Saturday, February 25, 2012

Phone and Battery care

External Mobile Protectors
Now that your display is protected you’re good to go. However, you also have to think of the rest of the handset. Again the Mumbai roadside is the best place for cheap casings. If you have a more expensive phone though, you owe it to yourself to get a decent case.
Personalize the look of your phone while protecting it
Personalize the look of your phone while protecting it


You’ll find all major brands like CapDase, Case-Mate available in stores, nowadays. While they are a bit expensive, they will last you longer and most come with a screen guard, as well. Honestly, they too don’t do great a job of protecting the handset from a drastic fall, but they will keep it relatively safe from short drops. Fommy is a good Indian site to shop for cases and other accessories.

Carry Cases/Mobile Pouch
Aside from normal wear and tear, a major reason most handset displays tend to get scratched is because of your pant pocket. We see plenty of people struggle with removing their handsets from their jeans pocket and in the process, the filament protecting the display gets peeled off and the screen itself is left susceptible to scratches. A good carry case is a practical, as well as a sensible option especially for people who tend to be on calls constantly. It ensures that the handset's screen is protected all the time. It also makes it easy to carry around your handset comfortably and you’ll also have a place to slip it back into instead of leaving it on a table or elsewhere where you may possibly forget it.
Keeping your investment safe
Keeping your investment safe


Just keep one thing in mind, if you’re a daily commuter you’d want a pouch that your belt slips through and not one that merely clips on to it. The latter makes a quite easy to steal. Prices vary depending on the material used which can range from faux leather to real leather to even snake skin, if you have the dough.

Battery Maintenance
To get the best out of the handset’s battery, it’s important to clean the battery posts on the handset, as well as the battery, every now and then. Sediments tend to build up on the posts and you could face issues like lower battery life, the handset refusing to charge properly and so on. It’s a simple procedure. With a little sandpaper, scrape off the battery posts on the battery and do the same with the connectors in the handset. This is not something you need to do very often. Once in a couple of months should do the trick. Avoid using fake chargers and batteries available on the street.
A simple trick that's easy to do
A simple trick that's easy to do


With ‘widgets’ becoming highly popular on smartphones like Android and Symbian, it’s advisable not to burden your phone with too many of them on the screen, as it unnecessarily uses system resources, which in turn drains the battery. Android users should disable ‘Live Wallpaper’, since it may look real fancy, but it ruins the battery life. A very important point is to never keep charging the phone on a daily basis (unless you have to). Allow the battery to discharge till about 10 percent and then charge it. Remember, your Li-ion battery has a finite number of charging cycles, so if you don’t let it complete the discharging cycle, you could end up ruining your battery in the long run. 

A Few Quick Tips
Avoid trying to open up the handset on your own to clean the inside. Let a professional do it, especially if it’s under warranty. If you’re using a memory card, don’t fill it to capacity, always leave at least 100MB of free space. Lightly wipe the camera lens with a microfiber cloth before using the camera. Uninstall old programs that you never use, it just occupies space and slows the phone down.

If there are any more tips you’d like to share with other readers, please go right ahead and leave your comments. In this day and age, while it may be possible to keep changing handsets, these tips will not just allow you to keep your handset safe, but in a better shape, allowing it to get you a better resale value for itself.

How To Keep Mobile Screen away from SCRATCHES ??

Every second person on the planet and sometimes I think a little more than that number, is a mobile phone user. Handsets themselves are designed in all possible shapes and sizes and directed at various demographics. It’s because of this insane, virtually unlimited variety that we tend to take a handset’s maintenance for granted. Looking after the handset is usually not something that we would pay too much of attention to. Let’s face it, it’s not high on our list of to-dos. But, mobile maintenance is very important for the longevity of the device. It’s the little things like dust and sedimentation that can be quite harmful to the handset in the long run. Of course, these tips are not for the hardcore mobile users, although, I do know a few who have been using handsets since day one and have no idea how to take care of them.

So without getting too technical, here are a few simple everyday methods and tips to help you keep your mobile in shape.

