what are you looking for?
Thursday, November 10, 2016
Donald Trump meeting president Obama at White House
Wednesday, November 9, 2016
Watch nannaku prematho full hindi dubbed movie here
Watch nannaku prematho full hindi dubbed movie here
Hacking Linux Systems
Hacking Linux Systems
Linux is the most widely used server operating system especially for web servers. It is open source; this means anybody can have access to the source code. This makes it less secure compared to other operating systems as attackers can study the source code to find vulnerabilities. Linux Hacking is about exploiting these vulnerabilities to gain unauthorized access to a system.
In this article, we will introduce you towhat Linux is, its security vulnerabilities and the counter measures you can put in place.
Quick Note on Linux
Linux is an open source operating system. There are many distributions of Linux based operating systems such as Redhat, Fedora, and Ubuntu etc. Unlike other operating system, Linux is less secure when it comes to security. This is because the source code is available freely so it is easy to study it for vulnerabilities and exploit them compared to other operating systems that are not open source. Linux can be used as a server, desktop, tablet, or mobile device operating system.
Linux programs can be operated using either GUI or commands. The commands are more effective and efficient compared to using the GUI. For this reason, it helps to know Linux basic commands.
Linux Hacking Tools
- Nessus– this tool can be used to scan configuration settings, patches, and networks etc. it can be found athttp://www.tenable.com/products/nessus
- NMap. This tool can be used to monitor hosts that are running on the server and the services that they are utilizing. It can also be used to scan for ports. It can be found at http://nmap.org/
- SARA – SARA is the acronym for Security Auditor’s Research Assistant. As the name implies, this tool can be used to audit networks against threats such as sql Injection, XSS etc. it can be found at http://www-arc.com/sara/sara.html
The above list is not exhaustive; it gives you an idea of the tools available for hacking Linux systems.
How to prevent Linux hacks
Linux Hacking takes advantage of the vulnerabilities in the operating system. An organization can adopt the following policy to protect itself against such attacks.
- Patch management– patches fix bugs that attackers exploit to compromise a system. A good patch management policy will ensure that you constantly apply relevant patches to your system.
- Proper OS configuration– other exploits take advantage of the weaknesses in the configuration of the server. Inactive user names and daemons should be disabled. Default settings such as common passwords to application, default user names and some port numbers should be changed.
- Intrusion Detection System– such tools can be used to detect unauthorized access to the system. Some tools have the ability to detect and prevent such attacks.
Hacking Activity: Hack a Linux system using PHP
In this practical scenario, we will provide you with basic information on how you can use PHP to compromise a Linux. We are not going to target any victim. If you want to try it out, you can install LAMPP on your local machine.
PHP comes with two functions that can be used to execute Linux commands. It has exec() and shell_exec() functions. The function exec() returns the last line of the command output while the shell_exec() returns the whole result of the command as string.
For demonstration purposes, let’s assume the attacker managers to upload the following file on a web server.
1
2
3
4
5
6
7
8
9
10
11
| <?php $cmd = isset( $_GET [ 'cmd' ]) ? $_GET [ 'cmd' ] : 'ls -l' ; echo "executing shell command:-> $cmd</br>" ; $output = shell_exec( $cmd ); echo "<pre>$output</pre>" ; ?> |
HERE,
The above script gets the command from the GET variable named cmd. The command is executed using shell_exec() and the results returned in the browser.
The above code can be exploited using the following URL
HERE,
- “…konsole.php?cmd=ls%20-l”assigns the value ls –l to the variable cmd.
The command executed against the server will be
shell_exec('ls -l') ;
Executing the above code on a web server gives results similar to the following.
The above command simply displays the files in the current directory and the permissions
Let’s suppose the attacker passes the following command
rm -rf /
HERE,
- “rm” removes the files
- “rf” makes the rm command run in a recursive mode. Deleting all the folders and files
- “/” instructs the command to start deleting files from the root directory
The attack URL would look something like this
Summary
- Linux is a popular operating system for servers, desktops, tablets and mobile devices.
- Linux is open source and the source code can be obtained by anyone. This makes it easy to spot the vulnerabilities.
- Basic and networking commands are valuable to Linux hackers.
- Vulnerabilities are weakness that can be exploited to compromise a system.
- A good security can help to protect a system from been compromised by an attacker.
