating after a while as it can eventually lead to slowdowns. If you want to disable this function, hit “Start,” enter “System Properties Performance” in the search bar and click “OK.” On the next screen, deselect the “Animate window when minimizing and maximizing” option and click “OK.”

Update Your Windows 7 Drivers

Lastly, ensure that you have the latest device drivers made specifically for Windows 7. Since your PC can have hundreds of drivers installed in it at any given time, this task can be tedious. Luckily there are 3rd party utilities out thee such as DriverFinder™, which can greatly speed up this process.



NOTE: THE AUTHOR IS NOT RESPONSIBLE FOR ANY DAMAGE DONE USING INFORMATION IN THIS ARTICLES.THIS ARTICLES IS FOR EDUCATIONAL PURPOSE ONLY. SHARE YOUR CYBER KNOWLEDGE FOR HUMANITY.

FIGHT AGAINST CYBER TERRORISM.

JAI HIND...... 

FROM:KRUNAL UPADHYAY

Tuesday, December 13, 2011

How to make faster windows XP shutdown process?

Using this tip, you can make the windows XP shutdown process bit faster up to 50 percent than normal time. Normally windows XP takes time to close all running services and applications to complete the shutdown process, but if you have little experience to edit windows registry keys then you can easily manage the windows shutdown process.

Perform the following steps to manage the windows shutdown process:
  • To edit this feature, you will need to be logged into your computer with administrative rights.
  • First click on Start button to open "Run" and type "notepad" then press Ok button to open the Notepad Editor.
Now type the following code in Notepad.
 
 HKEY_CURRENT_USER\ControlPanel\Desktop
"AutoEndTasks"="1"
"HungAppTimeout"="1000"
"WaitToKillAppTimeout"="2000"

 HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control
"WaitToKillServiceTimeout"="2000" 
Save this file with .exe extension (as registry file, for example shutdown.exe).
Now double click on shutdown.exe file (in this case), and click Yes and again Ok button to update computer registry.


 
NOTE: THE AUTHOR IS NOT RESPONSIBLE FOR ANY DAMAGE DONE USING INFORMATION IN THIS ARTICLES.THIS ARTICLES IS FOR EDUCATIONAL PURPOSE ONLY. SHARE YOUR CYBER KNOWLEDGE FOR HUMANITY.FIGHT AGAINST CYBER TERRORISM. 

JAI HIND...... 

FROM:KRUNAL UPADHYAY

How to configure same Policies for all Domain Users and Computers?

Normally Group Policy applies on the domain controller that provides the centralized management of connected computers and users. You can set the same policies for all Domain users and computers under a domain controller using Default policy or with new policies.
 
Follow the give steps to set same Policies for all Domain users and Computers: 
  • Click on Start button and go to All Programs > Administrative Tools > then click on Active Directory Users and Computers. 
  • Here right click on the domain name (in this case Champion.com), and click on Properties
 
 
A new window with the name champion.com Properties will appear, here select the Group Policy tab.

 
Here you can use the "Default Domain Policy" or click on Edit button to change the default policies. If you want to create new policies for all users then click on New button.
 
 
Now double click on "New Group Policy Object", after appearing a window Expand Computer Configuration (Software Setting, Windows Settings and Administrative Templates) for set policies on Computer.


Now expand Users Configuration (Software Setting, Windows Settings and Administrative Templates) for set policies on Domain Users.


Click Apply button then Ok.
Now login with domain users on client computers and check policies has been working or not.

 
NOTE: THE AUTHOR IS NOT RESPONSIBLE FOR ANY DAMAGE DONE USING INFORMATION IN THIS ARTICLES.THIS ARTICLES IS FOR EDUCATIONAL PURPOSE ONLY. SHARE YOUR CYBER KNOWLEDGE FOR HUMANITY.FIGHT AGAINST CYBER TERRORISM. 

JAI HIND...... 

FROM:KRUNAL UPADHYAY

Sunday, November 20, 2011

How to Secure a Wireless Network from Hackers?

The reason we secure a wireless network is to stop people from using the services of our network who don't have permission to utilize them. It is harder to secure a wireless network from hackers as compared to a classic wired network. This is due to the fact that a wireless network can be accessed anywhere inside the range of its antenna.

In order to secure a wireless network from hackers, we should take proper steps to save ourselves against security issues. If you don't secure a wireless network from hackers, you might end up without its service. The consequence might also include the utilization of our network to attack further networks. To secure a wireless network from hackers, you should follow these simple wireless networking tips:

1. Strategic antenna placement:

The first thing you have to do is to position the access point's antenna in a place which restricts the range of its signal to go further than the required area. You should not put the antenna close to a window because glass can't obstruct its signals. Place it in a central location of the building.

