Search

Proof of Concept,Passwords seen in plaintext on LAN and WiFi

You come to to your college campus hostel room day and you find your dean, and cyber cops standing on door. Well why ? Someone gave a tip-off that you’re storing illegal CREDIT card information / Terrorist information on your email. You’re sure that you didn’t indulge in any such activity and try to prove that by showing your email inbox and machine. Alas, you find that there are several files that contain database of stolen Credit cards, etc. Well, hey, you’ve been using hard to guess passwords ( after all that’s a tip every security guy gives), you keep a latest Antivirus software + Firewall to keep your machine Hacker Safe.

But, that’s not your machine  that’s a network where the boundries of all those installed “hacker-safe” tools is render

You have been using hard-to-guess passwords and changing them regularly. How could someone have gotten access to your account to use it for this activity? One likely possibility is that you have been a victim of a password sniffer attack.

You’re online and reading this posts, via internet, which is by concept a network of wire meshes. By principle is WiFi too is nothing but a wireless version of the same wired network topology- which inadvertendly is vulnerable. Whether you’re subscribed to the local cable internet walah, or a LAN inside your office you might be totalled.

The problem is that we feel installing a good updated antivirus or firewall will protect us from the malicious hackers. That’s nothing but an illusion, a false sense of security.

The whole point is about understanding the basics that lie behind the TCP/IP protocol. All the network data can be seen as packets flowing around which can be snooped.

Take for example an experiment I did yesterday, I ran up a sniffer program in the Windows environ to see what might be flowing through my Local Area Network. Not much to surprise , the passwords could easily be seen travelling in plaintext. Checkout this image1

One can intercept chat conversations at will. Google Talk, MSN , Yahoo,Rediff India do not use SSL or any encryption to secure the Chat conversations. So your amorous private conversation with your girlfriend, or serious ones with business affiliates might be just seen in plain by a malicious attacker sitting somewhere in the Local Area Network. All IITs, and college campuses employ LANs to distribute internet among, which by principle is not a safe environment.

Checkout this image: You may see the passwords of users :ajay… , prafull… etc… I do not know them since they might be sitting in some part of my Local LAN in my residential area. But I have their passwords.

Common FAQ that might arise after reading this short piece of text:

Q: Am I safe doing my business transactions via internet on LAN ?

A: Quite safe as of now. All the leading Internet transations are facilitated using CRYPTOGRAPHY embedded in their webpages. Security certificates and SSL is a good protection from getting sniffed in the LAN environs.

Q: Does my latest firewall, or antivirus protect me agaist such type of attacks?

A: Heck, no! Firewalls are only good when it comes to inbound attack security. The hacker might not be able to intrude your machine, or send viruses/trojans. Firewalls/AVs are defunct after the data escapes your machine and enters the Network, any snooping eye can catch hold of it.

Q: Any protections?

A: 100 percent security comes when you plug off your wires. For now make sure you use secure logins. (the ones having a https in front, to ensure your data is being encrypted.

When a hacker gathers encrypted data, its generally useless for him, unless he takes the pain to demystify the key by using BRUTEFORCE and Dictionary type attacks. Very few crackers adopt this, due to the amount of time involved in complex mathematical attacks.

Well you

Problems with Outlook Express

Having problems with Outlook Express ? Does it ask for password every time you connect tip:

If this is problem for you. Sometimes no matter what you do, Outlook Express forgets your password and asks you to enter it again each and every time you connect to your mail server.I have a solution that may work for you.

Open Registry by going to 
START-RUN and entering 
REGEDIT and Navigate to 
HKEY_CURRRENT USER\Software\Microsoft and look for 
"Protected Storage System Provider". 

There is a good chance that you will see this folder. If you have it. Simply delete it. More than likely, you have solved your problem.

Preparing to Move Hard Drive to Another Computer

Preparing to Move Hard Drive to Another Computer

To remove the devices from device manager when taking a HD from one computer to another,simply:
Run Regedit
Go to HKEY_LOCAL_MACHINE\ and delete the Enum section
This removes all of the hardware specific settings

OPTIMISE DISPLAY SETTINGS

 --------------------------------OPTIMISE DISPLAY SETTINGS-----------------------------

Windows can look sexy but displaying all the visual items can waste system resources. To optimize:

1.Go to Start
2. Click Settings
3. Click Control Panel
4. Click System
5. Click Advanced tab
6. In the Performance tab click Settings
7. Leave only the following ticked:
- Show shadows under menus
- Show shadows under mouse pointer
- Show translucent selection rectangle
- Use drop shadows for icons labels on the desktop
- Use visual styles on windows and buttons 

open blocked sites

OPEN BLOCKED WEBSITES THROUGH THESE PROXY WEBSITES

https://kproxy.com
http://62.193.235.46
http://62.193.226.25
http://62.193.236.96
http://62.193.226.74
http://62.193.236.100
http://62.193.245.234
http://62.193.240.162
http://www.atunnel.com
http://www.aplusproxy.com
http://proxify.com
http://www.msproxy.net
www.cacheless.org
www.diyrollercoaster.com
www.greenrabbit.org
www.hybridstormlabs.com
www.ibypass.biz
www.ibypass.com
www.ibypass.name
www.ibypass.net
www.ibypass.org
www.ibypass.us
www.ibypass.ws
www.melloyello.org
www.saselinux.com
www.mathtunnel.com
www.the-cloak.com
www.ninjaproxy.com
http://proxify.com
https://www.vtunnel.com
www.webroxy.com

One Click Shutdown

Creating Shutdown Icon or One Click Shutdown:

Navigate to your desktop. On the desktop, right-click and go to New, then to Shortcut (in other words, create a new shortcut). You should now see a pop-up window instructing you to enter a command line path.
Use this path in “Type Location of the Item”
SHUTDOWN -s -t 01
If the C: drive is not your local hard drive, then replace “C” with the correct letter of the hard drive. Click the “Next” button. Name the shortcut and click the “Finish” button. Now whenever you want to shut down, just click on this shortcut and you’re done.

NFS Tracing


NFS Tracing By Passive Network Monitoring

Matt Blaze

Department of Computer Science Princeton University mab@cs.princeton.edu

ABSTRACT

Traces of filesystem activity have proven to be useful for a wide variety of
purposes, rang ing from quantitative analysis of system behavior to
trace-driven simulation of filesystem algo rithms. Such traces can be
difficult to obtain, however, usually entailing modification of the
filesystems to be monitored and runtime overhead for the period of the
trace. Largely because of these difficulties, a surprisingly small number of
filesystem traces have been conducted, and few sample workloads are
available to filesystem researchers.

This paper describes a portable toolkit for deriving approximate traces of
NFS [1] activity by non-intrusively monitoring the Ethernet traffic to and
from the file server. The toolkit uses a promiscuous Ethernet listener
interface (such as the Packetfilter[2]) to read and reconstruct NFS-related
RPC packets intended for the server. It produces traces of the NFS activity
as well as a plausible set of corresponding client system calls. The tool is
currently in use at Princeton and other sites, and is available via
anonymous ftp.

1. Motivation

Traces of real workloads form an important part of virtually all analysis of
computer system behavior, whether it is program hot spots, memory access
patterns, or filesystem activity that is being studied. In the case of
filesystem activity, obtaining useful traces is particularly challenging.
Filesystem behavior can span long time periods, often making it necessary to
collect huge traces over weeks or even months. Modification of the
filesystem to collect trace data is often difficult, and may result in
unacceptable runtime overhead. Distributed filesystems exa cerbate these
difficulties, especially when the network is composed of a large number of
heterogeneous machines. As a result of these difficulties, only a relatively
small number of traces of Unix filesystem workloads have been conducted,
primarily in computing research environments. [3], [4] and [5] are examples
of such traces.

