Sunday, 31 March 2013
What Is Steganography?
Steganography is the art and science of hiding messages. Steganography is often combined with cryptography so that even if the message is discovered it cannot be read.
The word steganography is derived from the Greek words "steganos" and "graphein", which mean "covered" and "writing." Steganography, therefore, is covered writing.
Historical stenganography involved techniques such as disappearing ink or microdots. Modern steganography involves hiding data in computer files.
It is fairly easy to hide a secret message in a graphic file without obviously altering the visible appearance of that file.
Steganography is the art and science of hiding messages. Steganography is often combined with cryptography so that even if the message is discovered it cannot be read.
The word steganography is derived from the Greek words "steganos" and "graphein", which mean "covered" and "writing." Steganography, therefore, is covered writing.
Historical stenganography involved techniques such as disappearing ink or microdots. Modern steganography involves hiding data in computer files.
It is fairly easy to hide a secret message in a graphic file without obviously altering the visible appearance of that file.
JPHIDE and JPSEEK are programs which allow you to hide a file in a jpeg visual image. There are lots of versions of similar programs available on the internet but JPHIDE and JPSEEK are rather special. The design objective was not simply to hide a file but rather to do this in such a way that it is impossible to prove that the host file contains a hidden file. Given a typical visual image, a low insertion rate (under 5%) and the absence of the original file, it is not possible to conclude with
any worthwhile certainty that the host file contains inserted data. As the insertion percentage increases the statistical nature of the jpeg coefficients differs from "normal" to the extent that it raises suspicion. Above 15% the effects begin to become visible to the naked eye. Of course some images are much better than others when used a host file - plenty of fine detail is good. A cloudless blue sky over a snow covered ski paradise is bad. A waterfall in a forest is probably ideal.
MP3Stego will hide information in MP3 files during the compression process. The data is first compressed, encrypted and then hidden in the MP3 bit stream. Although MP3Stego has been written with steganographic applications in mind it might be used as a copyright marking system for MP3 files (weak but still much better than the MPEG copyright flag defined by the standard). Any opponent can uncompress the bit stream and recompress it; this will delete the hidden information (actually this is the only attack we know yet) but at the expense of severe quality loss.
Steghide is a steganography program that is able to hide data in JPG, BMP, WAV, and AU files. The color frequencies are not changed thus making the embedding resistant against first-order statistical tests.
Hydan steganographically conceals a message ito an executable. It exploits redundancy in the i386 instruction set by defining sets of functionally equivalent instructions. It then encodes information in machine code by using the appropriate instructions from each set. The executable filesize remains unchanged. The message is Blowfish encrypted with a user-supplied passphrase before being embedded.
The 1st method that We will Study Here Is Using command Prompt.
To hide a file behind a image file which means that if any one opens that image he will see the image only but if you open in a special way then you can open the hidden file behind the image.
So to hide the file behind a image open CMD.exe
1) Select an image to be used for hiding file behind the image.
2) Now select a file to hide behind the image and make it in .RAR format. With the help of the WinRAR.
3) And most important is that paste both the files on desktop and run the following command on the command
prompt.
4) And then type the following command.
{ cd } { Copy /b imagename.jpg + filename.rar finalnameofimage.jpg }
And then hit enter the file will be created with the file final file name of the image :D
The word steganography is derived from the Greek words "steganos" and "graphein", which mean "covered" and "writing." Steganography, therefore, is covered writing.
Historical stenganography involved techniques such as disappearing ink or microdots. Modern steganography involves hiding data in computer files.
It is fairly easy to hide a secret message in a graphic file without obviously altering the visible appearance of that file.
Steganography is the art and science of hiding messages. Steganography is often combined with cryptography so that even if the message is discovered it cannot be read.
The word steganography is derived from the Greek words "steganos" and "graphein", which mean "covered" and "writing." Steganography, therefore, is covered writing.
Historical stenganography involved techniques such as disappearing ink or microdots. Modern steganography involves hiding data in computer files.
