Sunday, December 15, 2013
Friday, November 29, 2013
Saturday, September 7, 2013
Top 10 Hackers in World
Vladimir
Leonidovitch Levin is a Russian-born Jewish individual famed for his
involvement in the attempt to fraudulently transfer US$10.7 million via
Citibank's computers. Wikipedia
Born: Russia
Born: Russia
Albert Gonzalez is a computer hacker and computer criminal who is
accused of masterminding the combined credit card theft and subsequent
reselling of more than 170 million card and ATM numbers from 2005
through 2007—the biggest such fraud in history. Gonzalez’s team used SQL
injection techniques to create malware backdoors on several corporate
systems in order to launch packet-sniffing (specifically, ARP Spoofing)
attacks, allowing him to steal computer data from internal corporate
networks
AKA Kevin Lee Poulsen
Born: 1965
Birthplace: Pasadena, CA
Gender: Male
Race or Ethnicity: White
Sexual orientation: Straight
Occupation: Hacker, Journalist
Nationality: United States
Executive summary: Hacker and journalist
When Kevin Poulsen was 17, he used his primitive TRS-80 "color computer" to hack into the US Department of Defense's Arpanet, the predecessor of the Internet. He wasn't prosecuted. He was later a computer programmer at SRI and Sun Microsystems, and worked as a consultant testing Pentagon computer security.
Robert Tappan Morris (born November 8, 1965) is an American computer scientist, best known for creating the Morris Worm in 1988, considered the first computer Worm on the Internet and subsequently becoming the first person convicted under the Computer Fraud and Abused
Birthplace: Pasadena, CA
Gender: Male
Race or Ethnicity: White
Sexual orientation: Straight
Occupation: Hacker, Journalist
Nationality: United States
Executive summary: Hacker and journalist
When Kevin Poulsen was 17, he used his primitive TRS-80 "color computer" to hack into the US Department of Defense's Arpanet, the predecessor of the Internet. He wasn't prosecuted. He was later a computer programmer at SRI and Sun Microsystems, and worked as a consultant testing Pentagon computer security.
Robert Tappan Morris (born November 8, 1965) is an American computer scientist, best known for creating the Morris Worm in 1988, considered the first computer Worm on the Internet and subsequently becoming the first person convicted under the Computer Fraud and Abused
He went on to co-found the online store Viaweb, one of the first web-based applications, and later the funding firm Y combinator —both with Paul Graham. He is a tenured professor in the department of Electrical Engineering and Computer Science at the Masschussetts Institute of Technology.
His father was the late Robert Morris,a coauthor of UNIX and the former chief scientist at the National Computer Security Center, a division of the National Security Agency
(NSA).
His father was the late Robert Morris,a coauthor of UNIX and the former chief scientist at the National Computer Security Center, a division of the National Security Agency
(NSA).
MafiaBoy was the Internet alias of Michael Demon Calce, a high school student from West Island, Quebec, who launched a series of highly publicized denial-of-service attacks in February 2000 against large commercial websites including Yahoo!, Fifa.com, Amazon.com, Dell, Inc., E*TRADE, eBay, and CNN.[1] He also launched a series of failed simultaneous attacks against 9 of the 13 root name servers
Kevin Mitnick, the world’s most famous (former) hacker will be the keynote guest speaker at Voxeo’s Customer Summit, June 21-23 at the Hard Rock Hotel at Universal Resorts Orlando.
Kevin drew headlines and a prison sentence in the summer of 1999 related to a 2-year computer hacking spree in which he gained unauthorized access to computer systems at some of the largest corporations on the planet and penetrated some of the most resilient computer systems ever developed. Today, he has his own consulting firm, and is one of the world’s most sought out experts in exposing the vulnerabilities of complex operating systems and telecommunications devices.
Mitnick gained unauthorized access to his first computer network in 1979, at 16, when a friend gave him the phone number for the Ark, the computer system Digital Equipment Corporation (DEC) used for developing their RSTS/E operating system software. He broke into DEC’s computer network and copied their software, a crime he was charged with and convicted of in 1988. According to the U.S. Department of Justice, Mitnick gained unauthorized access to dozens of computer networks while he was a fugitive. He used cloned cellular phones to hide his location and, among other things, copied valuable proprietary software from some of the country’s largest cellular telephone and computer companies
George Francis Hotz (born October 2, 1989), alias geohot, is an American hacker known for unlocking the iPhone, allowing the phone to be used with other wireless carriers, contrary to AT&T and Apple's intent.[1][2] Additionally, he developed the limera1n jailbreak tool, which used his limera1n bootrom exploit. He is also noted for hacking the PlayStation 3 and subsequently being sued by and settling with Sony.
