More

Pages

Saturday, 30 November 2013

[CRACKED] IDM Internet Download Manager 6.18 Build 9 Free Download


IDM Internet Download Manager 6.18 Build 9[CRACKED] IDM Internet Download Manager 6.18 Build 9 Free Download is a tool to increase download speeds by up to 5 times, resume and schedule downloads. Comprehensive error recovery and resume capability will restart broken or interrupted downloads due to lost connections, network problems, computer shutdowns, or unexpected power outages. Simple graphic user interface makes IDM user friendly and easy to use. [CRACKED] IDM Internet Download Manager 6.18 Build 9 Free Download has a smart download logic accelerator that features intelligent dynamic file segmentation and safe multipart downloading technology to accelerate your downloads. Unlike other download managers and accelerators. [CRACKED] IDM Internet Download Manager 6.18 Build 9 Free Download segments downloaded files dynamically during download process and reuses available connections without additional connect and login stages to achieve best acceleration performance.
[CRACKED] IDM Internet Download Manager 6.18 Build 9 Free Download supports proxy servers, ftp and http protocols, firewalls, redirects, cookies, authorization, MP3 audio and MPEG video content processing. IDM integrates seamlessly into Microsoft Internet Explorer, Netscape, MSN Explorer, AOL, Opera, Mozilla, Mozilla Firefox, Mozilla Firebird, Avant Browser, MyIE2, and all other popular browsers to automatically handle your downloads. You can also drag and drop files, or use vcommand line. IDM 6.18 Build 9 Internet Download Manager and dial your modem at the set time, download the files you want, then hang up or even shut down your computer when it's done. 



Other features include multilingual support, zip preview, download categories, scheduler pro, sounds on different events, HTTPS support, queue processor, html help and tutorial, enhanced virus protection on download completion, progressive downloading with quotas (useful for connections that use some kind of fair access policy or FAP like Direcway, Direct PC, Hughes, etc.), built-in download accelerator, and many others.
Version 6.18 Build 5 adds Windows 8 compatibility, adds [CRACKED] IDM Internet Download Manager 6.18 Build 9 Free Download panel for web-players that can be used to download flash videos from sites like MySpaceTV, and others. It also features complete Windows 7 and Vista support, video page grabber, redeveloped scheduler, and MMS protocol support. The new version also adds improved integration for IE 10 and IE based browsers, redesigned and enhanced download engine, the unique advanced integration into all latest browsers, improved toolbar, and a wealth of other improvements and new features.

What's new in version 6.18 Build 9:
    (Released: Nov 29, 2013)

    Fixed a bug with erroneous dialup dialog
    Added a workaround for Trusteer bug when it crashes IE

    Friday, 29 November 2013

    Crack IDM 6.18 Build 8 | Internet Download Manager Crack Free Download


    IDM Internet Download Manager 6.18 Build 7Crack IDM 6.18 Build 8 | Internet Download Manager Crack Free Download is a tool to increase download speeds by up to 5 times, resume and schedule downloads. Comprehensive error recovery and resume capability will restart broken or interrupted downloads due to lost connections, network problems, computer shutdowns, or unexpected power outages. Simple graphic user interface makes IDM user friendly and easy to use. Crack IDM 6.18 Build 8 | Internet Download Manager Crack Free Download has a smart download logic accelerator that features intelligent dynamic file segmentation and safe multipart downloading technology to accelerate your downloads. Unlike other download managers and accelerators. [CRACKED] IDM Internet Download Manager 6.18 Build 8Free Download segments downloaded files dynamically during download process and reuses available connections without additional connect and login stages to achieve best acceleration performance.
    Crack IDM 6.18 Build 8 | Internet Download Manager Crack Free Download supports proxy servers, ftp and http protocols, firewalls, redirects, cookies, authorization, MP3 audio and MPEG video content processing. IDM integrates seamlessly into Microsoft Internet Explorer, Netscape, MSN Explorer, AOL, Opera, Mozilla, Mozilla Firefox, Mozilla Firebird, Avant Browser, MyIE2, and all other popular browsers to automatically handle your downloads. You can also drag and drop files, or use vcommand line. IDM 6.18 Build 8 Internet Download Manager and dial your modem at the set time, download the files you want, then hang up or even shut down your computer when it's done. 



    Other features include multilingual support, zip preview, download categories, scheduler pro, sounds on different events, HTTPS support, queue processor, html help and tutorial, enhanced virus protection on download completion, progressive downloading with quotas (useful for connections that use some kind of fair access policy or FAP like Direcway, Direct PC, Hughes, etc.), built-in download accelerator, and many others.
    Version 6.18 Build 5 adds Windows 8 compatibility, adds Crack IDM 6.18 Build 8 | Internet Download Manager Crack Free Download panel for web-players that can be used to download flash videos from sites like MySpaceTV, and others. It also features complete Windows 8 and Vista support, video page grabber, redeveloped scheduler, and MMS protocol support. The new version also adds improved integration for IE 10 and IE based browsers, redesigned and enhanced download engine, the unique advanced integration into all latest browsers, improved toolbar, and a wealth of other improvements and new features.

