Archive for category internet

>A Proxy Server?

>

How/What is a Proxy Server?
Microsoft® Proxy Server 2.0 MCSE Study System
A proxy server is a kind of buffer between your computer and the Internet resources you are accessing. The data you request come to the proxy first, and only then it transmits the data to you. I know many are looking for IP Maskers or Scramblers, but honestly, it aint real easy for the simple fact that any website that you visit needs your IP to send the info packets too. If its scrambled, you will get alot of errors and crazy redirects 😛 My solution? Read on……….. for a good list of Proxy servers try here>>Multiproxy

Proxy Server 2.0 [Old Version]MCSE: Implementing and Supporting Microsoft Proxy Server 2.0
HTTP and The Web (Internet)
Anonymity of Proxy Server

Deep Proxy View

Annonymity Of Proxy 2

Leave a comment

>Find a Music

>

Exploseek, a simple tool to find music on the net

Why should I use Exploseek ?

Exploseek is a nice simple tool to find music on the net. It is possible to use the major search engines to type your queries, but if you use this tool it will be much easier as some of you have probably seen already. We always try to improve the queries, if possible, and will update it at random times. Further you don’t need to install a peer-to-peer program with possible spyware and other security issues, the price to pay is that you will not always find as much as such a program, but on a lucky day you find a load of music.

Go and Find Music Exploseek

Leave a comment

>Great Google Secrets(GGS)

>

Google is clearly the best general-purpose search engine on the Web (see

Some Links are removed

But most people don’t use it to its best advantage. Do you just plug in a keyword or two and hope for the best? That may be the quickest way to search, but with more than 3 billion pages in Google’s index, it’s still a struggle to pare results to a manageable number.

But Google is an remarkably powerful tool that can ease and enhance your Internet exploration. Google’s search options go beyond simple keywords, the Web, and even its own programmers. Let’s look at some of Google’s lesser-known options.

Syntax Search Tricks

Using a special syntax is a way to tell Google that you want to restrict your searches to certain elements or characteristics of Web pages. Google has a fairly complete list of its syntax elements at

Google Help

. Here are some advanced operators that can help narrow down your search results.

Intitle: at the beginning of a query word or phrase (intitle:”Three Blind Mice”) restricts your search results to just the titles of Web pages.

Intext: does the opposite of intitle:, searching only the body text, ignoring titles, links, and so forth. Intext: is perfect when what you’re searching for might commonly appear in URLs. If you’re looking for the term HTML, for example, and you don’t want to get results such as

, you can enter intext:html.

Link: lets you see which pages are linking to your Web page or to another page you’re interested in. For example, try typing in

Try using site: (which restricts results to top-level domains) with intitle: to find certain types of pages. For example, get scholarly pages about Mark Twain by searching for intitle:”Mark Twain”site:edu. Experiment with mixing various elements; you’ll develop several strategies for finding the stuff you want more effectively. The site: command is very helpful as an alternative to the mediocre search engines built into many sites.

Swiss Army Google

Google has a number of services that can help you accomplish tasks you may never have thought to use Google for. For example, the new calculator feature

(www.google.com/help/features.html#calculator)

lets you do both math and a variety of conversions from the search box. For extra fun, try the query “Answer to life the universe and everything.”

Let Google help you figure out whether you’ve got the right spelling—and the right word—for your search. Enter a misspelled word or phrase into the query box (try “thre blund mise”) and Google may suggest a proper spelling. This doesn’t always succeed; it works best when the word you’re searching for can be found in a dictionary. Once you search for a properly spelled word, look at the results page, which repeats your query. (If you’re searching for “three blind mice,” underneath the search window will appear a statement such as Searched the web for “three blind mice.”) You’ll discover that you can click on each word in your search phrase and get a definition from a dictionary.

Suppose you want to contact someone and don’t have his phone number handy. Google can help you with that, too. Just enter a name, city, and state. (The city is optional, but you must enter a state.) If a phone number matches the listing, you’ll see it at the top of the search results along with a map link to the address. If you’d rather restrict your results, use rphonebook: for residential listings or bphonebook: for business listings. If you’d rather use a search form for business phone listings, try Yellow Search

(www.buzztoolbox.com/google/yellowsearch.shtml).

Extended Googling

Google offers several services that give you a head start in focusing your search. Google Groups

(http://groups.google.com)

indexes literally millions of messages from decades of discussion on Usenet. Google even helps you with your shopping via two tools: Froogle
CODE
(http://froogle.google.com),

which indexes products from online stores, and Google Catalogs
CODE
(http://catalogs.google.com),

which features products from more 6,000 paper catalogs in a searchable index. And this only scratches the surface. You can get a complete list of Google’s tools and services at

http://www.google.com/options/index.html

You’re probably used to using Google in your browser. But have you ever thought of using Google outside your browser?

