WLAN Security

Wireless Security is very important for WLANs. Further, if your WLAN is insecured, then someone can easily destroy your PC, play with your Privacy and/or Get confidential info that is stored on your PC.

The first step in the process of securing of WLAN is password Protecting it. The main options for password protection are:

  • WEP
  • WPA
  • WPA2

I recommend you to use the WPA2 as it uses the latest encryption technology and is more secure than the others. WEP and WPA passwords can be cracked by using certain cracking tools such as Aircrack-ng, Airsnort, etc.

Then you need to choose a safe password. After doing that there are some other steps you need to follow to make your WLAN hackproof.

They are:

  1. Turn off? “File & Printer Sharing” if you don’t require it. If you require it then make sure to password-protect the shared drives/folders/files (Read my post for further info: ‘File & Printer Sharing ‘ Exploit-Protection or if you want to know the harms of ‘File & Printer Sharing’ Exploit then Click Here.)
  2. If your WLAN is not a hotspot & is used for Private Purposes then restrict users using MAC Addresses. You can specify which MAC Addresses can connect to the WLAN in your router settings.
  3. The best way to secure your network ( not WLAN) is by securing your IP. You can use softwares such as Anonymizer to hide your IP. This step will ensure that you are 75% protected from HacKeRs.
  4. You can further securify your WLAN by disabling the SSID (service set identifier) broadast.
  5. Download tools such as Airmagnet and spoofers to check you own network for vulnerabilities.

Anonymous Browser

Guyz, now here’s a really good tool “Freegate” which makes you Anonymous, its a proxy!
Everyone wants to be anonymous…
Especially a hacker & others just wanna protect themselves from getting hacked. Anonymous browsing can’t be truly anonymous, there always are ways to trace out a anonymous person…
So remember don’t think that you can do illegal deeds by using this tool!
It makes you anonymous by giving you a random IP and also provides you with a Proxy to overcome the censorship…

Download: HERE

Increase your RAM via V-RAM?

GuYz & GaLz…
Increase your RAM via using the Virtual RAM feature of Windows…
Its a good feature if you’ve got real less RAM or want to run apps which require more RAM than what you have…
I found it while exploring the Control Panel…
Windows creates a paging file on the Windows directory named “pagefile.sys”. Actually this file is used as RAM by Windows, but still it can’t function like the real RAM. This RAM is called Virtual RAM or V-RAM(by ME!)…
The good thing is that you can also alter the pagefile; create multiple pagefiles and also alter its size limit…
Here’s how to do it:

  1. Goto “Control Panel” and switch to “Classic View” if it isn’t! Then open “System”.
  2. Move over to the “Advanced” tab and click? on the ‘settings’ under “Performance”.
  3. In the ‘Performance Options’ again move over to “Advanced”.
  4. At the bottom you can see the ‘Virtual Memory’ and a button under it “Change”. Click on “Change” and there you can change the settings for it…
  5. Its a better idea to create a paging file on all partitions of a drive. That’s what I did!

EnJoY A BeTTeR PC –HacK_MiNDeD

Best Online Shopping Portal – ShopWiki.co.uk

ShopWiki is a revolution for online shoppers.It will give shoppers everything, and it has got 30,000 stores instead of the 1,000 stores on other shopping sites.Its really amazing, you can get evrything you have got to get!

It means that everything for sale on the net can be found on ShopWiki. From Sport Utilities to Household Products and whatever you’d ever need!

The biggest point is that online shopping sites show you stores that have paid for placement, but ShopWiki provides you all, for free.

DOS Commands List: All Commands

Do you know complete DOS Commands?
Or Wanna know it?
Get this list and save it, as its important for HacKinG.
List starts here:

