Sunday, 20 November 2011


Run Any Android Application On Windows | BlueStack



BlueStacks is an Android app player for Windows that can run any type of Android apps and games in full screen mode without encountering any performance or compatibility related issues. It features 10 pre-loaded apps along with an option to add custom apps. You can either download new apps from the BlueStacks Channel or push your favorite apps from your Android phone to your PC via BlueStacks


Saturday, 19 November 2011


Remove Lost iPhone Backup Password

Lets say that at some point you decided to adhere to security best practices and set a password on your iPhone backups so that they are encrypted. A year or two later you have upgraded your iPhone to a new version and you want to transfer all of your data across to the new phone. You attempt to restore from your backup and, doh, you need to remember the password you set. You try every password you could have set but none of them work. You try to remove the "Encrypt iPhone Backup" option so that you can create a backup without a password, but again it asks you for the password to disable the password.


Here is a hack that will let you disable your encrypted backups without the password so that you can create an unencrypted version to use to transfer your data across to your new phone:

1. Jailbreak your device. The easiest way to do this is via
www.jailbreakme.com, or if you have a more specific set of requirements then use Redsn0w or PwnageTool. This will install the hacked AppStore called Cydia.
2. Use Cydia to install OpenSSH and SQLite3
3. Connect your iPhone to a wireless network and ssh to it using Apple's default root password of "alpine"
4. We want to manipulate the keychains that basically store your saved encrypted passwords. Run "cd /var/Keychains" and you will find the keychains SQLite database called "keychain-2.db".
5. Connect to the keychain database by running the command "sqlite3 keychain-2.db"
6. Dump the contents of the table called "genp" by typing the following into the SQLite command prompt "select * from genp;"
7. Find the row containing the text "BackupPassword"
8. Get the RowID from the start of this line. Mine was "29"
9. Delete this row by typing the following into the SQLite command prompt "delete from genp where rowid = 29;" (remember to change 29 to be your own RowID)
10. Plug your iPhone into iTunes, where it will show that you still have a backup password enabled. Deselect the "Encrypt iPhone Backup" option.
11. This will ask you for your password, but don't fret! Type arbitrary text in as your password and hit ok.
At this point your password will be accepted, your backup encryption option will be disabled, nd your phone will start backing up unencrypted.


Friday, 18 November 2011


How to Block Proxy Servers?
(Important for web designer and relate web development)
Do you operate an e-commerce business? You check your access logs daily to see if there have been suspicious activities, such as hackers or botnets hacking your system.
Perhaps one of the challenges you face is proxy servers. You would like to block them so they don’t harm your system. Block proxy servers with the follow this methods
Basically there are
Method -1)
In this method you have to purchase software from the 3rd party  vendor  
1. Install proxy software on your server. (Already available on google try it from google search )
2. Analyze the IP address
3. Verify if the address is a static IP address.
4. Search for the IP address in the CIDR.
5. Block the proxy server from visiting your website.
Method-2)
This method will work if  you have used apache server for configuration
Block proxy servers by HTTP protocols.
 If you don’t want to purchase software, there is another way. You can insert a script in your website’s root .htaccess file. It’s best to copy and paste the code, rather than type it. That way, you can be sure that you won’t make any errors. After you’ve inserted the code, upload it to your server. This method is effective. Insert the following code:

# block proxy servers from site access
# source:http://perishablepress.com/press/2008/04/20/how-to-block-proxy-servers-via-htaccess/
# for details on how .htaccess is working check out url:http://httpd.apache.org/docs/1.3/howto/htaccess.html

RewriteEngine on
RewriteCond %{HTTP:VIA}  !^$ [OR]
RewriteCond %{HTTP:FORWARDED}  !^$ [OR]
RewriteCond %{HTTP:USERAGENT_VIA}  !^$ [OR]
RewriteCond %{HTTP:X_FORWARDED_FOR}  !^$ [OR]
RewriteCond %{HTTP:PROXY_CONNECTION}  !^$ [OR]
RewriteCond %{HTTP:XPROXY_CONNECTION}  !^$ [OR]
RewriteCond %{HTTP:HTTP_PC_REMOTE_ADDR} !^$ [OR]
RewriteCond %{HTTP:HTTP_CLIENT_IP}  !^$
RewriteRule ^(.*)$ - [F]
[Note: again only applicable for apache server ]
Enjoy web designing in secure way..