Google Alert

(www.googlealert.com)

monitors your search terms and e-mails you information about new additions to Google’s Web index. (Google Alert is not affiliated with Google; it uses Google’s Web services API to perform its searches.) If you’re more interested in news stories than general Web content, check out the beta version of Google News Alerts

(www.google.com/newsalerts).

This service (which is affiliated with Google) will monitor up to 50 news queries per e-mail address and send you information about news stories that match your query. (Hint: Use the intitle: and source: syntax elements with Google News to limit the number of alerts you get.)

Google on the telephone? Yup. This service is brought to you by the folks at Google Labs

(http://labs.google.com),

a place for experimental Google ideas and features (which may come and go, so what’s there at this writing might not be there when you decide to check it out). With Google Voice Search

(http://labs1.google.com/gvs.html),

you dial the Voice Search phone number, speak your keywords, and then click on the indicated link. Every time you say a new search term, the results page will refresh with your new query (you must have JavaScript enabled for this to work). Remember, this service is still in an experimental phase, so don’t expect 100 percent success.

In 2002, Google released the Google API (application programming interface), a way for programmers to access Google’s search engine results without violating the Google Terms of Service. A lot of people have created useful (and occasionally not-so-useful but interesting) applications not available from Google itself, such as Google Alert. For many applications, you’ll need an API key, which is available free from
CODE
www.google.com/apis

. See the figures for two more examples, and visit

www.pcmag.com/solutions

for more.

Thanks to its many different search properties, Google goes far beyond a regular search engine. Give the tricks in this article a try. You’ll be amazed at how many different ways Google can improve your Internet searching.

Online Extra: More Google Tips

Here are a few more clever ways to tweak your Google searches.

Search Within a Timeframe

Daterange: (start date–end date). You can restrict your searches to pages that were indexed within a certain time period. Daterange: searches by when Google indexed a page, not when the page itself was created. This operator can help you ensure that results will have fresh content (by using recent dates), or you can use it to avoid a topic’s current-news blizzard and concentrate only on older results. Daterange: is actually more useful if you go elsewhere to take advantage of it, because daterange: requires Julian dates, not standard Gregorian dates. You can find converters on the Web (such as

CODE
http://aa.usno.navy.mil/data/docs/JulianDate.html

excl.gif No Active Links, Read the Rules – Edit by Ninja excl.gif

), but an easier way is to do a Google daterange: search by filling in a form at

http://www.researchbuzz.com/toolbox/goofresh.shtml or http://www.faganfinder.com/engines/google.shtml

. If one special syntax element is good, two must be better, right? Sometimes. Though some operators can’t be mixed (you can’t use the link: operator with anything else) many can be, quickly narrowing your results to a less overwhelming number.

More Google API Applications

Staggernation.com offers three tools based on the Google API. The Google API Web Search by Host (GAWSH) lists the Web hosts of the results for a given query

(www.staggernation.com/gawsh/).

When you click on the triangle next to each host, you get a list of results for that host. The Google API Relation Browsing Outliner (GARBO) is a little more complicated: You enter a URL and choose whether you want pages that related to the URL or linked to the URL

(www.staggernation.com/garbo/).

Click on the triangle next to an URL to get a list of pages linked or related to that particular URL. CapeMail is an e-mail search application that allows you to send an e-mail to google@capeclear.com with the text of your query in the subject line and get the first ten results for that query back. Maybe it’s not something you’d do every day, but if your cell phone does e-mail and doesn’t do Web browsing, this is a very handy address to know.

Leave a comment

>Online Safety Tips

>

  • Never Reveal Personally identifiable information online.
  • Never share your password with other people (except your parents).
  • Never arrange meeting with strangers.
  • Don’t believe everything you read or see online.
  • Don’t download files or software without your parent’s permission.
  • Don’t respond to inappropriate messages or emails.
  • Don’t post inappropriate content.

                If you post information about tennis,you will attract people who are interested in tennis. If you post inappropriate content or picture, you will attract people who have inappropriate interest.s if you post jokes, photos or other content that conation sexual references you will probably attract people who are only interested in talking about sex. Be mindful of what you are communicating to the rest of the online world through the content you put onto the internet.

  • Be Leery of personal questions from strangers.

              Don’t continue communicating with strangers who ask you personal questions.

  • Don’t bullied into fights.

           People tend to say things online that they would never say in person.some people even say rude and malicious things, sometimes just to see if you will respond.Don’t respond to these people.

  • Don’t use adult sites.
  • Understand what you put online will be there forever.