Adrian Lamo is a Colombian-American threat analyst and hacker. He used
coffee shops, libraries and internet cafés as his locations for hacking.
Apart from being the homeless hacker, Lamo is widely-known for breaking
into a series of high-profile computer networks, which include The New
York Times, Microsoft, Yahoo!, and MCI WorldCom. In 2002, he added his
name to the The New York Times’ internal database of expert sources and
utilized LexisNexis account to conduct research on high-profile
subjects.
For his intrusion at The New York Times, Lamo was ordered to pay
approximately $65,000 in damages and was sentenced to six months house
arrest at his parents’ home, with an additional two years of probation.
In June 2010, Lamo disclosed the name of Bradley Manning to U.S. Army
authorities as the source of the July 12, 2007 Baghdad airstrike video
leak to Wikileaks. Lamo is presently working as a threat analyst and
donates his time and skills to a Sacramento-based nonprofit
organization.
In 2002, an exceptionally odd message appeared on a US Army computer
screen: “Your security system is crap,” it read. “I am Solo. I will
continue to disrupt at the highest levels.” It was later identified as
the work of Scottish systems administrator, Gary McKinnon, who was
accused of perpetrating the “biggest military computer hack of all
time”. He is accused of hacking into 97 United States military and NASA
computers over a 13-month period between, using the name ‘Solo’.
The US authorities claim he deleted critical files from operating
systems, which shut down the United States Army’s Military District of
Washington network of 2,000 computers for 24 hours. After the September
11 attacks in 2001, he deleted weapons logs at the Earle Naval Weapons
Station, rendering its network of 300 computers inoperable and
paralyzing munitions supply deliveries for the US Navy’s Atlantic Fleet.
He is also accused of copying data, account files and passwords onto
his own computer.
In November 2002, McKinnon was indicted by a federal grand jury in the Eastern District of Virginia. The indictment contained seven counts of computer-related crime, each of which carried a potential ten-year jail sentence. The court had recommended that McKinnon be apprehended to the United States to face charges of illegally accessing 97 computers, causing a total of $700,000 in damage. Even more interesting are McKinnon’s motives for the large scale hackings, which he claims were in search of information on UFOs. He believed the US government was hiding such information in its military computers.
In November 2002, McKinnon was indicted by a federal grand jury in the Eastern District of Virginia. The indictment contained seven counts of computer-related crime, each of which carried a potential ten-year jail sentence. The court had recommended that McKinnon be apprehended to the United States to face charges of illegally accessing 97 computers, causing a total of $700,000 in damage. Even more interesting are McKinnon’s motives for the large scale hackings, which he claims were in search of information on UFOs. He believed the US government was hiding such information in its military computers.
16-year-old black hat hacker Jonathan James, became the first juvenile
imprisoned for cybercrime. James gained his notoriety by implementing a
series of successful intrusions into various systems. In an anonymous
PBS interview, he professes, “I was just looking around, playing around.
What was fun for me was a challenge to see what I could pull off.”
James’ major intrusions targeted high-profile organizations such as NASA
and the Department of Defense. He cracked into NASA computers, stealing
software worth approximately $1.7 million. He also hacked into the
Defense Threat Reduction Agency and intercepted over 3,000 highly
secretive messages passing to and from the DTRA employees, while
collecting many usernames and passwords.Also known as “c0mrade,” James committed suicide using a gun, On May 18, 2008, at the age of 25. His suicide was apparently motivated by the belief that he would be prosecuted for crimes he had not committed. “I honestly, honestly had nothing to do with TJX,” James wrote in his suicide note, “I have no faith in the ‘justice’ system. Perhaps my actions today, and this letter, will send a stronger message to the public. Either way, I have lost control over this situation, and this is my only way to regain control.”
Friday, August 2, 2013
Fruits In Shape Of Women!!!
Fruit which is known as Nareepol....
he Nariphon , also known as Makaliphon is a tree in Buddhist mythology which bears fruit in the shape of young female creatures. The maidens grow attached by their head from the tree branches.This tree grows at the Himaphan, a mythical forest where the female fruits are enjoyed by the Gandharvas who cut the fruits and take them away.
The Nariphon is also mentioned in the Vessantara Jataka in which Indra placed these trees around the grove where the Bodhisattva Vessantara meditated.
