Sunday, November 27, 2011

MAKE MONEY THROUGH ADVERTISEMENT THAT REPLACES CAPTCHA

If there is anything utterly annoying about Web sites these days, it is CAPTCHA technology. Distorted, hard-to-read text and numbers might cut down on spam, but frustrate Web site visitors and may result in more lost sales than we care to admit.
captcha

A new company called Solve Media has an innovative idea. Instead of distorted text, visitors are asked to input part of the text in an advertisement. This still proves the user as human, but is less frustrating for the user, and earns the site owner a profit at the same time.
solve media

Advertisements vary. For example, this variation asks the Web site visitor to enter just the text in quotes. The quoted text is as much an advertisement at the big blue e.
iead

Sometimes the advertisements ask for feedback responses instead, like this one for Travelers:
travelers
One kind of advertisement that not all site owners will like contains a short video site visitors must watch to see the security code. This advertisement for a popular movie may annoy visitors just as much as CAPTCHA.

video_ad
Luckily, the video ads appear to be the minority. Most of the ones we test drove had easy-to-read text written directly on the advertisement.

Installing Solve Media requires very little. After a quick sign up process, all you must do is add a few lines of code to your Webpages, and you are in business.

code
The widget can be customized to some extent. The size and theme may be altered, and site owners may choose a difficulty level for the puzzles.

Overall, Solve Media has a good idea, and it is high time we start seeing improvements with these security features. Granted, an over-abundance of advertisements on a Web site can become tacky and distracting, so use with care.

NO WIRELESS NETWORK AVAILABLE IN WINDOW 7

One problem I have run into on several Windows 7 machines is not getting any wireless networks when I go to the wireless network manager! Usually, when you click on Network icon in the task bar, you get a list of wireless networks and then just connect.

However, there are times when you will see the message “No wireless networks available”, which makes no sense because the day before you may have seen 15 wireless networks while in your apartment or wherever. There are also some instances where a few wireless networks show up, but not all networks that you know exist. That’s a slightly different problem, but one that I’ll address too.
wireless networks
Basically, there are a few things you can try which normally fix the issue. It’s not a bug or anything like that, but it can be really frustrating if you don’t know what’s causing the problem. Below I will walk though the various steps you can take to resolve the missing wireless networks issue.

STEPS TO FIX THIS PROBLEM

Power Off/On Modem, Router, Computer

You’ve probably heard this one a thousands times, but it actually does work sometimes! Go ahead and turn off your modem, router and computer. Then power up your modem, wait 1 minute, then power up the router, again wait 1 minute and then power up the computer. It’s really simple and rebooting is a magical savior a lot of times.

Update Drivers/Firmware

Next up are drivers. Make sure you have the latest driver for your network card and also the latest firmware for your router. With all the new fancy wireless routers coming out these days, you need to make sure you have the latest drivers to keep up.
Another issue here is to try and use Windows Update first to update the network driver if you can. Sometimes the one from Microsoft works and the one from the manufacturer does not, so try both.

Ensure SSID Broadcast

If you don’t see the wireless network name listed in your wireless list, it also could simply be because SSID broadcast has been disabled on the router. Log into the router and make sure that SSID broadcast is turned on.

Reset Wireless Router

If you had somebody setup your router, you never know what kind of security settings they may have turned on. For example, some people turn on MAC Address Filtering, which only allows computers whose MAC address is listed to connect to the network. Other settings like 2 GHz and 5 GHz can cause issues. In this case, just go ahead and perform a full reset of your router.
You can normally do that by pressing the reset button on the back of the router, which will bring the device back to default settings and remove any passwords, etc.

WEP vs WPA/WPA2

his is actually a big issue that causes a lot of problems because people have older computers and laptops that used to run Windows XP, but now are loaded with Windows 7. Everything works great, but your network card may not support newer protocols like WPA2 with AES encryption. If you have no idea what any of that means, basically WEP is the simplest security protocol and will normally work with old hardware too.

If your wireless router says WPA or WPA2 under wireless security and you can’t see the network on your computer, try changing it to WEP and see if it shows up then. If it does, then you have up update your network card or work with the less secure WPA protocol.

And it’s useful to note that you have to change the WEP/WPA settings on both the router and the computer. But normally, once you change it on the router, the computer will automatically figure it out.

Sleep/Hibernate Problems

If you can’t connect to wireless networks after coming back from sleep mode or hibernate, then it could be that you have to adjust your power settings. Basically, go to your power profile (Balanced, etc) and click on Change Plan Settings. Click on Wireless Adapter Settings and then choose Maximum Performance.

Uninstall Adapter

Another thing you can try is to uninstall the wireless adapter from your computer by going to Device Manager and then rebooting the computer. When Windows loads up, it will normally “find” the hardware again and re-install it, which may fix the issue.

Hopefully one of the methods mentioned above will fix your problem. If not, post a comment here and we’ll try to help.

STORE AND PURCHASE SONG WITH GOOGLE MUSIC

When Apple announced iCloud would be able to store and backup music files from iOS devices, the iPhone and iPad-loving community inhaled gleefully—imagine, all of our music, with no computer connection! It seemed too good to be true. However, in all honesty, our iPhone 4s arrived in the mail more than a month ago, and we have yet to sync our music with iCloud.
Google recently released their own version of cloud-based music hosting, simply called Google Music. While it does not stream with iOS devices, it does offer playback on any computer or mobile phone. User can also purchase songs or download one of the thousands of free songs.
 google music

Click the Download Music Manager button to start using the service. This download is necessary to start syncing your music collection.
google music manager

During the installation, you will be asked for your Google account name and password, as well as the location of your music on your computer.
google

You can upload 20,000 songs for free, which is an ample amount by most standards. You can choose to sync your music manually or automatically. We chose the automatic method. Google Music also uploaded our iTunes-based playlists.