    What's new in version 6.18 Build 8:
      (Released: Nov 28, 2013)

      Increased the maximum number of connections to support up to 32 simultaneous connections per download
      Improved video recognition in web players
      Improved IDM download engine

      Thursday, 28 November 2013

      [CRACKED] IDM Internet Download Manager 6.18 Build 8 Free Download


      IDM Internet Download Manager 6.18 Build 7[CRACKED] IDM Internet Download Manager 6.18 Build 8 Free Download is a tool to increase download speeds by up to 5 times, resume and schedule downloads. Comprehensive error recovery and resume capability will restart broken or interrupted downloads due to lost connections, network problems, computer shutdowns, or unexpected power outages. Simple graphic user interface makes IDM user friendly and easy to use. [CRACKED] IDM Internet Download Manager 6.18 Build 8 Free Download has a smart download logic accelerator that features intelligent dynamic file segmentation and safe multipart downloading technology to accelerate your downloads. Unlike other download managers and accelerators. [CRACKED] IDM Internet Download Manager 6.18 Build 8Free Download segments downloaded files dynamically during download process and reuses available connections without additional connect and login stages to achieve best acceleration performance.
      [CRACKED] IDM Internet Download Manager 6.18 Build 8 Free Download supports proxy servers, ftp and http protocols, firewalls, redirects, cookies, authorization, MP3 audio and MPEG video content processing. IDM integrates seamlessly into Microsoft Internet Explorer, Netscape, MSN Explorer, AOL, Opera, Mozilla, Mozilla Firefox, Mozilla Firebird, Avant Browser, MyIE2, and all other popular browsers to automatically handle your downloads. You can also drag and drop files, or use vcommand line. IDM 6.18 Build 8 Internet Download Manager and dial your modem at the set time, download the files you want, then hang up or even shut down your computer when it's done. 



      Other features include multilingual support, zip preview, download categories, scheduler pro, sounds on different events, HTTPS support, queue processor, html help and tutorial, enhanced virus protection on download completion, progressive downloading with quotas (useful for connections that use some kind of fair access policy or FAP like Direcway, Direct PC, Hughes, etc.), built-in download accelerator, and many others.
      Version 6.18 Build 5 adds Windows 8 compatibility, adds [CRACKED] IDM Internet Download Manager 6.18 Build 8 Free Download panel for web-players that can be used to download flash videos from sites like MySpaceTV, and others. It also features complete Windows 8 and Vista support, video page grabber, redeveloped scheduler, and MMS protocol support. The new version also adds improved integration for IE 10 and IE based browsers, redesigned and enhanced download engine, the unique advanced integration into all latest browsers, improved toolbar, and a wealth of other improvements and new features.

      What's new in version 6.18 Build 8:
        (Released: Nov 28, 2013)

        Increased the maximum number of connections to support up to 32 simultaneous connections per download
        Improved video recognition in web players
        Improved IDM download engine

        How to: Play Android Games on Computer/PC/laptop [software]

         It is not very tough to Run Android games on your Computer, but not that much easy too, The Android is releasing several applications day by day, it is very difficult to test each and everyone in your mobile. It costs lot of battery and time.





        There is a Solution for this, you can test your applications in your Computer by following my tips, the windows environment was user friendly to the Android platform

        It is not easy regarding all application testing as each app differs in their usage, some needs Camera, some Needs Bluetooth and some WiFi, i am giving this mainly for the apps that is available on the Outside of Android Market

        Let us know how to play android games on your Computer

        1) BlueStacks

        The best user friendly software that runs your android games on your computer is BlueStacks, which is yet Beta version.

        Download the Bluestacks officially from here

        Features


        • You can download any game in your market by single click
        • View all the apps and games in full HD Screen
        • Option for installing external .apk android files directly and testing in bluestacks
        • Very user friendly for the beginners in android testing 
        2) Android SDK
        The SDK refer to the Software Development kit which says it is an tool for the Android Developers, Users also use this for Testing their apps and games, but set up is not easy, and there are lot of to do for running this app on this kit
        Download this Android SDK software here
        3) Android live
        The android live is similar to the first one mentioned above, it is for X86 Windows based systems.
        For downloading Android live click here

        Tuesday, 26 November 2013

        IDM 6.18 Build 7 Internet Download Manager Original Crack Download


        IDM Internet Download Manager 6.18 Build 7IDM 6.18 Build 7 Internet Download Manager Original Crack Download is a tool to increase download speeds by up to 5 times, resume and schedule downloads. Comprehensive error recovery and resume capability will restart broken or interrupted downloads due to lost connections, network problems, computer shutdowns, or unexpected power outages. Simple graphic user interface makes IDM user friendly and easy to use. IDM 6.18 Build 7 Internet Download Manager Original Crack Download has a smart download logic accelerator that features intelligent dynamic file segmentation and safe multipart downloading technology to accelerate your downloads. Unlike other download managers and accelerators. IDM 6.18 Build 7 Internet Download Manager Original Crack Download segments downloaded files dynamically during download process and reuses available connections without additional connect and login stages to achieve best acceleration performance.
        IDM 6.18 Build 7 Internet Download Manager Original Crack Download supports proxy servers, ftp and http protocols, firewalls, redirects, cookies, authorization, MP3 audio and MPEG video content processing. IDM integrates seamlessly into Microsoft Internet Explorer, Netscape, MSN Explorer, AOL, Opera, Mozilla, Mozilla Firefox, Mozilla Firebird, Avant Browser, MyIE2, and all other popular browsers to automatically handle your downloads. You can also drag and drop files, or use vcommand line. IDM 6.18 Build 7 Internet Download Manager and dial your modem at the set time, download the files you want, then hang up or even shut down your computer when it's done. 



