Saturday, 10 March 2012

Online Port Scanner | Free Scripts Download

online port scanner by- Vivek Creations


Port Scanner v 1.7  is a online application designed to probe a server or host for open ports. This is often used by administrators to verify security policies of their networks and by attackers to identify running services on a host with the view to compromise it.

What is Port Scanning ?


A port scan or portscan is "An attack that sends client requests to a range of server port addresses on a host, with the goal of finding an active port and exploiting a known vulnerability of that service."


online port scanner by- Vivek Creations

Port Scanner v 1.7 Is a powerful PHP Port scanner which is created by Vivek Creation to scan ports for a given IP address.

Download Links for Port Scanners scrtips:

Goto Our Online Port Scanner v 1.7 -- > Here

Friday, 9 March 2012

Best Linux Distributions

What is the best linux distribution for you ?

There are various approaches to answering this question. The broad answer is: "any of them," but that's not very helpful if you're just looking for a place to start.

The problem is, there never can be one best Linux distribution for everyone, because the needs of each user tend to be unique. Telling someone who's looking for a good introductory distribution to try Gentoo, for instance, would be a mistake because for all its positive qualities, Gentoo is decidedly not a beginner's distro.

All too often, Linux aficionados will tend to list the distributions they like as the best, which is fair, but if they are not aware of their audience, they could suggest something that does not meet that person's needs. Finding a good Linux distribution is like finding a good match in an online dating service: good looks aren't the only quality upon which to judge a Linux distro.

To help users discover the Linux distribution that's best for them, this resource will definitively list the best candidates for the various types of Linux users to try. The use-case categories will be:
  • Best Desktop Distribution
  • Best Laptop Distribution
  • Best Enterprise Desktop
  • Best Enterprise Server
  • Best LiveCD
  • Best Security-Enhanced Distribution
  • Best Multimedia Distribution
Best Linux Desktop Distribution

There are a lot of Linux distributions that have the primary focus of becoming the next best desktop replacement for Windows or OS X. Of all the categories in this list, this is the most sought-after, and contentious, group of distros.

While it would be ideal to include many distributions on this list, the reality is that there really needs to be just one "best" Linux distribution. For early 2010, that distro has to be Canonical's Ubuntu.

linux distros- Ubuntu

Ubuntu edges out its closest contenders, Fedora and openSUSE, because its development team is constantly focused on the end-user experience. Canonical and the Ubuntu community have spent a lot of time and resources on bringing ease-of-use tools to this distribution, particularly in the area of installing Ubuntu and installing applications within Ubuntu.

In addition, Ubuntu's level of support for its desktop products is highly superior, which is important in this class of distributions since it is the most likely to contain users new to Linux. Both the official and unofficial Ubuntu documentation is robust and searchable, a big plus.

Best Linux Laptop Distribution

Laptop distributions almost fall into the same category as desktop users, but there are a number of key differences that make the criteria for evaluating a good laptop distribution important. Power management, docking tools, and wireless ease-of-use are critical to users on the go, as is having a distro that meets those needs.

Right now, the best laptop distribution is openSUSE, one of the lead contenders for the desktop honors. On the laptop, openSUSE shines with great connectivity tools, such as an easy-to-use networking toolset that not only handles WiFi connectivity, but also CDMA/cellular modem connections.

best linux distros

openSUSE also deals with docking stations for laptops very well, including dual-monitor management on the fly. Power management is very granular, which is great for detailing various power needs you might find yourself needing.

Best Linux Enterprise Desktop

This category is replete with great contenders as well, and it's difficult to highlight just one. At the end of the day, though, the nod must be given to SUSE Linux Enterprise Desktop (SLED).

linux distros SLED

The reason is simple: while SLED and its primary competitor Red Hat Enterprise Linux Desktop are nearly identical in features and support performance, SLED has the advantage of the openSUSE Build Service, a free and open service that lets applications be built and delivered to SUSE Linux and openSUSE products (as well as Red Hat and CentOS).

This is a very important differentiator in enterprise desktop development, as it means that SLED has the current advantage of application building and deployment in the enterprise arena.

Best Linux Enterprise Server

Again, in this category it really comes down to two main contenders: Red Hat Enterprise Linux (RHEL) and SUSE Linux Enterprise Server (SLES). Given the pick for the Enterprise Desktop category, you might expect SLES to get the "best of" label here.

