July 21, 2008

BOSS -- The Next Step in our Open Search Ecosystem

On 9th July 2008, Yahoo! Search is taking another step in extending the Yahoo! Open Strategy with the launch of Yahoo! Search BOSS, a web services platform that allows developers and companies to create and launch web-scale search products by utilizing the same infrastructure and technology that powers Yahoo! Search.

Our goal with BOSS (Build your Own Search Service) is simple -- foster innovation in the search landscape. As anyone who follows the search industry knows, the barriers to successfully building a high quality, web-scale search engine are incredibly high. Doing so requires hundreds of millions of dollars of investment in engineering, sciences and core infrastructure -- from crawling and indexing technology to relevancy and machine learning algorithms, to stuff as mundane as data centers, servers and power. Because competing successfully in web search requires an investment of this scale, new players have effectively been prohibited from delivering credible alternatives to Yahoo! and Google. We believe the BOSS platform will begin to change that.

So what is BOSS?
BOSS is a new, open platform that offers programmatic access to the entire Yahoo! Search index via an API. BOSS allows developers to take advantage of Yahoo!'s production search infrastructure and technology, combine that with their own unique assets, and create their own search experiences. While search APIs have been available for some time, BOSS removes many of the usage restrictions that have prevented other companies from using them to build innovative new search engines.

Here's a quick summary of what's available today:

  • Ability to re-rank and blend results -- BOSS partners can re-rank search results as they see fit and blend Yahoo!'s results with proprietary and other web content in a single search experience
  • Total flexibility on presentation -- Freedom to present search results using any user interface paradigm, without Yahoo! branding or attribution requirements
  • BOSS Mashup Framework -- We're releasing a Python library and UI templates that allow developers to easily mashup BOSS search results with other public data sources
  • Web, news and image search -- At launch, developers will have access to web, news and image search and we'll be adding more verticals soon
  • Unlimited queries -- There are no rate limits on the number of queries per day
These capabilities are really just a first step -- we're already working on expanding the API functionality and providing more access to Yahoo! Search Technology.

In addition to a self-serve API, we're also partnering with a handful of Internet companies with large user bases or unique assets to collaboratively develop next gen search products using Yahoo!'s full suite of search technology. To learn more about BOSS Custom, click here.

What's in it for Yahoo! and partners?
Why would Yahoo! open up its search infrastructure and technology to developers, entrepreneurs and companies who could use it to compete with us? It's really quite simple. First, we believe that being open is core to Yahoo!'s future success -- opening our network, opening our own search experience via
SearchMonkey, and now opening our search infrastructure via BOSS -- will lead to innovation both on Yahoo! and powered by Yahoo!. For BOSS, we see a virtuous circle in which partners deliver innovative search experiences, and as they grow their audiences and usage we have more data that can be used to improve our own Yahoo! Search experience and as a result, improve the quality of results our BOSS partners and their users get. Second, we do see new revenue streams from BOSS. In the coming months, we'll be launching a monetization platform for BOSS that will enable Yahoo! to expand its ad network and enable BOSS partners to jointly participate in the compelling economics of search.

What's in it for users?
More choice. BOSS will enable a range of fundamentally different search experiences. These new search products will provide value to users along multiple dimensions, such as vertical specialization, new relevance indicators and ranking models, and innovative UI implementations. Our hope is that the resulting expansion in user choice will have the effect of fragmenting the increasingly consolidated search market in much the same way that cable TV dramatically increased programming choices for television viewers.

Kick the tires and get started
Want to kick the tires on what BOSS-powered search could look like? As part of an alpha program, we've been working with a handful of start-ups and developers who have already begun using BOSS. Here are a few early examples of what's possible with BOSS:

  • Me.dium, a start-up that's built an innovative collaborative browsing product used BOSS to build a web-scale search engine that leverages its real-time surfing data. By combining the depth of the Yahoo! Search index with its insight into where users are browsing, Me.dium can provide its users with a unique buzz-based search experience.
  • Hakia, a semantic search start-up, is using BOSS to access the Yahoo! Search index and dramatically increase the speed with which it can semantically analyze the web. With BOSS providing this important infrastructure, Hakia is able to deliver a language search experience that isn't available from any of the "big three" search providers or other semantic search engines.
  • Daylife To-Go is a new self-service, hosted publishing platform from Daylife. Anyone can use this platform to generate customizable pages and widgets. Daylife To-Go uses the BOSS API platform to power its web search module.
  • Cluuz, a next-generation search engine prototype, generates easier-to-understand search results through semantic cluster graphs, image extraction and tag clouds. The Cluuz analysis is performed in real-time on results returned from the BOSS API.

To learn more about BOSS and get started using the API, visit the Yahoo! Developer Network. BOSS is open to all -- so check out the documentation, get a BOSS app ID and start building the next generation of search.

The BOSS Team

Google Results Disappoint

The headline in the Wall St. Journal.

Google Inc.'s second-quarter net income rose 35%, but the results disappointed investors and shares fell nearly 10% in after-hours trading.

Update: If you want snark, but worthy analysis, read SAI:

GEORGE REYES takes over. Grab the coffee.

AdSense DOWN sequentially. First time ever. Attributed to quality control, seasonality.
Paid clicks DOWN sequentially. Again, first time ever. Attributed to quality control, seasonality.

UK DOWN sequentially. No FOREX benefit, seasonal weakness. Again, first time ever.

Operating margin down sequentially.

Interest income down (some of the EPS miss here). Lower cash balance from DoubleClick deal, and lower yields.

Free cash flow again hammered by massive CAPEX: Up modestly sequentially, but has essentially been flat for 4 quarters.

HAL VARIAN:

Queries in many sectors weak: autos, real-estate, finance, etc. Real estate down year over year. Y/Y auto ad spend up, but not on financing side (consumers hit). Consumers cautious. This is the first time Google has acknowledged weakness. Revenue performance remarkable in light of this.