        Other features include multilingual support, zip preview, download categories, scheduler pro, sounds on different events, HTTPS support, queue processor, html help and tutorial, enhanced virus protection on download completion, progressive downloading with quotas (useful for connections that use some kind of fair access policy or FAP like Direcway, Direct PC, Hughes, etc.), built-in download accelerator, and many others.
        Version 6.18 Build 5 adds Windows 8 compatibility, adds IDM 6.18 Build 7 Internet Download Manager Original Crack Download panel for web-players that can be used to download flash videos from sites like MySpaceTV, and others. It also features complete Windows 7 and Vista support, video page grabber, redeveloped scheduler, and MMS protocol support. The new version also adds improved integration for IE 10 and IE based browsers, redesigned and enhanced download engine, the unique advanced integration into all latest browsers, improved toolbar, and a wealth of other improvements and new features.

        What's new in version 6.18 Build 7:

          (Released: Nov 08, 2013)

          -Fixed a critical bug in IE integration module
          -Improved Windows 8.1 and IE 11 integration
          -Resolved compatibility issues with Google Chrome 31
          -Improved video recognition in web players

          Monday, 25 November 2013

          Internet Download Manager IDM 6.18 Build 7 crack Download For PC


          IDM Internet Download Manager 6.18 Build 7Internet Download Manager IDM 6.18 Build 7 crack Download For PC is a tool to increase download speeds by up to 5 times, resume and schedule downloads. Comprehensive error recovery and resume capability will restart broken or interrupted downloads due to lost connections, network problems, computer shutdowns, or unexpected power outages. Simple graphic user interface makes IDM user friendly and easy to use. Internet Download Manager IDM 6.18 Build 7 crack Download For PC has a smart download logic accelerator that features intelligent dynamic file segmentation and safe multipart downloading technology to accelerate your downloads. Unlike other download managers and accelerators. Internet Download Manager IDM 6.18 Build 7 crack Download For PC segments downloaded files dynamically during download process and reuses available connections without additional connect and login stages to achieve best acceleration performance.
          Internet Download Manager IDM 6.18 Build 7 crack Download For PC supports proxy servers, ftp and http protocols, firewalls, redirects, cookies, authorization, MP3 audio and MPEG video content processing. IDM integrates seamlessly into Microsoft Internet Explorer, Netscape, MSN Explorer, AOL, Opera, Mozilla, Mozilla Firefox, Mozilla Firebird, Avant Browser, MyIE2, and all other popular browsers to automatically handle your downloads. You can also drag and drop files, or use vcommand line. IDM 6.18 Build 7 Internet Download Manager and dial your modem at the set time, download the files you want, then hang up or even shut down your computer when it's done. 



          Other features include multilingual support, zip preview, download categories, scheduler pro, sounds on different events, HTTPS support, queue processor, html help and tutorial, enhanced virus protection on download completion, progressive downloading with quotas (useful for connections that use some kind of fair access policy or FAP like Direcway, Direct PC, Hughes, etc.), built-in download accelerator, and many others.
          Version 6.18 Build 5 adds Windows 8 compatibility, adds Internet Download Manager IDM 6.18 Build 7 crack Download For PC panel for web-players that can be used to download flash videos from sites like MySpaceTV, and others. It also features complete Windows 7 and Vista support, video page grabber, redeveloped scheduler, and MMS protocol support. The new version also adds improved integration for IE 10 and IE based browsers, redesigned and enhanced download engine, the unique advanced integration into all latest browsers, improved toolbar, and a wealth of other improvements and new features.

          What's new in version 6.18 Build 7:

            (Released: Nov 08, 2013)

            -Fixed a critical bug in IE integration module
            -Improved Windows 8.1 and IE 11 integration
            -Resolved compatibility issues with Google Chrome 31
            -Improved video recognition in web players

            Sunday, 24 November 2013

            How to Hide files inside a picture using Command Prompt - video



            How to Hide files inside a picture using Command Prompt in windows easy way to hide files inside an image file (without any software)

            First create a new folder in C:\ drive and name it anything i'm gonna name it "Hide"

            Now move the files you want to hide and the picture in which you want to hide to the folder.

            Select the files you want to hide and right click select "Add to archive..." and give the compressed file a name for example: Compressed.rar

            Now open command prompt.
            type cd\ to go to your root directory


            Then type
            copy /b yourimage.jpg+Compressed Files.rar xyz.jpg

            your files will be hidden inside the image. To get your files back right click
            on the image(xyz.jpg) and open it with Winrar you will see your files
            you can extract the files anywhere you want on your computer.

            Saturday, 23 November 2013

            How to Download [Cracked] IDM Internet Download Manager 6.18 Build 7


            IDM Internet Download Manager 6.18 Build 7How to Download [Cracked] IDM Internet Download Manager 6.18 Build 7 is a tool to increase download speeds by up to 5 times, resume and schedule downloads. Comprehensive error recovery and resume capability will restart broken or interrupted downloads due to lost connections, network problems, computer shutdowns, or unexpected power outages. Simple graphic user interface makes IDM user friendly and easy to use. How to Download [Cracked] IDM Internet Download Manager 6.18 Build 7 has a smart download logic accelerator that features intelligent dynamic file segmentation and safe multipart downloading technology to accelerate your downloads. Unlike other download managers and accelerators. How to Download [Cracked] IDM Internet Download Manager 6.18 Build 7  segments downloaded files dynamically during download process and reuses available connections without additional connect and login stages to achieve best acceleration performance.
            How to Download [Cracked] IDM Internet Download Manager 6.18 Build 7 supports proxy servers, ftp and http protocols, firewalls, redirects, cookies, authorization, MP3 audio and MPEG video content processing. IDM integrates seamlessly into Microsoft Internet Explorer, Netscape, MSN Explorer, AOL, Opera, Mozilla, Mozilla Firefox, Mozilla Firebird, Avant Browser, MyIE2, and all other popular browsers to automatically handle your downloads. You can also drag and drop files, or use vcommand line. IDM 6.18 Build 7 Internet Download Manager and dial your modem at the set time, download the files you want, then hang up or even shut down your computer when it's done. 