If you have a large music collection, it may take a while for Google Music to upload all of your songs. If you need to shut down your computer during the upload it is no big deal—Google music will simply resume when your computer restarts. As songs are uploaded, they are added to your online library. Click any album to play a song.

HOW TO MANAGE A WEBSITE USING DREAMWEAVER (ADVANCE)

When you’re in the Site Definition window, go to the Advanced tab. Here, unlike the Basic settings, you are given more tools and functions to resourcefully manage your site. Each step can be followed by clicking each the Category along the left side. For Local Info, enter the name of your website and select your Local root folder. You can also choose your local images folder. Clicking the folders on the right side of the text boxes will let you browse to the local directories.
Advance tab

The Default images folder should be stored beneath your website’s main location. For example: (c:/UserName/Documents/Name of the Website/images).
Image folder

Next, press Remote Info. In here, select your Access type, and input your FTP host and Host directory. Then, enter your web server’s account Login and Password. For added convenience, you can put your Check out name and Email address. To try the connection, click the Test button.
Remote Info

Wait for the testing to finish.
Connecting to website

If your FTP host, host directory, login, and password are all correct, you’ll be successfully connected to your web server. Hit OK to continue.
Connected successfully

Next, click Testing Server. For this illustration, we choose PHP MySQL as our Server model and FTP as the Access mode. Again, you have to put the FTP host & Host directory, and your account Login & Password.
Testing server

One of the many tools the Advanced setting have is the ability to filter your website’s folders and files through Cloaking. This function is applicable when you are downloading from your server and uploading from your local directory.
You can specify what file types you want to be filtered. As an example, we indicated here that all PNG images and flash files should not be included to all site operations.
cloaking

If your website’s codes have lots of comments and / or if you’re collaborating the development of your site with someone else, you must enable Design Notes.
Design note

Sitemaps are very important to websites. They make each site more SEO and user-friendly. To incorporate a sitemap, specify the index file of your website.
site playout

The last four categories (File View Columns, Contribute, Templates, and Spry) are extra tools you can use. You can leave it as is and set it up in the future.
Spry

If all your settings are correct and you’re good to go, click the OK button. ok button

Your website will then be added to Dreamweaver. test website

Just like the basic tutorial, you can download all your website’s remote files by using the Get command.
get files from server

Friday, November 25, 2011

HOW TO MANAGE A WEBSITE USING DREAMWEAVER (BASIC)

Dreamweaver is Adobe’s foremost web development software app. Although the interface can look intimidating to non-tech users, it’s pretty easy to use once you get to know some of its functions and tools.

With Dreamweaver, you can create and edit several types of websites — from simple ones (such as pure HTML) to more complex pages (such as ActionScripts, CSS, JavaScript, ASP, ColdFusion, JSP, and PHP).

If you have a website, you can use the power of Dreamweaver to manage it more effectively. For this tutorial, I will discuss the program’s Basic site management settings.

STEPS TO FOLLOW

  1. The first step is to open Dreamweaver and click the Files side panel.
  2. Next, press the drop-down arrow as shown below.
    files menu
  3. Then hit Manage Sites.
    manage sites
  4. In the Manage Sites window, click the New button and
    new button site
  5. Click Site click site
  6. There are two site management types, for this illustration we will use the Basic settings.
    Name your website for easy referencing later, and then enter its HTTP Address or URL. Press Next to proceed.
    editing files
  7. If you want to integrate a server technology to your site, tick the second option and select what server technology you want to have. As an example, we picked PHP MySQL. You should also choose this option if one or more of your webpages has PHP / MySQL codes. Click Next. editing file2 Some of the server technologies you can opt include the following. servertech
  8. Tick Edit locally, then upload to remote testing server and browse to where you want to save / store all your site’s files. Hit Next to continue to the next step.
    editing file3
  9. To test your files, you must choose how you want to connect to your testing server. For this illustration, we will connect through FTP (file transfer protocol).
    testing server
  10. Next, enter your web server’s hostname or FTP address, and specify what folder in your testing server you want to save / store all your site’s files.
    Enter your FTP login username and password. To identify whether or not all these settings are correct, click the Test Connection button. If the connection is successful, press Next
    testing files
  11. After that, input your website’s root folder. To test that directory, hit Test URL. If it went through, proceed to the subsequent step.
    testing files
  12. If you’re not the only one managing and / or editing your website, enable the checking in and out of the files. Tick Dreamweaver should check it out, and enter your name and email address. Click Next
    Sharing files
  13. You’ll be presented with the Site Definition summary. If all are correct, press the Done button.
    set up complete
  14. The Site Definition interface will then be closed. Press Done in the Manage Site window.
    Manage Site done

Your website is now added to Dreamweaver’s File side panel. Under Local Files, right-click your site and
test Website
press Get. This process will download all your website’s files from your web server.
Ge files from server
Depending on how large your website is, the downloading will take some time to finish.