It is fairly easy to hide a secret message in a graphic file without obviously altering the visible appearance of that file.
JPHIDE and JPSEEK are programs which allow you to hide a file in a jpeg visual image. There are lots of versions of similar programs available on the internet but JPHIDE and JPSEEK are rather special. The design objective was not simply to hide a file but rather to do this in such a way that it is impossible to prove that the host file contains a hidden file. Given a typical visual image, a low insertion rate (under 5%) and the absence of the original file, it is not possible to conclude with
any worthwhile certainty that the host file contains inserted data. As the insertion percentage increases the statistical nature of the jpeg coefficients differs from "normal" to the extent that it raises suspicion. Above 15% the effects begin to become visible to the naked eye. Of course some images are much better than others when used a host file - plenty of fine detail is good. A cloudless blue sky over a snow covered ski paradise is bad. A waterfall in a forest is probably ideal.
MP3Stego will hide information in MP3 files during the compression process. The data is first compressed, encrypted and then hidden in the MP3 bit stream. Although MP3Stego has been written with steganographic applications in mind it might be used as a copyright marking system for MP3 files (weak but still much better than the MPEG copyright flag defined by the standard). Any opponent can uncompress the bit stream and recompress it; this will delete the hidden information (actually this is the only attack we know yet) but at the expense of severe quality loss.
Steghide is a steganography program that is able to hide data in JPG, BMP, WAV, and AU files. The color frequencies are not changed thus making the embedding resistant against first-order statistical tests.
Hydan steganographically conceals a message ito an executable. It exploits redundancy in the i386 instruction set by defining sets of functionally equivalent instructions. It then encodes information in machine code by using the appropriate instructions from each set. The executable filesize remains unchanged. The message is Blowfish encrypted with a user-supplied passphrase before being embedded.
The 1st method that We will Study Here Is Using command Prompt.
To hide a file behind a image
.To hide a file behind a image file which means that if any one opens that image he will see the image only but if you open in a special way then you can open the hidden file behind the image.
So to hide the file behind a image open CMD.exe
1) Select an image to be used for hiding file behind the image.
2) Now select a file to hide behind the image and make it in .RAR format. With the help of the WinRAR.
3) And most important is that paste both the files on desktop and run the following command on the command
prompt.
4) And then type the following command.
{ cd } { Copy /b imagename.jpg + filename.rar finalnameofimage.jpg }
And then hit enter the file will be created with the file final file name of the image :D
Labels:
File hiding,
Hacking
12 Security tips for online shopping
The internet is an exciting place to shop. From the comfort of your own armchair you can browse for literally anything, from a new camera, to a holiday or flight. You are not restricted to the stores in your local town, or even country and youcan pick up deals at great prices on a whole range of products
Shopping online isn’t just as safe as handing over your credit card in a store or restaurant. However, if you take care of few things it can be a safe deal. Following are the things you should take care of:
1. Never respond to an email request for credit card details. All reputable companies will conduct transactions with you over a secure website connection.
2. Remember to never respond to any email advertisement, and only visit sites you know or have book marked, and verify the address before browsing further.
3. Only buy from trusted brands and websites.
4. To ensure that you only do business with legitimate companies check to see if they have a contact number, an actual retail store and a printed catalogue to browse.
5. Check a website’s returns and privacy policy before going ahead with a purchase.
6. Check that you are entering your details through a secure payment connection. You should notice when you click through to the transaction page of a company’s website that the URL in the address bar begins https:// (instead of the normal http ://). This is the standard encrypted communication mechanism on the internet and means that your credit card details are being sent securely.
7. Beware of deals that seem too good to be true.
8. Beware of the limitations of the internet. The internet may not the best place to buy clothes or other products you need to see, touch or try on.
9. All reputable websites use secure payment systems. These are either a company’s own system or a 3rd party system such as Worldpay or Pay pal.
10. When conducting a transaction over the internet, look for the yellow padlock in the grey status bar at the bottom of your browser page. This is an indication that the transaction is being conducted over a secure connection.
