Friday, 10 January 2014

Google SearchTricks

Google Hacking

 This Search will give you the List of all the websites with Title Hacking.

This Search will give you the List of all the websites with Title Hacking.
 This Search will give you the List of all the web pages from the website hackingtech.co.cc


Web Ripping


Web Ripping

Web Ripping is finding and extracting pictures and other media files from specified website URLs and save them to your
hard drive.
� Web Ripping is the ability to copy the structure of a Web site to a local disk and obtain a complete profile of the site and
all its files and links.
� We can use Black Windows Web ripper for web ripping.

  • IDM (internet download Manager) could also we used for web ripping

Sniffer..?

Sniffers



Sniffers are almost as old as the Internet itself. They are one of the first tools that allowed system administrators to
analyze their network and pinpoint where a problem is occurring. Unfortunately, crackers also run sniffers to spy on your
network and steal various kinds of data. This paper discusses what a sniffer is, some of the more popular sniffers, and
ways to protect your network against them. It also talks about a popular tool called Antisniff, which allows you to
automatically detect sniffers running on your network.


Who uses Sniffers ?


LAN/WAN administrators use sniffers to analyze network traffic and help determine where a problem is on the network. A
security administrator could use multiple sniffers, strategically placed throughout their network, as an intrusion detection
system. Sniffers are great for system administrators, but they are also one of the most common tools a hacker uses.
Crackers install sniffers to obtain usernames, passwords, credit card numbers, personal information, and other
information that could be damaging to you and your company if it turned up in the wrong hands. When they obtain this
information, crackers will use the passwords to attack other Internet sites and they can even turn a profit from selling
credit card numbers.
Defeating Sniffers
One of the most obvious ways of protecting your network against sniffers is not to let them get broken into in the first
place. If a cracker cannot gain access to your system, then there is no way for them to install a sniffer onto it. In a perfect
world, we would be able to stop here. But since there are an unprecedented number of security holes found each month
and most companies don�t have enough staff to fix these holes, then crackers are going to exploit vulnerabilities and
install sniffers. Since crackers favor a central location where the majority of network traffic passes (i.e. Firewalls, proxies),
then these are going to be their prime targets and should be watched closely. Some other possible �victims� where
crackers like to install sniffers are next to servers where personal information can be seen (i.e. Webservers, SMTP
servers).
A good way to protect your network against sniffers is to segment it as much as possible using Ethernet switches instead
of regular hubs. Switches have the ability to segment your network traffic and prevent every system on the network from
being able to �see� all packets. The drawback to this solution is cost. Switches are two to three times more expensive then
hubs, but the trade-off is definitely worth it. Another option, which you can combine with a switched environment, is to
use encryption. The sniffer still sees the traffic, but it is displayed as garbled data. Some drawbacks of using encryption
are the speed and the chance of you using a weak encryption standard that can be easily broken. Almost all encryption
will introduce delay into your network. Typically, the stronger the encryption, the slower the machines using it will
communicate. System administrators and users have to compromise somewhere in the middle. Even though most system
administrators would like to use the best encryption on the market, it is just not practical in a world where security is seen
as a profit taker, not a profit maker. Hopefully the new encryption standard that should be out shortly, AES (Advanced
Encryption Standard), will provide strong enough encryption and transparency to the user to make everybody happy.
Some form of encryption is better then no encryption at all. If a cracker is running a sniffer on your network and notices
that all of the data that he (or she) is collecting is garbled, then most likely they will move on to another site that does not
use encryption. But a paid or determined hacker is going to be able to break a weak encryption standard, so it is better to
play it smart and provide the strongest encryption as long as it will not have everybody giving you dirty looks when you
walk down the halls at work.

How to: Trace An Email.


Email Tracing

? Tracing an Email means locating the Original Sender and Getting to know the IP address of the network from
which the Email was actually generated.
? To get the information about the sender of the Email we first must know the structure of the Email.
? As we all know the travelling of the Email. Each message has exactly one header, which is structured into fields.
Each field has a name and a value. Header of the Email contains all the valuable information about the path and
the original sender of the Email.

? For tracing an email Address You need to go to your email account and log into the email which you want to trace
after that you have to find the header file of the email which is received by you.
? You will get Source code of the email
Now see from bottom to top and the first IP address you find is the IP address of the sender.
Once you have the IP Address of the sender, go to the URL www.ip2location.com and Find the location of the IP Address.


How to: Hide a file behind an image

To hide a file behind an image.



How to: create a private Folder..?


Make a Private Folder

To make Private folder which nobody can open, delete, see properties, rename.
To make such a folder you need to make a folder with any name. For example- manthan on desktop.
And then open command prompt and then type the following command on the screen
And hit enter the folder is locked
To open the folder just: replace with: f
And the folder is opened



Web ripping


Web Ripping

Web Ripping is finding and extracting pictures and other media files from specified website URLs and save them to your
hard drive.
� Web Ripping is the ability to copy the structure of a Web site to a local disk and obtain a complete profile of the site and
all its files and links.
� We can use Black Windows Web ripper for web ripping.

  • IDM (internet download Manager) could also we used for web ripping

Protecting Files From Google

Protecting File From Google