You are on page 1of 31

Techiesupport Monthly Magazine-February2012

Techiesupport, by SriramRayarao
___________________________________________________________________ The knowledge and abilities needed to accomplish mathematical, engineering, scientific or computer-related duties, as well as other specific tasks. Those with technical skills are often referred to as technicians in their chosen field, Hope this book will help you to increase your technical knowledge. Source:-The content in this book was taken from www.techiesupport.wordpress.com. Copying this content is strictly prohibited. ------------------------------------------------------------------------------------------------------------Copyright 2012 Techiesupport All Rights Reserved

Techiesupport Monthly Magazine-February2012

Contents ____________________________________________________ 1. Hacking FAQS 2. How To Find Your IP Address 3. Track GF/BF Mobile For Free. 4. How To Block Websites Without Software 5. How To Convert Webpage to Pdf 6. FireFox Speed Tweaks To Max-100% Works 7. Why Hackers Use Linux ? 8. How To Hack Yahoo Password 9. Truth About Hacking Gmail,Yahoo,Facebook etc (part-1) 10.Sony Xperia Tipo-Latest Review.

--------------------------------------------------------------------------------Copyright 2012 Techiesupport All Rights Reserved

Techiesupport Monthly Magazine-February2012

Hacking FAQS

____________________________________________________
Here I provide the answers for the most recently asked questions regarding hacking Q.What is hacking? A.Hacking is the art of breaking into computers to gain knowledge that our society has hidden from us. Hacking is illegal and the government spend lots of money each year to have hackers arrested..when they should be spending the money on more important issues. Q. What is a shadowed password? A.A shadowed password is a cover for the real password file. It shows that the real password is hidden somewhere else. Q.How do I crack shadowed passwords? A.Cracking a shadowed password file is impossible. Assuming that you got the password file via anonymous ftp. You should try connecting to port 25 and doing the sendmail bug. Q.What is the difference between an encrypted password and a shadowed password? A.An encrypted password is just the real password scrambled and changed. It can be cracked with a password cracked and a word file. A shadowed password hides the encrypted password somewhere else other than the etc. dir.

--------------------------------------------------------------------------------------------------Copyright 2012 Techiesupport All Rights Reserved

Techiesupport Monthly Magazine-February2012 Q. What is an exploit? A.An exploit is something that exploits UNIX or another kind of OS. You usually use exploits to gain root or high access to a system. They can prove to be very handy. Q. What are some basic telnet commands? A.Below is a list of common telnet commands. Command access account c Connect to a host cont d Disconnect full echo half Terminal echo hangup up mail set PAD parameters Hangs Mail Select Network Continue Function Telnet

--------------------------------------------------------------------------------------------------Copyright 2012 Techiesupport All Rights Reserved

Techiesupport Monthly Magazine-February2012 Q. What is DNIC? A. A DNIS says which network connect to the telnet you are using. Q. What is NUA? A. The NUA is the address of the computer on telnet. Q. What is telnet? A. Telnet is a program which lets you log in to other computers on the net. Q. What is a virus? A. A Virus is a program which reproduces itself. It may attach itself to other programs, it may create copies of itself. It may damage or corrupt data, change data, or degrade the performance of your system by utilizing resources such as memory or disk space. Some Virus scanners detect some Viruses. No Virus scanners detect all Viruses. Virus scanners will work for a while but people are always creating virii that will beat them. Q. What is a Trojan? A. A Trojan is a program which does an unauthorized function, hidden inside an authorized program. It does something other than it claims to do, usually something malicious, and it is intended by the author to do whatever it does. If it is not intentional, it is called a bug. Q. What do I need to become a hacker? A. You should start off with a good scanner, some dial ups a telnet client, and some knowledge of hacking. Those are the basic things that you will need. If you are serious about hacking then you should get Unix, or Linux(smaller, free version of UNIX). --------------------------------------------------------------------------------------------------Copyright 2012 Techiesupport All Rights Reserved

Techiesupport Monthly Magazine-February2012

Q. What is a sniffer? A. Taken from the Sniffer FAQ. Unlike telephone circuits, computer networks are shared communication channels. It is simply too expensive to dedicate local loops to the switch (hub) for each pair of communicating computers.