Thursday, 17 November 2011

Secrets of android
1. Complete Info
*#*#4636#*#*
 This code can be used to get some interesting information about your phone and battery. It shows following 4 menus on screen:
  • Phone information
  • Battery information
  • Battery history
  • Usage statistics
2. Factory data reset
*#*#7780#*#*
This code can be used for a factory data reset. It’ll remove following things:
  • Google account settings stored in your phone
  • System and application data and settings
  • Downloaded applications
It’ll NOT remove:
  • Current system software and bundled application
  • SD card files e.g. photos, music files, etc.
Note:
Once you give this code, you get a prompt screen asking you to click on “Reset phone” button. So you get a chance to cancel your operation.
3. Format Android Phone
  *2767*3855#
Think before you give this code. This code is used for factory format. It’ll remove all files and settings including the internal memory storage. It’ll also reinstall the phone firmware.
Note:
Once you give this code, there is no way to cancel the operation unless you remove the battery from the phone. So think twice before giving this code.
4. Phone Camera Update
*#*#34971539#*#*
This code is used to get information about phone camera. It shows following 4 menus:
  • Update camera firmware in image (Don’t try this option)
  • Update camera firmware in SD card
  • Get camera firmware version
  • Get firmware update count
WARNING:
Never use the first option otherwise your phone camera will stop working and you’ll need to take your phone to service center to reinstall camera firmware.
5. End Call/Power
*#*#7594#*#*
This one is my favorite one. This code can be used to change the “End Call / Power” button action in your phone. Be default, if you long press the button, it shows a screen asking you to select any option from Silent mode, AirPlane mode and Power off.
You can change this action using this code. You can enable direct power off on this button so you don’t need to waste your time in selecting the option.
6. File Copy for Creating Backup
*#*#273283*255*663282*#*#*
This code opens a File copy screen where you can backup your media files e.g. Images, Sound, Video and Voice memo.
7.  Service Mode
*#*#197328640#*#*
This code can be used to enter into Service mode. You can run various tests and change settings in the service mode.
8. WLAN, GPS and Bluetooth Test Codes:
*#*#232339#*#* OR *#*#526#*#* OR *#*#528#*#*           – WLAN test (Use “Menu” button to start various tests) 
*#*#232338#*#*                  – Shows WiFi MAC address 
*#*#1472365#*#*                – GPS test 
*#*#1575#*#*                      – Another GPS test 
*#*#232331#*#*                  – Bluetooth test 
*#*#232337#*#                    – Shows Bluetooth device address
9. Codes to get Firmware version information:
*#*#4986*2650468#*#* – PDA, Phone, H/W, RFCallDate 
*#*#1234#*#* – PDA and Phone 
*#*#1111#*#* – FTA SW Version 
*#*#2222#*#* – FTA HW Version 
*#*#44336#*#* – PDA, Phone, CSC, Build Time, Changelist number
10. Codes to launch various Factory Tests:
*#*#0283#*#* – Packet Loopback 
*#*#0*#*#* – LCD test 
*#*#0673#*#* OR *#*#0289#*#* – Melody test 
*#*#0842#*#* – Device test (Vibration test and BackLight test) 
*#*#2663#*#* – Touch screen version 
*#*#2664#*#* – Touch screen test 
*#*#0588#*#* – Proximity sensor test 
*#*#3264#*#* – RAM version
I think u will like this …

Wednesday, 16 November 2011

How to reset the password of router


What is 192.168.1.1 IP Address ?


For the convenience of the first time users to configure their home networking devices like broadband routers and to provide a standard computing environment, most of the network hardware manufacturers like LinkSys, Netgear, Westell etc. use a default IP address 192.168.1.1 for accessing their devices.
All you need to do is to type 192.168.1.1 in the address bar of your browser and just press enter. You will be able to configure all the settings of the Broadband router, with ease in your browser window.