SERGEY:

Boring product details.

del.icio.us Tags: ,

GPRS billing hack

GPRS billing hack
> Presumably one would have to hack into the internal network to get > access to the (private?) i.p addresses that are being assigned to > customers. (Or are they not private - can I ping them from the net?)
It depends. Some operators (including mine) use Network Address Translation (NAT) to provide ip addresses from private network to the clients. This would also efectively stop the "gprs billing hack".
Some operators provide the IP addresses from public ip space which is is efectively the same as connecting any normal computer to the internet. In this case (if there is not any firewall between) you can send packets to the handset. Still, this does not mean that you could somehow steal money from the packet charges.
The overbilling scam they described is basically just pinging a host (handset) in Internet. In the old days when ISP:s charged by the traffic you could do the same "attack" to some poor company by floodpinging their webserver. Was that called "hacking into ISP bi

lling system"? I dont think so :)
There were some valid point brought forward in the article. First, don't think this about wholesale theft form wireless carriers; rather,this is about the erosion of consumer confidence in per-packet billing.
DoCoMo already has a monthly 500yen kickback to consumers that acknowledges the fact that they don't own and can't control the Internet. The reality is that there is enough strange and wonderful stuff going on in the Internet that per-packet billing is tenuous at best.
...and for all those telcos and governments out there who's revenue models depending on per-(whatever besides monthly) billing, that hashuge implications. These folks consider a departure from per-packetbilling to be theft outright.

del.icio.us Tags: ,

How to hack MTNL account

Many persons asked me for how to hack mtnl account.Here is a general procedure to hack any DSL/cable account.I have already hacked MTNL triband and spectranet cablenet using this.
The actual procedure specifically for mtnl is damn simpler but this is the general method.Not for no

obs.
As they say,no pain no gain.
I am not responsible for any harm caused to you using this method.Though the method is damn simple,the detection is simpler.
This tutorial will explain to you how to hack someone's internet account thru his router.
This hack is based on a secuirty exploit of the router's default password and the stupidity of the user.
Explanation: when somebody buy's a xDSL/Cabel router, the router is set to manufactory defaults like IP range, user accounts, router table, and most important the security level.
The last one we will exploit.
Most routers will have a user friendly setup menu running on port 23 (telnet) and sometimes port 80 (http) or both.
This is what we are looking for.
Step 1.
Get a multie IP range scanner like superscanner (superscanner is fast and easy to use).
Get a xDSL/Cabel user IP range. This is a single user IP 212.129.169.196 so the ip range of this Internet provider is 212.129.xxx.xxx most likely it will be from 212.129.1.1 to 212.129.255.255 .
To keep your scanning range not to big it's smart to scan from 212.129.1.1 to 212.129.1.255 it also depends of your bandwidth how fast the scan will be finished.
The IP adres above is just a example any IP range from a xDSL/Cabel provider can be used for this hack.
before you start scanning specify the TCP/IP ports. You know that we are looking for TCP port 23 (telnet) and TCP port 80 (http) so edit the list and select only port 23 and port 80.
Now start scanning and wait for the results.
When finished scanning look for a IP that has a open port 23 and 80. Write them down or remember them.
Step 2.
Way 1
This is important: Most routers have connection log capability so the last thing you want to do is making a connection with your own broadband connection so use a anonymouse proxy server or dailup connection with a fake name and address (56.9 modem for example) when connection to the victim's router.
Now get a telnet program. Windows has a standard telnet program just go to start,
select run and type down "telnet" without the ", click or enter OK.
Select "connect" than "Remote system" enter IP adres of the victim in the "host name" field press OK.
wait for your computer to make a connection. This way only works when the router has a open telnet port service running.
Way 2
This is important: Most routers have connection log capability so the last thing you want to do is making a connection with your own broadband connection so use a anonymouse proxy server or dailup connection with a fake name and adres (56.9 modem for example) when connection to the victim's router.
Open a Internet explorer windows enter the IP address of the victim after the http:// in the address bar.
This way only works when the router has a open hyper text transfer protocol (http) service running.
Step 3
Entering the userfriendly setup menu. 9 out of 10 times the menu is protected by a loginname and password. When the user doesn't change any security value's the default password stay's usable.
So the only thing you have to do is find out what type of router the victim uses. I use this tool: GFILanguard Network Security Scanner is good. When you find out the type of router that's been used get the wright loginname and password from this list (not every router is on the list)
Step 4
When you have a connection in telnet or internet expolorer you need to look for user accounts.
PPP, PPtP, PPeP, PPoP, or such connection protocol. If this is not correct look for anything that maybe contains any info about the ISP account of the user.
go to this option and open it. Most likely you will see a overview of user setup options.
Now look for the username and password.
In most case the username will be freely displayed so just write it down or what ever....
The password is a different story. Allmost always the password is protected by ********* (stars) in the telnet way there is noway around it (goto another victim) but when you have a port 80 connection (http). Internet connection way open click right mouse key and select "View source" now look for the field where the star are at. most likely you can read it because in the source code the star are converted to normal ASCII text.
If not get a "******** to text" convertor like snadboy's revelation V.2 move the cursor over the ****** and....
It's a miracle you can read the password.
Now you have the username and password.
There a million fun thing to do with that but more about that next time.
Tips.
Beware on most routers only one person can be loget on simultaneous in the router setupmenu.
Don't change anything in the router if you don't know what you are doing.
Dont cause any unintentional harm.Dont overuse any connection as the sufferer may complain.

del.icio.us Tags: ,

INCREASE BROADBAND SPEED (HACK)

Before performing these steps you need to test your broadband speed
you can test your speed at http://www.2wire.com/
The broadband connection speed can be increased by clearing the route from modem to server. Number of packets sent by modem to server should be increased.Internet speed can be increased by increasing more number of incoming and outgoing packets.The main reason why your Internet connection is slow is because of harmful virus.If your system is infected with virus your number of incoming packets will be decreased.This leads to your slower Internet speed.Internet speed can be increased by by clearing the route to the server.
This can be done by upgrading costly software and hardware.This will optimize your system speed.And Increase your system speed.Internet tweak is the best software which increases your system speed for further applications.Another software Windows power tools which makes windows faster and increases your Internet speed.And decreases downloading time.It optimizes LAN,CABLE,DSN etc.Another software "Internet cyclone"which increases your Internet speed from 64kbps to 120kbps.
This tip is designed for increased BROADBAND speed in Windows XP while using standard Network Interface cards (NIC) that are connected to ADSL modems, or when using any directly-connected USB ADSL modem.
To speed up the Internet connection speed we need to configure a special buffer in the computer's memory in order to enable it to better deal with interrupts made from the NIC or the USB modem.


This tip is only recommended if you have 256MB RAM or higher.
Step #1 - Identify the IRQ used by the NIC/USB modem
1. Open the System Information tool by running MSINFO32.EXE from the Run command.
2. Expand System Summary > Hardware Resources > IRQ's.
3. Look for the listing made for your NIC (in my case - a Intel® PRO/100+ Management Adapter). Note the IRQ next to the specified line (in my case - IRQ21).
In case of USB modems you will first need to find the right USB device used by your modem. Follow these steps:
1. Open the Device Manager tool by running DEVMGMT.MSC from the Run command (or by right-clicking My Computer > Hardware tab > Device Manager button).
2. Scroll down to Universal Serial Bus controllers and expand it.
3. Right-click the USB Root Hub and select Properties. Note that you might need to do so for all listed USB Root hubs (if there are more than one) in order to find the right one.
4. In the Power tab, look for your USB ADSL modem.
5. In the Resources tab look for the assigned IRQ (in this case - IRQ21).
6. This is the IRQ we're looking for.
Note: IRQ's and modem names might vary...
Step #2 - Modify the system.ini file
1. Run SYSEDIT.EXE from the Run command.
2. Expand the system.ini file window.
3. Scroll down almost to the end of the file till you find a line called [386enh].
4. Press Enter to make one blank line, and in that line type IRQX=4096 where X is the designated IRQ number we found in step #1, in my case it's IRQ21.
Note: This line IS CASE SENSITIVE!!!
5. Click on the File menu, then choose Save.
6. Close SYSEDIT and reboot your computer.
Done. Speed improvement will be noticed after the computer reboots.