11. As an extra precaution check to see if there’s a gold lock at the bottom of the right hand corner of the browser. If they don’t include any of these reliable indicators, you might want to think twice before handing over your credit card number.
12. To be on the safe side, and avoid Internet fraudsters, it’s also a good idea to install and use security software such as Kaspersky Internet Security. It can provide you with industry-leading security services that will provide you more protection against the latest threats.
Monday, 25 March 2013
What is CAPTCHA and how it works?
CAPTCHA or Captcha (pronounced as cap-ch-uh) which stands for "Completely Automated Public Turing test to tell Computers and Humans Apart” is a type of challenge-response test to ensure that the response is only generated byhumans and not by a computer. In simple words, CAPTCHA is the word verification test that you will come across the end
of a sign-up form while signing up for Gmail or Yahoo account. The following image shows the typical samples of CAPTCHA.
Almost every Internet user will have an experience of CAPTCHA in their daily Internet usage, but only a few are aware of what it is and why they are used. So in this post you will find detailed information on how CAPTCHA works and why they are used.
What Purpose does CAPTCHA Exactly Serve?
CAPTCPA is mainly used to prevent automated software (bots) from performing actions on behalf of actual humans. For example while signing up for a new email account, you will come across a CAPTCHA at the end of the sign-up form so as to ensure that the form is filled out only by a legitimate human and not by any of the automated software or a computer bot. The main goal of CAPTCHA is to put forth a test which is simple and straight forward for any human to answer but for
a computer, it is almost impossible to solve.
What is the Need to Create a Test that Can Tell Computers and Humans Apart?
For many the CAPTCHA may seem to be silly and annoying, but in fact it has the ability to protect systems from malicious attacks where people try to game the system. Attackers can make use of automated software’s to generate a huge quantity of requests thereby causing a high load on the target server which would degrade the quality of service of a given system, whether due to abuse or resource expenditure. This can affect millions of legitimate users and their requests. CAPTCHAs can be deployed to protect systems that are vulnerable to email spam, such as the services from
Gmail, Yahoo and Hotmail.
Who Uses CAPTCHA?
CAPTCHAs are mainly used by websites that offer services like online polls and registration forms. For example, Web based email services like Gmail, Yahoo and Hotmail offer free email accounts for their users. However upon each sign-up process, CAPTCHAs are used to prevent spammers from using a bot to generate hundreds of spam mail accounts.
Designing a CAPTCHA System
CAPTCHAs are designed on the fact that computers lack the ability that human beings have when it comes to processing visual data. It is more easily possible for humans to look at an image and pick out the patterns than a computer. This is because computers lack the real intelligence that humans have by default. CAPTCHAs are implemented by presenting users with an image which contains distorted or randomly stretched characters which only humans should be able to identify. Sometimes characters are striked out or presented with a noisy background to make it even harder for
computers to figure out the patterns. Most, but not all, CAPTCHAs rely on a visual test. Some Websites implement a totally different CAPTCHA system to tell humans and computers apart. For example, a user is presented with 4 images in which 3 contains picture of animals and
one contain a flower. The user is asked to select only those images which contain animals in them. This Turing test can easily be solved by any human, but almost impossible for a computer.
Breaking the CAPTCHA
The challenge in breaking the CAPTCHA lies in real hard task of teaching a computer how to process information in a way similar to how humans think. Algorithms with artificial intelligence (AI) will have to be designed in order to make the computer think like humans when it comes to recognizing the patterns in images. However there is no universal algorithm that could pass through and break any CAPTCHA system and hence each CAPTCHA algorithm must have to be tackled individually. It might not work 100 percent of the time, but it can work often enough to be worthwhile to spammers.
of a sign-up form while signing up for Gmail or Yahoo account. The following image shows the typical samples of CAPTCHA.
Almost every Internet user will have an experience of CAPTCHA in their daily Internet usage, but only a few are aware of what it is and why they are used. So in this post you will find detailed information on how CAPTCHA works and why they are used.