--------------------------------------------------------------------------------------------------Copyright 2012 Techiesupport All Rights Reserved

Techiesupport Monthly Magazine-February2012 ____________________________________________________________

How To Find Your IP Address


__________________________________________________________ What is an IP address? Every device connected to the public Internet is assigned a unique number known as an Internet Protocol (IP) address. IP addresses consist of four numbers separated by periods Since these numbers are usually assigned to internet service providers within region-based blocks, an IP address can often be used to identify the region or country from which a computer is connecting to the Internet. An IP address can sometimes be used to show the users general location. The best way to find your IP address and complete details about your interconnection is as follow: - just visit http://whatismyipaddress.com/.

- It wil provide the complete details about your connection which include IP

---------------------------------------------------------------------------------------------------Copyright 2012 Techiesupport All Rights Reserved

Techiesupport Monthly Magazine-February2012

Track GF/BF Mobile For Free ______________________________________________


Actually this should not be done LOL.but I just want to make you people know about mobile phone tracing. Phone On Map provide such a great facility. It gives us a free application that have to be installed in cell phone GPS thats itnow you are ready to spy or track the phone from anywhere with the help of internet. This app works best with tracking members, official works, and even you track your children and your wife/girlfriend/boyfriend tooROFL You can use the service when your travelling and it is worldwide too. Phone On Map helps the marketing department companies a lot in many ways for tacking their marketing agents and one of the best part of Phone On Map is -here the data is stored on the companys server for a period of one month. Coming the terms of security and privacy, it provides the best security and your mobile device or cell phone cannot be monitored by any other Unauthorized User,You are supposed to authenticate your self with a personal code which was used as identification while installing on cell phone.

Few Features of GPS cell phone tracking system:


-This app fails to work when the phone is switched off. -If the data transmission is outside the providers coverage area this will add roaming charges like other mobile service charge us. ---------------------------------------------------------------------------------------------------Copyright 2012 Techiesupport All Rights Reserved

Techiesupport Monthly Magazine-February2012 ____________________________________________________________ -GPS cell phone tracker and locator will fail to work in the underground transportation. -Over the internet tracking system will show cell phone location between every 10Min to Sec, that all depend on the settings you made. -Once the app is uninstalled from the cell phone you cant do any thing. As of now this service does not provide the exact pin point location but the location determined s in the range of 10-20 meters. However with little intelligence the exact location can be easily determined especially when you wish to track your children or the cheating girlfriend or boyfriend;)

---------------------------------------------------------------------------------------------------Copyright 2012 Techiesupport All Rights Reserved

Techiesupport Monthly Magazine-February2012

How To Block Websites Without Software ______________________________________________

Here am gonna teach you How To Block Websties Without Software for free.There are many softwares available in the clould to do this,but most of them are fake!! I just want to share my view of blocking the particular Website without using any any kind of Software.

Follow the few simple steps listed below :

-Browse C:\WINDOWS\system32\drivers\etc - Find the file named HOSTS -Open it in notepad -Under 127.0.0.1 localhost Add 127.0.0.2 http://www.sitenameyouwantblocked.com , and that site will no longer be accessible.

---------------------------------------------------------------------------------------------------Copyright 2012 Techiesupport All Rights Reserved

Techiesupport Monthly Magazine-February2012 ___________________________________________________________________ -You are Done! -So-

127.0.0.1 localhost 127.0.0.2 http://www.blockedsite.com

<-http://www.blockedsite.com is now unaccessable> For every site after that you want to add, just add 1 to the last number in the internal ip (127.0.0.2) and then the add like before.

IE: 127.0.0.3 http://www.xyz.com 127.0.0.4 http://www.abc.com 127.0.0.5 http://www.def.com Etc

---------------------------------------------------------------------------------------------------Copyright 2012 Techiesupport All Rights Reserved

Techiesupport Monthly Magazine-February2012

How To Convert Webpage to Pdf


___________________________________________________________________

I have come across some websites that i wanted to save the page for later review. I found that i was having some problems and its stopping my a$# with certain sites.Finally i found a way around it.

what you need: adobe acrobat 6 pro or better popupcop

There may be some more other simpler way to do this but the way am going to teach you attracted me more and it works for sure

---------------------------------------------------------------------------------------------------Copyright 2012 Techiesupport All Rights Reserved

Techiesupport Monthly Magazine-February2012 ___________________________________________________________________ when at a webpage that you want to copy (YOU MUST BE USING IE AND HAVE BOTH POPUPCOP INSTALLED AND ADOBE ACROBAT 6 PRO OR HIGHER, ACROBAT ICON MUST BE IN IE TOOLBAR TO CONVERT TO .PDF), slide popupcops popup intensity bar to the far left, now click on adobe acrobat icon to convert webpage to .pdf document.