del.icio.us Tags: ,

Trick to hack Broadband

This is for broadband ADSL in india and think is working on all BroadBand .Some ISPs will bind username to specific router so this trick mite not work on those ISPs.
Step 1: Download any port Scanner (i preffer Super Scan or IPscanner)
Step 2: First Get your ip from
CODEwww.whatismyip.com
Asume your IP to be 59.x.x.17
Step 3: copy your ip in IPscanner Software and scan for alive IPs in the below range
start:59.x.x.1 to End:59.x.x.255
Step 4: Then check in your scanner which alive IPs has the port 80 open or somthing
Step 5: Enter that IP in your web browser
Step 6: It asks for user , pass
type user=admin password=admin
It is the default password for most of the routers.
if denied then use on another alive IP
Step 7: If success then it will show router settings page of tht IP user
There goto Home -> Wan Setting and the username and password of his account will appear there.
Step 8: use ShowPassword or Revelation software to view the password in asterisks
now you have username/password
Password revealer
http://camtech2000.net/Pages/Password_Reveal.html

use this to reveal the pass
click here for ip scanner
http://www.snapfiles.com/get/angryip.html

del.icio.us Tags: ,

Remove virus without antivirus

How do I clean my system???

To remove the virus without any antivirus software,reboot in the MSDOS mode. Then go to the windows/system directory by typing

c:\windows>cd system

Then,delete ska.exe and ska.dll by typing:

c:\windows\system>del ska*

Then delete wsock32.dll by typing

c:\windows\system>del wsock32.dll

Then rename your original wsock2.dll, which was renamed by the worm to wsock32.ska back to wsock32.dll. To do so type the following at the DOS Prompt:

c:\windows\system>ren wsock32.ska wosck32.dll

Hope you could do this

All the best

del.icio.us Tags: ,

Multiple Yahoo login

Multiple Login in Yahoo! by regedit
Follow these steps : ->
* Go to Start ==> Run ==>> Type regedit,hit enter
* Go to HKEY_CURRENT_USER -> Software -> Yahoo -> pager -> Test
* On the right pane ==>> right-click and choose new Dword value .
* Rename it as Plural.
* Double click and assign a decimal value of 1.
* Now close registry and restart yahoo messenger.
* For signing in with new id open another messenger .

July 16, 2008

Ten Handy Bash Aliases for Linux Users [Linux Tip]

TechRepublic's 10 Things blog posts 10 shortcut ideas for Linux
users (and Terminal-friendly OS X hackers) to make the terminal a
friendlier, faster place to work. To use them, open up the .bashrc
file found in your home directory and add lines in the following manner:

Alias NICKNAME='full command here'
Replace
"NICKNAME" with a quick-type command, and put the full command in
quotes. One example offered up by TechRepublic is a command to open up
a file you regularly edit, like your /etc/apt/sources.list repository list, with a single command:
For
instance, when I used Enlightenment E16 (I now use E17), I was
frequently editing the menu file ~/e16/menus/user_apps. Instead of
constantly opening up a terminal and entering nano
~/.e16/menus/user_apps, I used an alias that allowed me to type emenu
and start editing. I used this alias:

alias emenu='aterm nano -e ~/.e16/menus/user_apps'

Now, I just enter the command emenu (or I can enter that in the run command dialog) to open up this file in an editor.

Users of GNOME-based distributions like Ubuntu might want to switch gedit in place of nano -e
for an easier-to-grasp graphical editor. Got your own bash shortcuts
you put in every new Linux install? Share them in the comments.

The Mobile Photo Enhancer Improves Camera Phone Pics [Featured Windows Download]



Windows only: Although the quality of camera phone pictures has
increased over time, many camera phones still leave a lot to be
desired. If you have a bunch of camera phone pictures you'd really like
to keep but the quality seems a bit off, a run through the free Mobile
Photo Enhancer might be your saving grace. With single and batch
processing, Mobile Photo Enhancer has a host of tweaks to correct
problems like low contrast, vignetting at the edges, poor sharpness and
artifacts. While it won't make your photos of Mardi Gras revelry look
like they were taken with a medium format camera, it will put a little
sparkle back in your beads. The Mobile Photo Enhancer is a free
download for Windows only.

Turn Vista Home Premium into Ultimate with Free Software [How To]

The Mysticgeek blog at the How-To Geek's site has a clever series of
posts up that use free software tools to give Windows Vista Home
Premium—the version that most often ships with standard
laptops—the same kind of super-user powers you get with a copy of
Ultimate. Mysticgeek uses FileHamster
to replicate Ultimate's "Shadow Copy" function, installing a DreamScene
power toy to get moving backgrounds, and DriveIMage XML to create
sturdy backups (as Gina once detailed). Hit the link below for the FileHamster tutelage; and check out part 1 and part 2
for the other tweaks. What other tweaks do you use to add Ultimate-like
features to your copy of Vista? Share them in the comments.
vista_ultimate.jpg

How to Run Windows on Your Mac for Free [How To]



Weblog MakeUseOf details how to install Windows on your Mac with
freeware virtual machine software VirtualBox. We've already shown you how to run Windows apps seamlessly in Linux with VirtualBox,
but the MakeUseOf guide takes on the new OS X beta version of
VirtualBox with a nice step-by-step for getting started. It sounds like
VirtualBox isn't as robust as other Windows-on-Mac alternatives, but it
is the only no-cost app. If you've always wanted to ride the
Windows-on-Mac train but didn't feel like shelling out for VMware Fusion or Parallels,
VirtualBox looks to be a viable alternative. If you've tried running
Windows on the latest version of VirtualBox for Mac, let's hear how
it's worked for you in the comments.

SynthaSite Creates Your Web Site In-Browser [Web Development]

Web-based web site editor SynthaSite has relaunched itself with a
brand new and radically more friendly user interface. Select your
site's color scheme and template, and then modify it using a what you
see is what you get, drag and drop editor. Drag everything from basic
text and images to forms, maps, videos and photo galleries onto your
pages. Publish the site you've created directly through SynthaSite,
either at the http://yoursitename.sythasite.com address
or set your current URL to redirect to your SynthaSite, or you can
download the work you've done and host it on your own web server. If
SynthaSite isn't quite what you were looking for in a WSIWYG editor,
check out previously reviewed online editor Webon or if you're looking for a meatier project to wile away your weekend you can roll your own professionally designed web site.