What Purpose does CAPTCHA Exactly Serve?
CAPTCPA is mainly used to prevent automated software (bots) from performing actions on behalf of actual humans. For example while signing up for a new email account, you will come across a CAPTCHA at the end of the sign-up form so as to ensure that the form is filled out only by a legitimate human and not by any of the automated software or a computer bot. The main goal of CAPTCHA is to put forth a test which is simple and straight forward for any human to answer but for
a computer, it is almost impossible to solve.
What is the Need to Create a Test that Can Tell Computers and Humans Apart?
For many the CAPTCHA may seem to be silly and annoying, but in fact it has the ability to protect systems from malicious attacks where people try to game the system. Attackers can make use of automated software’s to generate a huge quantity of requests thereby causing a high load on the target server which would degrade the quality of service of a given system, whether due to abuse or resource expenditure. This can affect millions of legitimate users and their requests. CAPTCHAs can be deployed to protect systems that are vulnerable to email spam, such as the services from
Gmail, Yahoo and Hotmail.
Who Uses CAPTCHA?
CAPTCHAs are mainly used by websites that offer services like online polls and registration forms. For example, Web based email services like Gmail, Yahoo and Hotmail offer free email accounts for their users. However upon each sign-up process, CAPTCHAs are used to prevent spammers from using a bot to generate hundreds of spam mail accounts.
Designing a CAPTCHA System
CAPTCHAs are designed on the fact that computers lack the ability that human beings have when it comes to processing visual data. It is more easily possible for humans to look at an image and pick out the patterns than a computer. This is because computers lack the real intelligence that humans have by default. CAPTCHAs are implemented by presenting users with an image which contains distorted or randomly stretched characters which only humans should be able to identify. Sometimes characters are striked out or presented with a noisy background to make it even harder for
computers to figure out the patterns. Most, but not all, CAPTCHAs rely on a visual test. Some Websites implement a totally different CAPTCHA system to tell humans and computers apart. For example, a user is presented with 4 images in which 3 contains picture of animals and
one contain a flower. The user is asked to select only those images which contain animals in them. This Turing test can easily be solved by any human, but almost impossible for a computer.
Breaking the CAPTCHA
The challenge in breaking the CAPTCHA lies in real hard task of teaching a computer how to process information in a way similar to how humans think. Algorithms with artificial intelligence (AI) will have to be designed in order to make the computer think like humans when it comes to recognizing the patterns in images. However there is no universal algorithm that could pass through and break any CAPTCHA system and hence each CAPTCHA algorithm must have to be tackled individually. It might not work 100 percent of the time, but it can work often enough to be worthwhile to spammers.
Upgrade Windows 7 to any Higher Version :D
How to Upgrade Windows 7 to Any Higher Version for Free
You bought a new computer with a pre-installed Starter/Home Premium/Professional (Genuine) version of Windows 7 and want to upgrade to Professional or Ultimate for free in as few as 10 minutes .
Your pre-installed version of Windows 7 actually includes all files that are necessary to perform an in-place (local) upgrade without downloading anything from the internet. One simply needs unlocking features included in higher versions.
You can upgrade Windows 7 from/to:
Here's what you need to do:
To upgrade from one edition of Windows 7 to another edition of Windows 7, use Windows Anytime Upgrade. On your PC, open Windows Anytime Upgrade by clicking the Start button, typing Windows Anytime Upgrade in the search box, and then clicking Windows Anytime Upgrade in the list of results. You will be presented with a screen offering 2 options, one of them suggesting you have a valid Windows Anytime Upgrade key. Once the key has been copied into the appropriate field, it will be verified by MS and the upgrade process will take place. The whole process actually doesn't last longer than 10 minutes, your computer will reboot once or twice.
Upon restart, you will notice it now runs a genuine higher version of Windows 7.
* You can use Windows Anytime Upgrade to upgrade from a 32-bit version of Windows 7 to a 32-bit version of Windows 7 and from a 64-bit version of Windows 7 to a 64-bit version of Windows 7, but you can’t upgrade from a 32-bit version of Windows 7 to a 64-bit version of Windows 7 or vice versa.