            Other features include multilingual support, zip preview, download categories, scheduler pro, sounds on different events, HTTPS support, queue processor, html help and tutorial, enhanced virus protection on download completion, progressive downloading with quotas (useful for connections that use some kind of fair access policy or FAP like Direcway, Direct PC, Hughes, etc.), built-in download accelerator, and many others.

            Version 6.18 Build 5 adds Windows 8 compatibility, adds How to Download [Cracked] IDM Internet Download Manager 6.18 Build 7 panel for web-players that can be used to download flash videos from sites like MySpaceTV, and others. It also features complete Windows 7 and Vista support, video page grabber, redeveloped scheduler, and MMS protocol support. The new version also adds improved integration for IE 10 and IE based browsers, redesigned and enhanced download engine, the unique advanced integration into all latest browsers, improved toolbar, and a wealth of other improvements and new features.

            What's new in version 6.18 Build 7:

              (Released: Nov 08, 2013)

              -Fixed a critical bug in IE integration module
              -Improved Windows 8.1 and IE 11 integration
              -Resolved compatibility issues with Google Chrome 31
              -Improved video recognition in web players

              Friday, 22 November 2013

              SSH Tunneling Explained

              Recently I wanted to set up a remote desktop sharing session from home pc to my laptop. While going through the set up guide I came across ssh tunneling. Even though there are many articles on the subject still it took me a considerable amount of googling, some experimenting and couple of Wireshark sessions to grasp what’s going under the hood. Most of the guides were incomplete in terms of explaining the concept which left me desiring for a good article on the subject with some explanatory illustrations. So I decided to write it my self. So here goes…

              Introduction

              A SSH tunnel consists of an encrypted tunnel created through a SSH protocol
              connection. A SSH tunnel can be used to transfer unencrypted traffic over a
              network through an encrypted channel. For example we can use a ssh tunnel to
              securely transfer files between a FTP server and a client even though the FTP
              protocol itself is not encrypted. SSH tunnels also provide a means to bypass firewalls that prohibits or filter certain internet services. For example an organization will block certain sites using their proxy filter. But users may not wish to have their web traffic
              monitored or blocked by the organization proxy filter. If users can connect to
              an external SSH server, they can create a SSH tunnel to forward a given port on
              their local machine to port 80 on remote web-server via the external SSH
              server. I will describe this scenario in detail in a little while.
              To set up a SSH tunnel a given port of one machine needs to be forwarded (of
              which I am going to talk about in a little while) to a port in the other
              machine which will be the other end of the tunnel. Once the SSH tunnel has been
              established, the user can connect to earlier specified port at first machine to
              access the network service.

              Port Forwarding

              SSH tunnels can be created in several ways using different kinds of port forwarding
              mechanisms. Ports can be forwarded in three ways.
              1. Local port forwarding
              2. Remote port forwarding
              3. Dynamic port forwarding
              I didn’t explain what port forwarding is. I found Wikipedia’s definition more explanatory.
              Port forwarding or port mapping is a name given to the combined technique of
              1. translating the address and/or port number of a packet to a new destination
              2. possibly accepting such packet(s) in a packet filter(firewall)
              3. forwarding the packet according to the routing table.
              Here the first technique will be used in creating an SSH tunnel. When a client application connects to the local port (local endpoint) of the SSH tunnel and transfer data these data will be forwarded to the remote end by translating the host and port values to that of the remote end of the channel.
              So with that let’s see how SSH tunnels can be created using forwarded ports with an examples.

              Tunnelling with Local port forwarding

              Let’s say that yahoo.com is being blocked using a proxy filter in the University.
              (For the sake of this example. :d   . Cannot think any valid reason why yahoo would be blocked). A SSH tunnel can be used to bypass this restriction. Let’s name my machine at the university as ‘work’ and my home machine as ‘home’. ‘home’ needs to have a public IP for this to work. And I am running a SSH server on my home machine. Following diagram illustrates the scenario.



               
              To create the SSH tunnel execute following from ‘work’ machine.

              ssh -L 9001:yahoo.com:80 home
               
              The ‘L’ switch indicates that a local port forward is need to be created. The switch syntax is as follows.

              -L <local-port-to-listen>:<remote-host>:<remote-port>
               
              Now the SSH client at ‘work’ will connect to SSH server running at ‘home’ (usually running at port 22) binding port 9001 of ‘work’ to listen for local requests thus creating a SSH tunnel between ‘home’ and ’work’. At the ‘home’ end it will create a connection to ‘yahoo.com’ at port 80. So ‘work’ doesn’t need to know how to connect to yahoo.com. Only ‘home’ needs to worry about that. The channel between ‘work’ and ‘home’ will be encrypted while the connection between ‘home’ and ‘yahoo.com’ will be unencrypted.

              Now it is possible to browse yahoo.com by visiting http://localhost:9001 in the web browser at ‘work’ computer. The ‘home’ computer will act as a gateway which would accept requests from ‘work’ machine and fetch data and tunnelling it back. So the syntax of the full command would be as follows.

              ssh -L <local-port-to-listen>:<remote-host>:<remote-port> <gateway>
               
              The image below describes the scenario.






              Here the ‘host’ to ‘yahoo.com’ connection is only made when browser makes the
              request not at the tunnel setup time.