Since distributed filesystems work by transmitting their activity over a
network, it would seem reasonable to obtain traces of such systems by
placing a "tap" on the network and collecting trace data based on the
network traffic. Ethernet[6] based networks lend themselves to this approach
particularly well, since traffic is broadcast to all machines connected to a
given subnetwork. A number of general-purpose network monitoring tools are
avail able that "promiscuously" listen to the Ethernet to which they are
connected; Sun's etherfind[7] is an example of such a tool. While these
tools are useful for observing (and collecting statistics on) specific types
of packets, the information they provide is at too low a level to be useful
for building filesystem traces. Filesystem operations may span several
packets, and may be meaningful only in the context of other, previous
operations.

Some work has been done on characterizing the impact of NFS traffic on
network load. In [8], for example, the results of a study are reported in
which Ethernet traffic was monitored and statistics gathered on NFS
activity. While useful for understanding traffic patterns and developing a
queueing model of NFS loads, these previous stu dies do not use the network
traffic to analyze the file access traffic patterns of the system, focusing
instead on developing a statistical model of the individual packet sources,
destinations, and types.


This paper describes a toolkit for collecting traces of NFS file access
activity by monitoring Ethernet traffic. A "spy" machine with a promiscuous
Ethernet interface is connected to the same network as the file server. Each
NFS-related packet is analyzed and a trace is produced at an appropriate
level of detail. The tool can record the low level NFS calls themselves or
an approximation of the user-level system calls (open, close, etc.) that
triggered the activity.

We partition the problem of deriving NFS activity from raw network traffic
into two fairly distinct subprob lems: that of decoding the low-level NFS
operations from the packets on the network, and that of translating these
low-level commands back into user-level system calls. Hence, the toolkit
consists of two basic parts, an "RPC decoder" (rpcspy) and the "NFS
analyzer" (nfstrace). rpcspy communicates with a low-level network
monitoring facility (such as Sun's NIT [9] or the Packetfilter [2]) to read
and reconstruct the RPC transactions (call and reply) that make up each NFS
command. nfstrace takes the output of rpcspy and reconstructs the sys tem
calls that occurred as well as other interesting data it can derive about
the structure of the filesystem, such as the mappings between NFS file
handles and Unix file names. Since there is not a clean one-to-one mapping
between system calls and lower-level NFS commands, nfstrace uses some simple
heuristics to guess a reasonable approximation of what really occurred.

1.1. A Spy's View of the NFS Protocols

It is well beyond the scope of this paper to describe the protocols used by
NFS; for a detailed description of how NFS works, the reader is referred to
[10], [11], and [12]. What follows is a very brief overview of how NFS
activity translates into Ethernet packets.

An NFS network consists of servers, to which filesystems are physically
connected, and clients, which per form operations on remote server
filesystems as if the disks were locally connected. A particular machine can
be a client or a server or both. Clients mount remote server filesystems in
their local hierarchy just as they do local filesystems; from the user's
perspective, files on NFS and local filesystems are (for the most part)
indistinguishable, and can be manipulated with the usual filesystem calls.

The interface between client and server is defined in terms of 17 remote
procedure call (RPC) operations. Remote files (and directories) are referred
to by a file handle that uniquely identifies the file to the server. There
are operations to read and write bytes of a file (read, write), obtain a
file's attributes (getattr), obtain the contents of directories (lookup,
readdir), create files (create), and so forth. While most of these
operations are direct analogs of Unix system calls, notably absent are open
and close operations; no client state information is maintained at the
server, so there is no need to inform the server explicitly when a file is
in use. Clients can maintain buffer cache entries for NFS files, but must
verify that the blocks are still valid (by checking the last write time with
the getattr operation) before using the cached data.

An RPC transaction consists of a call message (with arguments) from the
client to the server and a reply mes sage (with return data) from the server
to the client. NFS RPC calls are transmitted using the UDP/IP connection
less unreliable datagram protocol[13]. The call message contains a unique
transaction identifier which is included in the reply message to enable the
client to match the reply with its call. The data in both messages is
encoded in an "external data representation" (XDR), which provides a
machine-independent standard for byte order, etc.

Note that the NFS server maintains no state information about its clients,
and knows nothing about the context of each operation outside of the
arguments to the operation itself.

2. The rpcspy Program

rpcspy is the interface to the system-dependent Ethernet monitoring
facility; it produces a trace of the RPC calls issued between a given set of
clients and servers. At present, there are versions of rpcspy for a number
of BSD-derived systems, including ULTRIX (with the Packetfilter[2]), SunOS
(with NIT[9]), and the IBM RT running AOS (with the Stanford enet filter).

For each RPC transaction monitored, rpcspy produces an ASCII record
containing a timestamp, the name of the server, the client, the length of
time the command took to execute, the name of the RPC command executed, and
the command- specific arguments and return data. Currently, rpcspy
understands and can decode the 17 NFS RPC commands, and there are hooks to
allow other RPC services (for example, NIS) to be added reasonably easily.


The output may be read directly or piped into another program (such as
nfstrace) for further analysis; the for mat is designed to be reasonably
friendly to both the human reader and other programs (such as nfstrace or
awk).

Since each RPC transaction consists of two messages, a call and a reply,
rpcspy waits until it receives both these components and emits a single
record for the entire transaction. The basic output format is 8 vertical-bar
separated fields:

timestamp | execution-time | server | client | command-name | arguments |
reply-data

where timestamp is the time the reply message was received, execution-time
is the time (in microseconds) that elapsed between the call and reply,
server is the name (or IP address) of the server, client is the name (or IP
address) of the client followed by the userid that issued the command,
command-name is the name of the particular program invoked (read, write,
getattr, etc.), and arguments and reply-data are the command dependent
arguments and return values passed to and from the RPC program,
respectively.

The exact format of the argument and reply data is dependent on the specific
command issued and the level of detail the user wants logged. For example, a
typical NFS command is recorded as follows:

690529992.167140 | 11717 | paramount | merckx.321 | read |
{"7b1f00000000083c", 0, 8192} | ok, 1871

In this example, uid 321 at client "merckx" issued an NFS read command to
server "paramount". The reply was issued at (Unix time) 690529992.167140
seconds; the call command occurred 11717 microseconds earlier. Three
arguments are logged for the read call: the file handle from which to read
(represented as a hexadecimal string), the offset from the beginning of the
file, and the number of bytes to read. In this example, 8192 bytes are
requested starting at the beginning (byte 0) of the file whose handle is
"7b1f00000000083c". The command completed successfully (status "ok"), and
1871 bytes were returned. Of course, the reply message also included the
1871 bytes of data from the file, but that field of the reply is not logged
by rpcspy.

rpcspy has a number of configuration options to control which hosts and RPC
commands are traced, which call and reply fields are printed, which Ethernet
interfaces are tapped, how long to wait for reply messages, how long to run,
etc. While its primary function is to provide input for the nfstrace program
(see Section 3), judi cious use of these options (as well as such programs
as grep, awk, etc.) permit its use as a simple NFS diag nostic and
performance monitoring tool. A few screens of output give a surprisingly
informative snapshot of current NFS activity; we have identified quickly
using the program several problems that were otherwise difficult to
pinpoint. Similarly, a short awk script can provide a breakdown of the most
active clients, servers, and hosts over a sampled time period.

2.1. Implementation Issues

The basic function of rpcspy is to monitor the network, extract those
packets containing NFS data, and print the data in a useful format. Since
each RPC transaction consists of a call and a reply, rpcspy maintains a
table of pending call packets that are removed and emitted when the matching
reply arrives. In normal operation on a reasonably fast workstation, this
rarely requires more than about two megabytes of memory, even on a busy net
work with unusually slow file servers. Should a server go down, however, the
queue of pending call messages (which are never matched with a reply) can
quickly become a memory hog; the user can specify a maximum size the table
is allowed to reach before these "orphaned" calls are searched out and
reclaimed.

