Are My Sites Up?

Yesterday I found out a great service for Webmasters! It informs the webmasters via mail or SMS whenever their site has? a downtime, cool isn’t (for webmasters :P) ?

This site – – provides its users with the data of their site’s uptimes and downtimes. There are two types of memberships @, they are: 1.Free Membership 2. Premium Membership. The free membership plans has all the basic services of the site whereas the premium membership extends the flexibility & support. The premium plan supports RSS Feeds Checks & reports, Twitter Integration, Premium Support & Keyword Search.

I’ve signed up for the free plan of this service to monitor Hacker’s Lane! Let’s see if they do what they have said… :D

List of Computer Abbreviations

Here’s a list of Computer Acronyms that I’ve found over the net…

Click Here to download the below list as a Text file :D

Some really useful bits…

ADSL – Asymmetric Digital Subscriber Line
AGP – Accelerated Graphics Port
ALI – Acer Labs, Incorporated
ALU – Arithmetic Logic Unit
AMD – Advanced Micro Devices
APC – American Power Conversion
ASCII – American Standard Code for Information Interchange
ASIC – Application Specific Integrated Circuit
ASPI – Advanced SCSI Programming Interface
AT – Advanced Technology
ATI – ATI Technologies Inc.
ATX – Advanced Technology Extended

— B —
BFG – BFG Technologies
BIOS – Basic Input Output System
BNC – Barrel Nut Connector

— C —
CAS – Column Address Signal
CD – Compact Disk
CDR – Compact Disk Recorder
CDRW – Compact Disk Re-Writer
CD-ROM – Compact Disk – Read Only Memory
CFM – Cubic Feet per Minute (ft?/min)
CMOS – Complementary Metal Oxide Semiconductor
CPU – Central Processing Unit
CTX – CTX Technology Corporation (Commited to Excellence)

— D —

DDR – Double Data Rate
DDR-SDRAM – Double Data Rate – Synchronous Dynamic Random Access Memory
DFI – DFI Inc. (Design for Innovation)
DIMM – Dual Inline Memory Module
DRAM – Dynamic Random Access Memory
DPI – Dots Per Inch
DVD – Digital Versatile Disc
DVD-RAM – Digital Versatile Disk – Random Access Memory

— E —
ECC – Error Correction Code
ECS – Elitegroup Computer Systems
EDO – Extended Data Out
EEPROM – Electrically Erasable Programmable Read-Only Memory
EPROM – Erasable Programmable Read-Only Memory
EVGA – EVGA Corporation

— F —
FC-PGA – Flip Chip Pin Grid Array
FDC – Floppy Disk Controller
FDD – Floppy Disk Drive
FPS – Frame Per Second
FPU – Floating Point Unit
FSAA – Full Screen Anti-Aliasing
FS – For Sale
FSB – Front Side Bus

— G —
GB – Gigabytes
GBps – Gigabytes per second or Gigabits per second
GDI – Graphical Device Interface
GHz – GigaHertz

— H —
HDD – Hard Disk Drive
HIS – Hightech Information System Limited
HP – Hewlett-Packard Development Company
HSF – Heatsink-Fan

— I —
IBM – International Business Machines Corporation
IC – Integrated Circuit
IDE – Integrated Drive Electronics
IFS- Item for Sale
IRQ – Interrupt Request
ISA – Industry Standard Architecture
ISO – International Standards Organization

— J —
JBL – JBL (Jame B. Lansing) Speakers
JVC – JVC Company of America

– K —
Kbps – Kilobits Per Second
KBps – KiloBytes per second

— L —
LG – LG Electronics
LAN – Local Area Network
LCD – Liquid Crystal Display
LDT – Lightning Data Transport
LED – Light Emitting Diode

— M —
MAC – Media Access Control
MB ? MotherBoard or Megabyte
MBps – Megabytes Per Second
Mbps – Megabits Per Second or Megabits Per Second
MHz – MegaHertz
MIPS – Million Instructions Per Second
MMX – Multi-Media Extensions
MSI – Micro Star International

— N —
NAS – Network Attached Storage
NAT – Network Address Translation
NEC – NEC Corporation
NIC – Network Interface Card

— O —
OC – Overclock (Over Clock)
OCZ – OCZ Technology
OEM – Original Equipment Manufacturer

— P —
PC – Personal Computer
PCB – Printed Circuit Board
PCI – Peripheral Component Interconnect
PDA – Personal Digital Assistant
PCMCIA – Peripheral Component Microchannel Interconnect Architecture
PGA – Professional Graphics Array
PLD – Programmable Logic Device
PM – Private Message / Private Messaging
PnP – Plug ‘n Play
PNY – PNY Technology
POST – Power On Self Test
PPPoA – Point-to-Point Protocol over ATM
PPPoE – Point-to-Point Protocol over Ethernet
PQI – PQI Corporation
PSU – Power Supply Unit

