Saturday, 27 December 2014

How do block/unblock a website using command prompt

In Windows XP/ Windows 7 u have must to do Below Steps

1. Click Start->All Programs->Accessories->Command Prompt2. Click Command Prompt This will open a DOS command window.
3. Type: notepad C:/Windows/System32/drivers/etc/hosts
4. Locate the line 127.0.0.1 localhost
5. To block the website google.com for example, just add this text under 127.0.0.1 localhost:


127.0.0.1 google.com
127.0.0.1 www.google.com



You can add as many sites any site, However you will need to prefix it with "127.0.0.1".

6. Save the file
Google will now be blocked in all web browser. This is an advanced but easy method on how to blow a website. 


TO UNBLOCK:


1st Trick
1- Open the command prompt
2- Ping the website you want to unblock by typing "ping www.website.com" without the ""
3- Copy the IP next to "Reply From"
4- Paste the IP into your address bar.

2nd Trick
1- Open command prompt and notepad.
2- Write "ping localhost" without the "" into the command prompt.
3- Copy the IP into the notepad file, hit tab and write localhost
4- Ping the website you want to unblock in the command prompt, as in "ping www.website.com" without the ""
5- Copy the IP of the site into the notepad file, hit tab and write the link to the site, without http://, as in "www.google.com"
6- Hit enter and repeat step 5, should look like this

00.00.0.00 localhost
000.000.00.00 www.website.com
000.000.00.00 www.website.com

7- Save the notepad file into your desktop as "host." with the "", if it wont let you just leave it as host. with the "."
8-Go to My Computer>Your Hardrive>WINDOWS>system32>drivers>ect and drag the notepad file into that folder

Windows TCP/IP Utilities

Windows TCP/IP UtilitiesThe following are the IP utilities available in Windows that help in finding out the information about IP Hosts and domains. These are the basic IP commands that every beginner in the field of hacking must know!
Please note that the the term Host used in this article may also be assumed as aWebsite for simple understanding purpose.

1. PING

PING is a simple application (command) used to determine whether a host is online and available. PING command sends one or more ICMP “Echo message” to a specified host requesting a reply. The receiver (Target Host) responds to this ICMP “Echo message” and returns it back to the sender. This confirms that the host is online and available. Otherwise the host is said to be unavailable.
Syntax:
C:\>ping gohacking.com

2. TELNET

Telnet command is used to connect to a desired host on a specified port number. Just like a house having several doors, a host or a server has different ports running different services. For example port 80 runs HTTP, port 23 runs TELNET while port 25 SMTP. Like this there are several ports on a server through which it is possible for a remote client to establish a connection.
For a connection to be established, the port has to be open. For example, in the following command, we are trying to establish a connection with the Yahoo server on port 25.:
Syntax:
C:\>telnet yahoo.com 25
C:\>telnet yahoo.com
The default port number is 23. When the port number is not specified the default number is assumed.
NOTE: If you are using Vista or Windows 7, Telnet feature may not be available by default. 

3. NSLOOKUP

Many times, we think about finding out the IP address of a given site. Say for example google.com, yahoo.com, microsoft.com etc. But how to do this? There are several websites out there that can be used to find out the IP address of any given website. However, in the Windows operating itself, we have an inbuilt tool to do this job for us. It is called “nslookup”.
This tool can be used for resolving a given domain name into its IP address (determine the IP of a given site name). Not only this, it can also be used for reverse IP lookup. That is, if the IP address is given it determines the corresponding domain name for that IP address.
Syntax:
C:\>nslookup google.com

4. NETSTAT

The netstat command can be used to display the current TCP/IP network connections. For example, the following “netstat” command displays all the currently established connections and their corresponding listening port numbers on your computer.
Syntax:
C:\>netstat -a
Type “Ctrl+Z” to exit.
This command can be used to determine the IP address/Host names of all the applications connected to your computer. If a hacker is connected to your system even the hacker’s IP is displayed. So, the “netstat” command can be used to get an idea of all the active connections of a given system.
NOTE: In order to obtain help on any given command such as its syntax, attributes etc., just type the “command-name /?” to obtain usage details on it. For example, to obtain help on “netstat” command just type: netstat /? and hit enter.