Wiping the Display
Nearly all of us, myself included, on rare occasions, will use any surface fabric that’s available to clean a handset’s display - T-Shirt, table cloth, hanky et al. This is never a good idea, EVER! It tends to leave small scratches and streaks on the screen. This is something that you have to pay special attention to especially if your phone doesn’t have a scratch resistant display. The last thing you want to do is leave marks over that screen. I know how annoying fingerprints are, but trust me, there’s a right way and a wrong way to get rid of them.
Various ways to keep clean
Various ways to keep clean


‘Microfiber’ cloths are very easily available for this purpose. Companies like Scotch-Brite and Staples carry the same and price-wise shouldn’t cost you more than Rs.100. Try not to press the LCD too hard as one of the main reasons displays go on the fritz is because of too much pressure. Microfiber cloths are also great for cleaning Laptop and Desktop displays, as well as your CDs and DVDs. Liquid cleaners are also available, but use it sparsely.

Screen Protection
This is not something that’s specific to just touchscreen handsets, but to all mobile phones. Having a Screen Guard ensures that the display is protected from dust, as well as scratches. There are a few different kinds of protectors. For touchscreen handsets, we'd recommend using a thinner quality as the thicker the protector the less receptive the display becomes to touch. All handsets already have a plastic sheet covering the display, but we've noticed that it somehow manages to peel off too quickly.
Becareful of fingerprints
Be careful of fingerprints


You can easily buy one off the street for as little as Rs.5 to Rs.10. There are more expensive options available that range anywhere between Rs.60 to Rs.100. ScratchGuard is a very popular screen protector brand and is available for almost all phones. The advantage of this is, it’s re-usable, which means if down the road, dust and grime manage to get in, simply peel it off, wash it and apply it. You can put the protector on your self, though we’d recommend letting the guy behind the counter do the dirty work. In case you don’t have that option, then here’s what you need to do.

  • Wipe the display carefully with a Microfiber cloth. Make sure it’s devoid of smudges or dust particles
  • What you’ll need to do first, if you’ve bought one of the street brands, is cut the sheet down to size. It doesn’t have to be the exact size of your screen as most screens these days are not usually sunk in.
  • Carefully peel off the plastic from the back portion. DO NOT touch the adhesive part or that’s the end of this procedure and you’ll ache to get yourself a new one, unless you’re ok with having an almost permanent fingerprint mark on your screen.

  • Gently place the top portion over the top of the screen and slowly lay it down over the entire display while pressing it down using a flat surface. This is to make sure that you don’t end up with air bubbles. If there are any, slowly peel up the layer and lay it down again a little more carefully this time, or gently push away the bubbles towards the edges using the flat object you’re using.

Remove any air-bubbles that may have formed
Remove any air bubbles that may have formed


It’s extremely important to make sure that the edges are absolutely flat, especially the four corners.

Saturday, February 11, 2012

How to Lock the folders



 How to Lock the folders 

folder1.jpg




You can lock and unlock your folder with this simple trick !
Procedure :
1. Make a folder on the desktop and name it as “folder”
2. Now, open notepad and write ren folder folder.{21EC2020-3AEA-1069-A2DD-08002B30309D} and now (Notepad Menu) File>save as.
3. In the ‘save as’ name it as lock.bat and click save ! (Save it on Desktop)
4. Now, again open notepad again and write ren folder.{21EC2020-3AEA-1069-A2DD-08002B30309D} folder and now (Notepad Menu) File>save as.
5. In the ‘save as’ name it as key.bat and click save ! (Save it on Desktop)
6. Now, double click lock.bat to lock the folder and now if you open your folder, control panel will open up !
7. Now, double click key.bat to open the folder and now if you open your folder, you can access your data inside the folder again !
8. Lock your folder and hide the key.bat somewhere else on your hard disk !
9. Whenever you want to open your folder just paste the key.bat on desktop and open your folder using it !

