Saturday 17 March 2012

Lookalike Analyzer: What Celebrity Do You Look Like ?

Have you ever wondered if you look like a celebrity ? Now you can find out with these online celebrity lookalike analyzer tools. Check out what celebrity do you look like by uploading your face photo.

Celebrity Lookalike Generator Online – Find Whom You Resemble Most

# MyHeritage (Link) Celebrity Lookalike Analyzer by Face Recognition 

Using super secret face recognition algorithms, MyHeritage analyzes your facial features and compares them to those found in its large database of celebrity faces. They have a cool face recognition tool that will tell you who you look like. Try it out now and come back here to tell us which celebrity you resemble the most!

# FaceDouble (Link) – Find Out Which Celebrity you Look Like


You can also create your own Facedouble by logging into your social network and adding a photo to the application.
The app will then find a celebrity lookalike for you and you can publish them so that other users can rate you.
Tip : Upload a photo with large, front-facing and straight faces to get accurate celebrity matches.

Make Background Transparent of Windows See Through in Windows 7 or XP


If you work with a lot of open windows in windows, then the Aero Peek preview in windows 7 allows you to see what’s happening in the background by a sneak peek through the transparent title bars and frames. You can add this feature to the full window and fully see through by making the window fully transparent.

Make Folder Backgrounds, Explorer Windows Transparent

# Peek Through (Link)

An application for Windows XP, Vista and 7 which makes the foreground window transparent with the press of Hot Keys. You may adjust the amount of transparency and the Hot Keys. You also have the ability to “click through” the transparent window onto the window beneath it. I have made this after releasing it seems like it should be a natural part of Windows 7.


After selecting your settings, click the Activate button, the application will then be minimized to the system tray. You may minimize the program window to send it to the system tray, or close it to exit the program. Clicking the icon in the system tray will bring the window back up. Simply pressing the Hot Keys will enable the transparency and pressing them again will remove the transparency.


# Glass2k (Link)

It is a small little program that allows Windows 2000/XP users to make any window transparent. Right-click on any window or press the keyboard shortcuts (Control + Shift + [0-9]) to make any window transparent. It’s that simple.


The new stable beta version remembers each window’s transparency settings, allows you to keep any window on top, loads on Windows startup etc. And with this latest version, you can easily make the windows taskbar transparent.

Thursday 15 March 2012

Hack Remote Computer with IP Address


Literally, hacking is accessing something or somebody in internet without their permission or interest. While, speaking in summary, hacking is very easy job, it is like instead of using front door, finding the hidden door of a house and hijacking the precious things. Among all the hacking, hacking via IP address is one of the most common yet powerful beginning.

You may want to hack the website and put your advertisement there or grab some database information In this type of hacking, you are playing with the web server’s computer instead of the administrator’s computer. Because, www.website.com is hosted in separate web server rather than personal computer.
Another can be accessing your friend’s computer from your home. Again this is IP based and this is possible only when your friend’s computer is online. If it is off or not connected to internet then remote IP hacking is totally impossible.



Well, both of the hacking has the same process. Let’s summarize what we must do.
  1. Confirm the website or a computer you want to hack.
  2. Find or trace their IP address.
  3. Make sure that IP address is online
  4. Scan for open ports
  5. Check for venerable ports
  6. access through the port
  7. Brute-force username and password
Now let me describe in brief in merely basic steps that a child can understand it.
First, getting the IP address of victim.
To get the IP address of the victim website, ping for it in command prompt.
For example,
ping www.google.com will fetch the IP address of Google.com


This is how we can get the IP address of the victims website.
How about your friend’s PC? You can’t do www.yourfirend’sname.com, can you? Finding your friend’s IP address is little tough job, and tougher it is if he has dynamic IP address that keeps changing.
One of the widely used method to detect IP address of your friend is by chatting with him.
You might find this article helpful

 Now you got the IP address right? Is it online?
To know the online status just ping the IP address, if it is online it will reply.
If the IP address is online, scan for the open ports. Open ports are like closed door without locks, you can go inside and outside easily.
Use Advanced Port Scanner to scan all open and venerable ports.


