CLSID Folders Explained

8:01 AM
Don't you just hate those stubborn stupid icons that refuse to leave the desktop, like the Network Neighborhood icon. I am sure you want to know how you can delete them. You may say, that is really simple, simply right click on the concerned icon and select Delete. Well not exactly, you see when you right click on these special folders( see entire list below)neither the rename nor the delete option does not appear. To delete these folders, there are two methods, the first one is using the System Policy Editor(Poledit in the Windows installation CD)and the second is using the Registry.

What is Hash? Types Of HASH

4:09 AM
It is a common technique use by developer to store password in database in encrypted format so that normal person cannot see the credentials in clear text.every time when ever a user log in to authentication portal his/her password is compared with the stored hash and if it found to be valid then the user is given access to portal,if the two hashes are not the same the passwords do not match and the user is denied access.

various types of encrypted password with example

+ MD5 - The most common hash you will come across in the wild is an MD5 hash (Message-Digest algorithm)

Characteristics:-

They are always 32 characters in length (128 Bits)
They are always hexadecimal (Only use characters 0-9 and A-F)

+ SHA1 - Still used frequently on the internet and is one of a large family of Secure Hash Algorithms.

Characteristics:-

They are always 40 Characters in length (160 bits)
They are always hexadecimal (Only use characters 0-9 and A-F)

+ MySQL < 4.1 - These aren't used very often but still come up on very often because people have no idea what to do with them, they are used in older versions of Mysql.

Characteristics:-

They are always 16 Characters in length (64 bits)
They are always hexadecimal (Only use characters 0-9 and A-F)
If the hash breaks one of these rules - IT IS NOT MYSQL < 4.1. 

+ MYSQL5 - Used in newer versions of MYSQL to store database user passwords.

Characteristics:-

They are always 41 characters in length
They are always capitalized
They always begin with an asterisk
If the hash breaks one of these rules - IT IS NOT MYSQL5.

+ MD5(Wordpress) - Used in word press driven sites, one of the most commonly confused hashes by everyone

Characteristics:-

They always start with $P$
They are always variable case alpha numeric (0-9 A-Z a-z)
The are always 34 characters long

If the hash breaks one of these rules - IT IS NOT MD5(Wordpress). 

+ MD5(phpBB3) - Used in PHPBB forums, another commonly miss identified hash, especially amongst skids.

Characteristics:-

They always start with $H$
They are always variable case alpha numeric (0-9 A-Z a-z)
The are always 34 characters long
If the hash breaks one of these rules - IT IS NOT MD5(PhpBB).

** What is SALTS? Types of Salts

The most commonly salted hash is MD5 because it is cryptographically weak and easy to crack. So a salt gets added to the password before hashing to increase the parity. For example MD5($password.$salt).

+ Salted MD5 - Used in a large amount of applications to increase hash parity and to increase the time it takes to crack.

Characteristics:-

They consist of two blocks connected by a colon, the first is the hash the second is the salt.
The first part of the salted hash is hexadecimal, the second is variable case alphanumeric.
They first part will always be 32 characters long
The second part can be any length.
If the hash breaks one of these rules - IT IS NOT A SALTED MD5.

Warning - in some cases the salt can contain symbols (but this is rare)

NOTE - You need both the salt AND the hash to decrypt a salted md5.

Cracking these Encryption

This what a hacker always look for after getting the password from database through sql injection /other web vulnerability.
There are various online as well as offline tools are available for cracking any encrypted password.

SMS HACKING

8:17 PM

#SMS phishing or #Smishing is a form of illegal activity using social engineering techniques. 

SMS phishing uses cell phone text messages to deliver the bait to induce people to divulge their personal information. The hook (the method used to actually capture people's information)

The SMS phishing message contains demanding target's immediate attention. Such as "We confirm that you have signed up for our lucky draw. You will be charged Rs. 8/day unless you cancel your order on this URL: [sample link]". 

The #hook will be a seemingly legitimate website that asks you to "confirm" (enter) your personal financial information, such as your credit/debit card number,your ATM card PIN, SSN, email address, and other personal information. If the hook is a phone number, it normally directs to a legitimate-sounding automated voice response system, similar to the voice response systems used by many financial institutions, which will ask for the same personal information.

This is an example of a (complete) SMS phishing message in current circulation: "Notice - this is an automated message from (a local credit union), your ATM card has been suspended. To reactivate call urgent [sic] at 866-###-####."

Also other types of attacks include a automated call asking you to press certain #octal codes like #90 or #09*. Never dial these and immidiately disconnect such calls...


jim carrey net worth

MASKING IP and MAC ADDRESS

11:32 PM
We all want to surf internet at times anonymously without wanting our IP(Internet Protocol) Address to be revealed. However very few people actually know the efficient methods in order to hide the Ip address. While using a proxy server is mostly preferred, the ways to do that vary. Common techniques are -

Browser Proxy
Website Proxy
Masking the Ip address via software

CORN HALWA (MAKAI)

9:50 AM

Corn Halwa is One Of The Special Desert In India. Especially Found In northern part Of India...Purely Made Of Ghee Gives You A Superb taste and Energy Pista, Almonds adds Much more Special Taste to your make...Try And Feel Free to Post Comments...

Drive Your Yacht on the Road!!

7:25 AM

Caravisio is a product of Knaus Tabbert, a German manufacturer who worked more than 2 years over the concept in cooperation with 20 different companies
Distinguishable from the most camper and caravan designs we see today, Caravisio was inspired by the sea and yachts and has far better aerodynamical shape than the other vehicles from the same class. 



The interior contains two beds which are placed to form V shape and depending on the place where Caravisio is located, these beds could provide fantastic views via the huge panoramic window right in front of them. Another feature of the beds is that they could become one bigger bed by by using a mattress extension.

Another feature that distinguishes Caravisio from the others is the comfortable bathroom with more space inside, instead of the narrow shower places in other caravans and campers. Water usage is controlled by special touchscreen system.


According to Knaus Tabbert, the interior could be easily transformed into work space by rearranging the furniture and electrical hook-ups could power laptops, TV, and other devices you may need to work on.
The back of this caravan could be extended to a fold-out deck, similarly to a deck of a yacht. Remotely controlled roof protects the inhabitants from sunlight and other weather conditions while traveling.

Also Read: jordan belfort net worth
All settings on this “road yacht” are easily controlled by a smartphone app. By using this app you can change the transparency of the side doors, transforming them from fully transparent to frosted. These doors could be turned into screens for projections from the mounted HD projector. Also, doors are locked and unlocked by fingerprints for maximum security.
You can even adjust the suspension and decrease it to ground level by using the smartphone app.
Tabbert stated that “the caravan does not claim to be reproducible nor to be suitable for series production,” so we don’t have to expect mass production.



Hiding and finding hidden Message In Media

2:59 PM

Hiding and finding hidden messages behind media files.


Steganography is a very interesting process by which encoding of hidden messages in such a way is did so that , apart from the sender and recipient,none will know the existence of the message. In such a case stegano-graphic coding is used inside of a transport layer, such as a document file, image file, program or protocol.