Sunday, June 23, 2013
How to install Android for your PC
1 install VMware Player.
3 Create a virtual machine and give a path for
above file location
4 Now you can set disk location to save
a.
Android os partition take near about 250mb of
disk space.
5 Once completed the task...you boot to a GRUB
menu. Select the installation link to get start.
a.
Select (Installation – install android-x86 to
hard disk)
6 Create?modify partitions:
a.
Select {New}
b.
Choose {primary}
c.
Accept default
d.
Select {Bootable} to add the “Boot” flag to the
partition.
e.
Select {Write} and complete partition setup.
7 Now finally quit the editor.
8 In the “Partition Choose” window. There an
option like “Install android to sda1Linux”. Then press enter
9 Select ext3 in “Choose filesystem” window. If it
ask for format then confirm it and move to further step
10 If you want to leave the drive as read-only.
Accept the default and select no when it ask you if wnt to set as read only.
11.
Reboot the vmware player
12.
Now you finally see the android screen. It will
take some time to start
13. No click on “I finished Installing” rigth down
side...
If you like then plz comment and if you face any problem then also plz share!!
If you like then plz comment and if you face any problem then also plz share!!
Tuesday, May 28, 2013
Tips for men for a healthy life!!!
- Eat healthy. Healthy foods give you energy and let you away from certain diseases. Focus on fruits and vegetables, grains, and low-fat or fat-free milk products.
- Stay at a healthy weight. Being overweight can raise your risk of diabetes, high blood pressure, heart disease, and stroke.
- Get Exercise. Regular exercise is one of the most important things you can do for your health.
- Be smoke-free. Smoking is a way to many of the leading causes of death, including cancer, lung disease, and stroke. If you smoke, quit today! Also, avoid secondhand smoke.
- Take any medications you need. Many deaths could be prevented each year by taking medications properly. follow doctor's instructions for all medications, including those that help to control conditions like high blood pressure and diabetes.
- Avoid heavy drinking. Heavy drinking can lead to many problems, including high blood pressure, various cancers, psychological problems, and accidents. For men 65 and younger, drinking in moderation means no more than two drinks per day. Men older than 65 should have no more than one drink a day.
- Manage stress. Balancing work and family obligations can be challenging. But it's important to protect your mental and physical health.
- Get enough sleep. Not getting enough sleep can affect your mood and your health.
- Know your risks. Learn how your lifestyle affects your risk of health problems. and men who have sex with men should talk with their doctors about particular concerns.
- Stay safe. Safety means many things, like wearing seatbelts and helmets, having working smoke detectors, and following safety rules at work. It also means using condoms, washing your hands, taking care of your teeth, and wearing sunscreen.
Sunday, May 19, 2013
IPL 6 Records Stats
- At Now Totals Sixes in IPL6 2013 - 605 Sixes
- At Now Totals fours in IPL6 2013 - 11 138 runs from boundary (fours)
- At Wickets IPL6 2013 - 795 Wickets
- At Now total Dot Balls IPL6 2013 -6164 Dot Balls (Most Dot Balls thrown by DALE STAN )
- At Now total Fifties in IPL6 2013 - 88 Fifties
- At Now total Hunreds in IPL6 2013 - 4 Hunreds (Shane Watson, Chris Gayle, suresh raina, David Miller)
- At Now Fastest Ball in IPL6 2013 - 153.48 KPH , KPH DALE STAN (SH) ,
- At Now Totals Runs in IPL6 2013 - 17,994 Runs
- at now IPL first highest individual runs by batsmen:Chris Gayle(RCB) 175 Runs Notout,66 Balls,13 Fours,17 sixes,265.15 Strike Rate
- At now IPL 6 Largest Victory by Wickets Match No 11-Kings XI Punjab 138 vs Chennai Super Kings 139/0 (17.2/20 ov) Chennai Super Kings won by 10 wickets
- Team highest Runs- In this Pepsi IPL6 2013, Made highest Runs Mumbai Indians team 209/5 against Delhi Daredevils Team (10th match 09-04-2013)
- At now Totals Super Over : 2Mtach (RCB vs sh) and (RCB vs DD)
- At now Totals Hat Trick- 2 times 3 continuous Wickets
- At Longest Six :119 M (Hitting by Chris Gayle)
- At Now Fastest Fifty: 50Runs/17 balls (Hitting by Chris Gayle)
- At Now 6 overs :67/0 (By CSK) against KKR
- At now Team Lowest score: Chennai Super Kings 79/10 15.2 ov) 05-05-2013
- maiden over IPL 2013 - Bowling Thrown 23 Maiden Overs
(A)1st maiden over 1st match in this ipl 2013 goes to Irfan Pathan (2overs 1 maiden 15 runs) against Kolkata Knight Riders
(B)2nd maiden over 10th match again goes to Irfan Pathan against Mumbai indian).