Now you’ve IP address and open port address of the victim, you can now use telnet to try to access them. Make sure that you’ve telnet enabled in your computer or install it from Control panel > Add remove programs > add windows components.
Now open command prompt and use telnet command to access to the IP address. Use following syntax for connection.
telnet [IP address] [Port]


You’ll be asked to input login information.


If you can guess the informations easily then it’s OK. Or you can use some brute-forcing tools like this one.
In this way you’ll able to hack remove computer using only IP address

Tuesday 13 March 2012

Got an iPhone? There's an App for Hacking That

The processors in smart phones and tablets leak radio signals that betray the encryption keys used to protect sensitive data.
 
New attacks highlight the growing threat to smart phones.

Over the past few years, researchers have warned that viruses and other security threats could soon start appearing on mobile devices. The buzz at two major hacker conferences suggests that such threats could finally be about to arrive in force. The Black Hat and Defcon conferences, which bring together computer security researchers, consultants, and independent hackers, both took place last week in Las Vegas. 

This weekend, a hacker known as "comex" grabbed headlines by launching a website called "JailbreakMe" for breaking the security architecture built into the iPhone. Simply visiting www.jailbreakme.com on an iPhone and clicking a button will disable these security features.
JailbreakMe doesn't appear to be designed to harm an iPhone or the data stored on it. Some users "jailbreak" their iPhones in order to install applications that haven't been approved by Apple, or to run the phones on a network other than Apple's partner, AT&T. But the technique used by JailbreakMe could just as easily be used by malicious hackers or virus writers. It was also just one of many mobile exploits discussed at both Black Hat and Defcon. 



According to Dave Marcus, security research and communications manager for the security company McAfee, JailbreakMe relies on two vulnerabilities: one involves the way an iPhone processes PDF files, and another is buried deep in the phone's operating system. Together, these vulnerabilities allow "remote code execution"--making it possible to run programs on the device without going through Apple's App Store or getting permission from the user. 

In a post on McAfee's site, Marcus noted that vulnerabilities that work as reliably as those used by JailbreakMe tend to be picked up by other attackers and used for malware and other nefarious purposes. "I hope I am not the only one who is bothered by this because it begs the question, 'What else can this be used for?' " Marcus wrote. 



JailbreakMe "shows exactly the threat scenario that mobile phones can face," adds Vincenzo Iozzo, an engineer for Zynamics. Iozzo was part of a team that won an iPhone hacking contest earlier this year at the CanSecWest security conference in Vancouver. He explains that smart phones are often protected by a technology known as "sandboxing," which is supposed to isolate some functionality in the phone from installed software, thus preventing attackers from gaining total control. JailbreakMe bypasses sandboxing, demonstrating a serious threat to the device.


Sunday 11 March 2012

How To Use FileZilla FTP

This guide gives you a short overview on how to use FileZilla client. By default you don't have to configure FileZilla, so you can start directly working with the program.

Connecting to an FTP server 

Using the Quick Connect bar

To connect to an FTP server, enter the address of the server into the host field of the Quickconnect bar (e.g. example.com - see image below). If it is a special server type like an SFTP server, add the protocol in front of the address. In case of an SFTP server, start the address with 'sftp://' (e.g. sftp://example.com). Enter the port of the server into the port field if it is not the default port (21 for FTP, 22 for SFTP). If a username / password is required, enter it in the corresponding fields, otherwise the default anonymous logon will be used. Click on Quickconnect or press Enter to connect to the server. 


Please notice that the Quick Connect is for... quick connections - so there is no way to edit the quick connections list which stores the last 10 entries. To store FTP server names you should use the Site Manager, instead.
Quick Connect is good for testing the login info before making a site manager entry. Once you connect, you can choose File -> "Copy current connection to Site Manager..." to make a permanent entry. It is usually best to check your login info with Quick Connect before making a permanent entry.

Using Site Manager

You can use the FileZilla Site Manager to specify specific site parameters and connect to the targeted FTP site. The Site Manager allows you to store entries and configure more parameters than the Quick Connect allows.

Special case: Servers in LAN

If the server you are connecting to is in your home LAN, then there is not an address (domain name) as you may know from the Internet. In LAN, you simply use the internal IP address of the server PC. In most cases the network name (computer name) will do, too. If the server is on the same PC as Filezilla, you can even use localhost or 127.0.0.1 as hostname.
NOTE: If you connect from the outside of your LAN this does not apply, you have to use the external (WAN) IP instead.

