Pages

Monday, December 9, 2013

How to remove permissions of a folder in ubuntu

Hello friends......

You can download this whole post as a PDF file. To download this post click here.

Here I am going to show you a trick about how to remove permissions of a folder in ubuntu or you can say how to lock a folder in ubuntu without using any software. Currently I am working on ubuntu 13.10, but this trick will work on all versions of ubuntu. So let's begin...



Monday, November 18, 2013

"Download Blocked Torrents"






"Download Torrent file even if torrent client is blocked."

To download the whole post as  a PDF file click here.

Hello friends...

First of all let us get some knowledge about torrent clients and torrent files. Torrent downloading is done through the P2P file sharing.
Peer to Peer (P2P) file sharing is one of the largest bandwidth eaters for most of the networks around the world, colleges, & also in companies. Hence, most network administrators tends to implement strong solutions to block P2P file sharing softwares. Let us start by discussing some basic terms:



Sunday, November 17, 2013

Data transfer on a network without using any softwares

Hello friends......

You can download this whole post as a PDF file. To download this post click here

Some times you have to transfer a big amount of data from one system to another like 100 to 200 GB or more than this. So if you are trying to transfer it through a pen drive, it will take a lot of time. Instead of that you can use a LAN cable with RJ 45 slot  to transfer the data.
Now there are two ways to transfer the data through LAN cable. First one is by using a software, but mostly it doesn't works.

The second one is using proxies which is most reliable method to transfer data from one system to other. Here I'm going to show you this method. you just have to follow the steps -


Step 1:-


Connect both the systems using LAN cable. Note that antivirus and firewalls on both systems must be OFF. This is not necessary but it is good to turn OFF them for this time only. You can turn ON them back after you have done your data transfer.

 

Step 2:-


Open Control panel and go to Network and Sharing Center. It will look like this...


 

Step 3:-


Here you can see all your current connections. Click on Ethernet option. It will open a window like this...


Click on properties button in lower left side. It will again open a window like this...


You have to scroll down and find the Internet Protocol Version 4 and after then double click it. It will again open a window like this...


 

Step 4:-


After that click on Use the following IP Address. You have to follow the same process in the system from which you have to take the data. Now in first system enter the IP address 10.0.0.1 and then press TAB key. In the second system enter the IP address 10.0.0.2 and hit TAB key. These two IP address must be different and unique. Now press OK in both systems and close all the previously opened windows. Now both the systems are configured to start the transfer. 

 

Step 5:-


Let us say that the system from which you have to take the data is user 2 with IP address 10.0.0.2 and your system in which you want to take the data is user 1 with IP address 10.0.0.1. 
Go to the desired folder in user2's system, right click and use the share with specific people option. It will look like this...

It will open a window looking like this....



 Step 6:-


Now choose the user from the list available from the first circle. If the user is not specified, just click on the Everyone and click on Add button. After that Everyone will be shown in the list below. You have to change the permissions according to requirements. Read means that the user1 can only see the files in the folder but he can't make changes to this folder while Read/Write means that the user1 can also make changes to this folder. Choose your option or just click the read/write option. After that click Share button below. It will open a window looking like this...


Click done and the folder is shared with the user1.

 

Step 7:-


After all this process user1 is ready to copy the desired folder. To start copying click on Start button and type the IP address of the user2 in the search box. It will not find any results.



 Just hit enter. It will open a window asking the user2 details. It will look like this...

 Step 8:-


Enter the User name and password of user2 system. If you don't know the user name of user2 press window key and L together. It will lock the screen and show you the username. Note that user2 must have a password protected account and the account must be local. After entering the details, the shared folder will be shown in the window behind like this...

Now you can copy the data from here to your own system.


If all goes well you will be able to transfer the data from one system to other. If you have any queries please ask it into comments. Please Like Us on FACEBOOK.

Thank you

Saturday, November 16, 2013

DDR2 vs DDR3 vs DDR4

Hello friends......

You can download this whole post as a PDF file. To download this post click here.
  