References: www.crickets-update.in
Saturday, April 13, 2013
Tuesday, April 9, 2013
Friday, April 5, 2013
Windows Operating System Version till now!!!
WINDOWS 1.0 :-16 Bit Os (1985)
WINDOWS 2.0 :-16 Bit Os
WINDOWS 3.0 :-16 Bit Os (1990)
WINDOWS 3.1 :-16 Bit Os (1992)
WINDOWS NT 3.1 :-32 Bit Os (1993)
WINDOWS 95 :-Used WIN32 API
WINDOWS 98
WINDOWS ME
WINDOWS NT 4
WINDOWS 2000 (or also Known as WINDOWS NT 5)
WINDOWS XP (or also Known as WINDOWS NT 5.1)
WINDOWS XP PROFESSIONAL ----->Supports 64 Bit
WINDOWS SERVER 2003
WINDOWS VISTA (WINDOWS NT 6.0)
WINDOWS 7
WINDOWS SERVER 2012
WINDOWS 8
XP-EXTENDED PROCEDURE
NT-NEW TECHNOLOGY
RT-RUNTIME
The world's first hard drive was
introduced in September 1956 by IBM, called the IBM 350, it was part of the IBM
RAMAC 305, the first computer to use a hard drive.
In case you're wondering what RAMAC stood for we won't
disappoint you; 'Random Access Method of Accounting and Control.'
Now bear in mind that computer stuff was really big
back in 1956 and the IBM 350 was no different, it contained fifty 24 inch
two-sided discs on which data was stored, housed in a cabinet 5 feet long, 5
feet 8 inches high and 2 feet 5 inches deep.
It weighed a ton, no really, it
weighed one ton.
Now if
you're thinking this thing had amazing storage capacity we won't disappoint you,
it could hold 35,000,000 bits, which is 4,375,000 bytes or a whopping 4.17
megabytes.
Those lucky
enough to get their hands on the IBM 350 had to shell out $3,200.00 USD, and
that's just for 1 month of the lease.
INDIA----- How to know your own mobile number
For Airtel – *121*9#
For Aircel - *888#
For Docomo – *580#
For IDEA - *100#
For Videocon - *1#
For Virgin - *1#
For Vodafone -*111*2#
For Reliance - *1#
Androoid All Version
1) Cupcake:Android:- 1.5 - 30 April 2009
2) Donut:- Android 1.6 - 15 September 2009
3) Eclair: 26 October 2009
Android 2.0, also 2.0.1
Android 2.1
Android 2.1-update1
4) Froyo:- (short for "frozen yogurt")
Android 2.2, also 2.2.x updates - 20 May 2010
5) Gingerbread:
Android 2.3, also 2.3.x updates - 6 December 2010
6) Honeycomb:- 22 February 2011
Android 3.0, also 3.0.x updates
Android 3.1
Android 3.2
7) Ice Cream Sandwich:
Android 4.0 :- 19 October 2011
8) Jelly Bean
Android 4.1 :- 27 June 2012
Android 4.2 :- 29 October 2012
......................................
Range Of Computer Memory!!!