                    Assume that everything you put online every email you write, every picture you post ,every blog or journal entry you post will be accessible on the internet FOREVER.many search engine copy internet page and save them for viewing even after the pages are no longer online.

Leave a comment

>Online Safety Tips

>

  • Never Reveal Personally identifiable information online.
  • Never share your password with other people (except your parents).
  • Never arrange meeting with strangers.
  • Don’t believe everything you read or see online.
  • Don’t download files or software without your parent’s permission.
  • Don’t respond to inappropriate messages or emails.
  • Don’t post inappropriate content.

                If you post information about tennis,you will attract people who are interested in tennis. If you post inappropriate content or picture, you will attract people who have inappropriate interest.s if you post jokes, photos or other content that conation sexual references you will probably attract people who are only interested in talking about sex. Be mindful of what you are communicating to the rest of the online world through the content you put onto the internet.

  • Be Leery of personal questions from strangers.

              Don’t continue communicating with strangers who ask you personal questions.

  • Don’t bullied into fights.

           People tend to say things online that they would never say in person.some people even say rude and malicious things, sometimes just to see if you will respond.Don’t respond to these people.

  • Don’t use adult sites.
  • Understand what you put online will be there forever.

                    Assume that everything you put online every email you write, every picture you post ,every blog or journal entry you post will be accessible on the internet FOREVER.many search engine copy internet page and save them for viewing even after the pages are no longer online.

Leave a comment

>COMMON FTP ERROR CODES

>

 
Description
110 Restart marker reply. In this case, the text is exact and not left to the particular implementation; it must read: MARK  where  is User-process data stream marker, and server’s equivalent marker.
120 Service ready in 
minutes.
125 Data connection already open; transfer starting.
150 File status okay; about to open data connection.
200 Command okay.
202 Command not implemented, superfluous at this site.
211 System status, or system help reply.
212 Directory status.
213 File status.
214 Help message.On how to use the server or the meaning of a particular non-standard command. This reply is useful only to the human user.
215 NAME system type. Where NAME is an official system name from the list in the Assigned Numbers document.
220 Service ready for new user.
221 Service closing control connection.
225 Data connection open; no transfer in progress. bpftpserver-howto-networkshares-05-ftp_session
226 Closing data connection. Requested file action successful (for example, file transfer or file abort).
227 Entering Passive Mode (h1,h2,h3,h4,p1,p2).
230 User logged in, proceed. Logged out if appropriate.
250 Requested file action okay, completed.
257 “PATHNAME” created.
331 User name okay, need password.
332 Need account for login.
350 Requested file action pending further information
421 Service not available, closing control connection.This may be a reply to any command if the service knows it must shut down.
425 Can’t open data connection.
426 Connection closed; transfer aborted.
450 Requested file action not taken.
451 Requested action aborted. Local error in processing.
452 Requested action not taken. Insufficient storage space in system.File unavailable (e.g., file busy).
500 Syntax error, command unrecognized. This may include errors such as command line too long.
501 Syntax error in parameters or arguments.
502 Command not implemented.
503 Bad sequence of commands.
504 Command not implemented for that parameter.
530 Not logged in.
532 Need account for storing files.
550 Requested action not taken. File unavailable (e.g., file not found, no access).
551 Requested action aborted. Page type unknown.
552 Requested file action aborted. Exceeded storage allocation (for current directory or dataset).
553 Requested action not taken. File name not allowed.

LiveJournal Tags: ,
del.icio.us Tags: ,
43 Things Tags: ,
Technorati Tags: ,,

Secure Computer: How burn bin file 2

Leave a comment

>COMMON FTP ERROR CODES

>

 
Description
110 Restart marker reply. In this case, the text is exact and not left to the particular implementation; it must read: MARK  where  is User-process data stream marker, and server’s equivalent marker.
120 Service ready in 
minutes.
125 Data connection already open; transfer starting.
150 File status okay; about to open data connection.
200 Command okay.
202 Command not implemented, superfluous at this site.
211 System status, or system help reply.
212 Directory status.
213 File status.
214 Help message.On how to use the server or the meaning of a particular non-standard command. This reply is useful only to the human user.
215 NAME system type. Where NAME is an official system name from the list in the Assigned Numbers document.
220 Service ready for new user.
221 Service closing control connection.
225 Data connection open; no transfer in progress. bpftpserver-howto-networkshares-05-ftp_session
226 Closing data connection. Requested file action successful (for example, file transfer or file abort).
227 Entering Passive Mode (h1,h2,h3,h4,p1,p2).
230 User logged in, proceed. Logged out if appropriate.
250 Requested file action okay, completed.
257 “PATHNAME” created.
331 User name okay, need password.
332 Need account for login.
350 Requested file action pending further information
421 Service not available, closing control connection.This may be a reply to any command if the service knows it must shut down.
425 Can’t open data connection.
426 Connection closed; transfer aborted.
450 Requested file action not taken.
451 Requested action aborted. Local error in processing.
452 Requested action not taken. Insufficient storage space in system.File unavailable (e.g., file busy).
500 Syntax error, command unrecognized. This may include errors such as command line too long.
501 Syntax error in parameters or arguments.
502 Command not implemented.
503 Bad sequence of commands.
504 Command not implemented for that parameter.
530 Not logged in.
532 Need account for storing files.
550 Requested action not taken. File unavailable (e.g., file not found, no access).
551 Requested action aborted. Page type unknown.
552 Requested file action aborted. Exceeded storage allocation (for current directory or dataset).
553 Requested action not taken. File name not allowed.