* Windows Anytime Upgrade isn’t available in all editions of Windows 7 - obviously not in Ultimate version
Download Windows Anytime Upgrade key from here: http://u.to/MSek
You bought a new computer with a pre-installed Starter/Home Premium/Professional (Genuine) version of Windows 7 and want to upgrade to Professional or Ultimate for free in as few as 10 minutes .
Your pre-installed version of Windows 7 actually includes all files that are necessary to perform an in-place (local) upgrade without downloading anything from the internet. One simply needs unlocking features included in higher versions.
You can upgrade Windows 7 from/to:
Here's what you need to do:
To upgrade from one edition of Windows 7 to another edition of Windows 7, use Windows Anytime Upgrade. On your PC, open Windows Anytime Upgrade by clicking the Start button, typing Windows Anytime Upgrade in the search box, and then clicking Windows Anytime Upgrade in the list of results. You will be presented with a screen offering 2 options, one of them suggesting you have a valid Windows Anytime Upgrade key. Once the key has been copied into the appropriate field, it will be verified by MS and the upgrade process will take place. The whole process actually doesn't last longer than 10 minutes, your computer will reboot once or twice.
Upon restart, you will notice it now runs a genuine higher version of Windows 7.
* You can use Windows Anytime Upgrade to upgrade from a 32-bit version of Windows 7 to a 32-bit version of Windows 7 and from a 64-bit version of Windows 7 to a 64-bit version of Windows 7, but you can’t upgrade from a 32-bit version of Windows 7 to a 64-bit version of Windows 7 or vice versa.
* Windows Anytime Upgrade isn’t available in all editions of Windows 7 - obviously not in Ultimate version
Download Windows Anytime Upgrade key from here: http://u.to/MSek
What Is MD5 Hash & How to Use It ?
Message-Digest Algorithm 5
MD5 -
In this
post I will explain you about an interesting cryptographic
algorithm called MD5 (Message-Digest algorithm 5). This algorithm
is mainly used to perform file integrity checks under most circumstances. Here
I will not jump into the technical aspects of
this algorithm, rather will tell you about how to make use of this algorithm in
your daily life. Before I tell you about how
to use MD5, I would like to share one of my recent experience which made me
start using MD5 algorithm.
Recently my friend
made some significant changes and updates to his website and as obvious he
generated a complete backup of the site
on the server. He then downloaded this backup onto his PC and deleted the original one
on the server. But after a few days
something went wrong and he wanted to restore the backup that he downloaded. When he tried to restore the backup he was
shocked! The backup file that he used to restore was corrupted. That means, the
backup file that he downloaded onto his PC
wasn’t exactly the one that was on his server. The reason is that there occured
some data loss during the download
process. Yes, this data loss can happen often when a file is downloaded from
the Internet. The file can be corrupted
due to any of the following reasons.
Ø Data loss
during the download process, due to instability in the Internet connection/server
Ø The file
can be tampered due to virus infections or,
Ø Due to Hacker attacks
So whenever
you download any valuable data from the Internet it is completely necessary
that you check the integrity of the
downloaded file. That is you need to ensure that the downloaded file is exactly
the same as that of the original one. In
this
scenario the MD5 hash can become handy. All you have to do is generate MD5 hash
(or MD5 check-sum) for the intended
file on your server. After you download the file onto your PC, again generate
MD5 hash for the downloaded file.
Compare
these two hashes and if it matches then it means that the file is downloaded
perfectly without any data loss.
A MD5 hash
is nothing but a 32 digit hexadecimal number which can be something as follows :
A
simple MD5 Hash
e4d909c290d0fb1ca068ffaddf22cbd0
This hash
is unique for every file irrespective of it’s size and type. That means two
.exe files with the same size will not have the
same MD5 hash even though they are of same type and size. So MD5 hash can be
used to uniquely identify a file.