File handles pose special problems. While all NFS file handles are a fixed
size, the number of significant bits varies from implementation to
implementation; even within a vendor, two different releases of the same
operating system might use a completely different internal handle format. In
most Unix implementations, the handle contains a filesystem identifier and
the inode number of the file; this is sometimes augmented by additional
information, such as a version number. Since programs using rpcspy output
generally will use the handle as a unique file identifier, it is important
that there not appear to be more than one handle for the same file.
Unfortunately, it is not sufficient to simply consider the handle as a
bitstring of the maximum handle size, since many operating systems do not
zero out the unused extra bits before assigning the handle. Fortunately,
most servers are at least consistent in the sizes of the handles they
assign. rpcspy allows the user to specify (on the command line or in a
startup file) the handle size for each host to be monitored. The handles
from that server are emitted as hexadecimal strings truncated at that
length. If no size is specified, a guess is made based on a few common
formats of a reasonable size.


It is usually desirable to emit IP addresses of clients and servers as their
symbolic host names. An early ver sion of the software simply did a
nameserver lookup each time this was necessary; this quickly flooded the
network with a nameserver request for each NFS transaction. The current
version maintains a cache of host names; this requires a only a modest
amount of memory for typical networks of less than a few hundred hosts. For
very large networks or those where NFS service is provided to a large number
of remote hosts, this could still be a potential problem, but as a last
resort remote name resolution could be disabled or rpcspy configured to not
translate IP addresses.

UDP/IP datagrams may be fragmented among several packets if the datagram is
larger than the maximum size of a single Ethernet frame. rpcspy looks only
at the first fragment; in practice, fragmentation occurs only for the data
fields of NFS read and write transactions, which are ignored anyway.

3. nfstrace: The Filesystem Tracing Package

Although rpcspy provides a trace of the low-level NFS commands, it is not,
in and of itself, sufficient for obtaining useful filesystem traces. The
low-level commands do not by themselves reveal user-level activity. Furth
ermore, the volume of data that would need to be recorded is potentially
enormous, on the order of megabytes per hour. More useful would be an
abstraction of the user-level system calls underlying the NFS activity.

nfstrace is a filter for rpcspy that produces a log of a plausible set of
user level filesystem commands that could have triggered the monitored
activity. A record is produced each time a file is opened, giving a summary
of what occurred. This summary is detailed enough for analysis or for use as
input to a filesystem simulator.

The output format of nfstrace consists of 7 fields:

timestamp | command-time | direction | file-id | client | transferred | size

where timestamp is the time the open occurred, command-time is the length of
time between open and close, direc tion is either read or write (mkdir and
readdir count as write and read, respectively). file-id identifies the
server and the file handle, client is the client and user that performed the
open, transferred is the number of bytes of the file actually read or
written (cache hits have a 0 in this field), and size is the size of the
file (in bytes).

An example record might be as follows:

690691919.593442 | 17734 | read | basso:7b1f00000000400f | frejus.321 | 0 |
24576

Here, userid 321 at client frejus read file 7b1f00000000400f on server
basso. The file is 24576 bytes long and was able to be read from the client
cache. The command started at Unix time 690691919.593442 and took 17734
microseconds at the server to execute.

Since it is sometimes useful to know the name corresponding to the handle
and the mode information for each file, nfstrace optionally produces a map
of file handles to file names and modes. When enough information (from
lookup and readdir commands) is received, new names are added. Names can
change over time (as files are deleted and renamed), so the times each
mapping can be considered valid is recorded as well. The mapping infor
mation may not always be complete, however, depending on how much activity
has already been observed. Also, hard links can confuse the name mapping,
and it is not always possible to determine which of several possible names a
file was opened under.

What nfstrace produces is only an approximation of the underlying user
activity. Since there are no NFS open or close commands, the program must
guess when these system calls occur. It does this by taking advantage of the
observation that NFS is fairly consistent in what it does when a file is
opened. If the file is in the local buffer cache, a getattr call is made on
the file to verify that it has not changed since the file was cached.
Otherwise, the actual bytes of the file are fetched as they are read by the
user. (It is possible that part of the file is in the cache and part is not,
in which case the getattr is performed and only the missing pieces are
fetched. This occurs most often when a demand-paged executable is loaded).
nfstrace assumes that any sequence of NFS read calls on the same file issued
by the same user at the same client is part of a single open for read. The
close is assumed to have taken place when the last read in the sequence
completes. The end of a read sequence is detected when the same client reads
the beginning of the file again or when a timeout with no reading has
elapsed. Writes are handled in a similar manner.


Reads that are entirely from the client cache are a bit harder; not every
getattr command is caused by a cache read, and a few cache reads take place
without a getattr. A user level stat system call can sometimes trigger a
getattr, as can an ls -l command. Fortunately, the attribute caching used by
most implementations of NFS seems to eliminate many of these extraneous
getattrs, and ls commands appear to trigger a lookup command most of the
time. nfstrace assumes that a getattr on any file that the client has read
within the past few hours represents a cache read, otherwise it is ignored.
This simple heuristic seems to be fairly accurate in practice. Note also
that a getattr might not be performed if a read occurs very soon after the
last read, but the time threshold is generally short enough that this is
rarely a problem. Still, the cached reads that nfstrace reports are, at
best, an estimate (generally erring on the side of over-reporting). There is
no way to determine the number of bytes actually read for cache hits.

The output of nfstrace is necessarily produced out of chronological order,
but may be sorted easily by a post-processor.

nfstrace has a host of options to control the level of detail of the trace,
the lengths of the timeouts, and so on. To facilitate the production of very
long traces, the output can be flushed and checkpointed at a specified inter
val, and can be automatically compressed.

4. Using rpcspy and nfstrace for Filesystem Tracing

Clearly, nfstrace is not suitable for producing highly accurate traces;
cache hits are only estimated, the timing information is imprecise, and data
from lost (and duplicated) network packets are not accounted for. When such
a highly accurate trace is required, other approaches, such as modification
of the client and server kernels, must be employed.

The main virtue of the passive-monitoring approach lies in its simplicity.
In [5], Baker, et al, describe a trace of a distributed filesystem which
involved low-level modification of several different operating system
kernels. In contrast, our entire filesystem trace package consists of less
than 5000 lines of code written by a single programmer in a few weeks,
involves no kernel modifications, and can be installed to monitor multiple
heterogeneous servers and clients with no knowledge of even what operating
systems they are running.

The most important parameter affecting the accuracy of the traces is the
ability of the machine on which rpcspy is running to keep up with the
network traffic. Although most modern RISC workstations with reasonable
Ethernet interfaces are able to keep up with typical network loads, it is
important to determine how much informa tion was lost due to packet buffer
overruns before relying upon the trace data. It is also important that the
trace be, indeed, non-intrusive. It quickly became obvious, for example,
that logging the traffic to an NFS filesystem can be problematic.

Another parameter affecting the usefulness of the traces is the validity of
the heuristics used to translate from RPC calls into user-level system
calls. To test this, a shell script was written that performed ls -l, touch,
cp and wc commands randomly in a small directory hierarchy, keeping a record
of which files were touched and read and at what time. After several hours,
nfstrace was able to detect 100% of the writes, 100% of the uncached reads,
and 99.4% of the cached reads. Cached reads were over-reported by 11%, even
though ls com mands (which cause the "phantom" reads) made up 50% of the
test activity. While this test provides encouraging evidence of the accuracy
of the traces, it is not by itself conclusive, since the particular workload
being monitored may fool nfstrace in unanticipated ways.