When the Get process is complete, your website will be locally stored in your computer and will have a Dreamweaver structure just like the one below. All downloaded files can be managed, edited, and deleted locally and uploaded to your remote server. You can also create a new webpage and file and save it to your web server.
File Got

KEEP TRACK OF COMPUTER UPTIME USING PC ON/OFF TIME

There may be times when you want to know how long your computer was turned on for a specific day. Or maybe you want to know when it was shutdown and for how long? What about if the computer went into standby mode?
For any of these situations, you can quickly get the answer using a free program called PC On/Off Time.

pc on-off time

The current version works on Windows 2000, XP, Vista, 7 and Windows Server 2008. You can download the program from here: http://www.neuber.com/free/pctime/index.html
Overall, the program is very simple, but cleverly implemented. Normally, you would think that you would have to install this software and then wait a couple of days before you see any data about your computer’s status. What’s neat about PC On/Off Time is that it simply reads your event logs and extracts out the events when the computer was shut down, turned on, put into standby mode, etc.
So with the free version of the program, you can instantly see 3 weeks of data about your PC. That means this program has a number of benefits:

  • It isn’t required to be installed, simply run it once you download it
  • It does not need to run in the background as a process
  • It does not add anything to the Windows registry
  • It does not modify files outside of it’s own directory
You can copy the program to your USB stick and run it on any other computer too. If you really like the program and find is useful for your situation, then you can get the Pro or Net version:

pro and net versions

With the Pro version, which is only $9, you get a lot more data. There is no 3 weeks limit on the data and you can see exact login and logoff times for users. It will automatically backup the events, so even when they are deleted by Windows, you can still see the data in the program. Lastly, there are no ads.

With the Net version, you can do the same thing as the Pro version, except you can see the data for an unlimited number of computers on a local network. This is great for an office environment where you have lots of users and you want to keep track of this data from one administrator computer.

And if you don’t like the default colors that the program chooses for when your computer was on or off, you can double-click and change it to whatever you like. Again, it’s a very simple program, but it gets the job done well.

ZTE CHORUS (ZTE D930) REVIEWS

ZTE CHORUS IMAGE The ZTE Chorus is an entry level music centric Android available from Cricket. The Device sports a 3.2-inch resistive touch WQVGA display, 2-megapixel camera, multimedia players, GPS, organizer and 3G connectivity.

ZTE CHORUS SPECIFICATION

DESIGN
  • Design type: Smart Phone
  • OS: Android
  • Form Factor: Candybar
  • Dimensions: 4.40 x 2.20 x 0.60 (112 x 56 x 15 mm)
  • Weight: 3.70 oz (105 g)
TECHNOLOGY
  • CDMA: 800, 1700/2100, 1900 MHz
  • DATA: EV-DO
  • SATELLITE SYSTEM: GPS, E911
PHONE FEATURES
  • PHONEBOOK: Caller groups, Multiple numbers per contact, Search by both first and last name, Picture ID, Ring ID
  • ORGANIZER: Calendar, Alarm, Calculator
  • MESSAGING: SMS, MMS, Predictive text input (XT9)
  • EMAIL: IMAP, POP3, SMTP, Push e-mail
DISPLAY
  • PHYSICAL SIZE: 3.20 inches
  • RESOLUTION: 240 x 400 pixels
  • TECHNOLOGY: TFT
  • COLORS: 262 144
  • TOUCHSCREEN: Resistive
CONNECTIVITY
  • BLUETOOTH: Yes
  • USB: USB 2.0
  • CONNECTOR: microUSB
  • FEATURES: Mass storage device
BATTERY
  • TALK TIME: 4.16 hours
  • STAND-BY TIME: 20 hours
  • CAPACITY: 1000 mAh
HARDWARE
  • PROCESSOR TYPE: Single core, 600 MHz
  • STORAGE SLOT TYPE: microSD, microSDHC
  • MAXIMUM CARD SIZE: 32 GB
CAMERA
  • CAMERA FEATURES: 2 megapixels, Digital Zoom
  • CAMCORDER: 320x240 (QVGA) (15 fps)
MULTIMEDIA
  • SPEAKERS: Earpiece, Stereo speakers
INTERNET BROWSING
  • BROWSER: Yes
  • SUPPORT: HTML
OTHER FEATURES
  • NOTIFICATIONS: Music ringtones (MP3), Polyphonic ringtones, Vibration, Silent mode, Speakerphone
  • SENSORS: Accelerometer
  • HEARING AID COMPATIBILITY: M4, T3
AVAILABILITY
  • OFFICIALLY ANNOUNCED: 23 Nov 2011
SHOPPING INFORMATION
  • ACCESSORIES: ZTE Chorus Phone, Li-ion Battery, 4 GB SanDisk® Muve capable Memory Card, Travel Charger, Quick Start Guide, Enhancement Guide, Quick Reference Manual, Muve Music User Guide

To see the full specs click here

Thursday, November 24, 2011

WATCH DIVX HOLLYWOOD AND BOLLYWOOD MOVIES ONLINE FOR FREE

When you are in the mood to watch a full movie online for free? You can use http://www.Joox.net to watch Hollywood, Hindi, Anime, Cartoons, TV Shows, Music videos, Documentaries, and foreign movies streaming online with subtitles for free! The site does not actually host any videos itself, but instead bookmarks videos from the site Stage6, which is a video sharing site like YouTube, but for high resolution DivX videos.

watch movie full screen

In order to watch the videos on Joox.net, you will need to install the DivX plugin from Stage6. Of course, since some stuff may by copyrighted, Stage6 will remove it and it may not work on this site. However, from playing around with it, all of the movies I’ve played so far work fine. The resolution in very high and you can even watch them full screen.
It doesn’t have the latest movies or anything like that, but if you’re in the mood for Casino (1995), The Man Who Knew Too Much (1934), Psycho (1960), or Schindler’s List, then this is the place to go. Also, I liked their selection of Bollywood movies and comedy/stand-up videos.