Friday, February 10, 2012

Steganography

-: Steganography :-


The art and science of hiding information by embedding messages within other, seemingly harmless messages. Steganography works by replacing bits of useless or unused data in regular computer files (such as graphics, sound, text, HTML, or even floppy disks ) with bits of different, invisible information. This hidden information can be plain text, cipher text, or even images.

Some common files used for hiding the data are .jpeg, .bmp, .jpg, .bmp, .pdf, .mp3, .wav, .gif, etc.

The following example gives detailed overview on how data can be hide by steganography :-
The tool used in this example is "S-Tools".
Download S-Tool.zip (273 KB)

1) Prepare the secret file that you want to hide (eg. '.txt')
2) Launch the steganography tool (eg. 'S-Tools')


3) Drag and drop the host file (image, audio or video) inside which you want to hide your secret file.(eg. 'Sachin.bmp')


4) Now, Drag and drop the secret file (eg. 'New Text Document.txt') over the host file (eg. 'Sachin.bmp'). As soon as you drop the secret file you will be alerted by s-tools to enter password and to choose encryption algorithm which can be further used to retrieve your secret file from the host file.


5) After entering password and encryption algorithm, click OK, the steganography tool will then create an identical copy of the host file (eg. 'hidden data.bmp') as shown below.


This identical copy actually consist of hidden data (your secret file), but it can never be differentiated from original one by human eyes.

6) The duplicate file containing hidden data can be saved by right clicking and selecting 'save as' option.
7) To reveal the hidden data from duplicate file (eg. hidden data.bmp'), open the file in steganography tool. Then right click and select 'reveal' option; you will be promted to enter password and proper encryption algorithm. As soon as you click OK you will be offered by 'reveal archive' as shown below :


This consist of exact secret file (eg. 'New Text Document.txt'). Then, you can save it to read the secret information.

what is encrypting ??

-: Cryptography :-


Cryptography By definition cryptography is the process of converting recognisable data into an encrypted code for transmitting it over a network (either trusted or untrusted). Data is encrypted at the source, i.e. sender's end and decrypted at the destination, i.e. receiver's end.

In all cases, the initial unencrypted data is referred to as plaintext. It is encrypted into ciphertext, which will in turn (usually) be decrypted into usable plaintext using different encryption algorithms.


The Purpose :-
* Authentication : The process of proving one's identity.
* Privacy/confidentiality : Ensuring that no one can read the message except the intended receiver.
* Integrity : Assuring the receiver that the received message has not been altered in any way from the original.
* Non-repudiation : A mechanism to prove that the sender really sent this message.

In general cryptographic algorithms are classified into three categories as follows :

1) Secret Key Cryptography (SKC) : Uses a single key for both encryption and decryption.
2) Public Key Cryptography (PKC) : Uses one key for encryption and another for decryption.
3) Hash Functions : Uses a mathematical transformation to irreversibly "encrypt" information.

Secret Key Cryptography :- With secret key cryptography, a single key is used for both encryption and decryption. Because a single key is used for both functions, secret key cryptography is also called symmetric encryption.

Secret key cryptography algorithms that are in use today include :

1) Data Encryption Standard (DES) : DES is a block-cipher employing a 56-bit key that operates on 64-bit blocks. DES uses a key of only 56 bits, and thus it is now susceptible to "brute force" attacks.
Triple-DES (3DES) and DESX are the two important variants that strengthen DES.

2) Advanced Encryption Standard (AES ) : The algorithm can use a variable block length and key length; the latest specification allowed any combination of keys lengths of 128, 192, or 256 bits and blocks of length 128, 192, or 256 bits.

3 ) International Data Encryption Algorithm (IDEA) : Secret-key cryptosystem written by Xuejia Lai and James Massey, in 1992 and patented by Ascom; a 64-bit SKC block cipher using a 128-bit key. Also available internationally.

4) Rivest Ciphers : Named for Ron Rivest, a series of SKC algorithms.