I'm going to show you the difference between three types of dynamic RAM memories which are DDR2, DDR3, DDR4. Double data rate synchronous dynamic random-access memory (DDR SDRAM) is generally called the DDR (1,2,3or4) RAM. The difference between these three types of memory is shown in the picture-




1) Voltage-  
 The power supply needed to keep the RAM turned ON. The lower the required power supply better the RAM memory. DDR4 requires only 1.2 V while DDR3 requires 1.5V and DDR2 requires 1.8V.

2)Data Rate-  
 RAM memory usually installed on a system to support the processor for maximum  performance. So higher the amount of RAM, better the performance. But in a case where the amount of RAM is higher, but the processor is not so advance that can handle that much amount, the system performance decreases.  DDR4 has the double data rate then DDR3. The maximum data transfer rate of DDR4 is 3.2 Gb/s.

3) Clock Speed- 
 DDR4 is supporting the maximum clock speed of 1.6 GHz. The average clock speed of DDR4 RAM is 1066 MHz,  while the same of DDR3 is 800MHz and for DDR2 it  is only 400MHz.




4) Refresh Rate- 
 The maximum refresh rate of DDR4 and DDR3 is same but the range of self refresh operation of DDR4 is higher then the DDR3 as shown in the picture.

5) Temperature- 
  DDR3 and DDR4 both can operate at the temperature of 95C but the DDR2 can only operate till 85C temperature. 

Friday, September 27, 2013

Download Videos even if downloading is blocked



Download Videos even if downloading is blocked


Sometimes downloading of videos are also blocked in any organizations and institutions. for ex. - you want to download a video from youtube, you opens that video on youtube but the downloader (like IDM) doesn't download the video.  To download some Videos you have to follow these simple steps

 

STEP 1 :-


Run the software "Ultra Surf". If anyone does not know how to do it or what is it. Just click here.


STEP 2:-


After successful connection in "Ultra Surf", you need a downloader like IDM (Internet Download Maneger) . You can download it here. It is a trial version for 30 days. To activate it after trial period click here.  Download and Install it. After Installation go to the options in IDM. It will look like this...


STEP 3:-

Go to Proxy tab and enter proxy"127.0.0.1" with port "9666". It will look like this...



Now click ok. After this process your IDM is configured according to the ULTRA SURF and you are free to download a video. IDM will give a download button on videos on your browsers like this...

If all goes well you will be able to download videos from blocked websites too.

Thank you

How to activate Internet Download Manager for free

Hello friends...
 
You can download this whole post as a PDF file. To download it click here.

This is a common problem faced by a user  who uses IDM.
When you download the Internet Download Manager for the first time, It gives you a trial period of 30 days. After 30 days it shows you the message of trial period over and IDM is exiting. It looks like this...


When you click OK it will show you a window like this...



Now click cancel and follow the steps below:-


STEP 1:-

Uninstall the IDM from Control Panel. After uninstalling restart the system.


STEP 2:-

To download the IDM with patch click here. It will take you to a webpage looking like this...


now click on download.


STEP 3:-

After downloading extract the file. Run the application and install the IDM. It may say Fake serial but no need to worry.


STEP 4:-

Copy the "Keygen+Patch" file from "Keygen+Patch" folder and paste it in to the installation folder. It is generally :
     C:\Program Files (x86)\Internet Download Manager
     OR
     C:\Program Files\Internet Download Manager


STEP 5:-

Run "Keygen+Patch.exe" and it will look like this...



    a) Click on Generate
    b) Click on Patch and select idman.exe
    c) Click on Auto Reg 
your IDM is registered successfully. If you update your IDM, you have to follow these steps again. 

If all goes well your IDM will be registered. If you have any queries please ask it into comments. Please Like Us on FACEBOOK here .

Thank you



Thursday, September 26, 2013

URL Obfuscating

"URL Obfuscating Web Proxies or Hide My Ass"

The problem with the web proxies is that the target website address that the user is visiting is revealed within the URL itself & hence this technique can easily be detected and blocked by your college or company administrator using a URL filtering technique. This is where some URL obfuscating proxies came into picture. OBFUSCATING is a technique of hiding a URL address in such a manner that nobody can figure out the actual website address by just looking at it. It makes it very tough for the network administrator to be able to detect and block you using URL filtering techniques.