You can also download the videos to your computer if you life. And if you know how to create DivX files, you can upload them yourself by creating an account on Stage6. Of course, you can also go to Stage6 itself and watch a host of other high resolution movies and videos there.

Stage6

Stage6 has many more categories and allows for search by tags or lookup through “channels”, such as Anime, move trailers, music videos, etc. Using Stage6, you can download videos for playback on your computer, TV, or portable media player like the iPod, etc. Lots of free video at very high quality!

HOW TO TRACE A HACKER

Sometimes, it's just not enough to simply know that there's a Trojan or Virus onboard. Sometimes you need to know exactly why that file is onboard, how it got there - but most importantly, who put it there. By enumerating the attacker in the same way that they have enumerated the victim, you will be able to see the bigger picture and establish what you're up against. But how can you do this?

Connections make the world go round

The computer world, at any rate. Every single time you open up a website, send an email or upload your webpages into cyberspace, you are connecting to another machine in order to get the job done. This, of course, presents a major problem, because this simple act is what allows malicious users to target a machine in the first place.

How do these people find their victim?

Well, first of all, they need to get hold of the victim's IP Address. Your IP (Internet Protocol) address reveals your point of entry to the Internet and can be used in many ways to cause your online activities many, many problems. It may not reveal you by name, but it may be uniquely identifiable and it represents your digital ID while you are online (especially so if you're on a fixed IP / DSL etc).
With an IP address, a Hacker can find out all sorts of weird and wonderful things about their victim (as well as causing all kinds of other trouble, the biggest two being Portnukes/Trojans and the dreaded DoS ((Denial of Service)) attack). Some Hackers like to collect IP Addresses like badges, and like to go back to old targets, messing them around every so often. An IP address is incredibly easy to obtain - until recently, many realtime chat applications (such as MSN) were goldmines of information. Your IP Address is contained as part of the Header Code on all emails that you send and webpages that you visit can store all kinds of information about you. A common trick is for the Hacker to go into a Chatroom, paste his supposed website address all over the place, and when the unsuspecting victim visits, everything about your computer from the operating system to the screen resolution can be logged...and, of course, the all important IP address. In addition, a simple network-wide port scan will reveal vulnerable target machines, and a war-dialler will scan thousands of lines for exposed modems that the hacker can exploit.
So now that you know some of the basic dangers, you're probably wondering how these people connect to a victim's machine?

Virtual and Physical Ports

Everything that you recieve over the Internet comes as a result of other machines connecting to your computer's ports. You have two types; Physical are the holes in the back of your machine, but the important ones are Virtual. These allow transfer of data between your computer and the outside world, some with allocated functions, some without, but knowing how these work is the first step to discovering who is attacking you; you simply MUST have a basic knowledge of this, or you won't get much further.

What the phrases TCP/UDP actually mean

TCP/IP stands for Transmission Control Protocol and Internet Protocol, a TCP/IP packet is a block of data which is compressed, then a header is put on it and it is sent to another computer (UDP stands for User Datagram Protocol). This is how ALL internet transfers occur, by sending packets. The header in a packet contains the IP address of the one who originally sent you it. Now, your computer comes with an excellent (and free) tool that allows you to see anything that is connected (or is attempting to connect) to you, although bear in mind that it offers no blocking protection; it simply tells you what is going on, and that tool is NETSTAT.

Netstat: Your first line of defence

Netstat is a very fast and reliable method of seeing exactly who or what is connected (or connecting) to your computer. Open up DOS (Start/Programs/MS-DOS Prompt on most systems), and in the MSDOS Prompt, type: netstat -a
(make sure you include the space inbetween the "t" and the "a").

If you're connected to the Internet when you do this, you should see something like:

Active Connections

Proto Local Address Foreign Address State
TCP macintosh: 20034 modem-123.tun.dialup.co.uk: 50505 ESTABLISHED
TCP macintosh: 80 proxy.webcache.eng.sq: 30101 TIME_WAIT
TCP macintosh MACINTOSH: 0 LISTENING
TCP macintosh MACINTOSH: 0 LISTENING
TCP macintosh MACINTOSH: 0 LISTENING
Now, "Proto(col)" simply means what kind of data transmission is taking place (TCP or UDP), "Local address" is your computer (and the number next to it tells you what port you're connected on), "Foreign Address" is the machine that is connected to you (and what port they're using), and finally "State" is simply whether or not a connection is actually established, or whether the machine in question is waiting for a transmission, or timing out etc.

Now, you need to know all of Netstat's various commands, so type: netstat ?
You will get something like this:

Displays protocol statistics and current TCP/IP network connections.