Simple Questions: What is the BIOS & What Does It Do?

If you are a casual computer user, you may have heard about the BIOS, or BIOS failures or Dual - BIOS motherboards, but you may not understand very well what all these terms are. What is a BIOS except a weird-sounding acronym? What does it do and why is it important? If you read this article you will learn the answers to these questions and more.

What is the BIOS?

BIOS is a low level software, the first software to run when you power up the system. For a better understanding of what low level software means, you should know that the programs installed on your system, that you use daily, like your browser, media player, office suite are high level software because they interact with the operating system. The operating system is a mid level software because it interacts with hardware components through drivers and the BIOS. The BIOS is low level software because it directly controls the way hardware components work.
The BIOS provides a number of services that allow users and higher level software to configure the settings for a computer's hardware components and to get direct information from those components. For example both the user and the software installed on a computer can learn the rotation speed of the coolers that are found in the computer case or the temperature of several components, including but not limited to the processor or the video card.
The term BIOS is an acronym for Basic Input/Output System. You should think of it as the software that intermediates data transfers between the hardware components of a system and the user or the software installed on that system.

How Does the BIOS Work & How to Interact With It?

BIOS are generally very small programs, with a size of up to 16 MB. Modern BIOSes have a user interface, usually called Setup Utility, where the user can configure many hardware settings.
On laptops or tablets you will often encounter simplified BIOS versions, in which the user can only set the time and a couple of other things like the boot order.
BIOS, what is, settings, characteristics
On more advanced motherboards like those found on desktop computers, the BIOS provides many options, including ways to configure the CPU clock or its voltage, the shared memory between the CPU and the GPU, the RAM latency and so on.
Configuring an advanced BIOS may be dangerous if the user doesn't know what every setting does and sets the wrong values, because the components of the system have limitations in the way they can be set. For example, asking the processor to work at a very high frequency can make it overheat, throwing the computer into an endless restart loop. To make sure that you are safe, configure the BIOS settings only after consulting your system's manual and be sure you know the capabilities of the hardware components you are setting.
BIOS, what is, settings, characteristics
Another job the BIOS has to deal with is to store these configuration settings when the system is powered off. To do this, it has a small amount of volatile CMOS memory, that is powered by a battery like the one in the picture below. The term CMOS stands for Complementary Metal–Oxide–Semiconductor, representing the technological process used to make this memory chip.
When referring to computers, CMOS is the memory chip that holds the hardware settings of the computer. To learn more about this subject, please check this article on Wikipedia.
BIOS, what is, settings, characteristics, CMOS
If the battery of the CMOS memory chip is dead and it can no longer provide energy, the BIOS will use the built-in default settings and not the custom settings you have set.

Computers & Devices Cannot Start Without the BIOS

The most important task the BIOS must handle is making the transition from a mechanical, hardware gesture, like touching the power button to a more abstract level, like showing your operating system logo on the screen. This means that, when you power-up your system, the BIOS is the first program to run. Its job is to start the coolers, check power levels, run some quick tests that evaluate the health of the system's hardware and then load drivers and start the boot process for the operating system. If there is any failure during this process, the BIOS displays a message informing you of what is wrong. In the screenshot below you can see and example of a possible error.
BIOS, what is, settings, characteristics, error
Before the BIOS was invented in 1975 by a computer scientist named Gary Arlen Kildall, the operating system was the first software to run when a computer started. That meant that the computer could only run the built-in operating system. Also, an operating system failure bricked the computer, because no other software could repair it, since it was not able to run before the operating system.
We can understand that using a BIOS provides a plus of flexibility, allowing users to install the operating system they want or to repair the current operating system if an error occurs.

What is the Dual-BIOS?

The BIOS is located on the motherboard and it is a small Read-Only memory chip. The software on that memory chip is created by the manufacturer of the motherboard and you can see what it looks like in the picture below.
BIOS, what is, settings, characteristics, Dual-Bios
If this memory chip fails, the BIOS cannot be loaded anymore, and the motherboard cannot be used. This is why motherboard manufacturers use a Dual-BIOS system on their modern motherboard. Dual-BIOS means that there are two chips for storing the BIOS: one for the main BIOS and one for a backup copy. If the main BIOS chip fails, you are asked to restart the computer and the backup BIOS chip is used to load the BIOS with the default settings.