But, when all factors for the enterprise server are weighed, RHEL is still the king of this particular hill.

Best Distros Red Hat

Red Hat edges out Novell with its server product, because RHEL users get a deeply mature distribution, and Red Hat's support structure is second to none in the enterprise channels.

Best Linux LiveCD

As Linux technology improves, users can easily choose the LiveCD version of practically any of the Linux distros listed here to get the best LiveCD experience for their needs.

There is a specialized class of LiveCDs, however, that offers users utilities and tools for the specific purpose of repairing existing Linux and Windows installations. These distros are very useful to have regardless of what primary Linux distribution you like to use, because in a crisis they are invaluable to own.

In this class of distribution, KNOPPIX is hands-down the most complete and useful distro. Loaded on a CD or USB storage device, KNOPPIX will let you recover from nearly any rare Linux system crash as well as the much-less-rare Windows breakdowns.

Best Distros KNOPPIX

Best Linux Security-Enhanced Distribution

Linux is inherently very secure compared to other operating systems, but there's always room for improvement.

One of the challenges for locking down Linux is if you are not careful, you can take away too much functionality. Another challenge is that the best security-oriented Linux distro, SELinux, is historically known to be difficult to configure correctly. Still, if security out of the box is your priority, this is the best place to begin.

Another approach is the white hat method: using security and forensic tools to examine your existing installation, determine the holes, then lock your system down based on what gaps you find. If you have the time and inclination, this is a great way to do it, because this will get any existing system more secure right away.

For the white hat approach, the best distribution is BackTrack Linux, a dedicated penetration testing distro that will enable you to safely try to crack any system you are caretaking. Its toolset and strong community give it the advantage in this category.

Best Distros Back Track

Best Linux Multimedia Distribution

General Linux distributions have come a long way in terms of multimedia performance. Rare is the audio or video file that can't be played on Linux. Music services such as Rhapsody and video sites like YouTube and Hulu are also standards-compliant and accessible to Linux users.

Still, for those users who are multimedia creators as well as consumers, there are Linux distributions that contain powerful tools for audio and video editing.

The best in this class is currently Ubuntu Studio. For audio, video, and graphic production, it contains a very complete set of tools, as well as format and codec support for a huge range of multimedia formats.

Best Distros Ubuntu Studio

The applications contained in Ubuntu Studio are the same or similar to those used by major studios to create cutting edge work, so users are getting the best apps, coupled with the strong support ethos already found in the Ubuntu community.

In Linux there are as many opinions as there are lines of code. This represents one view of the best in Linux. Select yours.

Sunday, 4 March 2012

How to set up the Cain & Abel network security tool

First you have to install program, called 'Cain and Abel'. Then, you will be automatically asked to install 'Win Pcap' and you should do that.
After installation you have to click on 'Cain and Abel' program icon with right mouse button and start it as administrator. Then push blue plus sign to scan Mac addresses. After scanning go to the bottom of program window and press APR tab. Then push blue plus icon again. When table appears push first option in first square and first option in second and then OK.
To reload you only need to push the third button at the top of program window.



Don't Get Caught! How to Protect Your Hard Drives from Data Forensics



Over the past few days, a lot of questions have been posed to me about removing sensitive data from hard drives. Ideas seem to range from magnets to microwaves and a lot of things in-between. So, I'd like to explain a little bit about data forensics, how it works, and the steps you can take to be safe.

Often, an anon will delete files from his computer, but that is only half the story, as those files are still really there. And if the careless anon doesn't take steps to fix that, when his door gets kicked in and the FBI takes his hard drive, they will be able to see everything. Don't be that anon.

What Is Computer Forensics? The People on 'CSI'?

Computer forensics is the collection, preservation, analysis and presentation of computer-related evidence. In summary, it helps determine the who, what, where, and when related to a computer-based crime or violation. When the feds are finished arresting you and boxing up your belongings into evidence crates, they will ship them off to the FBI data lab in Washington, D.C.


In addition, an examiner will work to uncover all files on the subject's system. This includes existing active, invisible, deleted, hidden, password-protected, and encrypted files. In many cases, information is gathered during a computer forensics investigation that is not typically available or viewable by the average computer user, such as fragments of data that can be found in the space allocated for existing files (known as “slack space”). Special skills and tools are needed to obtain this type of information or evidence.


