Thursday, December 16, 2010

Finalists in SHA-3 encryption hash contest announced

The final five entrants in the SHA-3 encryption hash run by the National Institute of Standards and Technology (NIST) have been made public.

The NIST competition is part of a long-term project to develop the next generation of encryption technology. In the announcement BLAKE, Grøstl, JH, Keccak and Skein all made it through.

The NIST project started the search for SHA-3 in 2007 and has been whittling down the list for the past two years, excluding 53 entrants from some of the biggest names in the business, including IBM, France Telecom and Sandia National Laboratories.

The long test period is important considering the essential nature of secure SHA-3 methodology.

“What they are trying to do is produce a hash function that the community internationally will think is good and will be a stand for the next 20 years,” Jon Callas, PGP fellow and member of the team behind Skein, told V3.co.uk.

“Getting an extra couple of years for people to study things is to the benefit of everyone right now.”

The competition has, however, thrown up worrying questions about the level of security research in the US. The finalists are dominated by European and Asian consortia but nationality is not an issue, Callas said.

“Our team is an international one that includes a couple of Europeans. We’re motivated by the best security solution.”

SHA-2 is still secure, Callas said. Early reports of attacks had been shown to have no practical application.

Security guru Bruce Schneier is also one of the team members working on the Skein hash. He has expressed confidence in the security of the final list.


Read more: http://www.v3.co.uk/v3/news/2273888/nist-encryption-hash-sha#ixzz18HwyC77I
The V3 App store has games, downloads and more. Visit the store now.

Sign into Multiple accounts in Gmail with in the same Browser!







Google introduced a new feature which lets you sign in and access two  different Gmail / Google accounts at once on the same browser.  Most of us have more than one email Id which we use for different purposes. Previously , one can login to only one account at a time through one browser. This new feature eliminates the need of signing out or using a different browser for using other account. Here is the procedure to use multiple accounts in the same browser at the same time..

  * Go to google.com/accounts
  * Navigate to Multiple sign-in option – “Use multiple Google Accounts in the same web browse”
       and turn it on.
   * Sign into your first account.


   * After that, you can sign in with up to two additional accounts using the new accounts menu.


 

After enabling it, You can open  and use multiple Gmail / Google accounts in different tabs of the same browser. The feature can also be disabled by going to the above path and turning it off.

Although the multiple account sign-in feature is available for users, it doesn’t support all Google services like like Blogger and Picasa Web Albums, etc. For these services, the default account will be the first account you signed into. As of now, This feature is supported App Engine, Code, Calendar, Gmail, Reader, Sites and Voice and is restricted to desktop browsers and cannot be enabled on your mobile phones.


Sunday, December 12, 2010

free download backtrack Operating system.

 

 BackTrack is the most top rated linux live distribution focused on penetration testing. With no installation whatsoever, the analysis platform is started directly from the CD-Rom and is fully accessible within minutes.

It's evolved from the merge of the two wide spread distributions - Whax and Auditor Security Collection. By joining forces and replacing these distributions, BackTrack has gained massive popularity and was voted in 2006 as the #1 Security Live Distribution by insecure.org. Security professionals as well as new-comers are using BackTrack as their favorite toolset all over the globe.


BackTrack has a long history and was based on many different linux distributions until it is now based on a Slackware linux distribution and the corresponding live-CD scripts by Tomas M. (www.slax.org) . Every package, kernel configuration and script is optimized to be used by security penetration testers. Patches and automation have been added, applied or developed to provide a neat and ready-to-go environment.


After coming into a stable development procedure during the last releases and consolidating feedbacks and addition, the team was focused to support more and newer hardware as well as provide more flexibility and modularity by restructuring the build and maintenance processes. With the current version, most applications are built as individual modules which help to speed up the maintenance releases and fixes.


Because Metasploit is one of the key tools for most analysts it is tightly integrated into BackTrack and both projects collaborate together to always provide an on-the-edge implementation of Metasploit within the BackTrack CD-Rom images or the upcoming remote-exploit.org distributed and maintained virtualization images (like VMWare images appliances).