  • ADDUSERS Add or list users to/from a CSV file
  • ARP Address Resolution Protocol
  • ASSOC Change file extension associations
  • ASSOCIAT One step file association
  • AT Schedule a command to run at a later time
  • ATTRIB Change file attributes
  • BOOTCFG Edit Windows boot settings
  • BROWSTAT Get domain, browser and PDC info
  • CACLS Change file permissions
  • CALL Call one batch program from another
  • CD Change Directory – move to a specific Folder
  • CHANGE Change Terminal Server Session properties
  • CHKDSK Check Disk – check and repair disk problems
  • CHKNTFS Check the NTFS file system
  • CHOICE Accept keyboard input to a batch file
  • CIPHER Encrypt or Decrypt files/folders
  • CleanMgr Automated cleanup of Temp files, recycle bin
  • CLEARMEM Clear memory leaks
  • CLIP Copy STDIN to the Windows clipboard.
  • CLS Clear the screen
  • CLUSTER Windows Clustering
  • CMD Start a new CMD shell
  • COLOR Change colors of the CMD window
  • COMP Compare the contents of two files or sets of files
  • COMPACT Compress files or folders on an NTFS partition
  • COMPRESS Compress individual files on an NTFS partition
  • CON2PRT Connect or disconnect a Printer
  • CONVERT Convert a FAT drive to NTFS.
  • COPY Copy one or more files to another location
  • CSVDE Import or Export Active Directory data
  • DATE Display or set the date
  • Dcomcnfg DCOM Configuration Utility
  • DEFRAG Defragment hard drive
  • DEL Delete one or more files
  • DELPROF Delete NT user profiles
  • DELTREE Delete a folder and all subfolders
  • DevCon Device Manager Command Line Utility
  • DIR Display a list of files and folders
  • DIRUSE Display disk usage
  • DISKCOMP Compare the contents of two floppy disks
  • DISKCOPY Copy the contents of one floppy disk to another
  • DNSSTAT DNS Statistics
  • DOSKEY Edit command line, recall commands, and create macros
  • DSADD Add user (computer, group..) to active directory
  • DSQUERY List items in active directory
  • DSMOD Modify user (computer, group..) in active directory 
  • ECHO Display message on screen
  • ENDLOCAL End localisation of environment changes in a batch file
  • ERASE Delete one or more files
  • EXIT Quit the CMD shell
  • EXPAND Uncompress files
  • EXTRACT Uncompress CAB files
  • FC Compare two files
  • FDISK Disk Format and partition
  • FIND Search for a text string in a file
  • FINDSTR Search for strings in files
  • FOR Conditionally perform a command several times
  • FORFILES Batch process multiple files
  • FORMAT Format a disk
  • FREEDISK Check free disk space (in bytes)
  • FSUTIL File and Volume utilities
  • FTP File Transfer Protocol
  • FTYPE Display or modify file types used in file extension associations
  • GLOBAL Display membership of global groups
  • GOTO Direct a batch program to jump to a labelled line
  • HELP Online Help
  • HFNETCHK Network Security Hotfix Checker
  • IF Conditionally perform a command
  • IFMEMBER Is the current user in an NT Workgroup
  • IPCONFIG Configure IP
  • KILL Remove a program from memory
  • LABEL Edit a disk label
  • LOCAL Display membership of local groups
  • LOGEVENT Write text to the NT event viewer.
  • LOGOFF Log a user off
  • LOGTIME Log the date and time in a file
  • MAPISEND Send email from the command line
  • MEM Display memory usage
  • MD Create new folders
  • MODE Configure a system device
  • MORE Display output, one screen at a time
  • MOUNTVOL Manage a volume mount point
  • MOVE Move files from one folder to another
  • MOVEUSER Move a user from one domain to another
  • MSG Send a message
  • MSIEXEC Microsoft Windows Installer
  • MSINFO Windows NT diagnostics
  • MSTSC Terminal Server Connection (Remote Desktop Protocol)
  • MUNGE Find and Replace text within file(s)
  • MV Copy in-use files
  • NET Manage network resources
  • NETDOM Domain Manager
  • NETSH Configure network protocols
  • NETSVC Command-line Service Controller
  • NBTSTAT Display networking statistics (NetBIOS over TCP/IP)
  • NETSTAT Display networking statistics (TCP/IP)
  • NOW Display the current Date and Time
  • NSLOOKUP Name server lookup
  • NTBACKUP Backup folders to tape
  • NTRIGHTS Edit user account rights 
  • PATH Display or set a search path for executable files
  • PATHPING Trace route plus network latency and packet loss
  • PAUSE Suspend processing of a batch file and display a message
  • PERMS Show permissions for a user
  • PERFMON Performance Monitor
  • PING Test a network connection
  • POPD Restore the previous value of the current directory saved by PUSHD
  • PORTQRY Display the status of ports and services
  • PRINT Print a text file
  • PRNCNFG Display, configure or rename a printer
  • PRNMNGR Add, delete, list printers set the default printer
  • PROMPT Change the command prompt
  • PsExec Execute process remotely
  • PsFile Show files opened remotely
  • PsGetSid Display the SID of a computer or a user
  • PsInfo List information about a system
  • PsKill Kill processes by name or process ID
  • PsList List detailed information about processes
  • PsLoggedOn Who’s logged on (locally or via resource sharing)
  • PsLogList Event log records
  • PsPasswd Change account password
  • PsService View and control services
  • PsShutdown Shutdown or reboot a computer
  • PsSuspend Suspend processes
  • PUSHD Save and then change the current directory
  • QGREP Search file(s) for lines that match a given pattern.
  • RASDIAL Manage RAS connections
  • RASPHONE Manage RAS connections
  • RECOVER Recover a damaged file from a defective disk.
  • REG Read, Set or Delete registry keys and values
  • REGEDIT Import or export registry settings
  • REGSVR32 Register or unregister a DLL
  • REGINI Change Registry Permissions
  • REM Record comments (remarks) in a batch file
  • REN Rename a file or files.
  • REPLACE Replace or update one file with another
  • RD Delete folder(s)
  • RDISK Create a Recovery Disk
  • RMTSHARE Share a folder or a printer
  • ROBOCOPY Robust File and Folder Copy
  • ROUTE Manipulate network routing tables
  • RUNAS Execute a program under a different user account
  • RUNDLL32 Run a DLL command (add/remove print connections) 
  • SC Service Control
  • SCHTASKS Create or Edit Scheduled Tasks
  • SCLIST Display NT Services
  • ScriptIt Control GUI applications
  • SET Display, set, or remove environment variables
  • SETLOCAL Begin localisation of environment changes in a batch file
  • SETX Set environment variables permanently
  • SHARE List or edit a file share or print share
  • SHIFT Shift the position of replaceable parameters in a batch file
  • SHORTCUT Create a windows shortcut (.LNK file)
  • SHOWGRPS List the NT Workgroups a user has joined
  • SHOWMBRS List the Users who are members of a Workgroup
  • SHUTDOWN Shutdown the computer
  • SLEEP Wait for x seconds
  • SOON Schedule a command to run in the near future
  • SORT Sort input
  • START Start a separate window to run a specified program or command
  • SU Switch User
  • SUBINACL Edit file and folder Permissions, Ownership and Domain
  • SUBST Associate a path with a drive letter
  • SYSTEMINFO List system configuration
  • TASKLIST List running applications and services
  • TIME Display or set the system time
  • TIMEOUT Delay processing of a batch file
  • TITLE Set the window title for a CMD.EXE session
  • TOUCH Change file timestamps
  • TRACERT Trace route to a remote host
  • TREE Graphical display of folder structure
  • TYPE Display the contents of a text file
  • USRSTAT List domain usernames and last login
  • VER Display version information
  • VERIFY Verify that files have been saved
  • VOL Display a disk label
  • WHERE Locate and display files in a directory tree
  • WHOAMI Output the current UserName and domain
  • WINDIFF Compare the contents of two files or sets of files
  • WINMSD Windows system diagnostics
  • WINMSDP Windows system diagnostics II
  • WMIC WMI Commands
  • XCACLS Change file permissions
  • XCOPY Copy files and folders