IP 192.168.1.1 is a private IPv4 address and any computer, modem, router or any other internet devices can be configured using this IP 192.168.1.1 address. The limitation of this scheme is that this IP cannot be used on Internet and thus these devices cannot be configured through Internet. But the advantage of using a standard IP address is far more than the disadvantage.

How to Reset / Crack 192.168.1.1 Password

In case you have forgotten or lost your 192.168.1.1 router password, then you can try different combination of username passwords. In case, you are like most of other users, who do not bother to change the default login settings of the devices, then your choices can be …
  1. username: <admin< / password: <admin>
  2. username: <>/<admin>
  3. username: <admin>/<password>
In most cases, you will be able to retrieve the access. In case you are not able to do that, and you are not able to remember the lost password of 192.168.1.1, then the only option left is to use the hardware reset button on the router. Just remember to press the reset button for at least 30 seconds, otherwise the router may not be able to reset itself to the factory settings.
Once the router settings are reset, just use try to use the different username password combination we have described above.

The Default Password List of Most Routers

In case you have changed the default username and password of the http://192.168.1.1 Router, then there is no solution other than trying a hardware reset. But in case, you have not changed the password, then you can try to access the router by using a combination of password given below.











What is conficker worm?
The Conficker worm is a computer worm that can infect your computer and spread itself to other computers across a network automatically, without human interaction.
What does the Conficker worm do?
It might spread through file sharing and via removable drives, such as USB drives (also known as thumb drives). The worm adds a file to the removable drive so that when the drive is used, the AutoPlay dialog box will show one additional option.
The Conficker worm can also disable important services on your computer.
In the screenshot of the Autoplay dialog box below, the option Open folder to view files — Publisher not specified was added by the worm. The highlighted option — Open folder to view files — using Windows Explorer is the option that Windows provides and the option you should use.
If you select the first option, the worm executes and can begin to spread itself to other computers.




How does it work?



How to prevent that worm
If your computer is infected with the Conficker worm, you may be unable to download certain virus protection security products, such as the Microsoft Malicious Software Removal Tool or you may be unable to access certain websites, such as Microsoft Update. If you can't access those tools, try using the Microsoft Safety Scanner for virus removal.
Source:
http://www.microsoft.com/security/pc-security/conficker.aspx#ETB




Tuesday, 15 November 2011


Top Ten Cyber Crime Skills in High Demand

With trillions of dollars in electronic funds available for the taking, cyber crime has become big business.
Like any other rapidly expanding business sector, particular expertise and skills are increasingly in demand, presenting exceptional career opportunities for those with less than noble character dispositions.
At the recent FOSE conference - a government IT trade show - deputy assistant director in the FBI's cyber division Steven Chabinsky identified the top ten skill sets for the blossoming cyber crime industry.
"The cyber underground now consist of subject matter experts that can focus all their time and energy on improving their techniques, their goods and services," said Chabinsky.
Expertise in high demand include:
1. Coders/programmers, who write the exploits and malware used by the criminal enterprise. Contrary to popular belief, Chabinsky noted that coders who knowingly take part in a criminal enterprise are not protected by the First Amendment.

2. Distributors, who trade and sell stolen data and act as vouchers for the goods provided by other specialists.

3. Tech experts, who maintain the criminal enterprise's IT infrastructure, including servers, encryption technologies, databases, and the like.

4. Hackers, who search for and exploit applications, systems and network vulnerabilities. 

5. Fraudsters, who create and deploy various social engineering schemes, such as phishing and spam.
6. Hosted systems providers, who offer safe hosting of illicit content servers and sites.
7. Cashiers, who control drop accounts and provide names and accounts to other criminals for a fee.
8. Money mules, who complete wire transfers between bank accounts. The money mules may use student and work visas to travel to the U.S. to open bank accounts.
9. Tellers, who are charged with transferring and laundering illicitly gained proceeds through digital currency services and different world currencies.