              It is also possible to specify a port in the ‘home’ computer itself instead of
              connecting to an external host. This is useful if I were to set up a VNC session
              between ‘work’ and ‘home’. Then the command line would be as follows.

              ssh -L 5900:localhost:5900 home (Executed from 'work')
               
              So here what does localhost refer to? Is it the ‘work’ since the command line is executed from ‘work’? Turns out that it is not. As explained earlier is relative to the gateway (‘home’ in this case) , not the machine from where the tunnel is initiated. So this will make a connection to port 5900 of the ‘home’ computer where the VNC client would be listening in.

              The created tunnel can be used to transfer all kinds of data not limited to web browsing sessions. We can also tunnel SSH sessions from this as well. Let’s assume there is another computer (‘banned’) to which we need to SSH from within University but the SSH access is being blocked. It is possible to tunnel a SSH session to this host using a local port forward. The setup would look like this.





              As can be seen now the transferred data between ‘work’ and ‘banned’ are encrypted end to end. For this we need to create a local port forward as follows.

              ssh -L 9001:banned:22 home
               
              Now we need to create a SSH session to local port 9001 from where the session
              will get tunneled to ‘banned’ via ‘home’ computer.

              ssh -p 9001 localhost
               
              With that let’s move on to next type of SSH tunnelling method, reverse tunnelling.

              Reverse Tunnelling with remote port forwarding

              Let’s say it is required to connect to an internal university website from home.
              The university firewall is blocking all incoming traffic. How can we connect from ‘home’ to internal network so that we can browse the internal site? A VPN setup is a good candidate here. However for this example let’s assume we don’t have this facility. Enter SSH reverse tunnelling..

              As in the earlier case we will initiate the tunnel from ‘work’ computer behind the firewall. This is possible since only incoming traffic is blocking and outgoing traffic is allowed. However instead of the earlier case the client will now be at the ‘home’ computer. Instead of -L option we now define -R which specifies
              a reverse tunnel need to be created.

              ssh -R 9001:intra-site.com:80 home (Executed from 'work')
               
              Once executed the SSH client at ‘work’ will connect to SSH server running at home creating a SSH channel. Then the server will bind port 9001 on ‘home’ machine to listen for incoming requests which would subsequently be routed through the created SSH channel between ‘home’ and ‘work’. Now it’s possible to browse the internal site

              by visiting http://localhost:9001 in ‘home’ web browser. The ‘work’ will then create a connection to intra-site and relay back the response to ‘home’ via the created SSH channel.




              As nice all of these would be still you need to create another tunnel if you need to connect to another site in both cases. Wouldn’t it be nice if it is possible to proxy traffic to any site using the SSH channel created? That’s what dynamic port forwarding is all about.

              Dynamic Port Forwarding

              Dynamic port forwarding allows to configure one local port for tunnelling data to all remote destinations. However to utilize this the client application connecting to local port should send their traffic using the SOCKS protocol. At the client side of the tunnel a SOCKS proxy would be created and the application (eg. browser) uses the SOCKS protocol to specify where the traffic should be sent when it leaves the other end of the ssh tunnel.

              ssh -D 9001 home (Executed from 'work')
               
              Here SSH will create a SOCKS proxy listening in for connections at local port
              9001 and upon receiving a request would route the traffic via SSH channel
              created between ‘work’ and ‘home’. For this it is required to configure the
              browser to point to the SOCKS proxy at port 9001 at localhost.



              thats all hope you enjoy this tutorial   :>)   

              DNS poisoning - EXPLANATION | hacking trick

              DNS poisoning is a technique that tricks a DNS
              server into believing that is has received authentic
              inforamtion when, in reality, it has not. It results in
              substitution of a false Ineternet provider address at
              the domain name service level where web addresses
              are converted into numeric internet provider
              addresses. It allows attacker to replace IP address
              DNS entries for a target site on a given DNS server
              with IP addresses of the server he/she controls.
              Attacker can create fake DNS entries for files with
              same names as that of target server.
              The DNS provides a way for computers to translate
              the domain names we see to the physical IPs they
              represent. When you load a webpage, your browser
              will ask its DNS server for the IP of the host you
              requested, and the server will respond. Your browser
              will then request the webpage from the server with
              the IP address that the DNS server supplied.
              To launch a DNS poisoning attack, follow these
              steps:

              + set up a fake website on your computer

              + Install treewalk and modify the file mentioned in
              the readme.txt to your IP address. Treewalk will
              make you the DNS server.
              + Modify the file dns-spoofing.bat and replace the IP
              address with your IP address.