— R —
RAID – Redundant Array of Inexpensive Disks
RAM – Random Access Memory
RAMDAC – Random Access Memory Digital Analog Convertor
RDRAM – Rambus Dynamic Random Access Memory
ROM – Read Only Memory
RPM – Revolutions Per Minute

— S —
SASID – Self-scanned Amorphous Silicon Integrated Display
SCA – SCSI Configured Automatically
SCSI – Small Computer System Interface
SDRAM – Synchronous Dynamic Random Access Memory
SECC – Single Edge Contact Connector
SODIMM – Small Outline Dual Inline Memory Module
SPARC – Scalable Processor ArChitecture
SOHO – Small Office Home Office
SRAM – Static Random Access Memory
SSE – Streaming SIMD Extensions
SVGA – Super Video Graphics Array
S/PDIF – Sony/Philips Digital Interface

— T —
TB – Terabytes
TBps – Terabytes per second
Tbps – Terabits per second
TDK – TDK Electronics
TEC – Thermoelectric Cooler
TPC – TipidPC
TWAIN – Technology Without An Important Name

— U —
UART – Universal Asynchronous Receiver/Transmitter
USB – Universal Serial Bus
UTP – Unshieled Twisted Pair

— V —
VCD – Video CD
VPN – Virtual Private Network

— W —
WAN – Wide Area Network
WTB – Want to Buy
WYSIWYG – What You See Is What You Get

— X —
XGA – Extended Graphics Array
XFX – XFX Graphics, a Division of Pine
XMS – Extended Memory Specification
XT – Extended Technology

Know Someone’s IP & Location via Email

Getting someone’s IP Address or location was never so easy!

There’s a site which allows you to know the IP, Location, etc… of a person just by sending an email. The site is , which is actually meant for tracking emails but it can be used for getting such info also :P

For doing all this, you just need to attach an image provided by SpyPig. If you want, you can also use your images by making an ID @ .

To make the SpyPig image work, the victim must enable images in emails (which is usually disabled by default!). To make my victim do this, I made an ID at and added some wallpapers, and used them as SpyPig images and requested my victim to Enable images to view the wallpapers…

Shutdown & Restart Shortcuts

Don’t you think the process of shutting down or restarting the computer consumes a lot of time??
Let’s cut-short this process…its really easy :)
Just create a shortcut to “Shutdown” or “Restart” and assign a shortcut key to it.

For Creating a Shutdown Shortcut

  1. Right-click anywhere and in the menu, go to “New” and then click on “Shortcut“.
  2. A dialogue box would pop-up asking for the Target or the Location of the item for which you’re creating the shortcut.
  3. In that box, type “shutdown -s -t 000“. The “-t 000” in this command stands for the timer of shutdown, the “000” is the time after which Windows will Shutdown.
  4. Then, give a name to the shortcut which will help you to identify it.

Now, assign a shortcut key to your shortcut…

  1. Right-click on your shortcut that you made just now, and click on the “Properties”.
  2. In the “Properties“, go to the “Shortcut” tab. Look for “Shortcut Key” over there.
  3. In the “Shortcut Key” box, press the keys that you want to assign to your shortcut (Mine is “Ctrl + Alt + S“)

For Creating a Restart Shortcut

Follow the same steps taken for creating a Shutdown Shortcut, just replace the “shutdown -s -t 000” command with “shutdown -r -t 000” and give it a diferent name.
Then you can create a Shortcut Key using the steps given earlier.

I gurantee that if you shutdown or restart your computer using the Shortcut Keys, the time taken in the process will be 70% less than the total time that was taken before. :P

XSS (cross site scripting)

XSS is an abbreviation of cross-site scripting.


