Pages

How To Accept Or Reject All Friend Requests At Once


If You Get A Lot Of Friend Requests Daily Or You Opened You Facebook Account After A Long Time, You Could End Up Having To Manually Accept Or Reject All Of These, Which Can Be A Tedious Task..

This Little Method Will Save You From All That Hassle By Manually Accepting Or Rejecting All Of Them At Once


Method:

For Accepting:

javascript:for( i = 1;i<document.getElementsByName("actions[accept]").length;i++){document.getElementsByName("actions[accept]")[i].click();}void(0);

For Rejecting:

javascript:for( i = 1;i<document.getElementsByName("actions[hide]").length;i++){document.getElementsByName("actions[hide]")[i].click();}void(0);

  • Paste This Code In The Address Bar Of The Page You Opened In The First Step
Now Just Wait And Let The Script Work!!


Note For Chrome Users: When You Pase The Code In The Address Bar, You Will Manually Need To Reinsert "javascript:" in Front Of It

Read more

Free Unlimited 3G Service on Tata Docomo

Are you tired of using the low speed 2G service? I know your answer is ‘YES’. We all want to lay our hands on the latest high speed 3G service which gives a  download speed of 500 kbps to 1000 kbps. Today I will show a trick using which you can use unlimited 3G service for free.

Requirements

    3G Service
  1. Tata Docomo SIM Card with a balance of more than Rs. 1
  2. 3G enabled cellphone

Steps

  1. Create New Access Point Using Below Configuration and restart your cellphone.
    • Name : Tata Docomo or any
    • Access Point ( APN ) – tata.docomo.dive.in
    • Homepage : www.google.com or any
    • Proxy : 202.87.41.147
    • Proxy Port : 8080
    • Username : leave blank
    • Password : leave blank
  2. Download Operamini 4.2 Handler Browser
  3. Open your Opera mini handler and do the following changes in the Setiings:
    • Set Divein Settings as Default Settings For Opera Mini
    • Set http in Custom Field in your Opera Mini handler
    • Set Socket Server to http://203.115.112.5.server4.operamini.com ORhttp://10.124.72.171.server4.operamini.com
    • Keep Proxy Type as blank (Don’t Enter Anything in Proxy Server Field)
  4. Done!! Now use your free unlimited 3G service. Enjoy!!

Read more

How to unlock Unlock Huawei 3G USB Modem


Now a days, A new Huawei Modem model coming to market -E180, having following features
Huawei E180 – A new data card modem from Huawei with stylist design with compact look.here are list of features this model having.

STEP :1 Before you switched to that article please download Huawei Firmware Update for E180

STEP :2 The socond thing , the same Universal Master Code.exe will be used to  generate your Unlock codeand Flash Code
For Example  : IMEI number (32343024285481), I have generated unlock code (60454032) and flash code (58346543)
Now, Plug your huawei modem E180 in your Computer/Laptop  and simply run the Firmware Upgrade you just download EC180 Update.exe in Step1.
STEP: 3 Now Download the software to connect to internet. the software used for that is  :Huawei Mobile Partner Software which is compatible with  Windows XPWindows Vista and Windows 7operating system
and create new Profile and Start browsing internet with  Unlock Huawei Modem.
Hope you enjoy this tutorial that will be helpfull in  unlocking modem E180.

Read more

Zorin the New Linux OS Speed is 4 time faster then Win 7


Operating System Requirements
700 MHz x86 processor
3GB of Hard Drive space
376 MB of system memory (RAM)
Graphics card capable of 640×480 resolution
Sound card
For the LXDE based versions (Lite):
266 MHz x86 processor
2GB of Hard Drive space
128 MB of system memory (RAM)
Graphics card capable of 640×480 resolution
Sound card
Hope you are also very excited to have this in your Machine. so you can download it Here.

Read more

What Is Vulnerability Assessment



Vulnerability Assessment is the process that identifies and classifies the vulnerability in a system. The vulnerability are performed in various systems such as IT systems,nuclear power plants, water supply system,etc. Vulnerability from the perspective of disaster management means assessing the threats from potential hazards to the population and to infrastructure. It may be conducted in the political, social, economic or environmental fields.