Kyolo Adds No-Hassle Speech Bubbles to Digital Pics [Image Editing]

Some pictures just cry out for a little cartoon-like commentary to strengthen their message—a fact your editors know all too well.
Free web service Kyolo helps non-Photoshop-ninjas quickly add speech
bubbles to any picture with serious simplicity. Resize the speech
bubbles, rotate the angular pointers, change the font sizes, and then
save the resulting images. There's a definite potential for over-use,
as any long-time blog reader knows, but it's a handy tool for inside
jokes, quick blog posts, and whatever else needs a little comic strip
flair. An optional sign-in lets you save pictures online and create
public and private albums, but anyone can grab their finished images
for free.Kyolo [via Download Squad]

Password Chart Generates Secure Passwords [Passwords]

Create secure passwords from a master phrase with web-based app
Password Chart. Enter a phrase and Password Chart generates a table of
values for the alphabet based off that phrase. For example, starting
with phrase "Lifehacker helps me get things done.", I converted my
existing password "mysecretpassword" into the much less crackable
"bs3rK@y4wB@yP8s68iueKK!3vB4MF". For the analog among us, you can even
print off the password chart to store or keep with you. For a more
digital based password management system, check out our guide to securely tracking your passwords.

How to Annotate Images in Preview [Mac OS X Leopard]

Mac OS X Leopard only: One of the built-in Mac utilities that got
the most feature additions in Leopard—albeit pretty
quietly—is Preview, the PDF and image viewer. We've already
covered how you can do more with Preview in Leopard,
but Mac OS X Hints points out another good one: image annotation. Add
arrows and notes, or circle and outline areas of an image in Preview
using the Annotation menu. (In Preview's View menu choose Customize
Toolbar, then drag the Annotate menu onto the toolbar.) Then, when
you're editing a non-PDF image in Preview, just select your annotation,
and click and drag on the image itself. Handy, and no third-party
software required.

Scour Pays You to Improve Search Results [Search Engines]

Search engine Scour aggregates results from Yahoo, Google, and MSN
on one page, displays reviews and feedback from other Scour members
about those results, and rewards you with points that you can trade in
for a Visa gift card. Register for a free account at Scour, and use it
each time you search the web. Accumulate enough Scour points and you
can get a $25 Visa gift card.
Every member is
awarded one point for every search, two for a vote and three for a
comment with a maximum of 4 points a search. Once you aggregate at
least 6,500 points you can cash them out for a $25 Visa gift card...
it's more than you currently make from searching, right?

Since Scour uses results from Google, Yahoo, and MSN anyway, you're
getting the same results you'd get if you were using those
engines—but racking up points while you do. A Scour browser
toolbar's available for for download as well.

Dock Spaces Creates Context-Specific Docks [Featured Mac Download]

Mac OS X only: Free utility Dock Spaces creates and swaps between up
to five customizable Docks in Leopard. Contrary to what the name might
imply, Dock Spaces does not swap out your Dock every time you change
Spaces. Instead, it swaps Dock content through your menu bar on demand,
perfect for creating different task-specific Docks. Dock Spaces is
donationware, Mac OS X only.
dock-spaces.png

TuneUp Automatically Updates and Fixes Your iTunes Metadata [Featured Windows Download]

Windows only: Music application TuneUp scans your iTunes library to
fill in and clean up your music's metadata, including album art. After
you install it, just point it at songs in your library you want to
clean up; TuneUp fingerprints and analyzes them and then provides a
diagnostic overview of your missing or incorrect metadata. You can then
verify and clean up all your metadata with the stroke of a button. In
theory it's very similar to previously mentioned MusicBrainz, but it's an altogether fresh take with a few more features.

For example, similar to the previously mentioned iConcertCal,
TuneUp lists upcoming concerts for artists in your library; it also
lets you explore your music through a web digest of YouTube videos,
articles, and merchandise related to bands you like. I just finished
testing TuneUp on around 40 entirely unlabeled or poorly labeled
tracks, and the results have been impressive. Not only does the app
update the metadata with accurate, consistent information,
but it does it all live, updating your library on the fly. TuneUp is
ad-supported and free to use, but you're limited to 500 cleans and 50
cover art look-ups per month. A premium version without any limitations
is also available for a $12 annually or a lifetime price of $20. TuneUp
is Windows only, with a Mac version planned for later this year.

SpiderOak Offers 2GB of Free, Cross-Platform Backup [Featured Download]



Windows/Mac/Linux (All platforms): Online backup utility SpiderOak is
notable for its true cross-platform availability, but it also offers
(like Mozy) 2 GB of non-expiring free storage space and the ability to
run in the background, making persistent backups as you change the
contents of any folders you want to watch. The creators boast of a
compression algorithm that speeds up both uploads and restoration, and
unlimited bandwidth for paying customers, but its real value comes in
its simple interface and set-and-forget nature. For any user—but
especially Linux newcomers—who doesn't quite feel comfortable
setting up their own automated backups, SpiderOak is a viable option.
SpiderOak is free to download and create a 2 GB account; each 10 GB
increment after that costs about $5/month.

Firefly Turns Firefox into a Local File Manager [Featured Firefox Extension]


All platforms with Firefox: Even though Firefox 3 has decent file and FTP browsing built-in,
the Firefly extension aims to turn the 'fox into a robust file manager.
Browse your local drives and folders in Firefox using Firefly, which
offers tabs, can split your screen to view several folders, preview
images, open, rename, copy, and delete files, and display a
hierarchical folder tree in the sidebar. Not sure Firefly is quite as
polished as it could be, but if you're dying for a Windows Explorer
alternative and Xplorer 2 and others like it aren't cutting it, Firefly is an option. See this Firefly tutorial for more of what it can do.
Firefly is a free download which works (almost) wherever Firefox
does—the developer says definitely Windows and Linux, but less
testing's been done on the Mac.

Widgets and Launchers Galore [Featured Desktop]



Reader jdgoal14 shows off his productive desktop, powered by widgets,
launchers, and other good looking utilities. Jdgoal14 writes:

The
widgets are from Yahoo Widgets and I use apps launchers such as
RocketDock and Keybreeze. Also, on the background I use John Background
Switcher to randomly change my wallpaper every hour and Google Calendar
sync. Also I use Dexpot to switch between my four workspaces and
sideslide (hidden here) to load all my folders and files that I need
quick access to.
Hit up the Flickr page and mouse over the
photo to see what's what. Got a fabulous desktop going on you want to
show the world? Submit it to the Lifehacker Desktop Show and Tell Flickr group.