XSS is a security breach that takes advantage of dynamically generated Web pages.
In an XSS attack, a Web application is sent with a script that activates when it is read by an unsuspecting user?s browser or by an application that has not protected itself against cross-site scripting. Because dynamic Web sites rely on user input, a malicious user can input malicious script into the page by hiding it within legitimate requests.
It won’t give u a ‘root‘ or SYSTEM access on a web server.As it lives purely on application level,so it will get u some information about the web application.Its mere an ability of injecting HTML tags in the input of a web application.It is generally believed to be one of the most common application layer hacking techniques.It refers to that hacking technique that leverages vulnerabilities in the code of a web application which allow an attacker to send malicious content from an end-user .Its attacks occur when an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a different end user.Flaws that allow these attacks to succeed are wide spreaded and occur anywhere were a web application uses input from a user in the output it generates without validating or encoding it.
It is also referred to as malicious tagging because its a type of computer security vulnerability typically found in web applications which allow code injection by malicious
web users into the web pages viewed by other users.
Examples of such code include HTML code and client-side scripts.
Common exploitations include search engine boxes, online forums and public-accessed blogs,etc.
Once XSS has been launched, the attacker can change user settings, hijack accounts, poison cookies with malicious code, expose SSL connections, access restricted sites and even launch false advertisements.
The simplest way to avoid XSS is to add code to a Web application that causes the dynamic input to ignore certain command tags.
Scripting tags that take advantage of XSS include <SCRIPT>, <OBJECT>, <APPLET>,
<EMBED> ,<FORM> & many more.
Common languages used for XSS include JavaScript, VBScript, HTML, Perl, C++, ActiveX
and Flash.
In short, its a common flaw found in today’s web applications & can cause serious
damage to a web application. Detecting these vulnerabilities early in the development process will help protect a web application from unnecessary flaws.
These are executed on the client-side (ie in the user?s web browser) rather than on the server-side. In itself its a threat which is brought about by the internet security weaknesses of client-side scripting languages. Its concept is to manipulate client-side scripts of a web application to execute in the manner desired by the malicious user.
Such a manipulation can embed a script in a page which can be executed every time the page is loaded, or whenever an associated event is performed. Its a trick which often is used to make malicious URLs less obvious is to have the XSS part of the URL encoded in HEX (or other encoding methods). This will look harmless to the user who recognizes the URL he is familiar with, and simply disregards and following tricked? code which would be encoded and therefore inconspicuous.It can be used to steal sensitive data from a back-end database Exploited XSS is commonly used to achieve the malicious results such as Identity theft , Accessing sensitive or restricted information,Gaining free access to otherwise paid for content, Spying on user?s web browsing habits , Altering browser functionality, Public defamation of an individual or corporation, Web application defacement, Denial of Service attacks & many more !


Three distinct types of XSS vulnerabilities exist: non-persistent, persistent and DOM-based (which can be either persistent or non-persistent).

Remedy (in short)

To check for Cross site scripting vulnerabilities, use a Web Vulnerability Scanner.A Web Vulnerability Scanner crawls your entire website and automatically checks for Cross Site Scripting vulnerabilities. It will indicate which URLs/scripts are vulnerable to these attacks so that you can fix the vulnerability easily. Besides Cross site scripting vulnerabilities a web application scanner will also check for SQL injection & other web vulnerabilities.To prevent these attacks, dangerous characters must be filtered out from the web application inputs. These should be filtered out both in their
ASCII and HEX values.A quick fix we can do being an end user is turning off javascript,
but having an Internet so polluted by active menu’s & javascript enabled forms,
a part of the internet might not function properly.The real fixing should be done on the application developer side. Filter & check all user input.SQL injection would be a problem that should be dealt with,but XSS isn’t always !
Many web application security do filter on certain characters such as single quote but many don’t filter on HTML code.Many automated security scanners give false positives while acessing a web server’s security.Some input fields might not be filterd but other
users can’t edit them.The danger of XSS lies in passing the data on to other ,
malicious , parties.

Get System Info using Command Prompt

How well do you know your system?
Do you know what is your OS’s version, System Model, System Type (x64 or x86), Processor(s) etc.?

It’s not so easy to get such infos…but you can get it easily using CMD (Command Prompt).

Go to “Run” (Windows Key + R) and type “cmd.exe” and hit “Enter“. This will pop-up “Command Prompt” window.
In Command Prompt, type “systeminfo” and hit “Enter“.
After sometime, you would see extended/advanced info of your System.

These infos are very useful, if you want, you can store it in a text file by entering the following line in Command Prompt:
systeminfo >D:\systeminfo.txt

In the above command, the “>” arrow tells Command Prompt to write the output to “systeminfo.txt” in the location “D:\” .?You can also replace the file’s name and the location where you want your file to be.

XAMPP: The Ultimate Web Development Tool

XAMPPSetting up a Apache Server is not an easy job…and it can take up a lot of brain if you have to use languages such as PHP or Perl on your Apache Server. XAMPP is the solution for Web Developers who want a Local Web Server, which they can use even without access to Internet…

My Story

I came to know about XAMPP through a friend of mine, who is a Web Developer. He insisted me to use XAMPP for testing PHP scripts and trying out new things on Hacker’s Lane, on the Local Web Server. At first I thought it would be a mess and I won’t be able to install a Local Web Server for developing things. Later I realized that it was a very easy job to install a Web Server using XAMPP & now, I am using XAMPP and I’ve to say, its Awesome!

What is XAMPP?

XAMPP is a free, open source , cross-platform web server package develped by Apache Friends. It mainly consists of Apache Web (HTTP) Server & MySQL Database. XAMPP also supports PHP and Perl, it has interpreters for scripts written in those languages.

What does XAMPP mean?

XAMPP is an acronym for: X=cross-platform, A=Apache HTTP server, M=MySQL, P=PHP, P=Perl.

What are its uses?

It’s used to serve Dynamic Pages. XAMPP is mainly used for Web Development Projects. Amazingly, XAMPP is sometimes also used to serve Dynamic Pages on the WWW.

XAMPP can also be used for creating and manipulating MySQL Databases.

Thats it for now, in my further posts, I would be posting on how to install, configure and use XAMPP as a Local Web Server on your PC. (Subscribe to RSS to be informed about the upcoming posts…)