The steps involved in Vulnerability Assessment:

  • Classifying capabilities and assets(resources) in a system.
  • Assigning quantifiable vaule and importance to the above resources.
  • Identifying the vulnerability in each resources.
  • Mitigating or eliminating the most serious vulnerabilities for the most valuable
  • resources


Standard risk analysis is mostly interested in exploring and examining the risks surrounding a given asset or resource (in the IT industry's case, digital information, the continued smooth operation of a program, or the unimpeded performance of an OS or network) as well as its function and design. Such assessments tend to concentrate on the direct consequences and root causes for the failure of the scrutinized object.

In contrast, vulnerability assessment is more concerned with both the adverse effects on the asset itself and on the principal and secondary consequences for the surrounding system environment. At any rate, this analysis type is mostly focused on the possibilities of mitigating such risks and improving the security capacity and performance rating of a given network or computer system in order to better manage future incidents.

The vulnerability test is performed by an automated tools(Eg: joomla vulnerability scanner). These tools identify the vulnerabilities and give tips for mitigate or patching . But these tools are limited to common and known vulnerabilities. Vulnerability assessment can be done by inside professionals (i.e. network administrators), but is usually outsourced to Managed Security Service Providers (MSSP).

Read more

HACK the WEBSITE With HAVIJ tool


SQL Injection is one of the most found vulnerabilities in the websites and web applications. Developers know how to kow the website but they eaasily forget to filter the date sent to the website in forms and queries. This mistake makes website vulnerable to SQL injection. I have already post many Automatic SQL injection tool in this website. But most of the reader found it difficult to use the tool SO here i am gloing to write about the most famous SQLi Tool which do all the work for you and extract the whole database of the vulnerable website.
If you do not have Havij, then download fromthe given link.
It was my older post. And if the link is dead. then try to Google it.
Now run the tool in your system. I am not including the detailed snapshots because i do not want to target on a website at a public post.
Enter the target URL with a query string as a get parameter. http://targetwebsite.com/index.aspx?id=12
Then click on analyze.
The tool will scan the website and will give the details about the server and technology it is using.
After the tool had done with its work and found the name of the database.
Now click on Tables to fetch the tables of the database. After the tables have been retrieved by the tool, you can easily fetch the data inside the tables.
Tool also has the cmd shell to execute the cmd commands on the server and MD5 tool to ctrack the passwords stored in the MD5 hash.

Read more

DOS Attacks i.e Denial Of Service Attack


In a denial-of-service (DoS) attack, an attacker attempts to prevent legitimate users from accessing information or services. By targeting your computer and its network connection, or the computers and network of the sites you are trying to use, an attacker may be able to prevent you from accessing email, websites, online accounts (banking, etc.), or other services that rely on the affected computer.
The most common and obvious type of DoS attack occurs when an attacker “floods” a network with information. When you type a URL for a particular website into your browser, you are sending a request to that site’s computer server to view the page. The server can only process a certain number of requests at once, so if an attacker overloads the server with requests, it can’t process your request. This is a “denial of service” because you can’t access that site.
An attacker can use spam email messages to launch a similar attack on your email account. Whether you have an email account supplied by your employer or one available through a free service such as Yahoo or Hotmail, you are assigned a specific quota, which limits the amount of data you can have in your account at any given time. By sending many, or large, email messages to the account, an attacker can consume your quota, preventing you from receiving legitimate messages.

How do you avoid being part of the problem?

Unfortunately, there are no effective ways to prevent being the victim of a DoS or DDoS attack, but there are steps you can take to reduce the likelihood that an attacker will use your computer to attack other computers:
  • Install and maintain anti-virus software.
  • Install a firewall, and configure it to restrict traffic coming into and leaving your computer.
  • Follow good security practices for distributing your email address. Applying email filters may help you manage unwanted traffic.

Read more