I have yet to find a webpage where this trick does not work.Am working on that.and i will post it shortly

---------------------------------------------------------------------------------------------------Copyright 2012 Techiesupport All Rights Reserved

Techiesupport Monthly Magazine-February2012

FireFox Speed Tweaks To Max-100% Works ______________________________________________

Firefox is already pretty damn fast but do you know that you can tweak it to max and improve the speed even more high? Thats the greatness of this program being open source.Here we go..just follow me Go to the URL bar, type about:config and press enter.This will bring up the configuration menu where you can change the parameters of Firefox. Double Click on the following settings and put in the numbers below for the true / false booleans - theyll change when you double click.

---------------------------------------------------------------------------------------------------Copyright 2012 Techiesupport All Rights Reserved

Techiesupport Monthly Magazine-February2012 ____________________________________________________________ Code: browser.tabs.showSingleWindowModePrefs true network.http.max-connections 48 network.http.max-connections-per-server 16 network.http.max-persistent-connections-per-proxy 8 network.http.max-persistent-connections-per-server 4 network.http.pipelining true network.http.pipelining.maxrequests 100 network.http.proxy.pipelining true network.http.request.timeout 300 One more thing Right-click somewhere on that screen and add a NEW -> Integer. Name it nglayout.initialpaint.delay and set its value to 0.

This value is the amount of time the browser waits before it acts on information it receives. Since youre broadband it shouldnt have to wait. Now you should notice youre loading pages MUCH faster now!

---------------------------------------------------------------------------------------------------Copyright 2012 Techiesupport All Rights Reserved

Techiesupport Monthly Magazine-February2012 ____________________________________________________________

Why Hackers Use Linux ? ____________________________________________________


-Most of the Hackers prefer Linux because its completely free.. hackers never pay for anything.. forget OS. -It is already fully loaded with all the stuff needed, no need to download additional applications for something as silly as netcat. -Open source.. w00t!!! I have full f*#c@i&g control over my OS. -Hackers hate windowsAPI/compatibility issues/so many libararies. -Hackers dont want their system to crash or freeze when theyre about to create history.

-90%(or more than that) servers run on Linux.. so why should we be behind?? -Linux is synonymous to customization, its customizable in every frigging way, you can update/recompile the kernels too!!This is something we live for, total control is the meaning of our lives. -You can get all flavors of Linux and can always tell your friend that the version he is running is lame. -You can always learn more commands than your friend and the competition will never end.

---------------------------------------------------------------------------------------------------Copyright 2012 Techiesupport All Rights Reserved

Techiesupport Monthly Magazine-February2012 ___________________________________________________________________

-(For new hackers) no matter how much you screw your system a nerd dude on forums is always willing to help(of course after traditional flaming)for windows you get only one answer, windows sucks.

-Incase all the commands are known you can start learning Linux system calls for a change and then compete again.

---------------------------------------------------------------------------------------------------Copyright 2012 Techiesupport All Rights Reserved

Techiesupport Monthly Magazine-February2012

Hack Yahoo Passwords ____________________________________________________


Methods of getting yahoo passwords I will explain in this tutorial how to obtain in different ways yahoo passwords so that any N00B can understand and do it. It actual isnt that hard the problem is that with the passing of years yahoo security has been getting better and better an most proggyes dont work anymore now I will present to u the most effective reliable and easy to do methods.After that I will also Inform you on how to protect your self of these dangers that go around the internet. METHOD 1 BRUTE FORCING: This is by far the most used method .You can find crackers everywhere to download .On www.hackerspk.com there are a lot of good cracked downloads.The one for which i sugest R-G-Kracka its easy to use and works. This is the most sawed for method but is good for 2 things cracking boots and when you really want a password and will spend some time cracking testing and working. For this You have to get A cracker A password list and in some cases a proxy list but I suggest u try a non proxy cracker if its your first time. This is a basic method and Im sure that everyone will get it the first time although results depend on your password list. PROTECTION Its simple get a very long password with asci and numbers the most hard and long password that a brute force will have trouble cracking --------------------------------------------------------------------------------------------------Copyright 2012 Techiesupport All Rights Reserved