What is UEFI & What Does it Have To Do with the BIOS?

UEFI stands for Unified Extensible Firmware Interface and you can look at it as a modern and more powerful BIOS. It has the same role as the traditional BIOS but it includes more features like cryptography or remote diagnostics and computer repair, even when there is no operating system installed. This type of BIOS was invented by Intel and it was first released in 2005.
UEFI became popular after the Windows 8 operating system was launched, because it was the first big operating system to provide native support for it.
Just like traditional BIOS, the UEFI is customized by the manufacturer of the motherboard you are using. On tablets and laptops, the UEFI BIOS will display few customization options. In the picture below you can see how it looks like on a Surface Pro 2 from Microsoft.
BIOS, what is, settings, characteristics, UEFI
On desktop computers, the UEFI BIOS will display many customization options, more than those you can find on traditional BIOSes.

Conclusion

As you can see from this article, the BIOS is a key component of any computer or device and knowing how to use it can provide more flexibility and some performance benefits. Knowledgeable users and IT professionals can use the BIOS to squeeze the maximum performance possible from their computers and devices. If you are not much of an expert that's fine. The default BIOS settings usually fit the needs of a casual user and your system will work fine even though you don't fiddle with the its settings.

Why Are There Two Desktop.ini Files On My Desktop & What Do They Do?

If you've set Windows to display all the files on your computer, including those that are hidden and those that are protected by the operating system, you will notice on yourDesktop two hidden Desktop.ini files. Why are there 2 files with the same name on yourDesktop? How can that be? What purpose do they serve? In this article we will shed some light on this matter, so read on to find the answers you seek.

How Do You See The Two Hidden Desktop.ini Files?

The two Desktop.ini files aren't always visible and most Windows users never see them. However, if you've set Windows to display both hidden and protected files, they will show up on yourDesktop.
If you don't know how to make Windows display these types of files, the appropriate settings are found in the Folder Options window of File Explorer or Windows Explorer.
In the Advanced settings section of the View tab, check "Show hidden files, folder, or drives" and uncheck "Hide protected operating system files". When done, click or tap OK.Windows, Dekstop, Desktop.ini, files, what they are, what they do
When Windows is set to display these types of files, you'll find the two Desktop.ini files on yourDesktop. You can see them below.

What Are The Two Desktop.ini Files?

Desktop.ini file is a file that determines the way a folder is displayed by Windows. These files can be found in any folder, anywhere on your computer, as long as that folder has a custom appearance set for it. Desktop.ini files control things like the icon used for that folder and its localized name.
For example, if a certain folder has a custom icon set by you or by the operating system, that icon's path is stored in the Desktop.ini file of that folder. In the screenshot below, you can see an example of how a Desktop.ini file looks.
Windows, Dekstop, Desktop.ini, files, what they are, what they do
If you'd like to read more about customizing folders using Desktop.ini files, you can find some detailed instructions and explanations here: How to Customize Folders with Desktop.ini.

Why Are There Two Desktop.ini Files On My Desktop?

Why do we have two Desktop.ini files on our Desktop? To understand the answer, we should keep in mind the following:
  1. First, the Desktop is a folder that's unique to every user account. Only the current user or the administrator has access to that user's Desktop folder. This folder is located at the following path: "C:\Users\Your Username\Desktop".
  2. Windows, Dekstop, Desktop.ini, files, what they are, what they do
  3. The Desktop displayed by Windows is a combination of your user's Desktop and the Public Desktop folder. The Public Desktop folder is used automatically by all the users on your computer. It is located in the folder "C:\Users\Public\Desktop" and it holds the items that are available on every user's standard Desktop.
  4. Windows, Dekstop, Desktop.ini, files, what they are, what they do
You see two Desktop.ini files because your Desktop is a combination of two folders, each with its own Desktop.ini file: one for your user account and one for the Public Desktop.