STEP 1:-


One of my favourite URL Obfuscating proxy server is

"http://www.hidemyass.com"

It will look like this...



STEP 2:-


It allows you to encode a web address in such a manner that nobody can make any sense of it! all you need to do is type the requested web address in the space provided, select the URL encoding option & click on "hide my ass".


STEP 3:-


If you type www.youtube.com in the space provided, the "hide my ass" will obfuscate the web address. Here not only the URL has been encoded, but even title bar text has been changed. It will look like this...



Now the blocked website is unblocked. Encoded URL's that are created by hide my ass remain same permanently. In other words, you can bookmark the above mentioned encoded URl and use it at your convenience.

Encoding is fantastic, but an even better option is the encryption option available on the hide my ass website. The advantage of using the encryption option is that it is a temporary encrypted URL that expires after a set period of time. This means that even in the future, nobody else can view the web pages that may have been visited through it, giving you complete anonymity.

URl obfuscating web proxies are very useful, but they could be blocked by your network administrator. In case they block the popular web proxies, then you can always find new web proxies that have not been blocked by encrypting the URl again and continue to access your favourite blocked websites. It is an endless cat-and-mouse game

It is important to note that if you want to log into any of your online accounts (like facebook, gmail & yahoo), you will need to find and use a web proxy that accepts cookies. Another problem with web proxies is taht many of them do not support JavaScript and SSL encryption, which means that a number of websites will not work. For example, you may not be allowed to watch streaming videos on youtube if scripts are not supported by your proxy.

If all goes well you will be able to get the internet access again and till you want. If you have any queries please ask it into comments.

Thank you

Firewall Tunnelling using SSH & Putty



"Firewall Tunnelling using SSH & Putty"

SSH (Secure Shell) is a protocol that allows two devices to connect and exchange data securelyin an encrypted format. It usually uses the port 22 for all communication. It protects your sensitive information like username and password by encrypting it and securely transmitting it over internet.
PuTTY is a free, open source client that allows users to establish connections using SSH, Telnet etc. with remote systems. To download it, click here. It will open a window like this...




Let us assume that you are connected to the internet and are behind the firewall of your college or company that doesn't allow you to make outgoing connections to remote Port 80 (HTTP or websites) of a particular website, say facebook. Just because the firewall has blocked access to remote Port 22, it doesn't mean that it would have also blocked outgoing connection to remote Port 22 (SSH). This means that you may be able to use PuTTY to create a SSH Tunnel connection through the firewall (outgoing remote Port 22) to a remote SSH server that you have access to and then use this remote SSH server to connect to the blocked remote systems. In other words, your firewall thinks that you are connecting to Port 22 of a harmless system, but in reality you are using that system to connect to facebook. The process is shown in following steps:-


STEP 1:-


You need to either set up your own SSH server with unblocked Internet access or register an account on a SSH server that has unblocked access to the Internet. This SSH server can be in any part of the world.


STEP 2:-


Use PuTTY to create an encrypted SSH connection to the remote SSH server. (Outgoing Port 22, encrypted communication will be allowed by most local firewalls.) PuTTY opens a local Port that you can now connect to in order to access the remote SSH server.


STEP 3:-


Once you have connected to remote SSH server that has unblocked access to the Internet, you can then use it to access all your favourite websites on the internet.

Let us assume that your firewall has blocked outgoing connections to remote Port 25 and 80 and you want to use PuTTY and SSH to bypass this Blocking mechanism. Now follow the steps to do this...


STEP 1:-


Download PuTTY and click on Session. In the hostname field enter the IP address of the SSH server that you want to connect to. In the port field enter 22.


STEP 2:-


Click on connection>SSH>Tunnels and enter the IP address and Port numbers of the blocked remote systems you wish to tunnel to. For example, I entered 110 in the source port field & 192.168.0.11:110 in the destination field then clicked on ADD. It will look like this...