2.Use WEP:

WEP stands for Wireless encryption protocol. It's a customary technique for encrypting traffic on a wireless network. You should never skip it as that will allow hackers to get instant access to the traffic over a wireless network.

3. Change the SSID, disable the broadcast of SSID:

SSID stands for service set identifier. It is the recognition thread utilized by the wireless access point due to which the customers are capable of starting connections. For every wireless access point arranged, select an exclusive as well as unique SSID. Also, if it's attainable, hold back the broadcast of the SSID out over the antenna. It won\t appear in the listing of offered networks, while being able to provide services as usual.

4. Disable DHCP:

By doing this, the hackers will have to decode the TCP/IP parameters, subnet mask as well as the IP address in order to hack your wireless network.

5. Disable or modify SNMP settings:

Change the private as well as public community settings of SNMP. You can also just disable it. Otherwise the hackers will be able to utilize SNMP to get significant info regarding your wireless network.

6. Utilize access lists:

For additional security of your wireless network, and if your access point support this feature, employ an access list. An access list lets us determine precisely which machinery is permitted to attach to an access point. The access points which include the access list can employ trivial file transfer protocol (TFTP) now and then in order to download modernized lists to steer clear of hackers.



NOTE: THE AUTHOR IS NOT RESPONSIBLE FOR ANY DAMAGE DONE USING INFORMATION IN THIS ARTICLES.THIS ARTICLES IS FOR EDUCATIONAL PURPOSE ONLY. SHARE YOUR CYBER KNOWLEDGE FOR HUMANITY.FIGHT AGAINST CYBER TERRORISM.

JAI HIND......

FROM:KRUNAL UPADHYAY

Monday, October 24, 2011

WIRELESS HACK..........

WIRELESS HACKThis is a featured page

Screens














(based on book with full instruction)

INFO

1) Unzip and install Commview, then paste the included "cv.exe" to the directory you installed it to (c:\program files\commviewwifi)

2) Open commview and install the commview drivers to a card. It should prompt you about your card and than automatically install the driver. It is important that you have 1 card that works with commview or else the rest of the tutorial will not work

3)now go to the "rules" tab and check "enable advanced rules"

4)type in the box labled formula "tods=1 and dmac=FF:FF:FF:FF:FF:FF" then type a name for your formula in the box labled name and than click add/edit.

5)it should now appear in the upper box. if it is not checked, check it.

6)now click settings>options>memory usage and turn maximum packets in buffer to 20000 (max). If it prompts you to restart it, do so. There are three funnel looking things on the main menu bar of commview. uncheck all but the first one (one labled "capture data packets")

7) now click the play button and scan for the network you want to crack.

8)once you have found it, drag the channel menu down to the desired channel and click capture.

9) now using your other adapter thats not capturing, connect to the password protected network. when it asks you for key, type in something random, i used 1234567890.

10) it should now say connected with limited connectivity. (same as being associated!!)

11)go back to your commview menu and click on the packets tab. you should see a couple of packets.

12) looking at the protocol column, you should see a couple labled IP/UDP, ARP REQ, and a couple of others. Right click on any packet labled "ARP REQ" and than click send packet, and selected. A mini menu should now appear.

13) on the mini menu, change packets per second to 2000, and rather than 1 time(s), click continuously, and Then click send.

14) now go back to the main commview window and go to the rules tab, and uncheck the rule you made.

15) You are now injecting and you should see the number of packets rising really fast.

16)to save the packets, you have to save every 20000 packets, click file, save and than in the save dialogue, remember where you saved it, and instead of saving it as an ncf file, save it as a "dump" .cap file.

17) Extract the Aircrack-NG folder.

18)open aircrack-ng-GUI that can be found in the map "bin" and select the files you saved, and than click launch.

19)Look at the list of IV's you have, and select the network you want to crack , there should be a list of alot of them, chose the one with the most ivs



DOWNLOAD

http://rapidshare.com/files/17383177...om_WEP-HCK.rar



NOTE: THE AUTHOR IS NOT RESPONSIBLE FOR ANY DAMAGE DONE USING INFORMATION IN THIS ARTICLES.THIS ARTICLES IS FOR EDUCATIONAL PURPOSE ONLY. SHARE YOUR CYBER KNOWLEDGE FOR HUMANITY.FIGHT AGAINST CYBER TERRORISM.

JAI HIND......

FROM:KRUNAL UPADHYAY