Being superior while staying easy to use is key to a good security live cd. We took things a step further and aligned BackTrack to penetration testing methodologies and assessment frameworks (ISSAF and OSSTMM). This will help our professional users during their daily reporting nightmares.


Currently BackTrack consists of more than 300 different up-to-date tools which are logically structured according to the work flow of security professionals. This structure allows even newcomers to find the related tools to a certain task to be accomplished. New technologies and testing techniques are merged into BackTrack as soon as possible to keep it up-to-date.


No other commercial or freely available analysis platform offers an equivalent level of usability with automatic configuration and focus on penetration testing.
for info & download this OS klik

BackTrack Clean Hard Drive Install

This method of installation is the simplest available. The assumption is that the whole hard drive is going to be used for BackTrack.



  1. Boot BackTrack on the machine to be installed. Once booted, type in “startx” to get to the KDE graphical interface.
  2. Double click the “install.sh” script on the desktop, or run the command “ubiquity” in console.
  3. Select your geographical location and click “forward”.  Same for the Keyboard layout.
  4. The next screen allows you to configure the partitioning layout. The assumption is that we are deleting the whole drive and installing BackTrack on it.
  5. Accept the installation summary and client “Install”. Allow the installation to run and complete. Restart when done.
  6. Log into BackTrack with the default username and password root / toor. Change root password.
  7. Fix the framebuffer splash by typing “fix-splash” ( or “fix-splash800″ if you wish a 800×600 framebuffer), reboot.
  8.   BackTrack 4 R2 Release ISO
  9.  BackTrack 4 R2 Release VMware Image 

Sunday, December 5, 2010

Sony Playstation phone aka Zeus leaked again



                         In the past few weeks, we talked a lot about the Sony Ericsson Playstation phone a.k.a Zeus, and we also saw some shots of it, and we heard that the phone will be launch officially this month. Now a video of the Playstation phone is rolling around the internet, and the video quality is very clear, in which we can see the SE Playstation phone clearly and almost in any angle. SE Playstation phone is running Android 2.3 Gingerbread, which we all know is going to be the next version of Android OS, and it’s expected to be out soon. It looks like this is the prototype version of the SE Playstation phone, but still we have an idea on how the phones looks like. SE Playstation phone is going to be a very desirable device for people who love portable gaming, and especially for PSP fans. PSP fans always wanted to have calling ability in their PSP, and soon their dream will come true. The name of the phone is not confirmed yet, so you can call it Zeus, Playstation Phone, or Z1. So folks, check out the video after the break, and tell us what do you think about it?

7 Best Web Sites To Download Free eBooks Legally




With number of eBooks readers in the market, eBooks are popular more than ever. And if you are looking for best web sites to download free eBooks legally, then we have a good list for you. These free eBooks or digital books can be read on desktops, laptops or any e-book readers.

Thursday, December 2, 2010

Trick To Make Your Firefox Fast

      This Firefox tricks will improve the speed & load time of firefox. And you will be able to surf faster.


Type about:config in the address bar, Then look for the following entries, and make the corresponding changes.
 
network.http.max-connections-per-server =32
network.http.max-persistent-connections-per-proxy =16
network.http.max-connections = 64
network.http.max-persistent-connections-per-server = 10
network.http.pipelining = true
network.http.pipelining.maxrequests = 200
network.http.request.max-start-delay = 0
network.http.proxy.pipelining = true
network.http.proxy.version = 1.0

Lastly right-click anywhere and select New- Integer. Name it nglayout.initialpaint.delay and set its value to 0. This value is the amount of time the browser
waits before it acts on information it receives. Enjoy!!

Wednesday, December 1, 2010

New Features In First Windows Phone 7 Update [Rumor]

So there are rumors that the first update is ready for Windows 7 phone. I would certainly believe if someone tells me that there is an update ready for windows 7 phone but If someone tells me that there is a new generation mobile phone device that could not be updated, I will call it a rumor. Well the thing is that all the latest devices are manufactured in a way so that they can be updated easily and the glitches and bugs can be fixed without any hassles, at the same time with the facility to update a mobile device it becomes very easy for a person to get updated with the technology without changing a phone. It helps save a lot of money and environment as well.