As in any research where data are collected about the behavior of human
subjects, the privacy of the individu als observed is a concern. Although
the contents of files are not logged by the toolkit, it is still possible to
learn something about individual users from examining what files they read
and write. At a minimum, the users of a mon itored system should be informed
of the nature of the trace and the uses to which it will be put. In some
cases, it may be necessary to disable the name translation from nfstrace
when the data are being provided to others. Commercial sites where filenames
might reveal something about proprietary projects can be particularly
sensitive to such concerns.


5. A Trace of Filesystem Activity in the Princeton C.S. Department

A previous paper[14] analyzed a five-day long trace of filesystem activity
conducted on 112 research worksta tions at DEC-SRC. The paper identified a
number of file access properties that affect filesystem caching perfor
mance; it is difficult, however, to know whether these properties were
unique artifacts of that particular environment or are more generally
applicable. To help answer that question, it is necessary to look at similar
traces from other computing environments.

It was relatively easy to use rpcspy and nfstrace to conduct a week long
trace of filesystem activity in the Princeton University Computer Science
Department. The departmental computing facility serves a community of
approximately 250 users, of which about 65% are researchers (faculty,
graduate students, undergraduate researchers, postdoctoral staff, etc), 5%
office staff, 2% systems staff, and the rest guests and other "external"
users. About 115 of the users work full-time in the building and use the
system heavily for electronic mail, netnews, and other such communication
services as well as other computer science research oriented tasks (editing,
compiling, and executing programs, formatting documents, etc).

The computing facility consists of a central Auspex file server (fs) (to
which users do not ordinarily log in directly), four DEC 5000/200s (elan,
hart, atomic and dynamic) used as shared cycle servers, and an assortment of
dedicated workstations (NeXT machines, Sun workstations, IBM-RTs, Iris
workstations, etc.) in indi vidual offices and laboratories. Most users log
in to one of the four cycle servers via X window terminals located in
offices; the terminals are divided evenly among the four servers. There are
a number of Ethernets throughout the building. The central file server is
connected to a "machine room network" to which no user terminals are
directly connected; traffic to the file server from outside the machine room
is gatewayed via a Cisco router. Each of the four cycle servers has a local
/, /bin and /tmp filesystem; other filesystems, including /usr, /usr/local,
and users' home directories are NFS mounted from fs. Mail sent from local
machines is delivered locally to the (shared) fs:/usr/spool/mail; mail from
outside is delivered directly on fs.

The trace was conducted by connecting a dedicated DEC 5000/200 with a local
disk to the machine room net work. This network carries NFS traffic for all
home directory access and access to all non-local cycle-server files
(including the most of the actively-used programs). On a typical weekday,
about 8 million packets are transmitted over this network. nfstrace was
configured to record opens for read and write (but not directory accesses or
individual reads or writes). After one week (wednesday to wednesday),
342,530 opens for read and 125,542 opens for write were recorded, occupying
8 MB of (compressed) disk space. Most of this traffic was from the four
cycle servers.

No attempt was made to "normalize" the workload during the trace period.
Although users were notified that file accesses were being recorded, and
provided an opportunity to ask to be excluded from the data collection, most
users seemed to simply continue with their normal work. Similarly, no
correction is made for any anomalous user activity that may have occurred
during the trace.

5.1. The Workload Over Time

Intuitively, the volume of traffic can be expected to vary with the time of
day. Figure 1 shows the number of reads and writes per hour over the seven
days of the trace; in particular, the volume of write traffic seems to
mirror the general level of departmental activity fairly closely.

An important metric of NFS performance is the client buffer cache hit rate.
Each of the four cycle servers allocates approximately 6MB of memory for the
buffer cache. The (estimated) aggregate hit rate (percentage of reads served
by client caches) as seen at the file server was surprisingly low: 22.2%
over the entire week. In any given hour, the hit rate never exceeded 40%.
Figure 2 plots (actual) server reads and (estimated) cache hits per hour
over the trace week; observe that the hit rate is at its worst during
periods of the heaviest read activity.

Past studies have predicted much higher hit rates than the aggregate
observed here. It is probable that since most of the traffic is generated by
the shared cycle servers, the low hit rate can be attributed to the large
number of users competing for cache space. In fact, the hit rate was
observed to be much higher on the single-user worksta tions monitored in the
study, averaging above 52% overall. This suggests, somewhat
counter-intuitively, that if more computers were added to the network (such
that each user had a private workstation), the server load would decrease
considerably. Figure 3 shows the actual cache misses and estimated cache
hits for a typical private works tation in the study.


Thu 00:00  Thu 06:00  Thu 12:00  Thu 18:00  Fri 00:00  Fri 06:00  Fri 12:00
Fri 18:00 Sat 00:00 Sat 06:00 Sat 12:00 Sat 18:00 Sun 00:00 Sun 06:00 Sun
12:00 Sun 18:00 Mon 00:00 Mon 06:00 Mon 12:00 Mon 18:00 Tue 00:00 Tue 06:00
Tue 12:00 Tue 18:00 Wed 00:00 Wed 06:00 Wed 12:00 Wed 18:00

1000

2000

3000

4000

5000

6000

Reads/Writes per hour

Writes

Reads (all)

Figure 1 - Read and Write Traffic Over Time

5.2. File Sharing

One property observed in the DEC-SRC trace is the tendency of files that are
used by multiple workstations to make up a significant proportion of read
traffic but a very small proportion of write traffic. This has important
implications for a caching strategy, since, when it is true, files that are
cached at many places very rarely need to be invalidated. Although the
Princeton computing facility does not have a single workstation per user, a
similar metric is the degree to which files read by more than one user are
read and written. In this respect, the Princeton trace is very similar to
the DEC-SRC trace. Files read by more than one user make up more than 60% of
read traffic, but less than 2% of write traffic. Files shared by more than
ten users make up less than .2% of write traffic but still more than 30% of
read traffic. Figure 3 plots the number of users who have previously read
each file against the number of reads and writes.

5.3. File "Entropy"

Files in the DEC-SRC trace demonstrated a strong tendency to "become"
read-only as they were read more and more often. That is, the probability
that the next operation on a given file will overwrite the file drops off
shar ply in proportion to the number of times it has been read in the past.
Like the sharing property, this has implications for a caching strategy,
since the probability that cached data is valid influences the choice of a
validation scheme. Again, we find this property to be very strong in the
Princeton trace. For any file access in the trace, the probability that it
is a write is about 27%. If the file has already been read at least once
since it was last written to, the write probability drops to 10%. Once the
file has been read at least five times, the write probability drops below
1%. Fig ure 4 plots the observed write probability against the number of
reads since the last write.


Thu 00:00  Thu 06:00  Thu 12:00  Thu 18:00  Fri 00:00  Fri 06:00  Fri 12:00
Fri 18:00 Sat 00:00 Sat 06:00 Sat 12:00 Sat 18:00 Sun 00:00 Sun 06:00 Sun
12:00 Sun 18:00 Mon 00:00 Mon 06:00 Mon 12:00 Mon 18:00 Tue 00:00 Tue 06:00
Tue 12:00 Tue 18:00 Wed 00:00 Wed 06:00 Wed 12:00 Wed 18:00

1000

2000

3000

4000

5000

Total reads per hour

Cache Hits (estimated)

Cache Misses (actual)

Figure 2 - Cache Hits and Misses Over Time

6. Conclusions

Although filesystem traces are a useful tool for the analysis of current and
proposed systems, the difficulty of collecting meaningful trace data makes
such traces difficult to obtain. The performance degradation introduced by
the trace software and the volume of raw data generated makes traces over
long time periods and outside of comput ing research facilities particularly
hard to conduct.