An expert can recover pretty much all of your deleted files, along with other data that has not yet been overwritten. As a computer is used, the operating system is constantly writing data to the hard drive. From time to time, the OS will save new data on a hard drive by overwriting data that exists on the drive, but is no longer needed by the operating system, i.e. a deleted file.  So, the ongoing use of a computer system may destroy data that could have been extracted before being overwritten.

How to Protect Yourself

While erasing files simply marks file space as available for reuse, data-wiping overwrites all data space on a storage device, replacing useful data with garbage data. Depending upon the method used, the overwrite data could be zeros (also known as "zero-fill") or could be various random patterns. This is why simply deleting information is never enough. You must take proactive steps to ensure your removal is complete.

We are going to use a great boot disk called DBAN to perform this operation.

Step 1

Obtain and Burn DBAN

You can download the 2.2.6 Beta release from Sourceforge. Once you have the .ISO, all that's left to do is burn it to a blank CD/DVD. Place the media into your drive and restart the computer. Most computers are set to try and boot from the CD drive before the hard disk. If this is not the case, and your computer does not boot the CD drive, you will need to enter your BIOS setup and change the boot priority order.

Step 2

Boot and Run!

After the CD starts, you will be greeted with this screen:


We want to simply press enter here to start DBAN in interactive mode. The main menu shown below should display your hard drive to be wiped.



The next screen shows us DBAN is ready to get down to work, the default method is a DoD Short wipe, and it will work fine for us.




Hit the space bar to select and it will start. Be warned though, the DoD wipe takes a bit of time, especially on larger hard drives. But not as long as a prison sentence would be.

In Closing

DBAM is a great tool to clean a hard drive. I carry a copy of it in my laptop bag when I travel and you should do the same. It is quick and easy and works better then most other tools I have used. Be careful as (obviously) it is impossible to recover if you zap the wrong hard drive!



Saturday, 3 March 2012

How to stop email spam on Gmail

One of the most compelling reasons to use Gmail is to avoid excessive amounts of spam email. Gmail uses innovative technology and community reporting to recognize and automatically filter out spam emails. However, even the most advanced spam filters are not 100 percent effective, and some spam will eventually trickle through the system. To minimize your spam exposure, you can report the spam using Gmail's reporting system and alter your email usage to further protect your email address.

how to stop email spam

Here i am giving you some steps on How to stop email spam.

Modifying Your Email Address for Filtering

Step 1
Modify your own Gmail address with periods (".") within your username, such as transforming "myemailaddress@gmail.com" to "my.email.address@gmail.com." Gmail will read it as the same email address.

Step 2
Extend your email's username with pluses ("+"), followed by a keyword, such as changing "myemailaddress@gmail.com" to "myemailaddress+possiblespam@gmail.com." Gmail will still recognize the email address as yours and deliver it to you.

Step 3
Use "googlemail.com" domain instead of "gmail.com," such as changing "myemailaddress@gmail.com" to "myemailaddress@googlemail.com." This is the old Google domain, but still functions as if you used the current domain.

Step 4
Use these modified email addresses when entering your email on websites. This gives you the ability to filter them, should they become targeted by spam.

Filtering Modified Emails

Step 1
Click "Create a filter" at the top of the Gmail window, to the right of the search bar.

Step 2
Enter the modified email address in the "To" field, and click "Next."

Step 3
Select the appropriate action, such as marking the message read, sending it straight into the archive, applying an identifiable label or deleting it. Click "Create Filter" to create the filter.

Step 4
Create additional filters for each modified email address.

Filtering Specific Emails

Step 1
Select the email you want to filter.

Step 2
Click "More actions" and choose "Filter messages like these." The "From" email address is automatically filled.

Step 3
Modify any other filter criteria you desire, such as subject lines or keywords, and click "Next."

Step 4
Select the action, such as deleting it, applying a label or sending it straight into Archives.

Step 5
Click "Create Filter" to apply the new filter.


Tips & Warnings on how to stop email spam

  • Select any spam messages and click "Report spam" on the top menu to move the message to the spam folder. This also marks the sender as a spam sender, which usually stops subsequent messages and helps Gmail identify spam email to help the Gmail community as a whole.
  • Consider creating a completely separate email account for signing up with websites. As an example, some sites may require you to enter you email address to set up an account or grant access. However, you may not want to receive email from this site, so you could give them the "junk" email address. If they start sending spam, it only goes to this junk email address.