Now talking about the windows 7 mobile phone, I am sure most of us would have had heard about it but still, like always I am going to give you some more facts. Windows phone 7 is a mobile operating system developed by Microsoft, and is the successor to their Windows Mobile Platform. It is aimed towards the consumer market instead of the enterprise market and that means that the latest technology is used to lure all the age group of customers. With Windows 7 phone Microsoft offers a new Metro user interface, and it integrates Microsoft’s other services into the mobile platform.



According to Microsoft documentation , software updates will be delivered to Windows Mobile phone users via Microsoft update. Microsoft has intentions to directly update any phone directly instead of relying on OEMs or Wireless Carriers. And it is also confirmed that update infrastructure system for windows 7 phone is already in place to effectively and reliably deliver updates. So there is no question in calling an upcoming update for Windows 7 phone a rumor and it was already confirmed that features like cut, copy, paste and full multi tasking will be arriving real soon. Some more features like hot swapping SD cards and custom ringtones, video calling and turn by turn navigation are not currently available on Windows 7 phone and will be most probably included in the upcoming update.

Increase your RAM and so system speed

1). Start any application, say Word. Open some large documents.



Tuesday, November 30, 2010

NO MORE PRIVATE E-MAILS Indian Police can now track your E-mails



The police can now read your e-mails without prior permission from the home department.
The Parliament recently cleared an amendment to the Information Technology (IT) Act, allowing the police to intercept or decrypt online information without seeking the home department’s nod.

Hide Folders in Nokia / Java phones without software

Have you ever wanted to hide folders in your phone? If yes,there here is very interesting solution for you to hide folders in your phone without the need of any software.This trick can be used for phone from Nokia,Samsung,Motorola,LG or any other company.The only requirement is that your phone should support java which almost all mobile phones support now .

So,If your phone support java then here is the Trick Hide Folders in Nokia / Java phones without software


   1. Create any new folder or you can use any existing folder that is to be hidden.
   2. Rename the folder to any name but with the extension of .jad like if I want to hide my images folder then I will name it as images.jad
   3. Now create a new folder with the same name in the same directory but with the extension of .jar So, I would create the folder with the name images.jar
   4. And thats it!! My orignal images folder which has been renamed with .jad gets hidden and only folder with.jar extension is visible which is empty.So,my data is protected/hidden from unwanted eyes.

Now ,we have to learn how to open these hidden folders.So here is the trick to open these hidden folders in Mobile phones

To unhide the orignal folder you have to remove the .jar extension from the new folder and your orignal folder with all the files and with .jad will become visible.

AS SIMPLE AS THAT!!

All Facebook Smiley Codes



How Terrorist Hide Messages in Images

It’s a very cool trick but I believe that terrorist must have used this method to convey messages across the world. I just found out that it is possible to hide TEXT messages in any images file. It can be encrypted and the text can’t be viewed easily. Hiding text in images is called Stegnography is NOT something new. There are freeware that is capable of doing this and the release date is year 2005. Looks like I am a little outdated to know this technique! Continue reading if you’re interested to know how to hide text messages in images.

Now Trace Any IP Address BY ur OWN



2007'S BIGGEST PROBLEM - THE TRUSTED INSIDER

This has not been a banner year for insider hacks, and insider data loss across the board. In many ways we can most likely call this the year of the insider.


CAN U CHANGE YOUR IP IN LESS THEN 1 MINUTE?



Nokia 5230 Price in india

Nokia 5230 is new touch screen 3G mobile phone @ very affordable price. Nokia 5230 features 3.2 inch touch screen, 2 Megapixel camera and, 33 hours of music playback time and easy access to web, music, and social networks.