CRP Keeps Your Important Apps Running [Featured Windows Download]



Windows only: Free application CRP (Control Running Programs) performs
two related but separate functions: First, it keeps important
applications running no matter what, so if a program unexpectedly shuts
down, CRP fires it back up. Second, it sets a user-defined limit on the
number of running instances of an application. If you've ever
unknowingly shut down your IM application, for example, but you need to
always be available for your job, the automatic relaunching of
specified apps can come in really handy. The second bit of
functionality—limiting instances of an application—can be
useful when you launch an application intending to restore the
currently running instance but you get another instance instead. CRP is
freeware, Windows only, requires .NET 2.0.

Bug Shooting Does Advanced Screen Capture and Annotation [Featured Windows Download]

Windows only: Free application Bug Shooting is a simple but powerful
screenshot application designed to make sharing screenshots via email
or with bug tracking applications a cinch. In fact, the application is
set up to work with several popular bug tracking applications out of
the box, but it also integrates with your default email client, Skype,
or any other application on your desktop with the right setup. The
application supports several markup options and advanced screenshot
features—like screen magnification—that we've primarily
seen in commercial apps like SnagIt in the past. Bug Shooting is
freeware, Windows only, requires .NET 2.0. If it's not quite what
you're looking for, take a look at one of the many alternative screen capture utilities we've covered.
bug-shooting.png

July 15, 2008

FREE rapidshare premium accounts 100% tested

Go fast and get NUMEROUS Rapidshare FREE PREMIUM accounts. Is working
100% and it never expire….. Be the first to get one.
Just go to:

http://rapidshare.com/files/126663746/Rapidshare_Premium_Accounts_Updated.txt

Pls don’t change the pw. I hope it satisfy you.

Turn your XP PC into Vista

Many of us still think Vista is too Expensive and of course it is.
Another bad thing about Vista is the compatibility. So, why don’t
just turn our Windows XP into Vista.I had installed Vista ultimate on
my PC a Couple of months ago. I worked fine but I really hated it
because:
I was not able to install my Sound card on it.
I was not able to Install Nero on it.Everything else was a charm, especially the Windows Aero and 3D flip ( Vista
is all about these two things). Everything else was like XP, and XP is
also much faster than Vista. So I got rid of Windows Vista. But I
really missed the Aero effect.After a month I figured how to turn my
Windows XP in Windows Vista. It looked so much similar to Vista that my
brother got confused so did everybody else who saw it. Here are the
screenshots of my Windows XP PC which look like Vista.



Here is how you can also turn XP in Vista:First you need to
patch Uxtheme.dll, because the themes won’t work if you have not
patched it. Download this patcher
which will do it for you and the Restart your PC.Next thing you need to
do is to find a good theme. The one I used in the above screenshots can
be downloaded from here. You can find Vista themes here.
When you have downloaded the Desired theme, Unzip it and copy it to
C:\WINDOWS\Resources\Themes.Get a nice Vista wallpaper over here or you can also search for them in google.Now download the vista sounds
and Unzip/Copy the to C:\WINDOWS\MEDIA folder. Goto Windows Control
panel >> Sounds, Speech, and Audio Devices >> Sounds and
change the sound for respective events. For the Vista like "Taskbar
Screenshot Utility" (I can’t find any other good word for it)
download Vista Task Tips
and install it. You can resize the screenshot by scrolling the mouse
wheel. Now when you hover a open window in Taskbar, it shows you a
screenshot of it. For the Aero Effect I use this. And for 3D flip I use Winplosion.For Sidebar I use Google sidebar bundled with Google desktop.
There are many others and better sidebars for XP than Google sidebar
but I like Google’s because it adds functionality to your
desktop, and because I use many other services of Google which are
integrated with Google Desktop. Other can be downloaded here, here and hereFor the start menu I used VistaStart and downloaded some Vista Screensavers from here. I downloaded the Vista cursors and Vista icons.To make my OS look more like Vista I used the Vista theme for my aVast antivirus software and which can be downloaded here. I also downloaded the Vista theme for Firefox. I changed the color scheme of Office 2007 to black which gives it a Vistaish feel. I also downloaded the Vista Explorer to make my PC more like Vista If you know some any other tweaks, let them come in comments.

Watch deleted Youtube Videos

If you are a regular user of youtube then may be you are quite familiar with this message“This video is no longer available”. If you are getting this message for a particular video that means the video has been removed by the youtube authority.

If you are a regular user of youtube then may be you are quite familiar with this message“This video is no longer available”. If you are getting this message for a particular video that means the video has been removed by the youtube authority.

But if you are still keen to see the video then you can take the service of Delutube.
Through Delutube it is possible for you watch the deleted youtube video
as long as youtube maintains a copy of the video on their cache
servers. To watch the deleted video, you have to provide the youtube
video id and Delutube will retrieve the deleted video and will play it.
But remember if youtube remove the video totally from their server then
it will not be possible to watch the video.

tariks world

How to get youtube video id—



For example “spy”is the video id of this youtube video
http://youtube.com/watch?v=spy

So for any particular video it will be

http://youtube.com/watch?v= Video ID

How to Download ANYTHING for FREE RAPIDSHARE !

Rapidshare is one of the most useful Internet websites
because it allows users to upload anything and share it with friends or
anybody else. At this time, Rapidshare has a huge database of files as
a considerable

number of users connected to it to upload
music, pictures, movies and even larger files such as games or
important documents. Although the owners encourage you to register and
become a paying member, Rapidshare is also available for free so you
can use it with only one restriction: you have a download limitation,
meaning that you’re not able to download too many files for free.
However, the website hosts an impressive number of files and it tends
to become a real encyclopedia for music and movies. Obviously, if you
don’t have the link of the uploaded file, you can’t access
it; so it’s mandatory to get it in order to download the
requested document.

Today, I’ll present you a simple way to
search this impressive encyclopedia using the power of the best search
engine on the Internet: Google. Basically, it can be done with ease
because there are numerous technologies on the Internet that allow you
to search Rapidshare but, if you really want to get relevant results,
you must use Google. So, all you need to do is to enter one of the
Google hidden operators that enable you to search a certain website.
Let’s suppose you want to search for multimedia files with your
favorite car, BMW. The search query typed on Google should look like
this:

CODE

site:rapidshare.com "bmw"

The
“site:” operator searches a certain webpage for the keyword
mentioned after the command so, in our case, Google will look on
Rapidshare for any file named with the BMW term. Additionally, you can
use any of the commands mentioned by Tech-Recipes to search Rapidshare
for certain files:

Music:CODE

+inurl:wma|mp3|ogg site:rapidshare.de

Videos:CODE

+inurl:avi|mpg|wmv site:rapidshare.de

Archives:CODE

+inurl:exe|rar|zip site:rapidshare.de

Please
note that you can use the above commands for any file format by
modifying the extension mentioned in the query. Watch the video
published below the article to understand the whole process of
searching Rapidshare with Google.

Top 15 Security/Hacking Tools & Utilities

1. Nmap

I think everyone has heard of this one, recently evolved into the 4.x series.