Speech of Donald Trump before and after being president
Before Being President
After Being President
After Being President
Saturday, November 5, 2016
How to create a nameless folder in a computer
To create a nameless folder in a PC do the following steps:
STEPS:
1. Select any file or folder whose name you want to remove or change its name as a blank space.
2. Right click on it and choose rename or simply press F2 from keyboard to rename that file or folder
3. Press and hold the Alt key. While holding the Alt key, type numbers 0160(0r 999999999 or 255) from the numpad.
Note: Type the numbers 0160 from the numpad, that is, the numbers present on the right side of the keyboard. Don’t type the numbers which are present on top of the character keys.
4. Press Enter and the nameless file or folder will be created.
Note: The file or folder that seems nameless is actually named with a single blank space
This is "Computer मा कसरी नाम नै नभएको Folder बनाउने.Watch full video :
Click here to watch video
STEPS:
1. Select any file or folder whose name you want to remove or change its name as a blank space.
2. Right click on it and choose rename or simply press F2 from keyboard to rename that file or folder
3. Press and hold the Alt key. While holding the Alt key, type numbers 0160(0r 999999999 or 255) from the numpad.
Note: Type the numbers 0160 from the numpad, that is, the numbers present on the right side of the keyboard. Don’t type the numbers which are present on top of the character keys.
4. Press Enter and the nameless file or folder will be created.
Note: The file or folder that seems nameless is actually named with a single blank space
This is "Computer मा कसरी नाम नै नभएको Folder बनाउने.Watch full video :
Click here to watch video
Download Backtrack 5r3 Free - Latest (32 & 64 Bit)
Download Backtrack 5r3 Free - Latest (32 & 64 Bit)
BackTrack 5 R3 is one of the Most Powerful Linux Distribution used for Penetration and Find Loopholes in Websites, Software and Application. Basically, it is Based on GNOME Linux Distribution and Include many of Top used Security Tools Like MetaSploit, Wireshark, AirCrack, Nmap and other Digital Forensic Tools. BackTrack 5 R3 is Developed by Offensive Securities and Soon They are Stop BackTrack Linux Series. The Last Edition of this Operating System is BackTrack 5 R3 and Further They Starting a new Project that is also a Newest Version of This Operating System Known as Kali Linux. It is the Successor of Backtrack 5 R3 and Include all the Tools that you have in BackTrack 5 R3. BackTrack is also Found as Best Operating System Used by Hackers.
There are Millions of Security Researchers (White Hat) who use BackTrack 5 R3 for Digital Forensics, Testing Systems, Networks and Other Penetration work. But On the Other Hand, It is also the Favourite Operating System Picked by Hackers because of their Tools and Features. Hackers and Crackers use this Operating System, not For Testing Instead to Breaking Systems, Cracking Passwords, Hacking Accounts and other Notorious Work. BackTrack have all the Deadly Tools and Programs that you need to Break the Digital Systems. The Last Edition of BackTrack 5 R3 is released on August 13, 2012. After that, They Start Project Kali.
Features of BackTrack 5 R3:
- Available in Different Flavours.
- Include all Hacking Tools.
- Preinstalled Digital Forensics.
- Simple and Easy Interface.
- Open Source for All People World Wide.
- Preinstalled Drivers.