Nokia N900 Price in India

Nokia N900 Features:

Nokia N97 Mini Price in India

Nokia N97 mini Features -

Sunday, November 28, 2010

How to Fix Blue Screen of Death

Blue Screen of Death is a very common error that occurs in all the versions of the Windows OS, be it Win XP, or Win Vista or Windows 7. A lot of major as well as minor hardware and software related issues can lead to Blue Screen of Death (BSOD). Sometimes you can resolve the issue by simply solving it by restarting your PC. However, many times the BSOD screen won’t allow you to reach the desktop or even if you have reached the desktop, the BSOD screen can appear all of a sudden while you are doing something important on your PC.
BSODs appear when Windows encounters a serious problem and stalls the operating system. You can easily fix BSOD issues by examining all the factors that has triggered it. Here are some things you should do when you encounter a BSOD:
1. Some BSODs are so bad that you may end up installing fresh copy of Windows on your system. If you are not able to access your data after the occurrence of BSOD, you may also end up losing all your precious data. So, you need try your best to reach the desktop. You can try the ‘Last Known Good Configuration’ option or by going into the Safe Mode. You can try both of these options by pressing the F8 key before the appearance of the Windows loading screen. If you do it correctly, you will see the ‘Windows Advanced Options Menu’ screen where you will see options like Safe Mode, Safe Mode with Networking and Last Known Good Configuration.
2. When you see the BSOD, you should read the message that appears on it carefully. Usually, the error screen contains a ‘STOP ERROR’ code that consists of numbers and alphabets. The code varies depending on the problems that have caused the respective BSOD error. So, the first thing you need to do is make a note of the error code.
3. If your system is displaying the BSOD screen after recent installation of hardware or software, you can try uninstalling the hardware or software and see if that resolves the issue. After uninstalling the software that caused the problem, you can perform virus scan on your system. Repairing registry errors by making use of registry applications can help in getting rid of BSODs that are caused by software. Alternatively, you can also try the System Restore option to go back to a date when your system was working perfectly fine.
4. The next thing you need to is to find out what has caused the BSOD by researching on the internet. You can do this on your secondary PC. All you need to do is type the STOP ERROR code on Google and find out what solutions are available. A very good way to find solution for all kinds of BSOD errors is to visit the Microsoft Support website. At Microsoft Support, you will get all the possible solutions that you can try to get rid of the BSOD screen.

Delete any facebook account with knowing by their username..

This is an extreme example of Social Engineering technique; we need following things to do so.


    1. Victim’s profile link ( you can get it easily )
   2. His/Her Email which he/she uses to sign in
   3. His/Her birth date which he/she has used in the profile
   4. Make an Email ID on gmail or yahoo with the first name and last name same as on victim’s facebook profile.
   5. Click here to start:

    
      Now you will get this screen



     Enter details. In the place of ‘ email address where you can be contacted ‘ enter the fake email u created.
    You will get a email on that ID in which facebook people will ask your problem. Reply to them that you are XYZ( victim’s name ) and you cant access your facebook account. Also you have lost access to your Email Address associated with the account. You dont know what to do now. The hacker is coming online regularly and using your account. If the victim is a girl also write ‘ I am a girl and it poses threat to my social life ‘ and write anything you want that could make them take action.
   After 2-3 days youu will get a reply. They will again ask you that you have access to your associated Email or not? Reply them that you still don’t have access to it. And repeat what all you wrote in first mail.
   Next Day or Same Day you will get an Email that your account is disabled.

Monday, October 25, 2010

How to crack IIS FTP password using Brute-Force

FTP is an application or service or protocol  which can be used to transfer files from one place to another  place ,it really comes very handy  during transfer of files from a local box to a remote one .Suppose someone get access to your FTP then he/she can cause nightmare for you by uploading  unappropriate images or files etc.Here we will discuss how we can crack the password of IIS installed FTP service in Windows.

Sunday, October 24, 2010

The Apple MacBook Air: Sleek by Design




Apple MacBook Air: Sporting a silvery finish, the MacBook Air features a 13.3-inch LED-back-lit wide-screen display that has a 1280 x 800 pixel resolution. The back-lighting saves power and provides “instant on” response from the moment you turn it on, according to Jobs. The device has a slightly wedge-shaped profile. It weighs about 3 pounds, and sports a thickness of 0.16-0.76 inches. It’s 12.8 inches wide and 8.95 inches deep.
The Apple MacBook Air also features a built-in iSight webcam and a full sized MacBook-style black keyboard. The keyboard is backlit, similar to MacBook Pros, and has an ambient light sensor that automatically adjusts brightness. The trackpad is also capable of recognizing multi-touch gestures, similar to using an iPhone or iPod touch. As a result, the MacBook Air’s trackpad is disproportionately large, compared to the size of trackpads found on the MacBook or MacBook Pro.



