A bootkit is a type of boot virus that is able to hook and patch Windows kernel , and thus getting unrestricted access to the entire computer hence compromising it . The "Stoned" bootkit, a MBR rootkit was presented by Austrian software developer Peter Kleissner at the Black Hat Technical Security Conference USA 2009 and has been taken quite seriously at the circles at Redmond. It is even able to bypass full volume encryption, because the master boot record (MBR) (where Stoned is stored) is not encrypted and as the master boot record contains the decryption software which encrypts and decrypts the harddrive using a password. This is a potential weak point as MBR if compromised,can be used to pwn your whole system. Forget your antiviruses..No one’s secure!
5 More sites for budding hackers
9/27/2010 06:30:00 AM
K.D
No comments
Last time I wrote about 5 sites for budding hackers and shared websites which I visit regularly for knowledge and queries.This time I m expanding it by sharing 5 more sites which in general are the best place to hangout and devote time if you are a budding hacker. Remember,as I repeat my words, NOBODY can make you a hacker, its your passion that makes you one. But for starters,here are some really good websites to have a look into.
Windows 3.1 on Android – “Completely Useless” but cool :)
9/24/2010 11:30:00 AM
K.D
No comments
On one hand Microsoft has been releasing and updating its smartphone operating systems, geeks are going the other way by porting windows on their respective iPhone’s and Android based phones. On an earlier note, a Norwegian developer named Erik Kristiansen developed the first “boot camp” (later turned out to be a hoax) but that had the devs going for the inevitable. Google about windows on iPhone and you will get loads of results.
How not to get Hacked – Choosing the Right Password
9/20/2010 06:00:00 AM
K.D
No comments
Its a digital nightmare when your password gets hacked. Password compromise = your are fucked, straight away. And if you do happen to be at an important position in a firm, and unfortunately find yourself the root cause of company’s security problems, its time to learn a few basics of choosing the right password. Be it your Email ID, terminal login, voicemail or anything that uses a generic password protection system,you need to choose a secure password for your digital ventures. Nevertheless, this simple guide is applicable to every netizen online who wants to secure himself by choosing the right password. Cause in the end, its your password that makes it easy, or hard for attackers to gain access to your account.
Engineer's Day
9/15/2010 01:10:00 PM
K.D
No comments
Happy Engineer's Day to all Engineer's.E-Efficient N-natural G-Genius I-Intelligent n-Naughty E-Extra Ordinary E-Energetic R-Robust Proud to be a Engineer*~HAPPY ENGINEER's DAY~*.
Hack Mozilla Firefox - Firefox Speedhacks
9/15/2010 11:00:00 AM
K.D
No comments
Mozilla Firefox is blazingly fast,yet it has been facing stiff competition from Google Chrome in terms of speed.Yes, Firefox is already pretty damn fast but did you know that you can tweak it and improve the speed even more? That's the beauty of this program being open source.
Here's what you do:
In the URL bar, type “about:config” and press enter. This will bring up the configuration “menu” where you can change the parameters of Firefox.
In the URL bar, type “about:config” and press enter. This will bring up the configuration “menu” where you can change the parameters of Firefox.
Note that these are what I’ve found to REALLY speed up my Firefox significantly - and these settings seem to be common among everybody else as well. But these settings are optimized forbroadband connections - I mean with as much concurrent requests we’re going to open up with pipelining you’d better have a big connection.
Hack Windows Vista Experience ratings
9/12/2010 10:00:00 AM
K.D
No comments
Windows Vista ships with a tool called the Windows System Assessment Tool (WinSAT) which measures the performance characteristics and capabilities of your computer hardware and aggregates it as the Windows Vista Experience Index (WEI). The Windows Experience Index consists of 5 separate sub scores - Processor, Memory (RAM), Graphics, Gaming Graphics and Hard Disk. The base score is the lowest of all the sub scores and it roughly defines the hardware potential of a computer system.However with many of dissatisfied with the scores we get,geeks around decided to hack it.The concept behind this hack is that WinSAT calculated system score is stored in a XML file which lies deep in Windows directory and by changing the scores there,you can beef up your Windows Experience Base Score and make your friends gawk at it :)
How to create PDF files for free
9/11/2010 12:00:00 PM
K.D
No comments
PDF is the de facto standard for online reading and publishing and various softwares like Adobe reader and Foxit reader allow you to read PDF files. But PDF creation comes under shady areas and the same softwares either allow for minor PDF modification with watermarked results (Foxit) or constitute a whole new different software package for PDF creation for a premium fee (Adobe PDF creator).However,for professionals,this software may be worth its price tag,general users can create excellent looking PDF’s by the method described before.
What you need -
What you need -
- DoPDF PDF convertor
- Any text editor/Word Processor like MS word, wordpad,notepad etc.
Tech News
9/09/2010 04:00:00 PM
K.D
No comments
Here are some latest news related to technology:
Google Secure search:
:Google has announced the secure socket layer(SSL) offering to its search application.(might be you all knows)
Hate OPERA?
If you don’t like OPERA for any reason ,the option available for mobile platforms include BOLT & SKYFIRE
ISADORA!
Linux Mint 9,codenamed ISADORA was launched this month.
Computex 2010
A look at one of the world’s largest computer expo.