Nmap
(”Network Mapper”) is a free open source utility for
network exploration or security auditing. It was designed to rapidly
scan large networks, although it works fine against single hosts. Nmap
uses raw IP packets in novel ways to determine what hosts are available
on the network, what services (application name and version) those
hosts are offering, what operating systems (and OS versions) they are
running, what type of packet filters/firewalls are in use, and dozens
of other characteristics. Nmap runs on most types of computers and both
console and graphical versions are available. Nmap is free and open
source.

Can be used by beginners (-sT) or by pros alike
(–packet_trace). A very versatile tool, once you fully understand
the results.

Get Nmap Here

2. Nessus Remote Security Scanner

Recently went closed source, but is still essentially free. Works with a client-server framework.

Nessus
is the world’s most popular vulnerability scanner used in over
75,000 organizations world-wide. Many of the world’s largest
organizations are realizing significant cost savings by using Nessus to
audit business-critical enterprise devices and applications.

Get Nessus Here


3. John the Ripper

Yes, JTR 1.7 was recently released!

John
the Ripper is a fast password cracker, currently available for many
flavors of Unix (11 are officially supported, not counting different
architectures), DOS, Win32, BeOS, and OpenVMS. Its primary purpose is
to detect weak Unix passwords. Besides several crypt(3) password hash
types most commonly found on various Unix flavors, supported out of the
box are Kerberos AFS and Windows NT/2000/XP/2003 LM hashes, plus
several more with contributed patches.

You can get JTR Here

4. Nikto

Nikto
is an Open Source (GPL) web server scanner which performs comprehensive
tests against web servers for multiple items, including over 3200
potentially dangerous files/CGIs, versions on over 625 servers, and
version specific problems on over 230 servers. Scan items and plugins
are frequently updated and can be automatically updated (if desired).

Nikto
is a good CGI scanner, there are some other tools that go well with
Nikto (focus on http fingerprinting or Google hacking/info gathering
etc, another article for just those).

Get Nikto Here

5. SuperScan

Powerful
TCP port scanner, pinger, resolver. SuperScan 4 is an update of the
highly popular Windows port scanning tool, SuperScan.

If you need an alternative for nmap on Windows with a decent interface, I suggest you check this out, it’s pretty nice.

Get SuperScan Here

6. p0f

P0f v2 is a versatile passive OS fingerprinting tool. P0f can identify the operating system on:

- machines that connect to your box (SYN mode),
- machines you connect to (SYN+ACK mode),
- machine you cannot connect to (RST+ mode),
- machines whose communications you can observe.

Basically it can fingerprint anything, just by listening, it doesn’t make ANY active connections to the target machine.

Get p0f Here

7. Wireshark (Formely Ethereal)

Wireshark
is a GTK+-based network protocol analyzer, or sniffer, that lets you
capture and interactively browse the contents of network frames. The
goal of the project is to create a commercial-quality analyzer for Unix
and to give Wireshark features that are missing from closed-source
sniffers.

Works great on both Linux and Windows (with a GUI),
easy to use and can reconstruct TCP/IP Streams! Will do a tutorial on
Wireshark later.

Get Wireshark Here

8. Yersinia

Yersinia
is a network tool designed to take advantage of some weakeness in
different Layer 2 protocols. It pretends to be a solid framework for
analyzing and testing the deployed networks and systems. Currently, the
following network protocols are implemented: Spanning Tree Protocol
(STP), Cisco Discovery Protocol (CDP), Dynamic Trunking Protocol (DTP),
Dynamic Host Configuration Protocol (DHCP), Hot Standby Router Protocol
(HSRP), IEEE 802.1q, Inter-Switch Link Protocol (ISL), VLAN Trunking
Protocol (VTP).

The best Layer 2 kit there is.

Get Yersinia Here

9. Eraser

Eraser is an advanced security tool (for Windows),
which allows you to completely remove sensitive data from your hard
drive by overwriting it several times with carefully selected patterns.
Works with Windows 95, 98, ME, NT, 2000, XP and DOS. Eraser is Free
software and its source code is released under GNU General Public
License.

An excellent tool for keeping your data really safe, if
you’ve deleted it..make sure it’s really gone, you
don’t want it hanging around to bite you in the ass.

Get Eraser Here.

10. PuTTY

PuTTY
is a free implementation of Telnet and SSH for Win32 and Unix
platforms, along with an xterm terminal emulator. A must have for any
h4×0r wanting to telnet or SSH from Windows without having to use
the crappy default MS command line clients.

Get PuTTY Here.

11. LCP

Main
purpose of LCP program is user account passwords auditing and recovery
in Windows NT/2000/XP/2003. Accounts information import, Passwords
recovery, Brute force session distribution, Hashes computing.

A good free alternative to L0phtcrack.

Get LCP Here

12. Cain and Abel

My personal favourite for password cracking of any kind.

Cain
& Abel is a password recovery tool for Microsoft Operating Systems.
It allows easy recovery of various kind of passwords by sniffing the
network, cracking encrypted passwords using Dictionary, Brute-Force and
Cryptanalysis attacks, recording VoIP conversations, decoding scrambled
passwords, revealing password boxes, uncovering cached passwords and
analyzing routing protocols. The program does not exploit any software
vulnerabilities or bugs that could not be fixed with little effort.

Get Cain and Abel Here

13. Kismet

Kismet
is an 802.11 layer2 wireless network detector, sniffer, and intrusion
detection system. Kismet will work with any wireless card which
supports raw monitoring (rfmon) mode, and can sniff 802.11b, 802.11a,
and 802.11g traffic.

A good wireless tool as long as your card supports rfmon (look for an orinocco gold).

Get Kismet Here

14. NetStumbler

Yes
a decent wireless tool for Windows! Sadly not as powerful as it’s
Linux counterparts, but it’s easy to use and has a nice
interface, good for the basics of war-driving.

NetStumbler is a
tool for Windows that allows you to detect Wireless Local Area Networks
(WLANs) using 802.11b, 802.11a and 802.11g. It has many uses:

  • Verify that your network is set up the way you intended.
  • Find locations with poor coverage in your WLAN.
  • Detect other networks that may be causing interference on your network.
  • Detect unauthorized “rogue” access points in your workplace.
  • Help aim directional antennas for long-haul WLAN links.
  • Use it recreationally for WarDriving.

Get NetStumbler Here

15. hping

To finish off, something a little more advanced if you want to test your TCP/IP packet monkey skills.

hping
is a command-line oriented TCP/IP packet assembler/analyzer. The
interface is inspired to the ping unix command, but hping isn’t
only able to send ICMP echo requests. It supports TCP, UDP, ICMP and
RAW-IP protocols, has a traceroute mode, the ability to send files
between a covered channel, and many other features.