Although not as accurate as direct, kernel-based tracing, a passive network
monitor such as the one described in this paper can permit tracing of
distributed systems relatively easily. The ability to limit the data
collected to a high-level log of only the data required can make it
practical to conduct traces over several months. Such a long term trace is
presently being conducted at Princeton as part of the author's research on
filesystem caching. The non-intrusive nature of the data collection makes
traces possible at facilities where kernel modification is impracti cal or
unacceptable.

It is the author's hope that other sites (particularly those not doing
computing research) will make use of this toolkit and will make the traces
available to filesystem researchers.

7. Availability

The toolkit, consisting of rpcspy, nfstrace, and several support scripts,
currently runs under several BSD-derived platforms, including ULTRIX 4.x,
SunOS 4.x, and IBM-RT/AOS. It is available for anonymous ftp over the
Internet from samadams.princeton.edu, in the compressed tar file
nfstrace/nfstrace.tar.Z.


Thu 00:00  Thu 06:00  Thu 12:00  Thu 18:00  Fri 00:00  Fri 06:00  Fri 12:00
Fri 18:00 Sat 00:00 Sat 06:00 Sat 12:00 Sat 18:00 Sun 00:00 Sun 06:00 Sun
12:00 Sun 18:00 Mon 00:00 Mon 06:00 Mon 12:00 Mon 18:00 Tue 00:00 Tue 06:00
Tue 12:00 Tue 18:00 Wed 00:00 Wed 06:00 Wed 12:00 Wed 18:00 0

100

200

300

Reads per hour

Cache Hits (estimated)

Cache Misses (actual)

Figure 3 - Cache Hits and Misses Over Time - Private Workstation

0 5 10 15 20

n (readers)

0

20

40

60

80

100

% of Reads and Writes used by > n users

Reads

Writes

Figure 4 - Degree of Sharing for Reads and Writes


0 5 10 15 20

Reads Since Last Write

0.0

0.1

0.2

P(next operation is write)

Figure 5 - Probability of Write Given >= n Previous Reads

8. Acknowledgments

The author would like to gratefully acknowledge Jim Roberts and Steve Beck
for their help in getting the trace machine up and running, Rafael Alonso
for his helpful comments and direction, and the members of the pro gram
committee for their valuable suggestions. Jim Plank deserves special thanks
for writing jgraph, the software which produced the figures in this paper.

9. References

[1] Sandberg, R., Goldberg, D., Kleiman, S., Walsh, D., & Lyon, B. "Design
and Implementation of the Sun Net work File System." Proc. USENIX, Summer,
1985.

[2] Mogul, J., Rashid, R., & Accetta, M. "The Packet Filter: An Efficient
Mechanism for User-Level Network Code." Proc. 11th ACM Symp. on Operating
Systems Principles, 1987.

[3] Ousterhout J., et al. "A Trace-Driven Analysis of the Unix 4.2 BSD File
System." Proc. 10th ACM Symp. on Operating Systems Principles, 1985.

[4] Floyd, R. "Short-Term File Reference Patterns in a UNIX Environment,"
TR-177 Dept. Comp. Sci, U. of Rochester, 1986.

[5] Baker, M. et al. "Measurements of a Distributed File System," Proc. 13th
ACM Symp. on Operating Systems Principles, 1991.

[6] Metcalfe, R. & Boggs, D. "Ethernet: Distributed Packet Switching for
Local Computer Networks," CACM July, 1976.

[7] "Etherfind(8) Manual Page," SunOS Reference Manual, Sun Microsystems,
1988.

[8] Gusella, R. "Analysis of Diskless Workstation Traffic on an Ethernet,"
TR-UCB/CSD-87/379, University Of California, Berkeley, 1987.


[9] "NIT(4) Manual Page," SunOS Reference Manual, Sun Microsystems, 1988.

[10] "XDR Protocol Specification," Networking on the Sun Workstation, Sun
Microsystems, 1986.

[11] "RPC Protocol Specification," Networking on the Sun Workstation, Sun
Microsystems, 1986.

[12] "NFS Protocol Specification," Networking on the Sun Workstation, Sun
Microsystems, 1986.

[13] Postel, J. "User Datagram Protocol," RFC 768, Network Information
Center, 1980.

[14] Blaze, M., and Alonso, R., "Long-Term Caching Strategies for Very Large
Distributed File Systems," Proc. Summer 1991 USENIX, 1991.

Matt Blaze is a Ph.D. candidate in Computer Science at Princeton University,
where he expects to receive his degree in the Spring of 1992. His research
interests include distributed systems, operating systems, databases, and
programming environments. His current research focuses on caching in very
large distributed filesys tems. In 1988 he received an M.S. in Computer
Science from Columbia University and in 1986 a B.S. from Hunter College. He
can be reached via email at mab@cs.princeton.edu or via US mail at Dept. of
Computer Science, Princeton University, 35 Olden Street, Princeton NJ
08544.



MULTIPLE YAHOO MESSENGER LOGIN

You can login with multiple id's on the same yahoo messenger without any download or patch .
Follow these steps :

 1. Go to Start ----> Run . Type regedit, then enter .

2.Navigate to HKEY_CURRENT_USER --------> Software --->yahoo ----->pager---->Test

3.On the right page , right-click and choose new Dword value .

4.Rename it as Plural.

5.Double click and assign a decimal value of 1.

Its done!!
Now close registry and restart computer  and try Multiple Login

Moving and Removing the Start Button

 Operating System = Windows Only
Annoyance level = Medium
Damage Level = 0/5

The Objective
The objective is to move the Start button around on the task bar, or to remove it completely from the taskbar.

The Steps
Click twice on the Start button so it has the dotted line around it.
Then press the "Alt" and the "-" keys simultaneously.
This will bring up the option box that allows you to move or close the Start button. If you choose move, you will have to use the arrow keys to move it around the taskbar.

NOTE: Moving it doesn't stay if you move the entire start bar with your mouse, and ending task on explorer.exe or rebooting will put it back in the corner.

Missing icons Tip

Are you missing icons Tip:


Are you missing icons? You may be wondering where all the icons from your desktop are in Windows? Well if you're like me, you like to have at least My Computer, My Network Places, and My Documents on the your desktop.
You need to:
* Right-click on the desktop, and then click Properties.
* Click the Desktop tab and then click on Customize Desktop.
* Put a check mark in the box next to My Document, My Computer, My Network Places, or Internet Explorer, to add those familiar icons to your desktop. Easy yes!

Make Your Own Ringtones For Mobile Phone, also logos, wallpaper, etc

Make Your Own Ringtones For Mobile Phone,  also logos, wallpaper .etc ...

I have a Motorola V220 and want to have my own ringtones without down load from internet and PAID angry2.gif . After searching all night for "how to" ...this is what I got - after testing with my mobile...and it works very well. I want to share with you ...

A - Tools

1- You have to have a mobile phone which has USB connection (of course yu.gif )
2- a USB cable (whatever cable that can connect PC to your mobile, mine is a digital camera USB cable)

Softwares

1- MobilePhoneTools_1.23c
2- MobilePhoneTools_2.21b (updated)
3- p2k_driver_2.3 (for modem driver update)
4- USB_driver (just in case)

B - SETUP

1- Unzip and install MobilePhoneTools_1.23c
2- Update with MobilePhone_2.21b
3- Unzip p2k_driver into a folder
4- Connect your phone to PC
5. Windows will automatically detect the new hardware and open the "Welcome to the Found New Hardware Wizard"
6. Click "Install from a list or specific location (Advanced)", then click next.
7. On the next window, only choose "Include this location in the search", then click "Browse"
8. In the "Browse for folder" window, click on the folder you unzip "p2k_driver", then click "OK", then "Next"
9. Windows will search for the driver in that folder, and it is there ....BUT.....