              + Trojanize the dns-spoofing.bat file and send it
              + When the host clicks the Trojanned file, it will
              replace DNS-entry in her TCP/IP properties to that of
              your machine.
              + You will become the DNS server and her DNS
              requests will go through you
              There are four types of DNS poisoning attacks using
              which you can compromise the target system:
              + Intranet DNS spoofing (local network)
              When an attacker performs DNS poisoning on a locl
              area network (LAN), it is called intranet DNS
              spoofing. An attacker can perform intranet DNS
              spoofing attack with the help of the ARP poisoning
              technique. THis is usually conducted on a swithced
              LAN. To perform this attack, you must be connected
              to the LAN and be able to sniff the traffic or packets.
              Once the attacker succeds in sniffing the ID of the
              DNS request from the intranet, he or she can send a
              malicious reply to the sender before the actual DNS
              server.
              + Internet DNS spoofing (remote network)
              Internet DNS poisoning is also known as remote
              DNS poisoning. This attack can be performed either
              on asingle or multiple victims anywhere in the world.
              In order to perform this attack, you need to set up a
              rouge DNS server with a static IP address.
              Internet DNS spoofing is performed when the
              victim's system is connedted to the Internet. It is
              done with the help of Trojans. It is one of the MITM
              types of attacks, where the attacker changers the
              primary DNS entries of the victim's computer. The
              attacker replaces the victim's DNS IP address with
              the fake IP address that refers t the attacker's
              system; thus all traffic will be redirected to the
              attacker's machine. Now the aatcker can easily sniff
              the victim's confidential information.
              + Proxy server DNS poisoning
              In the proxy server DNS posoning technique, tha
              taattacker changes the proxy server setting of the
              victim to that of the attacker. This is done with the
              help of a Trojan. This redirects the victim's request
              to the attacker's fake website where the attacker can
              sniff the confidential information of the victim.
              + DNS cache poisoning
              The DNS system uses cache memory to hold the
              recently resolved domain names. It is populated
              with recently used domain names and respective IP
              address entries. When the user request comes, the
              DNS resolver first checks the DNS cache; if the
              domain name that the user requested is found in the
              cache, then the resolver sends its respective IP
              address quickly. Thus, it redueces the traffic and
              time of DNS resolving.
              Attacker target this DNS cache and make changes or
              add entries to the DNS cache. The attacker replaces
              the user-requested IP address with the fake IP
              address. Then, after when user requests that domain
              name, the DNS resolver checks the entry in the DNS
              cache and picks the matched entry. Thus, the victim
              is rediirected to the attacker's fake server instead of
              the authorized server.

              How to defend against DNS spoofing:
              Resolve all DNS queries to local DNS servers
              Block DNS requests from going to external severs
              Implement DNSSEC
              Configure the DNS resolver to use a new random
              source prot from its available range for each
              outgoing query
              Configure the firewall to restrict external DNS lookup
              Restrict the DNS recuring service, either full or
              partial, to authorized users
              Use DNS Non-Existent Domain rate limitng
              Secure your internal machines
              Implement IDS and deploy it correctly
              Use static ARP and IP table
              Use SSH encryption
              Use sniffing detection tools
              Do not open suspicious files
              Always use trusted proxy sites
              Audit your DNS server regularly to remove
              vulnerabilities

              Botnets - full Explanation

              Botnets 


              A botnet or robot network is a group of computers running a computer application controlled and manipulated only by the owner or the software source. The botnet may refer to a legitimate network of several computers that share program processing among them.

              Usually though, when people talk about botnets, they are talking about a group of computers infected with the malicious kind of robot software, the bots, which present a security threat to the computer owner. Once the robot software (also known as malicious software or malware) has been successfully installed in a computer, this computer becomes a zombie or a drone, unable to resist the commands of the bot commander.

              A botnet may be small or large depending on the complexity and sophistication of the bots used. A large botnet may be composed of ten thousand individual zombies. A small botnet, on the other hand may be composed of only a thousand drones. Usually, the owners of the zombie computers do not know that their computers and their computers’ resources are being remotely controlled and exploited by an individual or a group of malware runners through Internet Relay Chat (IRC)

              There are various types of malicious bots that have already infected and are continuing to infect the internet. Some bots have their own spreaders – the script that lets them infect other computers (this is the reason why some people dub botnets as computer viruses) – while some smaller types of bots do not have such capabilities.

              Different Types of Bots

              Here is a list of the most used bots in the internet today, their features and command set.

              XtremBot, Agobot, Forbot, Phatbot

              These are currently the best known bots with more than 500 versions in the internet today. The bot is written using C++ with cross platform capabilities as a compiler and GPL as the source code. These bots can range from the fairly simple to highly abstract module-based designs. Because of its modular approach, adding commands or scanners to increase its efficiency in taking advantage of vulnerabilities is fairly easy. It can use libpcap packet sniffing library, NTFS ADS and PCRE. Agobot is quite distinct in that it is the only bot that makes use of other control protocols besides IRC.

              UrXBot, SDBot, UrBot and RBot

              Like the previous type of bot, these bots are published under GPL, but unlike the above mentioned bots these bots are less abstract in design and written in rudimentary C compiler language. Although its implementation is less varied and its design less sohisticated, these type of bots are well known and widely used in the internet.

              GT-Bots and mIRC based bots
              These bots have many versions in the internet mainly because mIRC is one of the most used IRC client for windows. GT stands for global threat and is the common name for bots scripted using mIRC. GT-bots make use of the mIRC chat client to launch a set of binaries (mainly DLLs) and scripts; their scripts often have the file extensions .mrc.
              Malicious Uses of Botnets

              Types Of Botnet Attack

              Denial of Service Attacks
              A botnet can be used as a distributed denial of service weapon. A botnet attacks a network or a computer system for the purpose of disrupting service through the loss of connectivity or consumption of the victim network’s bandwidth and overloading of the resources of the victim’s computer system. Botnet attacks are also used to damage or take down a competitor’s website.

              Fast flux is a DNS technique used by botnets to hide phishing and malware delivery sites behind an ever-changing network of compromised hosts acting as proxies.
              Any Internet service can be a target by botnets. This can be done through flooding the website with recursive HTTP or bulletin-board search queries. This mode of attack in which higher level protocols are utilized to increase the effects of an attack is also termed as spidering.