HaPpy LeaRninG

100% Working Proxy Lists

Censorship in your country?
Try the proxies below. By now most of them would have been blocked in your country.
Note:To start a blocked proxy try adding ‘s’ to http in the proxy’s URL.
For example if the proxy http://www.cuteknife.com is blocked, try https://www.cuteknife.com .

http://www.cuteknife.com

www.kproxy.com

http://www.shadow.com/

http://miss.info/

http://4proxy.com/

http://conqueror.info/

https://proxify.com/

http://www.morepress.info/

http://nyclife.org/

http://www.pagewash.com/

Google Chrome Beta

Google Chrome is a browser that combines a minimal design with sophisticated technology to make the web faster, safer, and easier.

  • It is very light,efficient and easy to use with themes which you can add on to it.
  • It takes less time to start when compared to browsers like Firefox,IE,Safari,etc.
  • You can download it from: Google

Software Vulnerabilities of a Computer

The term ‘vulnerability’ is often mentioned in connection with computer security, in many different contexts.

In its broadest sense, the term ‘vulnerability’ is associated with some violation of a security policy. This may be due to weak security rules, or it may be that there is a problem within the software itself. In theory, all computer systems have vulnerabilities; whether or not they are serious depends on whether or not they are used to cause damage to the system.

There have been many attempts to clearly define the term ‘vulnerability’ and to separate the two meanings. MITRE, a US federally funded research and development group, focuses on analysing and solving critical security issues. The group has produced the following definitions:

According to MITRE’s CVE Terminology:

[…] A universal vulnerability is a state in a computing system (or set of systems) which either:

* allows an attacker to execute commands as another user
* allows an attacker to access data that is contrary to the specified access restrictions for that data
* allows an attacker to pose as another entity
* allows an attacker to conduct a denial of service

MITRE believes that when an attack is made possible by a weak or inappropriate security policy, this is better described as ‘exposure’:

An exposure is a state in a computing system (or set of systems) which is not a universal vulnerability, but either:

* allows an attacker to conduct information gathering activities
* allows an attacker to hide activities
* includes a capability that behaves as expected, but can be easily compromised
* is a primary point of entry that an attacker may attempt to use to gain access to the system or data is considered a problem according to some reasonable security policy

When trying to gain unauthorized access to a system, an intruder usually first conducts a routine scan (or investigation) of the target, collects any ‘exposed’ data, and then exploits security policy weaknesses or vulnerabilities. Vulnerabilities and exposures are therefore both important points to check when securing a system against unauthorized access.