Labels

Thursday, 12 July 2012

Finding serial key Or Crack easily

* Go to Google.


* In the search field type : "Software name" 94FBR


* Where, "Software Name" is the name of the item you want to find the serial number for.


* And in google search Results you will get the list of all those websites where the serial key of the required software is available.Thats it !!  :-)




WEBSITES FOR KEYS

   * www.serials.ws
    * www.keygen.in
    * www.smartserials.com
    * www.keygenguru.com - Popular site with hundreds of thousands of results.
    * www.serialkey.net
    * www.zcrack.com
    * www.subserials.net
    * www.serialportal.com
    * supercracks.net
    * www.serialcrackz.com
    * www.serials.be
    * www.cracktop.com
    * www.cracksfm.com
    * www.cracklib.net
    * www.crackdb.org
    * www.theserials.com

Tuesday, 10 July 2012

Chrome for mobile and tablet !!!

hey guys..are you a Chrome Lovers and fed up with UC and opera and thought of getting Chrome then your search is here !!!!! click on below link for google chrome 
Click here and Get Chrome For Mobile or tablet

Monday, 9 July 2012

Methods OF DDOS ATTACKS


Methods of attack

A "denial-of-service" attack is characterized by an explicit attempt by attackers to prevent legitimate users of a service from using that service. There are two general forms of DoS attacks: those that crash services and those that flood services.
A DoS attack can be perpetrated in a number of ways. The five basic types of attack are:
  1. Consumption of computational resources, such as bandwidth, disk space, or processor time.
  2. Disruption of configuration information, such as routing information.
  3. Disruption of state information, such as unsolicited resetting of TCP sessions.
  4. Disruption of physical network components.
  5. Obstructing the communication media between the intended users and the victim so that they can no longer communicate adequately.
A DoS attack may include execution of malware intended to:
  • Max out the processor's usage, preventing any work from occurring.
  • Trigger errors in the microcode of the machine.
  • Trigger errors in the sequencing of instructions, so as to force the computer into an unstable state or lock-up.
  • Exploit errors in the operating system, causing resourceand/or thrashing, i.e. to use up all available facilities so no real work can be accomplished.

PEER--PEER ATTACK

  • Crash the operating system itself.Attackers have found a way to exploit a number of bugs in peer to peer servers to initiate DDoS attacks. The most aggressive of these peer-to-peer-DDoS attacks exploits DC++. Peer-to-peer attacks are different from regular botnet-based attacks. With peer-to-peer there is no botnet and the attacker does not have to communicate with the clients it subverts. Instead, the attacker acts as a "puppet master," instructing clients of large file sharing hubs to disconnect from their peer-to-peer network and to connect to the victim's website instead. As a result, several thousand computers may aggressively try to connect to a target website. While a typical web server can handle a few hundred connections per second before performance begins to degrade, most web servers fail almost instantly under five or six thousand connections per second. With a moderately large peer-to-peer attack, a site could potentially be hit with up to 750,000 connections in short order. The targeted web server will be plugged up by the incoming connections.
    While peer-to-peer attacks are easy to identify with signatures, the large number of IP addresses that need to be blocked (often over 250,000 during the course of a large-scale attack) means that this type of attack can overwhelm mitigation defenses. Even if a mitigation device can keep blocking IP addresses, there are other problems to consider. For instance, there is a brief moment where the connection is opened on the server side before the signature itself comes through. Only once the connection is opened to the server can the identifying signature be sent and detected, and the connection torn down. Even tearing down connections takes server resources and can harm the server.
    This method of attack can be prevented by specifying in the peer-to-peer protocol which ports are allowed or not. If port 80 is not allowed, the possibilities for attack on websites can be very limited.

Friday, 6 July 2012

check is your pc safe from july 9th fbi quest

due to dns malware many systems are gonna hit with no internet
check whether your pc is in the list or not

CLICK HERE TO KNOW

hack vps

OPEN vnc_scanner_gui


























































# CHOSE THE STATE YOU WONT
# CLICK  Get diap list
# AFTER THAT CLICK  start scan
# AFTER SCAN CLICK  start Praser
# THE IP LIST WILL BE SAVED IN  IPs.txt



YOU NEED TO GENERATE IP USERS AND PASSWORD JUST CLICK GENERATE


























# CLICK  Ip YOU NEED TO UPLOAD THE IP SCAN FILE 
# YOU NEED TO UPLOAD USERS AND PASSWORD IN THE OTHER TABS
# CLICK Make
# AND  Exit

































click on config


























 chose the threads number 
 click  ok 


CLICK START
and wait !!!!! you will hack it after 4-5 hrs !!!!

jntu results

jntu 2-2 results batch r09 enjoy results......