NETSTAT [-a] [-e] [-n] [-s] [-p proto] [-r] [interval]

-a Displays all connections and listening ports.
-e Displays Ethernet statistics. This may be combined with the -s option.
-n Displays addresses and port numbers in numerical form.
-p proto Shows connections for the protocol specified by proto; proto may be TCP or UDP. If used with the -s option to display per-protocol statistics, proto may be TCP, UDP, or IP.
-r Displays the routing table.
-s Displays per-protocol statistics. By default, statistics are shown for TCP, UDP and IP; the -p option may be used to specify a subset of the default.
Have a play around with the various options, but the most important use of these methods is when you combine them. The best command to use is: netstat -an

Because this will list all connections in Numerical Form, which makes it a lot easier to trace malicious users....Hostnames can be a little confusing if you don't know what you're doing (although they're easily understandable, as we shall see later). Also, by doing this, you can also find out what your own IP address is, which is always useful.
Also, netstat -b
will tell you what ports are open and what programs are connecting to the internet.

Types of Port

It would be impossible to find out who was attacking you if computers could just access any old port to perform an important function; how could you tell a mail transfer from a Trojan Attack? Well, good news, because your regular, normal connections are assigned to low, commonly used ports, and in general, the higher the number used, the more you should be suspicious. Here are the three main types of port:

  • Well Known Ports: These run from 0 to 1023, and are bound to the common services that run on them (for example, mail runs on channel 25 tcp/udp, which is smtp (Simple Mail Transfer Protocol) so if you find one of these ports open (and you usually will), it's usually because of an essential function.
  • Registered Ports: These run on 1024 to 49151. Although not bound to a particular service, these are normally used by networking utilities like FTP software, Email client and so on, and they do this by opening on a random port within this range before communicating with the remote server, so don't panic (just be wary, perhaps) if you see any of these open, because they usually close automatically when the system that's running on them terminates (for example, type in a common website name in your browser with netstat open, and watch as it opens up a port at random to act as a buffer for the remote servers). Services like MSN Messenger and ICQ usually run on these Ports.
  • Dynamic/Private: Ports Ranging from 49152 to 65535, these things are rarely used except with certain programs, and even then not very often. This is indeed the usual range of the Trojan, so if you find any of these open, be very suspicious. So, just to recap:
    Well Known Ports 0 to 1023 Commonly used, little danger.
    Registered Ports 1024 to 49151 Not as common, just be careful.
    Dynamic/Private Ports 49152 to 65535 Be extremely suspicious.
The hunt is on

Now, it is essential that you know what you're looking for, and the most common way someone will attack your machine is with a Trojan. This is a program that is sent to you in an email, or attempts to bind itself to one of your ports, and when activated, it can give the user your passwords, access to your hard drive...they can even make your CD Tray pop open and shut. At the end of this Document, you will find a list of the most commonly used Trojans and the ports they operate on. For now, let's take another look at that first example of Netstat...

Active Connections

Proto Local Address Foreign Address State
TCP macintosh: 27374 modem-123.tun.dialup.co.uk: 50505 ESTABLISHED
TCP macintosh: 80 proxy.webcache.eng.sq: 30101 TIME_WAIT
TCP macintosh MACINTOSH: 0 LISTENING
TCP macintosh MACINTOSH: 0 LISTENING
TCP macintosh MACINTOSH: 0 LISTENING

Now, straight away, this should make more sense to you. Your computer is connected on two ports, 80 and 27374. Port 80 is used for http/www transmissions (ie for all intents and purposes, its how you connect to the net, although of course it's a lot more complicated than that). Port 27374, however, is distinctly suspicious; first of all, it is in the registered port range, and although other services (like MSN) use these, let's assume that you have nothing at all running like instant messengers, webpages etc....you're simply connected to the net through proxy. So, now this connection is looking even more troublesome, and when you realise that 27374 is a common port for Netbus (a potentially destructive Trojan), you can see that something is untoward here. So, what you would do is:

Run Netstat , and use:
Netstat -a
then
Netstat -an
So you have both Hostnames AND IP addresses.
Tracerouting

Having the attacker's IP is all well and good, but what can you do with it? The answer is, a lot more! It's not enough to have the address, you also need to know where the attacker's connections are coming from. You may have used automated tracerouting tools before, but do you jknow how they work?
Go back to MSDOS and type: tracert *type IP address/Hostname here*

Now, what happens is, the Traceroute will show you all the computers inbetween you and the target machine, including blockages, firewalls etc. More often than not, the hostname address listed before the final one will belong to the Hacker's ISP Company. It'll either say who the ISP is somewhere in there, or else you run a second trace on the new IP/hostname address to see who the ISP Company in question is. If the Hostname that you get back doesn't actually seem to mention an actual geographical location within its text, you may think all is lost. But fear not! Suppose you get a hostname such as:

http://www.haha.com 

Well, that tells us nothing, right? Wrong....simply enter the hostname in your browser, and though many times you will get nothing back, sometimes it will resolve to an ISP, and from there you can easily find out its location and in what areas they operate. This at least gives you a firm geographical location to carry out your investigations in.

If you STILL have nothing, as a last resort you COULD try connecting to your target's ISP's port 13 by Telnet, which will tell you how many hours ahead or behind this ISP is of GMT, thus giving you a geographical trace based on the time mentioned (although bear in mind, the ISP may be doing something stupid like not having their clocks set correctly, giving you a misleading trace. Similarly, a common tactic of Hackers is to deliberately have their computer's clock set to a totally wrong time, so as to throw you off the scent). Also, unless you know what you're doing, I wouldn't advise using Telnet (which is outside the parameters of this tutorial).