Get hping Here


23 ways to speed up windows XP

Here is a list of 23s simple measures to Improve Win Xp's Speed . Most of these of these are viable for Vista as well...

Since
defragging the disk won't do much to improve Windows XP performance,
here are 23 suggestions that will. Each can enhance the performance and
reliability of your customers' PCs. Best of all, most of them will cost
you nothing.

1.) To decrease a system's boot time and increase
system performance, use the money you save by not buying
defragmentation software -- the built-in Windows defragmenter works
just fine -- and instead equip the computer with an Ultra-133 or Serial
ATA hard drive with 8-MB cache buffer.


2.)
If a PC has less than 512 MB of RAM, add more memory. This is a
relatively inexpensive and easy upgrade that can dramatically improve
system performance.


3.) Ensure that Windows XP is utilizing
the NTFS file system. If you're not sure, here's how to check: First,
double-click the My Computer icon, right-click on the C: Drive, then
select Properties. Next, examine the File System type; if it says
FAT32, then back-up any important data. Next, click Start, click Run,
type CMD, and then click OK. At the prompt, type CONVERT C: /FS:NTFS
and press the Enter key. This process may take a while; it's important
that the computer be uninterrupted and virus-free. The file system used
by the bootable drive will be either FAT32 or NTFS. I highly recommend
NTFS for its superior security, reliability, and efficiency with larger
disk drives.

4.) Disable file indexing. The indexing service
extracts information from documents and other files on the hard drive
and creates a "searchable keyword index." As you can imagine, this
process can be quite taxing on any system.

The idea is that the
user can search for a word, phrase, or property inside a document,
should they have hundreds or thousands of documents and not know the
file name of the document they want. Windows XP's built-in search
functionality can still perform these kinds of searches without the
Indexing service. It just takes longer. The OS has to open each file at
the time of the request to help find what the user is looking for.

Most
people never need this feature of search. Those who do are typically in
a large corporate environment where thousands of documents are located
on at least one server. But if you're a typical system builder, most of
your clients are small and medium businesses. And if your clients have
no need for this search feature, I recommend disabling it.

Here's
how: First, double-click the My Computer icon. Next, right-click on the
C: Drive, then select Properties. Uncheck "Allow Indexing Service to
index this disk for fast file searching." Next, apply changes to "C:
subfolders and files," and click OK. If a warning or error message
appears (such as "Access is denied"), click the Ignore All button.

5.)
Update the PC's video and motherboard chipset drivers. Also, update and
configure the BIOS. For more information on how to configure your BIOS
properly, see this article on my site.

6.) Empty the Windows
Prefetch folder every three months or so. Windows XP can "prefetch"
portions of data and applications that are used frequently. This makes
processes appear to load faster when called upon by the user. That's
fine. But over time, the prefetch folder may become overloaded with
references to files and applications no longer in use. When that
happens, Windows XP is wasting time, and slowing system performance, by
pre-loading them. Nothing critical is in this folder, and the entire
contents are safe to delete.

7.) Once a month, run a disk
cleanup. Here's how: Double-click the My Computer icon. Then
right-click on the C: drive and select Properties. Click the Disk
Cleanup button -- it's just to the right of the Capacity pie graph --
and delete all temporary files.

8.) In your Device Manager,
double-click on the IDE ATA/ATAPI Controllers device, and ensure that
DMA is enabled for each drive you have connected to the Primary and
Secondary controller. Do this by double-clicking on Primary IDE
Channel. Then click the Advanced Settings tab. Ensure the Transfer Mode
is set to "DMA if available" for both Device 0 and Device 1. Then
repeat this process with the Secondary IDE Channel.

9.) Upgrade
the cabling. As hard-drive technology improves, the cabling
requirements to achieve these performance boosts have become more
stringent. Be sure to use 80-wire Ultra-133 cables on all of your IDE
devices with the connectors properly assigned to the matching
Master/Slave/Motherboard sockets. A single device must be at the end of
the cable; connecting a single drive to the middle connector on a
ribbon cable will cause signaling problems. With Ultra DMA hard drives,
these signaling problems will prevent the drive from performing at its
maximum potential. Also, because these cables inherently support "cable
select," the location of each drive on the cable is important. For
these reasons, the cable is designed so drive positioning is explicitly
clear.

10.) Remove all spyware from the computer. Use free
programs such as AdAware by Lavasoft or SpyBot Search & Destroy.
Once these programs are installed, be sure to check for and download
any updates before starting your search. Anything either program finds
can be safely removed. Any free software that requires spyware to run
will no longer function once the spyware portion has been removed; if
your customer really wants the program even though it contains spyware,
simply reinstall it. For more information on removing Spyware visit
this Web Pro News page.

11.) Remove any unnecessary programs
and/or items from Windows Startup routine using the MSCONFIG utility.
Here's how: First, click Start, click Run, type MSCONFIG, and click OK.
Click the StartUp tab, then uncheck any items you don't want to start
when Windows starts. Unsure what some items are? Visit the WinTasks
Process Library. It contains known system processes, applications, as
well as spyware references and explanations. Or quickly identify them
by searching for the filenames using Google or another Web search
engine.

12.) Remove any unnecessary or unused programs from the Add/Remove Programs section of the Control Panel.

13.)
Turn off any and all unnecessary animations, and disable active
desktop. In fact, for optimal performance, turn off all animations.
Windows XP offers many different settings in this area. Here's how to
do it: First click on the System icon in the Control Panel. Next, click
on the Advanced tab. Select the Settings button located under
Performance. Feel free to play around with the options offered here, as
nothing you can change will alter the reliability of the computer --
only its responsiveness.

14.) If your customer is an advanced
user who is comfortable editing their registry, try some of the
performance registry tweaks offered at Tweak XP.

15.) Visit
Microsoft's Windows update site regularly, and download all updates
labeled Critical. Download any optional updates at your discretion.

16.)
Update the customer's anti-virus software on a weekly, even daily,
basis. Make sure they have only one anti-virus software package
installed. Mixing anti-virus software is a sure way to spell disaster
for performance and reliability.

17.) Make sure the customer has
fewer than 500 type fonts installed on their computer. The more fonts
they have, the slower the system will become. While Windows XP handles
fonts much more efficiently than did the previous versions of Windows,
too many fonts -- that is, anything over 500 -- will noticeably tax the
system.

18.) Do not partition the hard drive. Windows XP's NTFS
file system runs more efficiently on one large partition. The data is
no safer on a separate partition, and a reformat is never necessary to
reinstall an operating system. The same excuses people offer for using
partitions apply to using a folder instead. For example, instead of
putting all your data on the D: drive, put it in a folder called "D
drive." You'll achieve the same organizational benefits that a separate
partition offers, but without the degradation in system performance.
Also, your free space won't be limited by the size of the partition;
instead, it will be limited by the size of the entire hard drive. This
means you won't need to resize any partitions, ever. That task can be
time-consuming and also can result in lost data.