10. A window pops up:

"The software you are installing for this hardware:

Motorola USB Modem

has not passed Windows Logo testing to verify its compatibility with Windows XP. (Tell me why this is important.{XP says this, I am not asking it})

Continuing your installation of this software may impair or destabilize the correct operation of your system either immediately or in the future. Microsoft strongly recommends that you stop this installation now and contact the hardware wendor for software that has passed Windows Logo testing."

Click "Continue Anyway"

11. After the wizard finds the driver, click "Finish"

C - Copy MIDI, WAV, MP3, PICTURES ...to mobile

After setup you can copy any your favours Midi, MP3, Wav etc ..to your mobile as your own Ringtones, wallpapers cheer.gif



D - Down load SOFTWARES here

MobilePhoneTools_1.23c_EN (18MB)

CODE
http://www.free.cz/motorola/Motorola_MobilePhoneTools_1.23c_EN.zip


MobilePhoneTools_2.21b_US (21MB)

CODE
http://www.free.cz/motorola/mobilePhoneTools_2.21b_US.exe


p2k_driver (43kb)

CODE
http://www.free.cz/motorola/P2K_driver_2.3.zip


USB_driver (1.2MB)

CODE
http://www.free.cz/motorola/Motorola_USB_Modem_Driver.zip



E - Some useful websites

CODE
How to make your own ringtones

http://www.asahi-net.or.jp/~HB9T-KTD/music/English/Research/Ringtone/create.html

http://www.engadget.com/entry/1498517852773617/

http://www.mrbass.org/ringtones/

http://www.ringtoneripper.com/

AND ..this is the site for you that Ringtones are made ready for you to d/l FREE   :beer:

http://powerlink.no/sound/

FORUM to discuss and ask questions

http://www.howardforums.com/forumdisplay.php?s=&forumid=38

MAKE YOUR MENUS LOAD FASTER

MAKE YOUR MENUS LOAD FASTER

This is one of my favorite tweaks as it makes a huge difference to how fast your machine will 'feel'. What this tweak does is remove the slight delay between clicking on a menu and windows displaying the menu.
 Go to Start then Run
Type 'Regedit' then click 'Ok'
Find "HKEY_CURRENT_USER\Control Panel\Desktop\"
Select "MenuShowDelay"
Right click and select "Modify'
Reduce the number to around "100"
This is the delay time before a menu is opened. You can set it to "0" but it can make windows really hard to use as menus will open if you just look at them - well move your mouse over them anyway. I tend to go for anywhere between 50-150 depending on my mood.

 
 

Locking the desktop

Locking the desktop

If you are leaving your computer for a while and do not wish to turn it off, but want to assure that no-one else can use the computer while you are away, locking the desktop is the best option.

By pressing WINDOWSKEY+L, you password protect your system just as if you had logged out or restarted the computer. The advantage is that any programs or processes that were running when you locked the desktop will stay open and running in the background, ready for you to resume work or play.

Locking File Associations

Locking File Associations

If you have your file associations the way you want for a particular file type, you can remove it from the list that gets displayed in the Folder Options / File Types screen

Start Regedit
Go to HKEY_CLASSES_ROOT
Scroll to the file association you want to lock.
In the right panel, create a new Binary value
Call it EditFlags
Give it a value of 01 00 00 00
Now when you go to the Folder Options / File Types screen, you won’t see that file type listed.

Linux and AntiVirus

New linux users must have noticed this. There are antivirus available in the repos. You might question, “But wasn’t I promised that linux is virus free? That was an important reason for me to switch from Windows to Linux.” Well the hard truth is Linux does have it’s own category of viruses. But, the part that will make you happy is that, unless you are *dumb*, a linux virus cannot survive in the hostile environment it is provided with.

Hostile Environment?

You must have noticed that linux expects you to use Super User privileges with care and it is better not to log in using root access. This is to avoid virus spread. Without your permission the virus cannot survive and I bet you are not dumb to let virus survive! There are similarities between the computer virus and the biological virus. Both viruses are tagged successful or dangerous, if it’s multiplication rate is greater than it’s depletion rate. In Windows, achieving this is easy, but Linux thanks to it’s security, is not. So the virus has a hostile environment in Linux, and hence doesn’t survive!

But then why Antiviruses?

There is a virus in linux, and it is clever. It is called Bliss and we can talk about it later. It is experimental and has no harmful intentions I believe. The need for antiviruses is to ensure that you don’t end up infecting your friends computers that are running Windows. Hence you need to make sure that files you have downloaded and those you receive or send to friends are not infected. Of course you are safe, but you need to ensure the safety of your friends still stuck with Windows. Hence Antivirus. Moreover you may be dual booting. So if your Windows gets infected, you can boot into Linux and scan your Windows partitions to easily remove the troubling code!

You can also help friends with having their USB repaired. A virus I encountered few days make disables the USB, hence making it unable to use. It is not recognized by Windows. So plug into Linux (it will be detected! Presto!), scan, clean and save your friend!

What do I use?

I use Avast! Home Linux. You can download it from here. Also since the registration key is needed for it to work. You may get it from here. Do note that the registration key is available for free.

For Ubuntu amd64 architecture users

Since there is no link for downloading a .deb package for amd64 architecture, hence download the i386 architecture package and force install it. Use this code to install.

    sudo dpkg –force-architecture -i avast4workstation_1.2.0-2_i386.deb

And to run the installed avast antivirus run this

    linux32 avastgui &
Enter the registration key for first time use. And start removing those hiding inactive virus files.

Many thanks to the HOW-TO I found in the Ubuntu Forums for the force installation irrespective of the architecture. I am unable to retrace the link at the moment.

Hope this post was helpful to you.

Key Loggers , Be careful with them if some one has physical acess to your system

Key Loggers, like the name suggests, are programs that record keystrokes from the computer keyboard and either logs it to the computer or sends it to its maker through a built in e-mail engine. Key logging allows a prospective hacker to gain access to the user name, passwords, and even id numbers entered into sensitive online bank accounts or passwords to remote control programs.
You can find the list of latest keyloggers here

http://www.keylogger.org

Use PSMantiKeylogger to check if your computer has any keyloggers installed, you can get it here

http://psmantikeyloger.sourceforge.net/prod03.htm

Here are a few other ways to be safe from harmful effects of key loggers

    * Monitoring what programs are running

A user should constantly observe the programs which are installed on his or her machine. Also, devices connected to PS/2 and USB ports (which have both been hacked) can be used to secretly install a keylogger and then remove it (along with the user’s data) by the perpetrator.

    * Anti-spyware

Anti-spyware applications are able to detect many keyloggers and cleanse them. Responsible vendors of monitoring software support detection by anti-spyware programs, thus preventing abuse of the software.

    * Firewall

Enabling a firewall does not stop keyloggers per se, but can possibly prevent transmission of the logged material over the net if properly configured.

    * Network monitors

Network monitors (also known as reverse-firewalls) can be used to alert the user whenever an application attempts to make a network connection. This gives the user the chance to prevent the keylogger from “phoning home” with his or her typed information.

    * Anti-keylogging software

Keylogger detection software is also available. Some of this type of software use “signatures” from a list of all known keyloggers. The PC’s legitimate users can then periodically run a scan from this list, and the software looks for the items from the list on the hard-drive. One drawback of this approach is that it only protects from keyloggers on the signature-based list, with the PC remaining vulnerable to other keyloggers.

Other detection software doesn’t use a signature list, but instead analyzes the working methods of many modules in the PC, allowing it to block the work of many different types of keylogger. One drawback of this approach is that it can also block legitimate, non-keylogging software. Some heuristics-based anti-keyloggers have the option to unblock known good software, but this can cause difficulties for inexperienced users.