Reverse DNS Query

This is probably the most effective way of running a trace on somebody. If ever you're in a chatroom and you see someone saying that they've "hacked into a satellite orbiting the Earth, and are taking pictures of your house right now", ignore them because that's just bad movie nonsense. THIS method is the way to go, with regard to finding out what country (even maybe what State/City etc) someone resides, although it's actually almost impossible to find an EXACT geographical location without actually breaking into your ISP's Head Office and running off with the safe. To run an rDNS query, simply go back to MS-DOS and type: netstat , and hit return. Any active connections will resolve to hostnames rather than a numerical format.

DNS

DNS stands for Domain Name Server. These are machines connected to the Internet whose job it is to keep track of the IP Addresses and Domain Names of other machines. When called upon, they take the ASCII Domain Name and convert it to the relevant numeric IP Address. A DNS search translates a hostname into an IP address....which is why we can enter "www.Hotmail.com" and get the website to come up, instead of having to actually remember Hotmail's IP address and enter that instead. Well, Reverse DNS, of course, translates the IP Address into a Hostname (ie - in letters and words instead of numbers, because sometimes the Hacker will employ various methods to stop Netstat from picking up a correct Hostname).

So, for example, 298.12.87.32 is NOT a Hostname, mail6.bol.net.au IS a Hostname.
Anyway, see the section at the end? (au) means the target lives in Australia. Most (if not all) hostnames end in a specific Country Code, thus narrowing down your search even further. If you know your target's Email Address (ie they foolishly sent you a hate mail, but were silly enough to use a valid email address) but nothing else, then you can use the Country codes to deduce where they're from as well. You can also deduce the IP address of the sender by looking at the emails header (a "hidden" line of code which contains information on the sender)...on Hotmail for example, go to Preferences, and select the "Full Header's Visible" option. Alternatively, you can run a "Finger" Trace on the email address, at: www.samspade.org

Plus, some ISP's include their name in your Email Address with them too (ie Wanadoo, Supanet etc), and your Hacker may be using an email account that's been provided by a Website hosting company, meaning this would probably have the website host's name in the email address (ie Webspawners). So, you could use the information gleaned to maybe even hunt down their website (then you could run a website check as mentioned previously) or report abuse of that Website Provider's Email account (and thus, the Website that it goes with) to abuse@companynamegoeshere.com. If your Hacker happens to reside in the USA, go to: www.usps.gov/ncsc/lookups/abbr_state.txt for a complete list of US State abbreviatons.

List of Ports commonly used by Trojans

Please note that this isn't a complete list by any means, but it will give you an idea of what to look out for in Netstat. Be aware that some of the lower Ports may well be running valid services.

UDP: 1349 Back Ofrice DLL
31337 BackOfrice 1.20
31338 DeepBO
54321 BackOfrice 2000


TCP: 21 Blade Runner, Doly Trojan, Fore, Invisible FTP, WebEx, WinCrash
23 Tiny Telnet Server
25 Antigen, Email Password Sender, Haebu Coceda, Shtrilitz Stealth, Terminator, WinPC, WinSpy, Kuang2 0.17A-0.30
31 Hackers Paradise
80 Executor
456 Hackers Paradise
555 Ini-Killer, Phase Zero, Stealth Spy
666 Satanz Backdoor
1001 Silencer, WebEx
1011 Doly Trojan
1170 Psyber Stream Server, Voice
1234 Ultors Trojan
1243 SubSeven 1.0 - 1.8
1245 VooDoo Doll
1492 FTP99CMP
1600 Shivka-Burka
1807 SpySender
1981 Shockrave
1999 BackDoor 1.00-1.03
2001 Trojan Cow
2023 Ripper
2115 Bugs
2140 Deep Throat, The Invasor
2801 Phineas Phucker
3024 WinCrash
3129 Masters Paradise
3150 Deep Throat, The Invasor
3700 Portal of Doom
4092 WinCrash
4567 File Nail 1
4590 ICQTrojan
5000 Bubbel
5000 Sockets de Troie
5001 Sockets de Troie
5321 Firehotcker
5400 Blade Runner 0.80 Alpha
5401 Blade Runner 0.80 Alpha
5402 Blade Runner 0.80 Alpha
5400 Blade Runner
5401 Blade Runner
5402 Blade Runner
5569 Robo-Hack
5742 WinCrash
6670 DeepThroat
6771 DeepThroat
6969 GateCrasher, Priority
7000 Remote Grab
7300 NetMonitor
7301 NetMonitor
7306 NetMonitor
7307 NetMonitor
7308 NetMonitor
7789 ICKiller
8787 BackOfrice 2000
9872 Portal of Doom
9873 Portal of Doom
9874 Portal of Doom
9875 Portal of Doom
9989 iNi-Killer
10067 Portal of Doom
10167 Portal of Doom
10607 Coma 1.0.9
11000 Senna Spy
11223 Progenic trojan
12223 Hack´99 KeyLogger
12345 GabanBus, NetBus
12346 GabanBus, NetBus
12361 Whack-a-mole
12362 Whack-a-mole
16969 Priority
20001 Millennium
20034 NetBus 2.0, Beta-NetBus 2.01
21544 GirlFriend 1.0, Beta-1.35
22222 Prosiak
23456 Evil FTP, Ugly FTP
26274 Delta
30100 NetSphere 1.27a
30101 NetSphere 1.27a
30102 NetSphere 1.27a
31337 Back Orifice
31338 Back Orifice, DeepBO
31339 NetSpy DK
31666 BOWhack
33333 Prosiak
34324 BigGluck, TN
40412 The Spy
40421 Masters Paradise
40422 Masters Paradise
40423 Masters Paradise
40426 Masters Paradise
47262 Delta
50505 Sockets de Troie
50766 Fore
53001 Remote Windows Shutdown
54321 SchoolBus .69-1.11
61466 Telecommando
65000 Devil