19.) Check the
system's RAM to ensure it is operating properly. I recommend using a
free program called MemTest86. The download will make a bootable CD or
diskette (your choice), which will run 10 extensive tests on the PC's
memory automatically after you boot to the disk you created. Allow all
tests to run until at least three passes of the 10 tests are completed.
If the program encounters any errors, turn off and unplug the computer,
remove a stick of memory (assuming you have more than one), and run the
test again. Remember, bad memory cannot be repaired, but only replaced.

20.)
If the PC has a CD or DVD recorder, check the drive manufacturer's Web
site for updated firmware. In some cases you'll be able to upgrade the
recorder to a faster speed. Best of all, it's free.

21.) Disable
unnecessary services. Windows XP loads a lot of services that your
customer most likely does not need. To determine which services you can
disable for your client, visit the Black Viper site for Windows XP
configurations.

22.) If you're sick of a single Windows Explorer
window crashing and then taking the rest of your OS down with it, then
follow this tip: open My Computer, click on Tools, then Folder Options.
Now click on the View tab. Scroll down to "Launch folder windows in a
separate process," and enable this option. You'll have to reboot your
machine for this option to take effect.

23.) At least once a
year, open the computer's cases and blow out all the dust and debris.
While you're in there, check that all the fans are turning properly.
Also inspect the motherboard capacitors for bulging or leaks. For more
information on this leaking-capacitor phenomena, you can read numerous
articles on my site.


Following any of these suggestions
should result in noticeable improvements to the performance and
reliability of your customers' computers. If you still want to defrag a
disk, remember that the main benefit will be to make your data more
retrievable in the event of a crashed drive.

Ethical Hacking Courseware Content

Information Security & Ethical Hacking – CISE


Background:
In today's scenario, everything depends on IT. From tax collections,
booking the cheapest airline tickets, banking online to trading shares
online, you name it! If you aren't a Chapter of IT revolution yet, you
are missing on a lot of ease and opportunities. But as they say,
everything comes at a price, and the price you pay here is risking your
privacy and probably your bank balance!
Online Security Breaches are
happening at a very fast rate and experts are needed to check and cure
these. ITS (IT Security) Experts are in demand. According to NASSCOM,
the demand for ITS Experts will be 10 Lakh by 2010 in India. ITS is a
THE next big thing in IT and you should make the best of it. The
current demand for Information Security jobs continues to grow. With
information security increasingly becoming a boardroom level concern,
training and certification are becoming increasingly important for
candidates and companies like.

Need for Information Security in the Indian Market

Security Compliance is must for all companies with IT backbone. The requirement is high with organizations in IT / ITES segment.
Information workers lack of basic security knowledge.
Information Security Industry is going through an exponential growth rate,current worldwide growth rate is billed at 21 %.
Higher salaries are been offered to professionals in IT security.
Information
Security industry is currently over $ 100 billion (2006), $ 60 bn in
US, $ 20 bn in UK, $4.5 bn in Japan, $ 1.5 bn in India etc.



Careers in Information Security
Network Security Systems Manager

Network Security Systems Administrator

Network Security Engineer

Systems/Applications Security Executive

Web Security Administrator

Web Security Manager

Security Auditor

Ethical Hacker

Data Security Specialist
Chief Information Security Officer
Course Duration: 50 Hours
Batches Available for Part-time Training on weekends.

Course Module:

Level 0:

Chapter I - Basics of Internet, Networking & Hacking.
Chapter II – Hacking & History.
Chapter III – Types of Threats in the Internet age.
Chapter IV – Google Hacking.
Chapter V – Firewalls Chapter
Chapter VI – The new age OS: Linux


Level 1:

I – Ethics Chapter

II – Google Hacking Chapter
III – Footprinting Chapter
IV – Scanning Chapter
V – Email Hacking Chapter
VI – System Hacking Chapter
VII – Trojans Chapter
VIII – Sniffers Chapter
IX – Social Engineering Chapter
X – Denial of Service Attacks Chapter
XI – Session Hijacking Chapter
XII – Hacking Web Servers Chapter
XIII – Compromised Systems Chapter
XIV – PHP Injection Chapter
XV – SQL Injection Chapter
XVI – Physical Security Chapter
XVII – Firewalls and Honeypot Chapter
XVIII – Buffer Overflow attacks Chapter
XIX – Cryptography Chapter
XX – Cyber Forensics Chapter
XXI – Cyber Crimes & Laws Chapter
XXII – Financial Frauds Online Chapter
XXII – Case Studies for Cyber Forensics Chapter
XXIII – Registration for CISE Examination

Course Fee: Rs.6500 (Online Examination Cost, Books, Service Tax Included)



Click here to Register for Course

Download Adobe Dreamweaver Full Version and Crack



Quickly and easily design, develop, and maintain Web sites and Web applications from start to finish with Adobe Dreamweaver CS3 software.
Built for both designers and developers, Dreamweaver CS3 offers the
choice of working in an intuitive visual layout interface or a
streamlined coding environment. Intelligent integration with Adobe Photoshop CS3, Adobe Illustrator CS3, Adobe Fireworks CS3, Adobe Flash CS3 Professional, and Adobe Contribute CS3 software ensures efficient workflow across your favorite tools.
Why use Dreamweaver?

Industry-leading tool
Take
advantage of all the flexibility and power of a world-class web design
tool. Manipulate pixel-perfect designs in Design view, craft complex
code in Code view, or do a little of each. Work the way you work best.

Integrated workflows
Design, develop, and maintain content within Adobe® Dreamweaver® CS3 while taking advantage of intelligent integration with other Adobe tools, including Adobe Flash® CS3 Professional, Adobe Fireworks® CS3, Adobe Photoshop® CS3, Adobe Contribute® CS3, and new Adobe Device Central CS3 for creating mobile device content.

Complete CSS support
Discover
the advantage of visual CSS tools that make it easy to view, edit, and
move styles within and between files, as well as see how your changes
will affect the design. Accelerate your workflow with new CSS layouts,
and test your design with the new Browser Compatibility Check.

Integrated coding environment
Organize
and accelerate your coding with code collapse, color coding, line
numbering, and a coding toolbar with comment/uncomment and code
snippets. Apply code hints for HTML and server languages
Support for leading technologies
Take advantage of support for leading web development technologies, including HTML, XHTML, CSS, XML, JavaScript, Ajax, PHP, Adobe ColdFusion®, ASP, ASP.NET, and JSP.
Effortless XML

Quickly integrate XML
content using either XSL or the Spry framework for Ajax. Point to an
XML file or XML feed URL, and Dreamweaver CS3 will display its
contents, enabling you to drag and drop appropriate fields onto your
page
DOWNLOAD ADOBE DREAMWEAVER VERSION 8.0 HERE