Techiesupport Monthly Magazine-February2012

____________________________________________________________ and getting to is the last of all asci letters and numbers the last password a normal brute force of lets say 10 chars will be zzzzzzzz9! this password will be the last one it will try to crack.

METHOD 2 TROJAN PASSWORD STEALER This is one of the most effective methods of obtaining passwords at this time.U get a programmer named Y! Jacked/mps1.5se/sub7 none of its many variations from www.cyberpunkz.com or www.hackerspk.com there are many Trojans n stealers. With this you have to take the main program put it in a folder and generate a Trojan that you send via attachment to the victims mail box.When that person opens it u will have hes password.This is a easy to use program just take care that most antiviruses see it as a virus and u shouldnt get alarmed by that.It has a lot of options that u will understand surely if u know English.

PROTECTION Its the easiest way to protect your self dont open attachments from anybody I can send a mail with an attachment from any mail I want for example Its not smart to open any attachment without a good antivirus.

---------------------------------------------------------------------------------------------------Copyright 2012 Techiesupport All Rights Reserved

Techiesupport Monthly Magazine-February2012

____________________________________________________________ METHOD 3

THE FAKE LOGIN This is a modified login page for yahoo.Its code has been altered .Instead of sending the password and the user to a yahoo server for loging in it sends them to a yahoo server that sends them in a mail account. Get one of thees from certain people fool. Its hard to spot people after you make a page with this u have to send the link to some one and he has to sign in from there.

PROTECTION Dont sign in yahoo from pages like www.infernal.isking.com/login.yahoo/script This is probably a fake login.Try to open one of thees pages and check out the source code you can determine what it will do from there.

METHOD4 PASSWARE OR PASSWORD SENDER This is for u people that want all passwords that were entered in Internet explorer on your computer.You download Password recovery kit and it will give u all ofthe passwords on your computer u can use this for people you are close to lol ---------------------------------------------------------------------------------------------------Copyright 2012 Techiesupport All Rights Reserved

Techiesupport Monthly Magazine-February2012 ____________________________________________________________ PROTECTION

Be a paranoiac son of a bitch scan your computer check installed programs never let other people f#ck with it and of-course never enter your passwords in another persons computer.

---------------------------------------------------------------------------------------------------Copyright 2012 Techiesupport All Rights Reserved

Techiesupport Monthly Magazine-February2012 ___________________________________________________________________

Truth About Hacking Gmail,Yahoo,Facebook etc (part-1) ______________________________________________


I wrote this post especially for beginners and for the people who have no interest in learning hacking but they need someones passwords at any cost.I want to clarify the misconceptions regarding Social Networking Sites hacking/Email Hacking etc. Because those misconception will put you in big trouble. Usually when someone want to hack the password the most common thing that every one is just googling out like How to Hack Facebook password, How to hack gmail/yahoo password etc. The reality behind this is you will be landed up to some malicious blogs or sites which will ask us to follow fu*king instructions where there is a chance that our own account get compromised. To be frank even I did the same when I was a beginner.

Let us discuss what are the things that generally happened when ever we signed up for an account(gmail,yahoo, Facebook or any other networking sites) The password you have selected will be stored in only two places.

1] In the websites database. 2] The second one is obviously in your mind.

---------------------------------------------------------------------------------------------------Copyright 2012 Techiesupport All Rights Reserved

Techiesupport Monthly Magazine-February2012 ___________________________________________________________________ Knowing the details(your Id/Password) from the websites database is highly impossible to any hacker as they will be paying millions of dollars for securing their database.I have to say that HardCore hackers might get success in compromising even their systems database also. The thing in which I strongly believe that hacking someones email account completely depends on foolishness/carelessness of the victim. General FAQs which I usually see in my blog from the visitors regarding the same topic are like :Do any free/premium online services exists to hack the networking sites ?