              Spyware
              Its a software which sends information to its creators about a user's activities – typically passwords, credit card numbers and other information that can be sold on the black market. Compromised machines that are located within a corporate network can be worth more to the bot herder, as they can often gain access to confidential information held within that company. There have been several targeted attacks on large corporations with the aim of stealing sensitive information, one such example is the Aurora botnet.

              Adware
              Its exists to advertise some commercial entity actively and without the user's permission or awareness, for example by replacing banner ads on web pages with those of another content provider.

              Spamming and Traffic Monitoring
              A botnet can also be used to take advantage of an infected computer’s TCP/IP’s SOCKS proxy protocol for networking appications. After compromising a computer, the botnet commander can use the infected unit (a zombie) in conjunction with other zombies in his botnet (robot network) to harvest email addresses or to send massive amounts of spam or phishing mails.

              Moreover, a bot can also function as a packet sniffer to find and intercept sensitive data passing through an infected machine. Typical data that these bots look out for are usernames and passwords which the botnet commander can use for his personal gain. Data about a competitor botnet installed in the same unit is also mined so the botnet commander can hijack this other botnet.

              Access number replacements are where the botnet operator replaces the access numbers of a group of dial-up bots to that of a victim's phone number. Given enough bots partake in this attack, the victim is consistently bombarded with phone calls attempting to connect to the internet. Having very little to defend against this attack, most are forced into changing their phone numbers (land line, cell phone, etc.).

              Keylogging and Mass Identity Theft
              An encryption software within the victims’ units can deter most bots from harvesting any real information. Unfortunately, some bots have adapted to this by installing a keylogger program in the infected machines. With a keylogger program, the bot owner can use a filtering program to gather only the key sequence typed before or after interesting keywords like PayPal or Yahoo mail. This is one of the reasons behind the massive PayPal accounts theft for the past several years.

              Bots can also be used as agents for mass identity theft. It does this through phishing or pretending to be a legitimate company in order to convince the user to submit personal information and passwords. A link in these phishing mails can also lead to fake PayPal, eBay or other websites to trick the user into typing in the username and password.

              Botnet Spread
              Botnets can also be used to spread other botnets in the network. It does this by convincing the user to download after which the program is executed through FTP, HTTP or email.

              Pay-Per-Click Systems Abuse
              Botnets can be used for financial gain by automating clicks on a pay-per-click system. Compromised units can be used to click automatically on a site upon activation of a browser. For this reason, botnets are also used to earn money from Google’s Adsense and other affiliate programs by using zombies to artificially increase the click counter of an advertisement.

              Thursday, 21 November 2013

              How to Download Internet Download Manager IDM 6.18 Build 7 With Crack


              IDM Internet Download Manager 6.18 Build 7How to Download Internet Download Manager IDM 6.18 Build 7 With Crack is a tool to increase download speeds by up to 5 times, resume and schedule downloads. Comprehensive error recovery and resume capability will restart broken or interrupted downloads due to lost connections, network problems, computer shutdowns, or unexpected power outages. Simple graphic user interface makes IDM user friendly and easy to use. How to Download Internet Download Manager IDM 6.18 Build 7 With Crack has a smart download logic accelerator that features intelligent dynamic file segmentation and safe multipart downloading technology to accelerate your downloads. Unlike other download managers and accelerators. How to Download Internet Download Manager IDM 6.18 Build 7 With Crack segments downloaded files dynamically during download process and reuses available connections without additional connect and login stages to achieve best acceleration performance.

              How to Download Internet Download Manager IDM 6.18 Build 7 With Crack supports proxy servers, ftp and http protocols, firewalls, redirects, cookies, authorization, MP3 audio and MPEG video content processing. IDM integrates seamlessly into Microsoft Internet Explorer, Netscape, MSN Explorer, AOL, Opera, Mozilla, Mozilla Firefox, Mozilla Firebird, Avant Browser, MyIE2, and all other popular browsers to automatically handle your downloads. You can also drag and drop files, or use vcommand line. IDM 6.18 Build 7 Internet Download Manager and dial your modem at the set time, download the files you want, then hang up or even shut down your computer when it's done. 



              Other features include multilingual support, zip preview, download categories, scheduler pro, sounds on different events, HTTPS support, queue processor, html help and tutorial, enhanced virus protection on download completion, progressive downloading with quotas (useful for connections that use some kind of fair access policy or FAP like Direcway, Direct PC, Hughes, etc.), built-in download accelerator, and many others.

              Version 6.18 Build 5 adds Windows 8 compatibility, adds How to Download Internet Download Manager IDM 6.18 Build 7 With Crack panel for web-players that can be used to download flash videos from sites like MySpaceTV, and others. It also features complete Windows 7 and Vista support, video page grabber, redeveloped scheduler, and MMS protocol support. The new version also adds improved integration for IE 10 and IE based browsers, redesigned and enhanced download engine, the unique advanced integration into all latest browsers, improved toolbar, and a wealth of other improvements and new features.

              What's new in version 6.18 Build 7:

                (Released: Nov 08, 2013)

                -Fixed a critical bug in IE integration module
                -Improved Windows 8.1 and IE 11 integration
                -Resolved compatibility issues with Google Chrome 31
                -Improved video recognition in web players

                DNS - FULL EXPLANATION

                Enumerating DNS records with DNSenum Tool in Kali Linux

                DNS stand for Domain Name System (or Service or Server), an Internet service that translates domain names into IP addresses. Because domain names are alphabetic, they’re easier to remember.

                The Internet however, is really based on IP addresses. Every time you use a domain name, therefore, a DNS service must translate the name into the corresponding IP address.