Do you know more than this ? ! ? :D
1 Bit = Binary Digit
8 Bits = 1 Byte
1024 Bytes = 1 Kilobyte
1024 Kilobytes = 1 Megabyte
1024 Megabytes = 1 Gigabyte
1024 Gigabytes = 1 Terabyte
1024 Terabytes = 1 Petabyte
1024 Petabytes = 1 Exabyte
1024 Exabytes = 1 Zettabyte
1024 Zettabytes = 1 Yottabyte
1024Yottabytes = 1 Brontobyte
1024 Brontobytes = 1 Geopbyte
1024 Geopbyte=1 Saganbyte
1024 Saganbyte=1 Pijabyte
Alphabyte = 1024 Pijabyte
Kryatbyte = 1024 Alphabyte
Amosbyte = 1024 Kryatbyte
Pectrolbyte = 1024 Amosbyte
Bolgerbyte = 1024 Pectrolbyte
Sambobyte = 1024 Bolgerbyte
Quesabyte = 1024 Sambobyte
Kinsabyte = 1024 Quesabyte
Rutherbyte = 1024 Kinsabyte
Dubnibyte = 1024 Rutherbyte
Seaborgbyte = 1024 Dubnibyte
Bohrbyte = 1024 Seaborgbyte
Hassiubyte = 1024 Bohrbyte
Meitnerbyte = 1024 Hassiubyte
Darmstadbyte = 1024 Meitnerbyte
Roentbyte = 1024 Darmstadbyte
Coperbyte = 1024 Roentbyte
1 Bit = Binary Digit
8 Bits = 1 Byte
1024 Bytes = 1 Kilobyte
1024 Kilobytes = 1 Megabyte
1024 Megabytes = 1 Gigabyte
1024 Gigabytes = 1 Terabyte
1024 Terabytes = 1 Petabyte
1024 Petabytes = 1 Exabyte
1024 Exabytes = 1 Zettabyte
1024 Zettabytes = 1 Yottabyte
1024Yottabytes = 1 Brontobyte
1024 Brontobytes = 1 Geopbyte
1024 Geopbyte=1 Saganbyte
1024 Saganbyte=1 Pijabyte
Alphabyte = 1024 Pijabyte
Kryatbyte = 1024 Alphabyte
Amosbyte = 1024 Kryatbyte
Pectrolbyte = 1024 Amosbyte
Bolgerbyte = 1024 Pectrolbyte
Sambobyte = 1024 Bolgerbyte
Quesabyte = 1024 Sambobyte
Kinsabyte = 1024 Quesabyte
Rutherbyte = 1024 Kinsabyte
Dubnibyte = 1024 Rutherbyte
Seaborgbyte = 1024 Dubnibyte
Bohrbyte = 1024 Seaborgbyte
Hassiubyte = 1024 Bohrbyte
Meitnerbyte = 1024 Hassiubyte
Darmstadbyte = 1024 Meitnerbyte
Roentbyte = 1024 Darmstadbyte
Coperbyte = 1024 Roentbyte
Chating With Friends Using Command Promt!!
"Chat with Friends through
ms dos Command Prompt"
:VJ
Cls
echo MESSENGER
set /p n=User: set /p m=Message:
net send %n% %m%
Pause
Goto VJ
ms dos Command Prompt"
- Now you need friend's IP address and your desktop Command Prompt.
- Open notepad and write this code as it is.....!
:VJ
Cls
echo MESSENGER
set /p n=User: set /p m=Message:
net send %n% %m%
Pause
Goto VJ
- Now save this as
- In user type the IP address of the computer you want to contact & Press enter
Saturday, March 9, 2013
Charge Your Battery by Turns Battery Around Your Finger
This is not a Green concept and neither does it claim to be “Eco Friendly”. It’s just a helpful solution for many situation. The situation may be is: you running out of juice on your mobile phone. So what you gona do? Remove the battery from the phone and give it a few good turns around your index finger and its gathered enough power to last you a conversation.
Friday, March 1, 2013
CSS,Javascript For FaceBook Front Page Design
create two file first one is "css.css" and then second one is "javascript.js" and paste these code and run facebookpage.html file
Thursday, February 28, 2013
If your phone is stole by some one!!!
Follow this step
- First submit your FIR if your mobile lost or stolen
- Then submit your FIR to your service provider
- Then ask your service provider to trace your number
- If your mobile is switched on and it has different Sim-card then it will trace easily
- If your simcard is not activated then also your mobile can trace
- You can ask your service provider to Block your IMEI number
- Service provider use a shared hosting service for blocking IMEI numbers
- Witch mean if your mobile have different Sim then also Your mobile not work
- your service provider get that Sim number which is used for you IMEI Number
point to Remember :
- when ever you purchased new mobile then take your IMEI number and note it
- if your mobile lost or stolen then call to your service provider and block your number
- then go to your nearest police station and give written complete that is FIR
- and take one copy for you
- then submit this copy to your service provider
Subscribe to:
Posts (Atom)
Popular Posts
-
This stone at the time of Ramayana is swing in water till now... Space images taken by NASA reveal a unknown anci...
-
* Sachin Tendulkar(india) God Of Cricket!!! ** ACHIEVEMENTS OF SACHIN'S ** Record number of matches played – 462 matche...
-
This condition is basically called "pupula duplex" -- which means just what it sounds like in Latin: "double pupil". ...