SUMMARY

I hope this tutorial is useful in showing you both how to secure yourself against unwanted connections, and also how to determine an attacker's identity. The Internet is by no means as anonymous as some people think it is, and although this is to the detriment of people's security online, this also works both ways....it IS possible to find and stop even the most determined of attackers, you just have to be patient and keep hunting for clues which will help you put an end to their exploits.
Big THANKS to PAPERGHOST

HOW TO GET RID OF FAKE WINDOW RESTORE VIRUS

A few days ago, my client reported that: "I seem to have a virus/spyware/malware on my computer. The virus/malware showed up yesterday, and within minutes completely delete my hard drive, all , my desktop is empty , I’m left with a blank desktop and no Documents / Files / Music / Pictures / Programs etc, and all of my programs are deleted , the spyware preventing me from using any antivirus/spyware programs to scan my computer."
I checked my client's computer , the computer is infected by Windows Restore spyware, it didn’t delete those files it just made the files attribute as “hidden”, and did the same thing with desktop shortcuts, all of your folders and everything.

FOLLOW THE STEPS OUTLINE BELOW

The simple thing you have to do is open your folder options within any window , and “Folder and Search options” should be the tabpage to pick. Under the tabpage there is a view tab and within are a bunch of radial buttons, there is a options called “Hidden Files and Folders”, checkmark the one that says “Show hidden files, folders” , after you check it , then click apply button , you should see all of your folders and datas back to where they are.

What is Windows Restore? Windows Restore is really a spyware or virus?

Fake Windows Restore reputation/ rating online is terrible. and it is installed/ run without your permission.WinRestore.exe spyware is a fake software which belongs to rogue spyware family. it is also named as WindowsRestore and has a clone named System Restore virus. It is 100 percent sure and confirmed that Windows Restore is not a useful computer software but a bogus and piece of fraud tools and a part of scam. Windows-Restore spyware is a fake software developed by hackers, They install it into computers over internet using malicious websites ,worm and trojans. After Windows restored virus or WinRestore.exe is placed in your computer, it will try to scare you with fake warnings and alerts and it will force you to buy its full version to get rid of viruses.

Windows Restore malware/spyware/virus manually removal:
  1. The associated files of Fake Windows Restore to be deleted are listed below:
    • %AppData%\Microsoft\[random].exe
    • %UserProfile%\Desktop\Windows Restore.lnk
    • %UserProfile%\Start Menu\Programs\Windows Restore\
    • %UserProfile%\Start Menu\Programs\Windows Restore\Windows Restore.lnk
    • %UserProfile%\Start Menu\Programs\Windows Restore\Uninstall Windows restore.lnk
  2. The registry entries of Windows Restore spyware that need to be deleted are listed as follows:
    • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run "[random].exe"
    • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run "[random]"
    • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Associations "LowRiskFileTypes" =‘{hq:/s`s:/ogn:/uyu:/dyd:/c`u:/bnl:/ble:/sdf:/lrh:/iul:/iulm:/fhg:/clq:/kqf:/`wh:/lqf:/lqdf:/lnw:/lq2:/l2t:/v`w:/rbs:’
    • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Attachments "SaveZoneInformation" = ‘1′
    • HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Download "CheckExeSignatures" = ‘no’
    • HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main "Use FormSuggest" = ‘yes’
    • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings "WarnonBadCertRecving" = ‘0′
    • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System "DisableTaskMgr" = ‘1′
How to remove fake WindowsRestore virus (spyware,Trojan,worms) automatically:

You will need to download and burn into cd several programs on clean PC or copy them to USB Disk to remove WindowsRestore virus. Here is the instructions:

  1. Copy the below programs to USB disk (you can use an MP3 player) or Burn them to CD :
    1. Avast Pro Antispyware software(Try, free of charge, for a 30 day trial period!) .Please download with this Download Link.
    2. Avast downlaod Link
    3. Download wise PC doctor : with this download link(http://www.wisepcdoctor.com/wisepcdoctor_Setup.exe),to restore normal execution of registry.
    4. Wise PC doctor download link
  2. Restart your computer. At this point you need to gently Press the F8 key repeatedly when you find the startup menu, Select the option “ Safe Mode with Networking” by using the arrow key, then press Enter key on your keyboard , and your computer will start into Windows Safe Mode.
  3. Now you need to install Avast Pro Antispyware on your computer, When the program is installed, your need update its database to the latest, then reboot your computer to make the program fully functional, Go to the previous Step to reboot(restart) your computer into Safe Mode and do a complete scan for your computer .
  4. NOTE:
    1. In case you have some problems running Avast Pro Antispyware, you may rename the downloaded file’s name to explorer.exe or iexplore.exe. After that double click the download file and follow the install steps.
    2. Please make file extention show before renaming download file.
  5. After finish the full scan, click "Show Results" and be sure that the important data aren’t removed and infected. Select or ignore the scan result and click "Remove Selected" button to get rid of the virus and malwares. Avast Pro Antispyware will give you a report to indicate all operations for this scan. It can be saved as you want. Restart your computer and the Avast Pro Antispyware will get rid of all virus or malwares which are detected before.
  6. How to erase bad registry? Please install Wise PC Doctor- the best PC cleaner can easily fix your broken registry values and restore registry values.
  7. Why Wise PC Doctor should be used?