Can I Delete The Desktop.ini Files On My Desktop?

Deleting the Desktop.ini files is not recommended even though it is not really harmful. The only thing they do is store some visual customization options and deleting them won't damage your Windows installation. The only consequence of this action is that the folder in which they are found will lose its custom appearance when it is displayed by Windows.
If you would rather not see Desktop.ini files anywhere on your computer, hide the system files that are protected by the operating system. To do that, enable the "Hide protected operating system files (Recommended)" setting in the Folder Options window.
Windows, Dekstop, Desktop.ini, files, what they are, what they do

Simple Questions: What Is USB or Universal Serial Bus?

USBEveryone has used at least once a device that was connected to another device with the help of a USB port. Whether we are talking about flash memory sticks or other peripherals like printers, many devices are using the USB standard connector. In this article we will share what USB stands for, what it does and what are the advantages and disadvantages of using USB to connect devices.
Credit: The images used in this article are from Wikipedia.

What Does USB Mean?

USB stands for Universal Serial Bus and it is a term that defines cables, connectors and communications protocols used in communication between devices. It was designed in 1996 by a group of seven companies that included MicrosoftCompaqIBMIntelDECNEC and Nortel. Its purpose was to standardize the connection between peripheral devices like printers, keyboards, mice and personal computers.

These companies wanted to replace theUSB, Universal Serial Bus, what it, what it does
 multitude of connectors that were used back then, removing problems like the usability issues of existing interfaces and simplifying the software configuration of all devices that were connected via USB, as well as permitting greater data transfer rates between devices.
USB has become a very successful standard and it is now used by many devices in the world. Today there is no computer that's manufactured without at least one USB port.

Types Of USB Connectors

The are two USB standard plugs: Standard A and Standard B. They are show in the diagram below.

USB, Universal Serial Bus, what it, what it does
If you haven't realized yet, the USB connector is an electronic device, so like any other electronic device it needs electrical energy to operate. It receives energy through pins 1 and 4, and the data is transferred through pins 2 and 3.
Nowadays, almost any device you can buy can be connected to a personal computer via the USB interface, whether it is a keyboard, mouse, smartphone, printer or something else. Even a device that's designed and built by you can be connected with your computer. Also, the USB interface permits power supply exchanges between computers and electronic devices. For example, this means that the battery of a smartphone will charge while the device is connected to a computer via USB.
In order to use this new technology on smaller devices like cell phones, portable game consoles or other similar devices, the Mini USB port was released in October 2000. This connector is rated at 5.000 connect-disconnect cycles. It has been used by PDA's and early smartphones.

USB, Universal Serial Bus, what it, what it does
In 2007, the new Micro USB was announced. The thinner micro connectors are intended to replaceMini USB in new devices including smartphones, personal digital assistants, and cameras. TheMicro USB plug design is rated for at least 10.000 connect-disconnect cycles, which is more than the Mini USB plug design. This plug has revolutionized the way portable devices are connected. The Micro USB was endorsed as the standard connector for data and power on mobile devices and as a universal charging solution. You can see it in the diagram below.
USB, Universal Serial Bus, what it, what it does
In order to use the speed rates of USB 3.0 on smartphones, the Micro USB 3.0 connector was created. It consists of a standard USB 2.0 MicroUSB cable plug with 5 additional pins. The Micro USB 3.0 receptacle is compatible with the Micro USB 2.0 plug. Samsung Galaxy Note 3 was the first smartphone to include this connector.
USB, Universal Serial Bus, what it, what it does

USB Versions & Speed Standards

Several years have passed since the release of the first version of the USB interface, so in the following we'll show you all stages of development from the first version, in January 1996, up to the latest, in July 2013. Today, the most used USB interface is still USB 2.0, but all manufacturers will switch to newer standards in the near future. In the table below you see when each USB version was released and its speed and data rates.