RC1 : Designed on paper but never implemented.
RC2 : A 64-bit block cipher using variable-sized keys designed to replace DES. It's code has not been made public although many companies have licensed RC2 for use in their products. Described in RFC 2268.
RC3 : Found to be breakable during development.
RC4 : A stream cipher using variable-sized keys; it is widely used in commercial cryptography products, although it can only be exported using keys that are 40 bits or less in length.
RC5 : A block-cipher supporting a variety of block sizes, key sizes, and number of encryption passes over the data. Described in RFC 2040.
RC6 : An improvement over RC5, RC6 was one of the AES Round 2 algorithms.

5) Blowfish : A symmetric 64-bit block cipher invented by Bruce Schneier; optimized for 32-bit processors with large data caches, it is significantly faster than DES on a Pentium/PowerPC-class machine. Key lengths can vary from 32 to 448 bits in length. Blowfish, available freely and intended as a substitute for DES or IDEA, is in use in over 80 products.

White Papers 3

-: White Papers :-


File Size Description
 metasploit_beginners.pdf 129 KB Metasploit Beginners
 crack_wep.txt 1.11 KB Crack a Wireless WEP Key
 pass_hack_google.txt 1.71 KB Passwords Hacking by Google
 hide_files_jpeg.txt 1 KB How To Hide Files in JPEG Images
 win2kbypass.txt 2.93 KB Bypass password logon in Windows 2000
 linux_infogather.txt 8.81 KB Linux Commands for Information Gathering
 nmap_basics.txt 3.54 KB Nmap Basics
 shellbegin.pdf 104 KB Shellcode for Beginners
 sniffer_faq.txt 19.2 KB Sniffer FAQs
 telnet_secrets.txt 9.90 KB Telnet The Secret Exposed
 trojan_paper.pdf 1.79 MB Trojan White Paper
 firewall_bypass.txt 3.93 KB Firewall bypass via protocol stenography
 creating_xss_worm.txt 9.95 KB Creating An XSS Worm
 dsniff.txt 35.5 KB Network Monitoring with Dsniff
 xmas.txt 27.6 KB Shopping Carts and Weak Security
 trojan_horses.txt 14.4 KB Computer Trojan Horses
 ajax_holes.pdf 43.8 KB Top 10 AJAX security holes
 portscan_tech.pdf 16.1 KB Port Scanning Techniques
 social_engg.pdf 173 KB Threat of Social Engineering and Defense
 spam_antispam.pdf 645 KB SPAM and Anti-Spam
 wireless_ids.pdf 506 KB Wireless Intrusion Detection Systems
 802.11_analysis.pdf 1.42 KB 802.11 Network Forensic Analysis
 winzip_analysis.pdf 676 KB Analysis of the WinZip Encryption Method
 writing_shellcode.pdf 141 KB Writing Small Shellcode
 anon-ftp-faq.htm 26.2 KB Anonymous FTP FAQ
 wardriving.pdf 406 KB Wardriving and Detecting Wardrivers
 cica_pentest.pdf 428 KB Penetration Testing White Paper
 wireless_hacktech.doc 256 KB Hacking Techniques in Wireless Networks
 wireless_hacktools.doc 110 KB Wireless Hacking Tools
 ddos_taxonomy.pdf 98.2 KB Taxonomy of DDoS Attacks and Defense
 pass_pin_sec.doc 93.5 KB Password and PIN Security
 ddos_disasters.pdf 592 KB Internet Disasters - DDoS Attacks
 bluetooth_hacking.pdf 353 KB Bluetooth Hacking - Full Disclosure
 spam_information.doc 83 KB Spam Information
 viruses_worms.pdf 93.7 KB Viruses and Worms
 proxy_intro.doc 867 KB Introduction to Proxy Servers
 spam_fraud.ppt 1.25 MB Spam, Phishing and Fraud
 yahoo_booter_faq.txt 5.33 KB Yahoo Booters - FAQs
 trojan_linkoptimizer.pdf 252 KB Trojan Linkoptimizer
 finding_conficker.pdf 462 KB Finding W32/Conficker.worm
 identity_theft.ppt 3.53 MB Identity Theft