    As we all know, virus, Trojans and Malwares make the computer breakdown by destroying and modifying the registry values so that the computer will not run normally. After the virus, Trojans and Malwares are removed, the registry remains to be destroyed or modified, therefore the computer’s system still has some problems. That’s why you really need to fix the registry. Furthermore, some virus, Malwares and Trojans leave many dll data in the registry and this may cause damaged DLL errors and also have an effect on the computer’s system performance. In any other case Uninstall or install software may make your registry database fragmented, with corrupted, harmful and obsolete files. Do a complete scan for your computer by Wise PC Doctor at this moment.

  8. Run Wise PC Doctor to repair your computer:
    1. Install Wise PC Doctor.
    2. Click "One-Click Fix",do a complete scan for your computer.
    3. Click “Repair All” then fix all detected problems.

Following the five easy steps above, your computer will run much faster than before.

ADDING YOUR OWN PICTURE AND LOGO WITHIN MICROSOFT OFFICE TEMPLATE

Have you ever been frustrated by trying to create a brochure or flier in Microsoft Word? To create your own great-looking marketing materials using Microsoft Word and Publisher, start with a template to give yourself a head start.

FOLLOW THE STEPS OUTLINE BELOW:

  1. Insert a picture from a file:
    • Hover over the Picture option inside the Insert menu, and then click From File.
    • Browse to locate the picture you want to insert.
    • Double-click the picture you want to insert.
    • Change the wrapping style of a picture. Change the wrapping syle of a picture to freely place it on the page and to layer it in front or behind others.
    • change the wrap style of a picture
    • Select the graphic you want to change.
    • Click picture in the Format menu. In the Format Picture dialog box, click the Layout tab.
    • Click "In front of text" as the wrapping style (click ‘None’ for Publisher), and then click OK. Move the graphic where you want.
  2. Select graphics placed behind other graphics.
    • Click the graphic on top and drag it out of the way to select the graphic behind.(Graphics used in the layout file may be layered on top of one another.) Or, change the layer order of the graphic by moving it forward or backward. (see instructions below).
  3. Move a graphic forward or backward.Layer graphics on top of one another to create artistic effects.
    1. Select the graphic you want to move forward or backward.
      • Word: On the Drawing toolbar, click Draw, point to Order, and then click Bring Forward, or Send Backward, or Bring to Front, or Send to Back.
      • Publisher: On the Arrange menu, point to Order, and then click Bring Forward, Send Backward, Bring to Front, or Send to Back.
  4. Create graphics files with transparent backgrounds. If a graphic you inserted has a colored background you’d like to be transparent, locate a different file format or convert the graphic to a format that supports transparent areas. (See tips)
TIPS
  • In Words, pictures are inserted at the top left corner of the page. The picture may be hidden behind another graphic. To select the picture, move graphics on top out of the way and change its wrapping style. (see instructions below).
  • Graphic files that usually have transparent areas are vector: .eps, .emf, .wmf
  • Graphic files that do not have transparent areas are bitmap: .jpg, .tif, .bmp

CHOOSE AN OFFICE SUITE

The personal computer was originally designed for the office and to perform tasks traditional offices did using paper such as typing and accounts. Word processing and spreadsheets are the basic components of an office software suite.

FOLLOW THE STEPS OUTLINE BELOW

  1. Determine the machine you are using (PC, Mac, SPARC) and ensure its system specifications meet the minimum expected by the office suite you want to run
  2. How Much have you got to spend on it?
    • The following costs money but may offer supports for businesses:
      Apple I-work
      Corel WordProcessor
      • MicroSoft Office
      • KingSoft Office
      • Apple iWork
      • StarOffice
      • Softmaker
      • MarinerPak
      • WordPerfect
      • Ability
      • Celframe
      • Gobe Productive
    • The following are free:
      Open Office
      • OpenOffice.org
      • LibreOffice
      • Lotus Symphony (IBM
      • GNOME Office
      • Calligra Suite
      • SIAG
  3. Is it cross-platform or compatible with your operating system (Windows, Mac OS, Linux, BSD)? Mac OS X supports Microsoft Office except Microsoft Access. WINE on Linux/BSD supports all Microsoft Office versions to varying degrees. Macros are unlikely to work without Crossover Office.
  4. Consider the applications you will want. Expect a word processor and spreadsheet as standard. Suites can also contain presentation, database, e-mail client, notetaking and project management software.
  5. Consider file format compatibility for files you already have, and files you may need to use (DOC, OOXML, ODF, WPS, WKS). Plug-ins to handle major standard formats are available for all major office suites. Except for iWork which does not support ODF.
  6. Do you want to use a web-based office suite such as Google Docs, Thinkfree or Zoho? Google Docs can even work offline with Google Gears.
  7. Read reviews and advocacy sites.
  8. Try a free trial of Microsoft Office (60 day limit) or Apple iWork (30 day limit) before you buy them.