USB, Universal Serial Bus, what it, what it does



Security problems

According to The Verge, researchers Karsten Nohl and Jakob Lell discovered a huge problem with the firmware of USB devices which they called BadUSB. The problem is that the software of the USB chip can be overwritten, allowing attackers to take control of devices connected to the computer via the USB interface. The problem cannot be solved because of how the Universal Serial Bus was designed. Even worse, any device can be compromised, even a mouse. The only solution is to use a new USB accessory with newer firmware that doesn't have this security problem.
In simple terms this means that if you're not careful and you are using a compromised USB device, someone else can use it to control your computer remotely. Just think about what might happen if someone were to control the keyboard, mouse or webcam.
You can find a very technical explanation and demonstration of this security issue, in the presentation below.

Conclusion

Currently, most connections between devices are done via the USB interface. Even if some security vulnerabilities were found, is very hard to give up on this interface because there aren't many other good alternatives out there.
If you are looking for other useful articles about technology, don't hesitate to read our recommendations below.

Friday, 26 December 2014

EASY STEPS TO CHANGE YOUR IP IN LESS THAN A MINUTE,,,!!!




Here is the 10 most easy quick step method to change the IP address by changing the properties in LAN (Local Area Netwok).

Step 1:
Click on "Start"---> "Run"
Then Type in "command" or "cmd" and hit OK or press ENTER.

Step 2:





In the Command Prompt also known as "MS-DOS" prompt just type "ipconfig /release" & Hit Enter.

Type "exit" and leave the
prompt

Step3 :
Right-click on "Network Places" or "My Network Places" ---> Click on "properties" .Then Right click on "Local Area Connection"--->Click
"properties"

Step 4:
Now click on the "Internet Protocol (TCP/IP)" from the list under the "General" tab

Step 5: Click on "Use the following IP address" under the "General" tab
BINGOOO,,,,!!! Now you can type in your own IP address .

Step 6:

Now Press "Tab" and it should automatically fill in the "Subnet Mask" section with default numbers.

Step 7:
Hit the "Ok" button twice and you are now back to the "Local Area
Connection" screen.
Step 8:
Now Right-click back on "Local Area Connection" and go to properties again.

Step 9:
Go back to the "TCP/IP" settings
Now , Select "Obtain an IP address automatically"
Step 10:
Hit "Ok" twice again

BANG BANG BANG,,,,,!!!! :D ;)
You now have a new IP address However it only changes your
dynamic IP address and not not your ISP/IP address.

Hope you enjoyed this post,,,!!! Cheers,,,!!! ;)

HOW TO FIND PERSON THROUGH HIS EMAIL-ADDRESS?


How to find person through its email-address?
If you get email from unknown person and before giving reply to email, you want to find little information about that person , then you need reverse email-address lookup. Or someone who abuse you , & you want to trace person you should use reverse email-address lookup.
If person has website or listed his account in any public website then you can find information about use of search engine. But in most cases , person use fake email-address for communication.

(1)If person use any desktop client(like outlook,Evolution mail etc) to send email then you can trace his I.P. From email. But if he send from browser then you get location of his email provider. For example , person send email from gmail through web-browser then you get location of gmail server.

Open the header of the email message and look for lines that say “Received: from” followed by an IP address in square brackets. If there are multiple entries, use the IP address mentioned in the last entry.
Now paste the IP address in this trace route tool and you should get a fairly good idea about the location of the email sender.




(2)Try to email search with Facebook. Facebook is largest social website nowadays , if person register his account on that email , then you can search his profile by email-address in facebook. Put his email-address in facebook search-box. 
 find-person-through-his-email-address

(3)If the email address of the send is something like nirav_91@hotmail.com, there’s a probably that he or she may have created accounts of some other social network using the same alias “nirav_91” – put that in knowem.com to confirm. 
 find-person-through-his-email-address

(4)Finally, if nothing works, you should try a people search service like Pipl and Spokeo –both services let you perform reverse email lookups but Spokeo has a more comprehensive database than Pipl.(But some Information in Spokeo need subscription) 
 find-person-through-his-email-address

Other than regular web documents, Spoke also scans social networks and even the whois information of domain names to find any bit of information associated with an email address.  

Related Posts Plugin for WordPress, Blogger...
Twitter Delicious Facebook Digg Stumbleupon Favorites More

 
TRICKS AND TIPS CREATED BY SUSHIL UPADHYAY| Grants for single moms