Apple MacBook Air
The Apple MacBook Air features a 1.8-inch hard disk drive with 80GB of storage capacity standard. A 64GB solid-state disk (SSD) drive is an option. The hard drive is a Parallel ATA (PATA) model that operates at 4200 RPM.
The laptop is powered by an Intel Core 2 Duo chip running at 1.6GHz, with 1.8GHz available as an option. Jobs noted that Intel was willing to engineer a new version of the Core 2 Duo specifically to Apple’s specifications — it’s 60 percent smaller than others. The chip operates with 4MB of on-chip shared L2 cache running at full processor speed, and uses an 800MHz frontside bus. 2GB of 667MH DDR2 SDRAM is also included.
Like the Apple MacBook and the Apple MacBook Pro, the Apple MacBook Air features a slimmed down MagSafe connector for power. It comes with a 45 watt power adapter. A flip-down door on one side reveals USB 2.0, Micro-DVI (to connect an external display) and a headphone jack. The Apple MacBook Air also includes 802.11n-based wireless networking support and Bluetooth 2.1 + EDR.
Apple estimates that with wireless networking turned on, the Apple MacBook Air can get about 5 hours of battery life.

Friday, October 22, 2010

Turn your Body into a Touchscreen Interface

We present Skinput, a technology that appropriates the human body for acoustic transmission, allowing the skin to be used as an input surface. In particular, we resolve the location of finger taps on the arm and hand by analyzing mechanical vibrations that propagate through the body. We collect these signals using a novel array of sensors worn as an armband. This approach provides an always available, naturally portable, and on-body finger input system. We assess the capabilities, accuracy and limitations of our technique through a two-part, twenty-participant user study. To further illustrate the utility of our approach, we conclude with several proof-of-concept applications we developed.



arm_touchscreen_03
arm_touchscreen_04

Top 10 Facebook Status Tips & Tricks




Facebook is the largest growing social network today and with its ever-changing layout, there are some pretty smart tricks you can pull using your humble Facebook status. We have pulled together 10 great how-to tips that will help you get the most out of your status update on facebook, from official features to apps, Easter eggs, jokes and more.
Perfect for newer Facebook users, or anyone who is looking for a refresher, read on and let us know the ones you like in the comments below.

10. HOW TO: Play a Trick On Your Friends in Your Status Update

Want to play an amusing trick on your Facebook buddies????
This clever link “http://facebook.com/profile.php?=73322363” looks like it could be a URL for anyone’s Facebook profile, actually takes anyone logged into Facebook to their own profile page.
If you try it out, be sure to remove the link preview that Facebook auto-ads. Have fun! :D

9. HOW TO: See Your Status Update Stats

Have you ever wondered how many times you have updated your status on Facebook? The Facebook app Status Statistics, can tell you this and more.
The app analyzes your updates and gives you a list of how many you’ve written, the average word count and how many times a day you post. In addition, it generates a graph that shows you what time of day or what days of the week you normally update.
Old statuses are also searchable via the app, so you can find your previous statuses without having to scroll back through your history.


Saturday, October 16, 2010

How to open Multiple Instances of yahoo Messenger

A Look at Future laptops – Pen Computers

pen-computers 

 Amazing Technology from Japan. But can you guess what it is?

Friday, October 15, 2010

China Mobile Secret Codes




How To Remove W32.sillyFDC Virus|W32.sillyFDC Virus removal


This is wonderful trick its to make ur PC free from virus..: 

Static IP Address Configuration Using Command Line


Thursday, October 14, 2010

How to Uninstall and Remove Software in Safe Mode in Windows Operating System:



View Hidden files With Google