Navigating on the server

After a successful connection attempt, a list of files and directories appears on the right side of the main window. The name of the current remote directory is listed in the edit field on the top. Below that you will see the remote directory tree. Under the remote directory is a list of the contents of the current remote directory.
To change the current remote directory:
  • Type a directory name into the edit field and press enter, or
  • Click a directory in the directory tree, or
  • Double-click a directory in the list of the current directory contents
You will notice a directory called ".." listed in virtually all directories. Selecting this directory allows you to go up to the parent directory of the current directory.
Question marks ("?") appear on directories you haven't accessed yet, indicating that the FileZilla Client can't tell if there are subdirectories within those directories. If you access the directory the question mark will vanish. 


Navigating on your machine

Navigating on your machine works almost like navigating on the server. The current local directory and the local directory tree are displayed on the left side of the main window by default. 



Synchronized Browsing

If you have an identical directory structure on the local machine and the server, you can enable synchronized browsing. This means that any directory navigation on one machine is duplicated on the other.
To enable synchronized browsing, create an entry in the Site Manager, and on the Advanced tab, ensure that the Default local directory and the Default remote directory have the same structure. Then check "use synchronized browsing," save your settings, and connect.

Directory Comparison

To quickly see differences between files on the local machine and the server, choose View > Directory Comparison, and choose either "compare file size" or "compare modification time." (You also hide identical files by checking that option.) Then choose "Enable."
You will now see color-coded differences between copies of the same file on the different machines. 

Transferring files

You can upload or download a file by double-clicking on it. It will be added to the transfer queue and the transfer starts automatically. To transfer directories and/or multiple files, select them and right-click the selection. Then you can click on Upload/Download in the popup menu. 


You can also drag the files from one side and drop them on the other side. To add files to the queue so that they will be transferred later, select them and click Add to Queue from the popup menu. You may also drag the files directly into the queue. Click on the button on the toolbar to start the transfer.
Or, you can click on a file, then drag the file (a box is added to the arrow cursor) to the directory where you want to move it. The directory will be highlighted when you are over it. Let go of the mouse button and the file will be moved to the directory. 

File Transfer Notes

FileZilla uses multiple FTP sessions. One session gets used purely to browse the server. The other sessions get used to do the file transfers. That way, you can always browse the server even during transfers.
For example, here is a simple car analogy: You order a pizza using your telephone (aka the browsing connection), then you hang up the telephone. Then the delivery man drives the pizza in his car to your location (the transfer connection). While the pizza is transferring, you can phone somebody else, like for example your garage because your own car is broken ;)

Reducing simultaneous connections for incorrectly configured servers

If you get a 421 Too many connections from this IP (<number>) error, the FTP server is restricting your number of connections. There are even servers restricting it to one connection at a time.
The preferred solution would be to contact the server administrator and encourage him/her to configure the server correctly (FTP uses more than one connection by design!). But if you need access immediately, there is a workaround:
1. Open the Site Manager (File - Site Manager... or the first toolbar button)
2. Create an entry for that server, enter all details you know, the more precise, the better
3. Open the 'Transfer Settings' tab
4. Tick the 'Limit number of simultaneous connections' checkbox
5. Enter the desired limit into the 'Maximum number of connections' field

Now, if you connect using the Site Manager entry, connections will be limited.
Note: If you limit connections to 1 only, there is a major drawback: You cannot browse the server anymore while a transfer is in progress!

Troubleshooting

Re-registering the shell extension (Windows only)

Especially on Vista or Windows 7 it can happen that Drag&Drop fails and you get an error message stating the shell extension doesn't work. In this case you may need to re-register it. Here's how:

1. Open a command prompt as administrator. This is important!
Start Menu - All Programs - Accessories: Right Click 'Command Prompt', select 'Run as administrator'

2. Navigate to the Filezilla program directory.
Example (32bit): cd "\Program Files\Filezilla FTP Client"
Example (64bit): cd "\Program Files (x86)\FileZilla FTP Client"
3. Re-register the shell extension.
Type 'regsvr32 fzshellext.dll' (without quotes of course)

4. If you have 64bit OS, you need to perform an additional step.
Type 'regsvr32 fzshellext_64.dll' (no quotes as well)