STEP 3:-


Based on this configuration, now the local port 80 on your system will connect to port 80 on 190.168.0.1 (using SSH connection to SSH server) and the local port 25 will connect to Port 25 on 192.168.0.22 and so on. As simple as that.


STEP 4:-


Now click on the OPEN button, you will be prompted to enter the SSH server username and password. You would have received it when you created an account on the remote SSH server. PuTTY now starts to listen to port 80 and port 110 on the local system. Now in order to access the port 80 on 192.168.0.1, you need to start your browser or any other tool and simply type local host: 80 or local host: 110 & press enter! It is also possible to buy SSH Tunnel accounts on various websites like "https://camolst.com/sshtunnel/" which is currently providing a SSH tunnel account to users at a subscription price of $5 per month.

If all goes well you will be able to get the internet access through tunneling and till you want. If you have any queries please ask it into comments.

Thank you

Unblocking Facebook and other websites over Internet



"Unblocking Facebook and other websites over Internet or use of ULTRA SURF"


Sometimes we can't access facebook even if we are connected to internet properly in an institute or in organization. This is due to the blocking of websites for safe web surfing. These organizations blocks some websites including Facebook, Youtube and many other Porn Websites to remove overload from their slow internet servers.
Here is a simple method to unblock these websites. you must follow these simple steps:-


STEP 1:-


Click here.

you will get a webpage like this...


STEP 2:-


Now click the download button situated in the right corner.
Download the file. It's size is only 1.5 MB.


STEP 3:-


Install the downloaded file. After Installation it will look like this...


It will either say "Sucessfully connected to the Server" or "Connection Failed"
If it says "Sucessfully connected to the Server" then follow the step:-5. otherwise continue step:-4.


STEP 4:-


If it says "Connection Failed" then you must check options. That will look like this...


then you must click on "Proxy Settings". It will look like this...


Here you can enter your organization's proxy manually. For example proxy host is "10.0.2.11" and proxy port is "3128".
then click ok and restart the ultra surf. Now It will show you "Sucessfully connected to the Server".


STEP 5:-


After "Sucessfully connected to the Server"....you have one another running proxy that is "127.0.0.1" with port no. "9666".
Now you have to integrate this new proxy into your browser. It is automatically done in "Internet Explorer". but I will show you how to do it manually.
For Internet Explorer you have to click internet options. It will look like this...


After opening options you have to click "connections" tab and then "LAN settings".


It will open a window like this...here you have to enter the new proxy as shown in figure. Then click ok.


this process can also be done in "mozila Firefox" and "Google Chrome".

If all goes well you will be able to open all the blocked websites.

Thank you

Unblocking Download limits with "MAC Spoofing"



Unblocking Download limits with "MAC Spoofing" or changing the MAC address.

Each network interface(like Wireless card, Ethernet card) on every computer on the internet has a unique MAC address. MAC stands for "Media Acess Control". Companies and colleges may have a policy on how much data each user can download from internet in a specific time. Such download limit are forced by recording the MAC address of all the users and then keeping track of the amount of data downloaded by  the users. If any MAC address reaches the download limit, then his internet access is taken away.
To get the internet access again, you have change your MAC address. Changing the MAC address is called "MAC Spoofing". Follow these steps to get internet access through MAC Spoofing...


STEP 1:-


First check your System's MAC Address. It is possible to view the MAC Address by going to the "MS DOS" prompt and typing the command:-
getmac -v



STEP 2:-



For MAC Spoofing you have to use a software named "Mac Makeup" ver. 1.95d. To download it click hereIt will open a webpage like this..


now click download.


STEP 3:-


It will take you to a webpage where 3 downloading mirrors are available. Choose for yourself. you can choose any of them...



STEP 4:-


After downloading, Run the software. But it would not run simply. It will give you a error code like this...


Now click ok.


STEP 5:-


Now right click the application and click on "Run as administrator" like this...