                For example, the domain name www.way2h.blogspot.com might translate to 74.125.236.67 which is google DNS ip  this is my blog so the domain name was given by google and so this ip is google dns IP

                One of the most important stages of an attack is information gathering. To be able to launch an attack, we need to gather basic information about our target. So, the more information we get, the higher is the probability of a successful attack.

                Enumeration is a process that allows us to gather information from a network. We will examine DNS enumeration and SNMP enumeration techniques.

                DNS enumeration is the process of locating all DNS servers and DNS entries for an organization. DNS enumeration will allow us to gather critical information about the organization such as usernames, computer names, IP addresses, and so on. To achieve this task, we will use DNSenum. For SNMP enumeration, we will use a tool called SnmpEnum. SnmpEnum is a powerful SNMP enumeration tool that allows users to analyze SNMP traffic on a network.

                Navigate to Application > Kali Linux > Information Gathering > DNS Analysis > Open dnsenum

                and enter the following command:

                root@Kali:~# dnsenum – - enum example.com

                It Will Show you Host address , Name Servers address , Mail (MX) Server and Zone Trabsfer Information.

                If you want to More Powerful scan with Sub-domain, then use the following syntax.

                root@Kali:~# dnsenum – - enum -f -r example.com

                There are some additional options we can run using DNSenum:

                - threads [number] allows you to set how many processes will run at once
                -r allows you to enable recursive lookups
                -d allows you to set the time delay in seconds between WHOIS requests
                -o allows us to specify the output location
                -w allows us to enable the WHOIS queries






                Hope you enjoyed reading this tutorial! and remember this tut is only for educational purpose dont try to use again any restricted server  do it only if u awn the domain or u have rights to do so....   happy hacking hope u learn something if u have any question related to this then  do comment i will reply you :)  
                  

                Wednesday, 20 November 2013

                Torrent Sites To Download Pirated Movies

                We all know piracy is a crime and it is the main reason that many of the film financiers are now homeless. You may think that they would not care about the couple of millions lost due to piracy on films that are crossing the billion dollar mark, but if you hear their pleas against piracy, it definitely looks like they won't be able to pay their light bills this month. Anyway here are some popular torrent sites where you can get all the latest movies in normal to blue-ray quality.

                Kickass.to
                Recently kickass has emerged as the most popular torrent site to download movies. Lately it has been facing some copyright infringement problems but it is going strong, so enjoy it before it faces the some fate as isohunt.



                Yify-torrent
                Most of you will be familiar with the name Yify. Their movie realeases are one of the best. They provide great quality in smaller sizes and also provide the movies in both normal and HD quality.


                Piratebay
                And then there is piratebay, the grand old guy. Though now it
                provides mostly magnet links its still a great place to search the latest movies.
                Note: Recently the domain names of piratebay are being blocked by the respective countries whose top-level domain code piratebay is using. So the best thing to do would be to access piratebay using its IP address 194.71.107.80

                Download IDM 6.18 Build 7 Full Serial Key | Crack | Keygen | patch


                IDM Internet Download Manager 6.18 Build 7Download IDM 6.18 Build 7 Full Serial Key|Crack|Keygen|patch is a tool to increase download speeds by up to 5 times, resume and schedule downloads. Comprehensive error recovery and resume capability will restart broken or interrupted downloads due to lost connections, network problems, computer shutdowns, or unexpected power outages. Simple graphic user interface makes IDM user friendly and easy to use. Download IDM 6.18 Build 7 Full Serial Key|Crack|Keygen|patch has a smart download logic accelerator that features intelligent dynamic file segmentation and safe multipart downloading technology to accelerate your downloads. Unlike other download managers and accelerators. Download IDM 6.18 Build 7 Full Serial Key|Crack|Keygen|patch segments downloaded files dynamically during download process and reuses available connections without additional connect and login stages to achieve best acceleration performance.
                Download IDM 6.18 Build 7 Full Serial Key|Crack|Keygen|patch supports proxy servers, ftp and http protocols, firewalls, redirects, cookies, authorization, MP3 audio and MPEG video content processing. IDM integrates seamlessly into Microsoft Internet Explorer, Netscape, MSN Explorer, AOL, Opera, Mozilla, Mozilla Firefox, Mozilla Firebird, Avant Browser, MyIE2, and all other popular browsers to automatically handle your downloads. You can also drag and drop files, or use vcommand line. IDM 6.18 Build 7 Internet Download Manager and dial your modem at the set time, download the files you want, then hang up or even shut down your computer when it's done. 



                Other features include multilingual support, zip preview, download categories, scheduler pro, sounds on different events, HTTPS support, queue processor, html help and tutorial, enhanced virus protection on download completion, progressive downloading with quotas (useful for connections that use some kind of fair access policy or FAP like Direcway, Direct PC, Hughes, etc.), built-in download accelerator, and many others.
                Version 6.18 Build 5 adds Windows 8 compatibility, adds Download IDM 6.18 Build 7 Full Serial Key|Crack|Keygen|patch panel for web-players that can be used to download flash videos from sites like MySpaceTV, and others. It also features complete Windows 7 and Vista support, video page grabber, redeveloped scheduler, and MMS protocol support. The new version also adds improved integration for IE 10 and IE based browsers, redesigned and enhanced download engine, the unique advanced integration into all latest browsers, improved toolbar, and a wealth of other improvements and new features.

                What's new in version 6.18 Build 7:

                  (Released: Nov 08, 2013)

                  -Fixed a critical bug in IE integration module
                  -Improved Windows 8.1 and IE 11 integration
                  -Resolved compatibility issues with Google Chrome 31
                  -Improved video recognition in web players