Friday, November 4, 2016
TOP NEWS PUBLISHED BECAUSE OF "TARKARIWALI"
ALL THE NEWS PUBLISHED BECAUSE OF "TARKARIWALI"
In Nagarik News
काठमाडौं- 'तरकारीवाली' ट्रेन्डिङबाट सामाजिक सञ्जालमा चर्चित बनेकी गोरखाकी कुसुम श्रेष्ठलाई चलचित्रमा अभिनय गर्न अफर आएको छ।
गोरखा भूम्लीचोककी श्रेष्ठलाई पपुलर मल्टीमिडियाले बनाउन लागेको चलचित्र लम्फुमा अभिनयको लागि अफर गरेको हो। 'हामीले उनलाई चलचित्रमा अभिनय र प्रवक्ताको लागि कुरा गरेका छौं', चलचित्रका निर्देशक गोपालचन्द्र लामिछानेले भने, ' श्रेष्ठसँग कुरा भएको छ। उनि इच्छुक छन् घरमा सल्लाह गरेर कन्फर्म गर्ने भनेकी छन्।'
श्रेष्ठले आफु फिल्मको लागि इच्छुक भएको बताइन्। 'फिल्मको अफर आएको छ', उनले भनिन्, ' सोचेर निर्णय गर्छ।' लम्फुको लागि अफर आए पनि निर्णय गरिनसकेको उनले बताइन्।
लामिछानेले यस अघि 'किन लाग्छ माया', 'बोक्सी', 'द मिरर' र 'ओ माइ म्यान'को निर्देशन गरिसकेका छन्।
पृथ्वीराजमार्गसँग जोडिएको चितवनको फिस्लिङ बजारपारि गोरखा, भुम्लिचोक–८ को पहाडी गाउँ वाङ्लिङ्की बासिन्दा श्रेष्ठको तस्बिरले इन्टरनेटमा धुम मच्चाएको छ।
चितवन रत्ननगरमा बसेर क्वेस्ट मोडल कलेजमा व्यवस्थापन विषय लिएर कक्षा ११ पढ्दै छन्। गाउँदेखि ट्याक्टरले ओसारे पनि त्रिशूली नदीमा बनेको झोलुंगे पुलतार्न टमाटार राखेको क्रेट बोक्नुपर्ने हुन्छ। कुसुमले टमाटरको क्रेट बोकेर पुलतर्दै गरेको फोटो त्रिशूलीमा र्याफ्टिङ सञ्चालन गर्ने एक कम्पनीमा कार्यरत काठमाडौंका रुपचन्द्र महर्जनले खिचेर कात्तिक १२ गते फेसबुकमा राखेका थिए। त्यही फोटोले फेसबुक, ट्विटरमा सनसनी मच्चायो। करोडौं सेयर भएको छ।
In BBC Hindi
पाकिस्तानी चायवाले अरशद ख़ान के बाद नेपाल की एक तरकारीवाली ने भी ट्विटर ट्रेंड में जगह बनाई है.
एक स्थानीय बाज़ार में सब्ज़ी बेचने वाली इस नेपाली लड़की की कुछ तस्वीरें सोशल मीडिया पर शेयर की गईं. इसके कुछ ही देर बाद ट्विटर पर #Tarkariwali ट्रेंड करने लगा.
@SabyasachiPuhan हैंडल से सभ्यसाची पुहां ने लिखा, ''जब क्यूटनेस और कड़ी मेहनत को मिलाया जाता है, तो रिज़ल्ट होता है नेपाल की तरकारीवाली. सोशल मीडिया फेम ज़िंदाबाद.''
@Ravinepz हैंडल से रवि ने लिखा, ''नेपाल की तरकारीवाली ने अपने लुक्स से इंटरनेट पर क़ब्ज़ा कर लिया है.''
At NDTV
Much like Arshad Khan, someone noticed this 'tarkariwali' and shared her picture online. According to The Gundruk Post, Rupchandra Mahajan clicked the woman's picture near the 'Fishling suspension bridge between Gorkha and Chitwan.' And just like Mr Khan, she too went viral on social media.
Now, Twitter would very much like to know who she is while collectively swooning over her.
At Dialy Pakistan
After ‘chaiwalla,’ Nepali ‘tarkariwali’ has Twitter’s attention
GORKHA – Move over Arshad Khan, there’s a new online sensation who is making all the headlines now.
The young lady is the 11th standard student of management studies who helps her parents in selling fresh vegetables in the local market.
According to Indian media, Rupchandra Mahajan clicked the woman’s picture near the ‘Fishling suspension bridge between Gorkha and Chitwan.’ And just like Khan, she too went viral on social media.
AT khaleejtimes UAE
Remember last week when a humble chaiwalla form Pakistan broke the internet? Well, social media has now found it's new viral star and it's none other than a Nepali vegetable seller.
According to The Gundruk Post, Rupchandra Mahajan photographed the woman near the 'Fishling suspension bridge between Gorkha and Chitwan.' And the picture went viral on social media.
TAP TO WATCH HOW TO EARN MONEY ONLINE IN NEPAL
TAP TO WATCH HOW TO EARN MONEY ONLINE IN NEPAL
How to earn money online in nepal
Guys you won't believe that also in nepal you can do online works and earn a lots of money.I had started my carrier in online works 3 years ago but believe if you go on working all the time you also can achieve the success which i've gained so guys lets start earning from today.
Guys watch the following video and start earning online from today in Nepal.