STEP 6:-

Now it will run and look like this...


here you can see the empty "new address bar".


STEP 7:-


All you need to do is to enter the new MAC address and then click "change button". you can also choose "generate ramdom" for new address.


STEP 8:-

It will take around 30 seconds to change the MAC address. Now again check the MAC address by command "getmac -v" in "MS dos" prompt. It will look like this...



Sometimes, administrators have no restrictions on the amount of data download. This means that if you are able to spoof your MAC address and pretend to be one of the administrator then you may be able to get unlimited downloads on your system as well!!

To get the Internet access you need the valid MAC address on the same network. It is quite easy to find out some other user's MAC address by simply running "DATA SNIFFER" on your system to sniff data packets being sent across the network.


If all goes well you will be able to get the internet access again and till you want. If you have any queries please ask it into comments.

Thank you

How to increase system start up speed using MSCONFIG



When our windows is newly installed into our pc, it's start up speed is very fast. but after some time when some softwares are installed, start up speed starts to decrease. later on our system seems to be so slow that we can't tolerate it.
Here is a small trick to increase start up speed effectively using "MSCONFIG". Follow these steps to increase your system speed extreamly:-


STEP 1:-


Click on "START" button. Here you can see a search bar. It will look like this...


STEP 2:-

Now type "MSCONFIG" in that search bar. When you finished typing "msconfig" it will look like this...



STEP 3:-


Now run that file. after clicking on that file a window will open that will look like this...



STEP 4:-


Click on start up tab. Now you can see some softwares installed on your system which also run on startup. Here you can either choose which softwares are to be run on start up or you can also choose "disable all", which will disable all the softwares from start up. It will increase your speed at maximum rate.



Now click ok.


STEP 5:-


It will ask you to restart the system. Now simply restart the system or you can restart later.

If all goes well you will be able to speed up your system's start up speed. If you have any queries please ask it into comments.

Thank you

READY BOOST to increase system performence



"How to use a PEN DRIVE as RAM memory."

Some times we have to increase our system performence to play high graphics game, or just some other work which takes the 100% storge of RAM memory. If our System's RAM memory is 1 GB or 2 GB, it is too little to do that work simply or play that game freely. The game will start stucking. Now we need 1 or 2 GB RAM memory extra. Here is a simple trick "READY BOOST" to use any removable media like pen drive or sd card etc. as RAM memory...

 

Step 1:-


Connect your removable media. Here I will show you this trick with my 1 GB memory card. First of all, your removable media should be empty. There should be no data on that device.



STEP 2:-


Right Click on the sd card and then click on PROPERTIES. It will look like this...


Step 3:-

Now click on "READY BOOST" tab. Here you can see the "do not use this device" option ticked. It is shown in the figure...


Step 4:-


Now all you need to do is Click on "use this device" and select how much storage of your device, you can give for increasing your system speed. More the available storage for READY BOOST, more the system speed. Now click ok. It will look like this...


Step 5:-


After clicking ok the device will look filled up. It will look like this...





If all goes well you will be able to increase your system's speed and performence. If you have any queries please ask it into comments.

Thank you

Friday, August 2, 2013

How to hack a Facebook account

hey guys....
       you always want to hack someone's facebook account. You all know that each and every facebook account is related to a email account. If any how you get the password of the email account of victim's facebook then this task is the piece of butter only. but- 


 The big thing is how to hack anyone's email account, so to know how to hack an email account click  here.


Now if you have already the password of
 email account of victim then you are already 95% done. Just follow steps below-


STEP 1-


firstly click here, it will open a window looking like this...



STEP 2-


Enter the user name of the account you want to hack and hit search. now the facebook will take you to webpage looking like this...



STEP 3-


Now a pop up window will open, in which you have to enter the gmail address and password which is registered with this facebook account and which, you have already hacked. after that you will come to a webpage looking like this...


STEP 4-


Enter the new password, and you are done with it.

If all goes well you will be able to hack someone's facebook account. If you have any queries please ask it into comments. Please Like Us on FACEBOOK.

Thank you