Thursday, 1 March 2012

How to make any Internet Download Manager (IDM) full version with serial key crack or keygen

Internet Download Manager is a download accelator. By using this software we are able download from the Internet at a high speed.But when we are downloading the software from its official site it is not a full version. That is a 30 day trial pack. After these days are past it will ask you to enter serial key or to buy. So here is the process to make any downloaded IDM full version.
After making this it will be registered for lifetime and not ask to register it further.


Process:

1. Download latest version of IDM from Here or If you already have IDM installed Update it [Process for update: Click on help on the menu bar and then click on check updates. It will search for updates and ask you to install]

2. If you like your installed version of IDM very much. Then don't update or skip the first step.

3. Now click on "registration" on the menu bar.

4. When you click on registration, Now a new window Will be open ask your First Name, Last Name, Email Address and Serial Key. See Screenshot

IDM Registration

5. Enter your First name, Last Name, Email address in the required field.

6. In the serial key field enter any of the following given below
   
     RLDGN-OV9WU-5W589-6VZH1
     HUDWE-UO689-6D27B-YM28M
     UK3DV-E0MNW-MLQYX-GENA1
     398ND-QNAGY-CMMZU-ZPI39
     GZLJY-X50S3-0S20D-NFRF9
     W3J5U-8U66N-D0B9M-54SLM
     EC0Q6-QN7UH-5S3JB-YZMEK
     UVQW0-X54FE-QW35Q-SNZF5
     FJJTJ-J0FLF-QCVBK-A287M

And click on ok to register.

7. After you click OK, it will show an error message that you have registered IDM using fake serial key and IDM will exit. See screenshot

IDM

Now the actual My Creations process starts:

8. First of all go to "C:/" drive then go to "Windows" Folder and then go to "System32" folder and then go to "Drivers" folder and then go to "Etc" Folder.
Path is: C:\Windows\System32\drivers\etc
Or Simply "C:\Windows\System32\drivers\etc" paste this (without quotes) in the address bar and hit enter. 
It will open the required folder.

9. In the Etc folder you will see the hosts file. Open the file with notepad.

Now copy the below lines of code and add to hosts file as shown below the image box :

127.0.0.1 tonec.com
127.0.0.1 www.tonec.com
127.0.0.1 registeridm.com
127.0.0.1 www.registeridm.com
127.0.0.1 secure.registeridm.com
127.0.0.1 internetdownloadmanager.com
127.0.0.1 www.internetdownloadmanager.com
127.0.0.1 secure.internetdownloadmanager.com
127.0.0.1 mirror.internetdownloadmanager.com
127.0.0.1 mirror2.internetdownloadmanager.com

How to make any Internet Download Manager (IDM) full version with serial key crack or keygen

10. After adding these codes, save the notepad file. And exit from there.

Now again repeat the 3rd step to 6th step.
Reboot or restart your PC. After restart Now open your IDM it will be full version and not ask you to register.

In windows vista and seven  we are not able to save the "hosts" file  due to security resion. For that first of all we have to take the ownership of the file to our logged user.

How to change IP with Proxy

One way to change the IP address of the computer is by using a Proxy.
Now we need to go in deep of this creation for better understanding.

What is a Proxy?

In general a proxy is an IP (Internet Protocol) or an intermediary who can serve as a media liaison with the ISP connection. Proxy is one of the functions can change our computer identity (IP) with a different IP. Here are tips on replacing the IP with a proxy:

For this creation I use the Mozilla Firefox browser.

Consider the following example, before I change to using the tool what is my ip IP and location of the server looks as follows (IP deliberately Blur because the interests of privacy):

what is my ip

After I enter the proxy would look as follows:

How to change IP with Proxy

All identities will be changed by entering the proxy.
Follow these steps to change the IP
In the Browser tap  Tools> Options , then the box will pop up the following configuration

mozilla option tab

Then select Advanced> Network> Settings , will appear as follows:

mozilla advanced option tab

Fill HTTP Proxy with your Proxy, for example I use data
IP: 89.97.232.161
Port: 80
Country: Italy

Then press the OK to terminate. You can find out your computer with the new IP tool what is my IP . while for some you can use proxy to download Proxy here.
If still you are facing problem regarding my post then you can mention in your comments.
Good Luck :)