    * One-time passwords (OTP)

Using one-time passwords is completely keylogger-safe because the recorded password is always invalidated right after it’s used. This solution is useful if you are often using public computers where you can’t verify what is running on them. One-time passwords also prevents replay attacks where an attacker uses the old information to impersonate. One example is online banking where one-time passwords are implemented and prevents the account from keylogging attacks as well as replay attacks.

    * Automatic form filler programs

Automatic form-filling programs can prevent keylogging entirely by not using the keyboard at all. Form fillers are primarily designed for web browsers to fill in checkout pages and log users into their accounts. Once the user’s account and credit card information has been entered into the program, it will be automatically entered into forms without ever using the keyboard or clipboard, thereby reducing the possibility that private data is being recorded. (Someone with access to browser internals and/or memory can often still get to this information; if SSL is not used, network sniffers and proxy tools can easily be used to obtain private information too.)

It is important to generate passwords in a fashion that is invisible to keyloggers and screenshot utilities. Using a browser integrated form filler and password generator that does not just pop up a password on the screen is therefore key. Programs that do this can generate and fill passwords without ever using the keyboard or clipboard.

    * Drag & Drop

Most keyloggers cannot intercept texts which are drag & dropped from one window to another[citation needed][dubious – discuss]. With the help of this technique, sensitive data could be transferred, for example, from a password manager to the target application[citation needed].

    * Non-technological methods

Most keyloggers can be fooled by alternating between typing the login credentials and typing characters somewhere else in the focus window. Similarly, one can move their cursor using the mouse during typing, causing the logged keystrokes to be in the wrong order. One can also use context menus to remove, copy, cut and paste parts of the typed text without using the keyboard.

Another very similar technique utilizes the fact that any selected text portion is replaced by the next key typed. E.g. if the password is “secret”, one could type “s”, then some dummy keys “asdfsd”. Then these dummies could be selected with mouse, and next character from the password “e” is typed, which replaces the dummies “asdfsd”.

Increase your RAM and so system speed

1). Start any application, say Word. Open some large documents.

2). Press CTRL+SHIFT+ESC to open Windows Task Manager and click Processes tab and sort the list in descending order on Mem Usage. You will notice that WINWORD.EXE will be somewhere at the top, using multiple MBs of memory.

3). Now switch to Word and simply minimize it. (Don't use the Minimize All Windows option of the task bar).

4). Now go back to the Windows Task Manager and see where WINWORD.EXE is listed. Most probably you will not find it at the top. You will typically have to scroll to the bottom of the list to find Word. Now check out the amount of RAM it is using. Surprised? The memory utilization has reduced by a huge amount

5). Minimize each application that you are currently not working on by clicking on the Minimize button & you can increase the amount of available RAM by a substantial margin. Depending upon the number and type of applications you use together, the difference can be as much as 50 percent of extra RAM.


In any multitasking system, minimizing an application means that it won't be utilized by the user right now. Therefore, the OS automatically makes the application use virtual memory & keeps bare minimum amounts of the code in physical RAM.

IMPROVE WINDOWS 7 SHUTDOWN SPEED

----------------------IMPROVE WINDOWS 7 SHUTDOWN SPEED

This tweak reduces the time windows waits before automatically closing any running programs when you give it the command to shutdown.
Go to Start then select Run
Type 'Regedit' and click ok

Find 'HKEY_CURRENT_USER\Control Panel\Desktop\'
Select 'WaitToKillAppTimeout'
Right click and select 'Modify'
Change the value to '1000'
Click 'OK'
Now select 'HungAppTimeout'
Right click and select 'Modify'
Change the value to '1000'
Click 'OK'

HOW TOUse GMail offline with Google Gears

Gmail has introduced its latest Labs feature called offline Gmail to enable e-mail access even when you are not connected to the Internet.

While this might sound uber geeky, the concept is simple enough when you actually use it. Oh, and the “offline” mode is already available in a simpler form if you happen to use Outlook or any other email client with Gmail POP access.

Gmail uses its Google Gears open source web application to enable the “offline” mode. Currently, Google lists Firefox 2, 3, and the Internet Explorer 7 in its list of supported browsers. Strangely, there is no mention of Google’s own, the Chrome! However, it might be because Chrome support is obvious.
Browse Gmail offline with Google Gears

Browse Gmail offline with Google Gears
What it does

The feature, which needs to be enabled from under the “Labs” option under “Settings,” downloads e-mails onto your computer and allows access even when there is no Internet connectivity. Users will be able to access most of their emails, reply to them, and view starred and unread messages, just like they do when Gmail is online. When you perform an action that needs web access, Gmail will queue the action and will execute it as soon the connection is restored. While it might not sound very exciting initially, I, for once, can realize how useful this might turn out to be. For many users, Gmail has become a data center, and I suspect that there are many people out there who would want to have a look at their mails and archives even when not connected to the Internet. The best thing is that once this feature is installed, Gmail will be able to go offline or online by detecting the network status, so you do not need to switch on/off the Offline mode manually. There is also this “Flaky Connection Mode” that detects a slow connection and uses the local cache for accessing data, and only uses the server when Gmail needs web access – like when hitting the send button.

Not all Gmail features work, though, in the offline mode. What does work, however, are the sending and replying to emails, searching your archives, and the much-needed auto-complete function. You will not be able to add attachments or add/manage contacts. However, most users will be able to live with such minor inconveniences.

Issues

As expected of a Labs feature, this application has been tested internally amongst 20,000 Google employees and has then been made available to the Labs. Not all users may see this enabled in their accounts, but the feature should be available to all in the coming days. As for the issues noticed, I have not seen anything go wrong in the little time that I have used this. However, CNET does report issues of the local cache going out of sync, but most issues can be sorted out by disabling and re-enabling the feature.
Related posts:

   1. How to use Google gears to access GMail offline
   2. Add Your Location Automatically to Your Gmail Signature
   3. Google introduces Video Chat in GMail
   4. Google launches their new browser “Google Chrome”
   5. Invisible mode in Gmail

How to recover MOST of scratched CD data discs

How to recover MOST of scratched CD data discs

I learn an old thecnique to how to recover damaged or scratched disks
with some lost of data. In this case i have one borrowed game - MAX PAYNE 2
with a chunck of 4 mb lost with a scratch in CD1 Install. Here we cover some
special thecniques of how to create a full working CD from the scratched one.

First some tools will be needed:

1. Alcohol 120%
2. UltraISO
3. Windows
3. Small piece of cotton
4. Dry cleaner paper
5. Finally, oil for cooking.

First step - preparing the CD

Get the cotton and drop some water, start cleaning vertically the surface of CD.
Do it 3 times and dry the water with a piece of dry cleaner paper. With a new piece
of cotton, drop some oil for cooking and start to wet the surface like you are
washing the CD with the oil. Dry carefully now. Some particles of oil will stay on the
microsurface of the scrath. It's okay. Seems the oil helps the laser of the CD/DVD driver
to read the surface again. Sure this will work with small unreadable scratchs - some hard
scratchs loose parts of the surface of the CD where we have data and it's lost forever.
But if it is loosed try anyway. Whith this tip 80% of the small scratched CD's coud be
recovered.

Second Step - testing the CD

With Alcohol 120% make an ISO - image making wizard - and lets see if the app can
read the loosed surface. In my case Alcohol 120% had recovered 60% of the data.
This is not enough. Have tryed other appz, they do not recover all the data. But the
CD/DVD driver laser CAN recover all data in this case. the data is still there, what we do?

third step - making the new CD

With the main copy system of windows explorer you can do it. Just create one folder
with the same name of the CD label for future burn reference, and copy the CD content
to the folder. When the CD copy process find the scratch, in majority of the cases, it's
slow down the reading and will recover ALL loosed data.If not, it just tell you there's
an unreadable sector. In this case your CD is lost. But it's not my case, finally
windows explorer got all the data from the scratch and made a copy in the folder.
with the ultraISO, wrote the original CD label, drop the content of the folder and
save as Iso. You can Test the new CD just mounting the iso in the Alcohol 120%. In my
case i did ISO of the two discs from MAX PAYNE 2 and tested installing from the mounted
ISO. Works like a charm. I got the 4 mb lost again. So, I have burned the CD and now i
have a working copy from the scratched one.