Safari 5.0
Safari 5.0 has been released ,boasting of greater speed , a new java script engine called NITRO ,among other changes.
Adobe Flash 10.1 for mobile
Adobe has launched flash 10.1 for mobile phones & is available for immediatedownload for froyo user for now.
Apple iOS 4 hacked
Apple released their latest iphone/ipod touch OS version late last month & just a day later hackers publish a way to jailbreak.
Last Symbian phone for N-series
According to NOKIA ,the N-8 will be the last N-Series phone to run on the Symbian platform; all future N-Series phones will run on MeeGo.
Like this article ? You can always support me by buying me a cup of coffee or You can always try some of the cool merchandize from THEPROTECH.
10 SEARCH ENGINE OTHER THAN GOOGLE
9/09/2010 02:00:00 PM
K.D
No comments
Hii folks how are you.Are you enjoying the cool articles of THEPROTECH.keep giving continous comments because this is only your supports that encourage me to write more & more about advanced technology & secrets behind its.Now time, I back with momentous news which I hope you like.AS you all concern with search engine(the most GOOGLE), many of yours knows it.So there are many Search engine other than GOOGLE.
Here it is:
1.GURUJI
2.GOOGLE
3.TORRENZS
4.ANSWER
5.WALFROM ALPHA
6.EMPORA
7.GAZOPA
8.PIPL(for Friends search best)
9.YUMMILY(for food with calory)
10.HEALTHBASE(spl. For diease & care)
Like this article ? You can always support me by buying me a cup of coffee or You can always try some of the cool merchandize from THEPROTECH.
Top 10 Linux Speed Hacks
9/09/2010 09:21:00 AM
K.D
No comments
Ah…Linux..The pinnacle of what open source can achieve today..the brainchild of Linus Torvalds has surely come a lot further and evolved to show the world what it is capable of.As an extremely reliable Operating system, Linux rarely needs to be rebooted. But when it does, it’s often slow to boot.Loads of Matrix style lines scrolling down the screen are sure to drive nuts added with boot time of GUI initialization.. Fortunately, there are ways to speed things up. Some of these methods are not terribly difficult. (although some, unfortunately, are). Let’s take a look at Top 10 Speed hacks of Linux and let your linux box reincarnate with speed.
Enable Windows Vista Hidden Boot Screen
9/07/2010 02:00:00 PM
K.D
No comments
The Windows Vista BootScreen is pointless,dull and in short – BORING. The guys at Redmond,Microsoft(?) decided to hide a more visually appealing boot screen of Windows Vista for that blank piece of art (?). However,the hidden boot screen can be easily enabled in Windows Vista in full glory and with very little trouble. I'm not sure why they didn't make the boot screen better but I think they wanted to give Windows users a surprise what Vista be hiding underneath (which failed miserably). Seriously,If you really want a better boot screen, you can check out my article on creating a custom boot logo which is easy to pick and good to go :) here
For the time being,here is how you can enable the hidden boot screen in Windows Vista -
Now..Here's the default boot screen:
Track USB drive users
9/06/2010 09:13:00 AM
K.D
No comments
I got an interesting email from my friend RD who asked me that how he can track users who used his USB
Use Windows Key for Start Menu in Linux
9/05/2010 07:00:00 AM
K.D
No comments
Yesterday I installed Vmware and tested Ubuntu Linux on it,however being a keyboard ninja,I felt clunked whenever I hit the Windows key (another windows habit of bringing Start Menu) to bring the Ubuntu Panel at the top of screen as nothing happened at that time. Ubuntu Panel is a dropdown menu which is used to launch applications, which is quite similar to the way Windows has the start menu. However If you are a windows user new to Ubuntu, you might want to have the windows key launch the applications menu. Thankfully this is an easy thing to do in Ubuntu.
Go to the System \ Preferences \ Keyboard Shortcuts menu item:
Hide files using Alternate Data Streams
9/03/2010 06:00:00 AM
K.D
No comments
Windows has its share of threats which can be manipulated by a creative hacker.Microsoft incorporated NTFS system which allowed for greater data compression and file storage algorithms but a relatively less known compatibility feature of NTFS, Alternate Data Streams (ADS) provides hackers with a method of hiding root kits or hacker tools on a breached system and allows them to be executed without being detected by the computer user.
However,dangerous it sounds,its amazingly easy to create ADS and require almost little or no skill on the part of hacker.ADS works by storing 2 data streams on single memory location,and simple DOS commands like “type” are used to create an ADS. These commands are used in conjunction with a redirect [>] and colon [:] to fork one file into another.
For instance: the command
type c:\anyfile.exe > c:\winnt\system32\cmd.exe:anyfile.exe
Once can hide his/her files using this method and they are almost impossible to detect.
Compress Videos to smallest size
9/02/2010 08:56:00 AM
K.D
No comments
Okay..A video is nothing but a series of still images moving in fast motion such that they appear to be moving.I mean a sequence of still images representing scenes in motion.Frame rate, the number of still pictures per unit of time of video,ranges from PAL (Europe, Asia, Australia, etc.) and SECAM (France, Russia, parts of Africa etc.) standards specify 25 frame/s, while NTSC (USA, Canada, Japan, etc.) specifies 29.97 frame/s.The minimum frame rate to achieve the illusion of a moving image is about 15 frames per second or the video will be too jerky and you will be a dead jerk.