About 3000 a day
Tap here to watch video
AFTER WATCHING THE VIDEO DON'T FORGET TO LIKE SHARE AND SUBSCRIBE
Thursday, November 3, 2016
How To Create A File or Folder Without Any Name
How To Create A File or Folder Without Any Name in Windows 7, 8, XP
Article will show you how to create a file/folder having blank space as a name. It means folder has no name. The process works on all Windows (Windows XP, Windows Vista, Windows 7, Windows 8 and Windows RT) PC.
Step By Step Procedure To Create A folder With Blank Space
1. Select any file or folder whose name you want to remove or change its name as a blank space.
2. Right click on it and choose rename or simply press F2 from keyboard to rename that file or folder
3. Press and hold the Alt key. While holding the Alt key, type numbers 0160(0r 999999999 or 255) from the numpad.
2. Right click on it and choose rename or simply press F2 from keyboard to rename that file or folder
3. Press and hold the Alt key. While holding the Alt key, type numbers 0160(0r 999999999 or 255) from the numpad.
Note: Type the numbers 0160 from the numpad, that is, the numbers present on the right side of the keyboard. Don’t type the numbers which are present on top of the character keys.
4. Press Enter and the nameless file or folder will be created.
Note: The file or folder that seems nameless is actually named with a single blank space.
How to create another folder without name on the same location
For this you will have to rename the file with 2 spaces. Just follow these steps below:
1. Select file, press F2.
2. Hold alt key and type 0160 from the numpad.
3. Release the alt key. Now without doing anything else, again hold Alt key and press 0160.
4. Press enter and you will have second nameless file in the same directory.
5. Repeat step 3 to create as many nameless files or folders in the same directory.
1. Select file, press F2.
2. Hold alt key and type 0160 from the numpad.
3. Release the alt key. Now without doing anything else, again hold Alt key and press 0160.
4. Press enter and you will have second nameless file in the same directory.
5. Repeat step 3 to create as many nameless files or folders in the same directory.
Tap here to watch the video
Wednesday, November 2, 2016
How to find adsense earnings from mobile phone
If you are a beginner to blogging and to the online World in general, you may have heard about Google Adsense or seen the adsense ads when you searched something on Google and visited a website that is using Adsense.
But if you are a adsense earner , You can look all your earning reports on your android instead of using any PC.So to find all your earnings in your mobile just follow the following steps:
1.Go to playstore of of your android and type "Adsense" there and search.
But if you are a adsense earner , You can look all your earning reports on your android instead of using any PC.So to find all your earnings in your mobile just follow the following steps:
1.Go to playstore of of your android and type "Adsense" there and search.
2. Then following page will appear and click on "Google Adsense" then Install it.
3. Open the application and Select your Gmail ID in which adsense is connected.
4.Then all the earnings of your account will be seen as below:
Then you will not need any computer to find your income #enjoy
How to Hack AppLock Password in Android mobile phone
Hack AppLock in any Android mobile phone
When it comes to using an Android device, your device is incomplete without some important applications. Few are inclined towards game whereas few are interested in some other apps. But, AppLock is one of those most popular applications. It is found in almost all android devices for the security of their device. This application protects our privacy by locking almost all the features like messages, contacts, gallery, apps and etc of our device. The user can set the password for any applications which they want to secure from other people.
However, like almost all the android applications of AppLock is also unable to provide 100% security to the apps of your android device. Through this article, I will explain to you that how easily can hack AppLock in the android mobile phone. Don’t worry you don’t have to root your android device or to uninstall the AppLock from the device to hack AppLock application.
Hack AppLock in any Android mobile phone
Before explaining the method to bypass your android device let me inform you that this method will only work if settings are not locked by the admin. To follow this method first you have to make sure that the settings of the Android device are not locked.
- Take the Android phone of which you want to bypass the AppLock application.
- Now, open the Menu section and tap on settings.
- Now, tap on Applications or Apps.
- Now, find AppLock app under a downloaded section of settings and tap on it.
- Now you will see three options on AppLock app.
1-Force Stop
2-Uninstall.
3-Disable - As I have mentioned above to hack this app there is no need to uninstall this app.
- So, tap on Force stop option and you are done with your hacking process.
Bypass App lock password without knowing the password – Hack AppLock
With this process, we have put the application in the idle state. Now, you can easily open the locked apps of the device without entering the password. Isn’t it an amazing hack to know? I know the information in this article would be helpful for many of you out there. So, don’t forget to share this article with your friends.
Subscribe to:
Posts (Atom)