How to use MD5 Hash to check the Integrity of Files?
Suppose
you have a file called backup.tar on your server. Before you download, you need
to generate MD5 hash for this file
on your server. To do so use the following command.
For UNIX:
md5sum backup.tar
When
you hit ENTER you’ll see something as follows
e4d909c290d0fb1ca068ffaddf22cbd0
This
is the MD5 hash for the file backup.tar. After you download this file onto your PC, you can cross
check it’s integrity by again
re-generating MD5 hash for the downloaded file. If both the hash matches then
it means that the file is perfect.
Otherwise
it means that the file is corrupt. To generate the MD5 hash for the downloaded
file on your Windows PC use the following freeware tool.
“You can Download MD5 Summer
From Here: http://www.md5summer.org/download.html
“.
Labels:
Check Integrity,
MD5
Thursday, 21 March 2013
Types of Hackers !
Types of H4(|<3R$
Let’s see the categories of Hackers on the basis on their knowledge.
Coders
The Real Hackers are the Coders, the ones who revise the methods and create tools that are available in the market. Coders can find security holes and weaknesses in software to create their own exploits. These Hackers can use those exploits to develop fully patched and secure systems.
Coders are the programmers who have the ability to find the unique vulnerability in existing software and to create working exploit codes. These are the individuals with a deep understanding of the OSI Layer Model and TCP/IP Stacks.
Coders are the programmers who have the ability to find the unique vulnerability in existing software and to create working exploit codes. These are the individuals with a deep understanding of the OSI Layer Model and TCP/IP Stacks.
Admins
Admins are the computer guys who use the tools and exploits prepared by the coders. They do not develop their own techniques, however they uses the tricks which are already prepared by the coders. They are generally System Administration, or Computer Network Controller. Most of the Hackers and security person in this digital world come under this category.
Admins have experience with several operating systems, and know how to exploit several existing vulnerabilities . A majority of Security Consultants fall in this group and work as a part of Security Team.
Admins have experience with several operating systems, and know how to exploit several existing vulnerabilities . A majority of Security Consultants fall in this group and work as a part of Security Team.
Script Kiddies
Next and the most dangerous class of Hackers is Script kiddies, They are the new generation of users of computer who take advantage of the Hacker tools and documentation available for free on the Internet but don’t have any knowledge of what’s going on behind the scenes. They know just enough to cause you headaches but typically are very sloppy in their actions, leaving all sorts of digital fingerprints behind. Even though these guys are the teenage Hackers that you hear about in the news media, they need minimum skills to carry out their attacks.
Script Kiddies are the bunnies who use script and programs developed by others to attack computer systems and Networks. They get the least respect but are most annoying and dangerous and can cause big problems without actually knowing what they are doing.
Types of Hackers on the basis of activities performed by them.
White Hat Hacker
A White Hat Hacker is computer guy who perform Ethical Hacking. These are usually security professionals with knowledge of hacking and the Hacker toolset and who use this knowledge to locate security weaknesses and implement counter measures in the resources.
They are also known as an Ethical Hacker or a Penetration Tester. They focus on Securing and Protecting IT\ Systems.
Black Hat Hacker
A Black Hat Hacker is computer guy who performs Unethical Hacking. These are the Criminal Hackers or Crackers who use their skills and knowledge for illegal or malicious purposes. They break into or otherwise violate thesystem integrity of remote machines, with malicious intent.
These are also known as an Unethical Hacker or a Security Cracker. They focus on Security Cracking and Data stealing.
These are also known as an Unethical Hacker or a Security Cracker. They focus on Security Cracking and Data stealing.
Grey Hat Hacker
A Grey Hat Hacker is a Computer guy who sometimes acts legally, sometimes in good will, and sometimes not.They usually do not hack for personal gain or have malicious intentions, but may or may not occasionally commit crimes during the course of their technological exploits.