Thursday, 5 July 2012

Create a Standard Ghost Boot Up



This trick shows you how create a standard Symantec Ghost bootup floppy set (i.e. without Network). The "Standard Ghost Boot Disk" option from Symantec Ghost allows you to create a set of 2 bootable floppy disks to use with Ghost tools for backup/restore hard drives and partitions.
The "Standard Ghost Boot Disk" does not allow you to access the network resources (i.e. GhostCast), but it does allow you to read and write from your CD-ROM and DVD drives as well as USB external drives.
Use this trick at your own risk.
 
1)Open the "SYMANTEC GHOST BOOT Wizard"








2) select "STANDARD GHOST BOOT DISK" and click "NEXT"


3)Leave the default options as is and click "Next".
Note that even though you are not selecting the "USB Support" option on this screen, you'll still be able to access your USB external devices. The "USB Support" option here is for "Peer-to-peer".




4)Click "Next" on the next screen to "Use PC-DOS"


5)On the next screen, you'll need to specify where the file "ghost.exe" is located. This file is normally installed to a path as example below, but you should double check. Then click "Next".

6)Click "Next" on the next screen to use default options for external storage devices


7)Click "Next" on the next screen:


8)click "NEXT" on review screen


9)A message will display telling you that you will need two floppy disks. Click "OK".


10)The Boot Disk Wizard will start to erase your floppy and create the boot data. Once it's done with the first disk, it will prompt for a second one.




Wednesday, 4 July 2012

Oracle 10g Mysql plus Login Problems


Login Problem to Oracle 10G (SQL Plus)

How to do it?

1. Logon to the database using SYSTEM or SYS account 
2. Unlock the account alter user <username> account unlock; 

Example: 
SQL> conn scott/tiger@oradb13 
ERROR:
ORA-28000: the account is locked 

Warning: You are no longer connected to ORACLE. 
SQL> conn system@oradb13 
Enter password: ****** 
Connected. 

SQL> select username, account_status from dba_users 2 where username = 'SCOTT'; 


USERNAME                 ACCOUNT_STATUS 
-------------------------------------------------------------- 
SCOTT                          EXPIRED & LOCKED 


SQL> alter user scott account unlock; 
User altered. 
SQL> select username, account_status from dba_users
2 where username = 'SCOTT'; 


USERNAME                 ACCOUNT_STATUS 
-------------------------------------------------------------- 
SCOTT                          EXPIRED 


SQL> conn scott/tiger@oradb13 
ERROR: 
ORA-28001: the password has expired

Finally
  1. Close Sql Application
  2. Reopen The application
  3. A screen will appear to change password 

Changing password for scott 
New password: ***** 
Retype new password: ***** 
Password changed 
Connected. 
SQL>

How to know your own number or else sim number which you have

FOR AIRTEL
send a blank message to 59103 you will get message from your number
FOR Reliance
just dial *1# number will be displayed on screen
BSNL
*888#
VODAFONE
*131*0#
and also
IDEA
*1#
VODAFONE in some circles
*777*0#
TATA DOCOMO
*580#
AIRTEL
*140*1600#
AIRCEL
*#1#888#

Tuesday, 3 July 2012

Avoid Game Requests in facebook !!!

i am here to explain how you can stop game requests for the game you have played in past
now a days many are sending game requests even if you are not intrested in playing that game
here is the simple trick
just in your wall u can see the tag called "APPS"
below that there are game's listed which you have been played
go to left side of "Game name" which you want to stop















CLICK ON REMOVE APP
now successfully you have done your task !!!! njoy

How To remove suspicious applications in Facebook

many applications like video apps...are posting **** or above 18 videos without informing you..so that your friends will notice about this
inorder to remove those applications
first step is " ENABLE SECURE BROWSING "
second step is "Go To Account Settings > Click On APPs > check for your APP which you want to DELETE > Click on EDIT (or) X button on the desired APP
now it is done...!!!!!

 
Design by Free WordPress Themes | Bloggerized by Lasantha - Premium Blogger Themes | Blogger Templates