LiveJournal Tags: ,
del.icio.us Tags: ,
43 Things Tags: ,
Technorati Tags: ,,

Secure Computer: How burn bin file 2

Leave a comment

Ethical Hacking

Being a hacker does not mean being a delinquent.Nowadays,companies are hiring services from “ethical Hackers “ to detect vulnerabilities of their computer science system and therefore,improve their defense measures.
Ethical Hackers,with their knowledge,help to define the parameters of defense.They do “controlled” attacks,previously authorized by the organization, to verify the system’s defenses.they create groups to learn new attack techniques,exploitations and vulnerabilities, among others,They work as researchers for the security field.
Hacking

Attack is the secret of defense;defense is the planning of attack  by Sun Tzu
Ethical hacking is divided in several Phases :

  • Attack Planning
  • Internet Access
  • Test and Execution of an attack
  • Gathering information
  • Analysis
  • Assessment and Diagnosis
  • Final Report.

Ethical Hackers use the OSSTMM methodology(open source security testing methodology manual).This methodology is for the testing of any security system,from guards and doors to mobile and satellite communications and satellites.
TCP/IP model
Topologies
HTTP and The Web (Internet)

Leave a comment

>Ethical Hacking

>Being a hacker does not mean being a delinquent.Nowadays,companies are hiring services from “ethical Hackers “ to detect vulnerabilities of their computer science system and therefore,improve their defense measures.
Ethical Hackers,with their knowledge,help to define the parameters of defense.They do “controlled” attacks,previously authorized by the organization, to verify the system’s defenses.they create groups to learn new attack techniques,exploitations and vulnerabilities, among others,They work as researchers for the security field.
Hacking

Attack is the secret of defense;defense is the planning of attack  by Sun Tzu
Ethical hacking is divided in several Phases :

  • Attack Planning
  • Internet Access
  • Test and Execution of an attack
  • Gathering information
  • Analysis
  • Assessment and Diagnosis
  • Final Report.

Ethical Hackers use the OSSTMM methodology(open source security testing methodology manual).This methodology is for the testing of any security system,from guards and doors to mobile and satellite communications and satellites.
TCP/IP model
Topologies
HTTP and The Web (Internet)

Leave a comment

TCP/IP model

TCP/IP was developed by the DoD (Department of Defense) of the United States and DARPA
(Defense Advanced Research Project Agency) in the 1970s. TCP/IP was designed to be an
open standard that anyone could use to connect computers together and exchange
information between them. Ultimately, it became the basis for the Internet

Layers :
 The TCP/IP model defines four totally independent layers into which it divides the process of
communication between two devices. The layers through which it passes information
between two devices are

 Application :
The application layer is the layer nearest the end user. This is the layer that is in charge of
translating data from applications into information that can be sent through the network.
The basic functions of this layer are:

  – Representation.
  – Codification.
  – Dialog Control.
  – Application Management.

Transport :

The transport layer establishes, maintains and finishes virtual circuits for information transfer. It
provides control mechanisms for data flow and allows broadcasting, and it provides
mechanisms for the detection and correction of errors. The information that arrives at this
layer from the application layer is divided into different segments. Information that comes to
the transport layer from the internet layer is delivered back to the application layer through
ports.
The basic functions of this layer are:
  – Reliability.
  – Flow Control.
  – Error Correction.
  – Broadcasting.

Internet: 

This layer divides the segments of the transport layer into packets and sends the packets
across the networks that make up the Internet. It uses IP, or internet protocol addresses to
determine the location of the recipient device. It does not ensure reliability in the
connections, because this is already taken care of by the transport layer, but it is responsible
for selecting the best route between the originating device and the recipient device.

Network Access :

This layer is in charge of sending information at both the LAN level and the physical level. It
transforms all the information that arrives from the superior layers into basic information (bits)
and directs it to the proper location. At this level, the destination of the information is
determined by the MAC, or media access control, address of the recipient device.
 

Leave a comment