They are hybrid between White Hat and Black Hat Hackers
Thanks for Reading :)
They are hybrid between White Hat and Black Hat Hackers
Thanks for Reading :)
BSOD Screensaver :D
Internet Download Manager 6.12 Free Download
Download Internet Download Manager :
Download link - https://www.dropbox.com/sh/8dk0tcmebr25zwl/YVKMUpLBHB
Install it by disconnecting any Network connections , if you are connected to .
Use the Product key in the Key.txt file .
Enjoy uninterrupted Downloading :D
Download link - https://www.dropbox.com/sh/8dk0tcmebr25zwl/YVKMUpLBHB
Install it by disconnecting any Network connections , if you are connected to .
Use the Product key in the Key.txt file .
Enjoy uninterrupted Downloading :D
Wednesday, 20 March 2013
Why Linux ?
Linux is fast emerging as an affordable yet available operating system. As the popularity is growing so is the attention of players with malicious intent to break in to the systems.
Why Linux ?
# Majority of servers around the globe are running on Linux / Unix-like platforms
# Easy to get and Easy on pocket
# There are many types of Linux -Distributions /Distros / Flavors such as Red Hat, Mandrake, Yellow Dog, Debian etc.
# Source code is available
# Easy to modify.
# Easy to develop a program on Linux.
Linux is an operating system that can be downloaded free and "belongs" to an entire community of developers, not one
corporate entity. With more and more people looking for an alternative to Windows, Linux has recently grown in
popularity and is quickly becoming a favorite among major corporations and curious desktop users. Not only does it give
users a choice of operating systems, it also proves itself valuable with its power, flexibility, and reliability.
Linux supports most of the major protocols, and quite a few of the minor ones. Support for Internet, Novell, Windows,
and Appletalk networking have been part of the Linux kernel for some time now. With support for Simple Network
Management Protocol and other services (such as Domain Name Service), Linux is also well suited to serving large
networks. Since Linux was developed by a team of programmers over the Internet, its networking features were given
high priority. Linux is capable of acting as client and/or server to any of the popular operating systems in use today, and is quite capable of being used to run Internet Service Providers.
corporate entity. With more and more people looking for an alternative to Windows, Linux has recently grown in
popularity and is quickly becoming a favorite among major corporations and curious desktop users. Not only does it give
users a choice of operating systems, it also proves itself valuable with its power, flexibility, and reliability.
Linux supports most of the major protocols, and quite a few of the minor ones. Support for Internet, Novell, Windows,
and Appletalk networking have been part of the Linux kernel for some time now. With support for Simple Network
Management Protocol and other services (such as Domain Name Service), Linux is also well suited to serving large
networks. Since Linux was developed by a team of programmers over the Internet, its networking features were given
high priority. Linux is capable of acting as client and/or server to any of the popular operating systems in use today, and is quite capable of being used to run Internet Service Providers.
Linux is an implementation of the UNIX design philosophy, which means that it is a multi-user system. This has numerous
advantages, even for a system where only one or two people will be using it. Security, which is necessary for protection of
sensitive information, is built into Linux at selectable levels. More importantly, the system is designed to multi-task.
Whether one user is running several programs or several users are running one program, Linux is capable of managing the
traffic.
Another huge advantage of an open system is a large number of software authors and beta testers. This makes the
software testing and refinement process faster and better. Because there is not a lot of commercial software for Linux,
most software written for Linux is written because the authors want to do it and there need be no compromise of quality.
Linux is "Free" in two senses. In one sense, the Linux consumer is free to modify the system and do anything he or she
wishes with it. In another sense, acquiring Linux does not necessarily require any cash outlay at all.
advantages, even for a system where only one or two people will be using it. Security, which is necessary for protection of
sensitive information, is built into Linux at selectable levels. More importantly, the system is designed to multi-task.
Whether one user is running several programs or several users are running one program, Linux is capable of managing the
traffic.
Another huge advantage of an open system is a large number of software authors and beta testers. This makes the
software testing and refinement process faster and better. Because there is not a lot of commercial software for Linux,
most software written for Linux is written because the authors want to do it and there need be no compromise of quality.