---------------------------------------------------------------------------------------------------Copyright 2012 Techiesupport All Rights Reserved

Techiesupport Monthly Magazine-February2012 ____________________________________________________________ Obviously NO, there are no such services in the cloud.You might have logged on to many websites that claim to crack any email password for some money, but they are fake and be aware of those.Never login to them and loose your money!!

Do we have any program/cracker/free/paid softwares exist to hack such accounts?

NO, You might have faced many free or paid software which assure that they will crack email passwords. They generally ask you to enter the victims email id and they start generating passwords.If you remember I have already told you ---------------------------------------------------------------------------------------------------Copyright 2012 Techiesupport All Rights Reserved

Techiesupport Monthly Magazine-February2012 ___________________________________________________________________ where the passwords will be stored when ever you signup for an account. Now I dont understand form where the hell these software would bring passwords to you!! Remember one thing,when ever you come across this kinda things, for sure they are scam/rubbish.

There are many more frauds that must be considered regarding Hacking Facebook,gmail,yahoo etc. I will the write my next article Truth about hacking Facebook,gmail,yahoo ect (part-2) in upcoming magazine

---------------------------------------------------------------------------------------------------Copyright 2012 Techiesupport All Rights Reserved

Techiesupport Monthly Magazine-February2012 ___________________________________________________________________

Sony Xperia Tipo-Latest Review ____________________________________________________

Sony has been trying to make a mark in smart-phone market for quite some time now, and it is safe to say that it has succeed to a certain extent in the form of its NXT series smartphones. The Xperia S,Ion,,Sola and U managed to impress and find their way into a lot of consumers pockets. Now Sony has a small but pretty impressvie offering in the sub-10k smartphone market, in the form of Xperia Tipo.The design of Tipo is quite simple, with a 3.2-inch screen set in a metal bezel and three capacitive navigation soft keys, and a curved, plastic back panel.The panel may be plastic but the design and feel of the back panel adds a little premiumness to the Tipo. The music apps inside and the sound quality is just as great as in Walkman series phones. ---------------------------------------------------------------------------------------------------Copyright 2012 Techiesupport All Rights Reserved

Techiesupport Monthly Magazine-February2012

____________________________________________________________ Xperia Tipo is powered by an 800 MHz CPU, which in our opinion wasnt quite capable of supporting all of its apps and features. Because on the inside, it is filled with a few processor-sapping features that other phones in its class dont have. It is the only phone in our comparison chart that runs on Android version 4.0 ICS (Ice Cream Sandwich). This makes the user interface very smooth and friendly. So while the UI is great some apps just freeze!!

Sony has also added its own Timescape UI, which has really deep Facebook integration. This feature will definitely pull a lot of younger customers towards the Tipo.

Moreover, the Tipo is dual-SIM variant, known as Tipo Dual. The only addition to this is a second SIM card slot inside the rear hatach. The battery can last for about 9 hours on a single charge, with regular surfing, texting/WhatApping and few voice calls. Finally Tipo is a great phone for anyone who likes music on the go, and wants to make a style statement with a smartphone that fits the pocket, both in teams ofmoney and size.

LOVE : FB integration,smooth UI HATE: slow texting, average processor Rs 9,999 ---------------------------------------------------------------------------------------------------Copyright 2012 Techiesupport All Rights Reserved

Techiesupport Monthly Magazine-February2012 ___________________________________________________________________

Techiesupport
Know Hacking-No Hacking Get Connected with us www.techiesupport.wordpress.com

Subscribe to the blog and receive all updates from us.

--------------------------------------------------------------Copyright 2012 Techiesupport All Rights Reserved

Techiesupport Monthly Magazine-February2012

_______________________________________
Meet The Author:

Sriram Rayarao Is 20 years old blogger by day, Hacker by night. He is passionated about blogging and hacking. He is a student of Engineering ( Infromation Technology) and CEO & Founder of www.techiesupport.wordpress.com.

You can catch him here www.facebook.com/sriram.rayarao

---------------------------------------------------------------------------------------------------Copyright 2012 Techiesupport All Rights Reserved

Techiesupport Monthly Magazine-February2012

Techiesupport Monthly Magazine-February2012

You might also like