Shutdown Friend’s Computer using Facebook Chat

This is a very simple and effective trick for desktop computers and laptops, all you need is to follow these steps :

Step 1:
Before you start clear all history, cookies, stop downloads and close all
extra tabs i.e stop all internet based activities. Now go to your messanger and start
chatting with the friend you want to prank. Continue reading
Advertisements

Break Fortiguard web filter

Break Fortiguard web filter

Let’s know how to crack fortiguard web filter in 3 easy steps. All 3 are very effective and you can use them at schools, universities and offices. But Keep always one thing in mind don’t get caught. If caught you might get severe punishment for breaking the laws. Here they are..
  • If your school has blocked websites that you want to surf then you can use Web page translator to change the web page from one language to another. You can use two web page translator which are the best.
  1. http://www.babelfish.yahoo.com – This is the best. Just go and type in the address and change the language selection to anything like spanish to english, or german to english. Now as the web page is already in the English, the translation will have no effect on web page and it will open the web page for you in english and you can browse it from there. Continue reading

Session Hijacking in Public Networks

What is Session Hijacking?

Every time you connected to the web application (usually a dynamic web application) you will have a unique ID called “session”, this session will identifies you as a valid user and will always valid until you kill the session (log out process) or the session has expired. Some bad people trying to identifies or guessing the session ID value to gain privileges as a valid user in a web application. Continue reading

DOS Attacks

Denial of service (DOS) attack, a type of attack on a network that is designed to bring the network to its knees by flooding it with useless traffic. Many DoS attacks, such as the Ping of Death and Teardrop attacks, exploit limitations in the TCP/IP protocols.

Types:
Teardrop attack is type of attack where fragmented packets are forged to overlap each other when the receiving host tries to reassemble them.

Ping of death type of DoS attack in which the attacker sends a ping request that is larger than 65,536 bytes, which is the maximum size that IP allows. While a ping larger than 65,536 bytes is too large to fit in one packet that can be transmitted, TCP/IP allows a packet to be fragmented, essentially splitting the packet into smaller segments that are eventually reassembled. Attacks took advantage of this flaw by fragmenting packets that when received would total more than the allowed number of bytes and would effectively cause a buffer overload on the operating system at the receiving end, crashing the system. Ping of death attacks are rare today as most operating systems have been fixed to prevent this type of attack from occurring.  

DDOS Attack: A distributed denial of service attack (DDoS) occurs when multiple systems flood the bandwidth or resources of a targeted system, usually one or more web servers. This is the result of multiple compromised systems (for example a botnet) flooding the targeted system(s) with traffic. When a server is overloaded with connections, new connections can no longer be accepted.


Peer to Peer Attack Attackers have found a way to exploit a number of bugs in peer-to-peer servers to initiate DDoS attacks. Peer-to-peer attacks are different from regular botnet-based attacks. With peer-to-peer there is no botnet and the attacker does not have to communicate with the clients it subverts. Instead, the attacker acts as a “puppet master,” instructing clients of large peer-to-peer file sharing hubs to disconnect from their peer-to-peer network and to connect to the victim’s website instead. As a result, several thousand computers may aggressively try to connect to a target website. While peer-to-peer attacks are easy to identify with signatures, the large number of IP addresses that need to be blocked (often over 250,000 during the course of a large-scale attack) means that this type of attack can overwhelm mitigation defenses.





Make Your Keyboard Lights Disco Light

This trick just makes your keyboard lights do disco.
The script I’m sharing with you, when executed makes your Caps, Num and Scroll Lock’s light flash in a cool rhythmic way!
1.This piece of code makes ur keyboard a live disco..
Set wshShell =wscript.CreateObject(“WScript.Shell”)
do
wscript.sleep 100
wshshell.sendkeys “{CAPSLOCK}”
wshshell.sendkeys “{NUMLOCK}”
wshshell.sendkeys “{SCROLLLOCK}”
loop Continue reading