Linux is "Free" in two senses. In one sense, the Linux consumer is free to modify the system and do anything he or she
wishes with it. In another sense, acquiring Linux does not necessarily require any cash outlay at all.
There are two very popular methods for acquiring and distributing Linux: FTP and CD-ROM. Most of the major Linux
distributions (Red Hat, Debian, Slackware, Caldera) are available for free download from several popular sites. Though
time consuming, it does not cost anything beyond connection charges.
Linux is one of the more stable operating systems available today. This is due in large part to the fact that Linux was
written by programmers who were writing for other programmers and not for the corporate system. There are currently
two mature program packaging standards in the Linux world - SuSE and Mandrake. Debian and Red Hat each have their
own packaging systems; both will check dependencies, both can upgrade an entire running system without a reboot. This
makes it easy to upgrade parts or all of a system, as well as add new software, or remove unwanted software
distributions (Red Hat, Debian, Slackware, Caldera) are available for free download from several popular sites. Though
time consuming, it does not cost anything beyond connection charges.
Linux is one of the more stable operating systems available today. This is due in large part to the fact that Linux was
written by programmers who were writing for other programmers and not for the corporate system. There are currently
two mature program packaging standards in the Linux world - SuSE and Mandrake. Debian and Red Hat each have their
own packaging systems; both will check dependencies, both can upgrade an entire running system without a reboot. This
makes it easy to upgrade parts or all of a system, as well as add new software, or remove unwanted software
Some DOWNLOAD Links For Linux Distributions :
Desktop Versions : www.linux.com/directory/Distributions/desktop
Embedded/Mobile Versions : http://www.linux.com/directory/Distributions/embeddedmobile
Security enhanced Versions : http://www.linux.com/directory/Distributions/security-enhanced
Labels:
Linux . Download Linux
E-Mail Tracing Explained
E-Mail Tracing Explained .
# Tracing an Email means locating the Original Sender and Getting to know the IP address of the network from
which the Email was actually generated.
which the Email was actually generated.
# To get the information about the sender of the Email we first must know the structure of the Email.
# As we all know the traveling of the Email. Each message has exactly one header, which is structured into fields.
#Each field has a name and a value. Header of the Email contains all the valuable information about the path and the original sender of the Email
#Each field has a name and a value. Header of the Email contains all the valuable information about the path and the original sender of the Email
#For tracing an email Address You need to go to your email account and log into the email which you want to trace
after that you have to find the header file of the email which is received by you.
after that you have to find the header file of the email which is received by you.
For Rediffmail-
Click on Show Full Headers on top of the mail
For Gmail :
Now see from bottom to top and the first IP address you find is the IP address of the sender.
Once you have the IP Address of the sender, go to the URL www.ip2location.com and Find the location of the IP Address.
Once you have the IP Address of the sender, go to the URL www.ip2location.com and Find the location of the IP Address.
And from where he had sent the email.
Thanks for reading !!
Tuesday, 19 March 2013
Setting up a Video as a Wallpaper in your Windows 7 PC
Setting up a Video as a Wallpaper
in your Windows 7 PC .
So in this tutorial , we are talking about how to get the much hyped 'Video Wallpaper/Live Wallpaper'
in your Windows 7 PC . This was a part of Microsoft Windows Vista Ultimate , but I don't know , what made Microsoft remove such a feature from Windows 7 , may be because of the Memory Usage it does or may be not !
Well , setting up a Video wallpaper in Windows 7 is quite easy . All thanks to , Dreamscene Seven :)
This Free App , gives you the power to set a Video as a Wallpaper ! The link for the app is given below :
Just click on the download button :
Install it and have fun :D You can set any .wmv (Windows Media Video) file as a desktop background . Just select the file and Right click on it and click on Set as Desktop Background .
Thats it , You are Done !!
Some .wmv files for download are available here :
http://www.dreamscene.org/gallery.php
Some .wmv files for download are available here :
http://www.dreamscene.org/gallery.php
Subscribe to:
Posts (Atom)