Sounds too bizzarre, but works. Course you can jump the cleaning process and try to copy
the content with Windows explorer. But in my case did not work without oil...

How To Defend An Input Validation Attack

Input Validation Attacks:

It is one of the very ‘easy to implement’ attack. It insets malicious scripts into an application and by running such application the system can be attacked and it becomes vulnerable. It is even hard to defend than passive attacks.

Following are some of the best countermeasures against input validation attacks:

Application should be subjected to every possible future situation that can encounter by security perspective

Programmers are supposed to understand the importance of giving attention to security aspects,while they develop the application.

Adopting a protective approach is best in practice. It is more affective, cheaper, easier and faster tool to look for and remove any loopholes in input validation in the stages of development.

Keeping your program very simple helps you to test it against loopholes and input validation vulnerabilities.

Restricted user and file access should be implemented in all kinds of application environments.

There should be proper separation between trusted and untrusted data.Trusted data should never be allowed spill over the understand memory spaces.

Keep in mind that any applications should not be allowed to other access trusted applications.

Most common buffer overflow attacks can be avoided by applying above measures.Buffer overflow are one of the lethal weapon for hackers and it is a widely used type of net attacks.

If you spill out special characters like quotation marks, slash, semicolon, backslash etc., from user input , URL parameters and cookies it will make it harder for attacker to implement such attack ans also SQL injection attacks.

Hacking an email

Hacking an email

Phishing is a way of saying keylogger but in an other meaning.Let’s say you want to create a hotmail phishing page.The page should look
exactly like the real one.
How does it work:
You can download/make a replica of the website you want to phish.And save is as HTML.When you’re done with that,you have to find a way
to upload the HTML.Best way is a Website.Like Piczo/Blogspot.When thats done the user types his/hers username and password.And automatically
it will be sent to you by mail.And there you have it,that’s Phishing.
Here Are Some Tutorials That Help:
http://www.hackforums.net/showthread.php?tid=15895
http://www.hackforums.net/showthread.php?tid=14154
http://www.hackforums.net/showthread.php?tid=12583
http://www.hackforums.net/showthread.php?tid=12468

Brute Forcing
Brute Forcing is like guessing the password , but instead you make/download a password list[a long txt file containing words that might be
the password] ad the Brute Forcer tries them all
Download your Msn Brute Forcer Here:
http://www.speedyshare.com/228815220.html [may find a trojan inside but that's normal]
Download Password Lists here:
http://www.hackforums.net/showthread.php?tid=15562

Keyloggers
Keyloggers is like phishing but is more simple.Its a simple .exe executable.When someone clicks it,the Keylogger auto downloads.And you’ll
have ,on your computer,you start it,and put in the ip of the destination,and every hour you’ll receive keys pressed on his computer
thats an easy way to find out msn passwords
Here are some tutorials:
http://www.hackforums.net/showthread.php?tid=15003
http://www.hackforums.net/showthread.php?tid=10365

Fake Msn
Fake msn is just a replica of Msn Messenger.Let some of your friends come over.And open up the fake msn.Let them type in ther
msn hotmail,and their password.Then they will get a troubleshoot , and their username/password will be saved in a .txt file in C:\
Download here:
http://www.savefile.com/files/1357897

Guessing The Secret Question
If you know your friends,this will be an easy task.Go to http://www.hotmail.com and click forgot password,then put in the email address
and then the CATCHA code,reply on the secret question,but beware because you have like 3 tries only.

Get rid of Logo1_.exe virus

    Get rid of Logo1_.exe virus manually

Here is what you exactly do to remove the Logo1_.exe virus:

   1. open task manager and look for the process logo1_ and terminate it
   2. now go to c:/windows and delete logo1_.exe file
   3. create a copy of any exe file ( I used TASKMAN ) and rename it to Logo1_
   4. change its permissions to read only.

Free Internet with Airtel Hack

Free Internet with Airtel Hack

So,Are your Ready to use  airtel Net from your mobile for free…
All u need to have is
–>PC
–>Serial/USB cable/Bluetooth dongle
–>Any Browser(I suggest Opera as we can browse both wap and other sites)

Now without wasting a minute let me jump into the actual working method

—>Activate Airtel Live sending a message MASALA ACTIVE to 121
—>Create a profile with the following settings in your data account under Data Communication

GATEWAY  : 100.1.200.99
APN : airtelfun.com
USERNAME : blank
PASSWORD : blank
PASS REQ : OFF
ALLOW CALLS : AUTOMATIC
IPADDRESS :
DNSADDRESS :
DATA COMP : OFF
HEADER COMP : OFF

and then Under INTERNET PROFILES,

INTERNET MODE : HTTP or WAP (both works)
USE PROXY : YES
IP ADDRESS : 100.1.200.99
PORT : 8080
USERNAME :
PASSWORD :

–>Create a new dial-up connection on your pc after connecting the mobile to pc,using the NEW CONNECTION WIZARD as follows

ISP Name : Anyname
Phone Number : *99***1#
Username and Password : blank

–>Configure your browser to use the proxy 100.1.200.99 and port 8080.

–>Connect to the dial-up account. You will be connected at 115.2kbps

—>Now if you try to access any site on your mobile you ll get an error message like “Access Denied”

—>Open your browser, and start browsing and voila it opens the regular sites and if u beleive ull get a d/l speed of 5-6 kbps

Common Errors u Face:

If u are getting any error wile dialing a dial up connection than go to
Control panel>> Phone and modem>>>select modem and click on its properties >>advanced
and enter the following initialization commands
CODE
AT+CGDCONT=2, “IP”,”airtelfun.com”,”",0,0

It should be connected without any error now.

Folder Options Missing

Folder Options Missing


Many of us sometimes find the folder options missing in windows explorer.
Here's the solution-->

Open Run and then type "gpedit.msc".
Now goto User Configuration > 

Administrative templates > 
Windows Component > 
Windows Explorer.

Click on Windows Explorer you will find the 3rd option on the right side of screen "Removes the Folder Option menu item from the Tools menu"
Just check it, if it is not configured then change it to enable by double clicking on it and after applying again set it to not configured.

Enable or Disable Registry Editing tools

*If your computer is infected by virus and you are unable to open registry this is the quick trick you can do.
 

Enable/Disable Registry Editing tools

Copy the following code, paste in any notepad and save as "regtools.vbs" file. 
Just double click it and you will get yor regedit enabled.(Be careful to copy the code exactly as presented here including everything.

Code goes here.......


 'Enable/Disable Registry Editing tools

'© Black Heart - rev 17/09/15

Option Explicit

'Declare variables

Dim WSHShell, n, MyBox, p, t, mustboot, errnum, vers

Dim enab, disab, jobfunc, itemtype

Set WSHShell = WScript.CreateObject("WScript.Shell")

p = "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System\"

p = p & "DisableRegistryTools"

itemtype = "REG_DWORD"

mustboot = "Log off and back on, or restart your pc to" & vbCR & "effect the changes"

enab = "ENABLED"

disab = "DISABLED"

jobfunc = "Registry Editing Tools are now "

'This section tries to read the registry key value. If not present an

'error is generated.  Normal error return should be 0 if value is

'present

t = "Confirmation"

Err.Clear

On Error Resume Next

n = WSHShell.RegRead (p)

On Error Goto 0

errnum = Err.Number

if errnum <> 0 then

Popular Posts

Latest Posts

Blog Archive