The Stoned Bootkit – NO ONE IS SECURE !


A bootkit is a type of boot virus that is able to hook and patch Windows kernel , and thus getting unrestricted access to the entire computer hence compromising it . The "Stoned" bootkit, a MBR rootkit was presented by Austrian  software developer Peter Kleissner at the Black Hat Technical Security Conference USA 2009 and has been taken quite seriously at the circles at Redmond. It is even able to bypass full volume encryption, because the master boot record (MBR) (where Stoned is stored) is not encrypted and as the master boot record contains the decryption software which encrypts and decrypts the harddrive using a password. This is a potential weak point as MBR if compromised,can be used to pwn your whole system. Forget your antiviruses..No one’s secure!

5 More sites for budding hackers

Last time I wrote about 5 sites for budding hackers and shared websites which I visit regularly for knowledge and  queries.This time I m expanding it by sharing 5 more sites which in general are the best place to hangout and devote time if you are a budding hacker. Remember,as I repeat my words, NOBODY can make you a hacker, its your passion that makes you one. But for starters,here are some really good websites to have a look into.



Windows 3.1 on Android – “Completely Useless” but cool :)


On one hand Microsoft has been releasing and updating its smartphone operating systems, geeks are going the other way  by porting windows on their respective iPhone’s and Android based phones. On an earlier note, a Norwegian developer named Erik Kristiansen developed the first “boot camp” (later turned out to be a hoax) but that had the devs going for the inevitable. Google about windows on iPhone and you will get loads of results.

How not to get Hacked – Choosing the Right Password


Its a digital nightmare when your password gets hacked. Password compromise = your are fucked, straight away. And if  you do happen to be at an important position in a firm, and unfortunately find yourself the root cause of company’s security problems, its time to learn a few basics of choosing the right password. Be it your Email ID, terminal login, voicemail or anything that uses a generic password protection system,you need to choose a secure password for your digital ventures. Nevertheless, this simple guide is applicable to every netizen online who wants to secure himself by choosing the right password. Cause in the end, its your password that makes it easy, or hard for attackers to gain access to your account.

Engineer's Day

Happy Engineer's Day to all Engineer's.E-Efficient N-natural G-Genius I-Intelligent n-Naughty E-Extra Ordinary E-Energetic R-Robust Proud to be a Engineer*~HAPPY ENGINEER's DAY~*.

Hack Mozilla Firefox - Firefox Speedhacks



Mozilla Firefox is blazingly fast,yet it has been facing stiff competition from Google Chrome in terms of speed.Yes, Firefox is already pretty damn fast but did you know that you can tweak it and improve the speed even more? That's the beauty  of this program being open source.
Here's what you do: 
In the URL bar, type “
about:config” and press enter. This will bring up the configuration “menu” where you can change the parameters of Firefox.
Note that these are what I’ve found to REALLY speed up my Firefox significantly - and these settings seem to be common among everybody else as well. But these settings are optimized forbroadband connections - I mean with as much concurrent requests we’re going to open up with pipelining you’d better have a big connection.

Hack Windows Vista Experience ratings


Windows Vista ships with a tool called the Windows System Assessment Tool (WinSAT) which measures the performance  characteristics and capabilities of your computer hardware and aggregates it as the Windows Vista Experience Index (WEI). The Windows Experience Index consists of 5 separate sub scores - Processor, Memory (RAM), Graphics, Gaming  Graphics and Hard Disk. The base score is the lowest of all the sub scores and it roughly defines the hardware potential of a computer system.However with many of dissatisfied with the scores we get,geeks around decided to hack it.The concept behind this hack is that WinSAT calculated system score is stored in a XML file which lies deep in Windows directory and by changing the scores there,you can beef up your Windows Experience Base Score and make your friends gawk at it :)

How to create PDF files for free


PDF is the de facto standard for online reading and publishing and various softwares like Adobe reader and Foxit reader  allow you to read PDF files. But PDF creation comes under shady areas and the same softwares either allow for minor PDF modification with watermarked results (Foxit) or constitute a whole new different software package for PDF creation for a premium fee (Adobe PDF creator).However,for professionals,this software may be worth its price tag,general users can create excellent looking PDF’s by the method described before.
What you need -

Tech News

Here are some latest news related  to  technology:
Google Secure search:
:Google has announced the secure socket layer(SSL) offering to its search application.(might be you all knows)
Hate OPERA?
 If you don’t like OPERA for any reason ,the option available for mobile platforms include BOLT & SKYFIRE
ISADORA!
  Linux Mint 9,codenamed ISADORA was launched this month.
Computex 2010
A look at one of the world’s largest computer expo.
Safari 5.0
Safari 5.0 has been released ,boasting of greater speed , a new java script engine called NITRO ,among other changes.
Adobe Flash 10.1 for mobile
Adobe has launched flash 10.1 for mobile phones & is available for immediatedownload for froyo user for now.
Apple iOS 4 hacked
Apple released their latest iphone/ipod touch OS  version late last month & just a day later hackers publish a way to jailbreak.
Last Symbian phone for N-series
According to  NOKIA ,the N-8 will be the last N-Series phone to run on the Symbian platform; all future N-Series phones will run on MeeGo.
Like this article ? You can always support me by buying me a cup of coffee or You can always try some of the cool merchandize from THEPROTECH.

10 SEARCH ENGINE OTHER THAN GOOGLE

Hii folks how are you.Are you enjoying the cool articles of THEPROTECH.keep giving continous comments because this is only your supports that encourage me to write more & more about advanced  technology & secrets behind its.Now time, I back with  momentous news which I hope you like.AS you all concern with search engine(the most GOOGLE), many of yours knows it.So  there are many Search engine other than GOOGLE.
Here it  is:
1.GURUJI
2.GOOGLE
3.TORRENZS
4.ANSWER
5.WALFROM ALPHA
6.EMPORA
7.GAZOPA
8.PIPL(for Friends search best)
9.YUMMILY(for food with calory)
10.HEALTHBASE(spl. For diease & care)
Like this article ? You can always support me by buying me a cup of coffee or You can always try some of the cool merchandize from THEPROTECH.

Top 10 Linux Speed Hacks



Ah…Linux..The pinnacle of what open source can achieve today..the brainchild of Linus Torvalds has surely come a lot  further and evolved to show the world what it is capable of.As an extremely reliable Operating system, Linux  rarely needs to be rebooted. But when it does, it’s often slow to boot.Loads of Matrix style lines scrolling down the screen are sure to drive nuts added with boot time of GUI initialization.. Fortunately, there are ways to speed things up. Some of these methods are not terribly difficult. (although some, unfortunately, are). Let’s take a look at Top 10 Speed hacks of Linux and let your linux box reincarnate with speed.  

Enable Windows Vista Hidden Boot Screen



The Windows Vista BootScreen is pointless,dull and in short – BORING. The guys at Redmond,Microsoft(?) decided to  hide a more visually appealing boot screen of Windows Vista for that blank piece of art (?). However,the hidden boot  screen can be easily enabled in Windows Vista in full glory and with very little trouble. I'm not sure why they didn't make the boot screen better but I think they wanted to give Windows users a surprise what Vista be hiding underneath (which failed miserably). Seriously,If you really want a better boot screen, you can check out my article on creating a custom boot logo which is easy to pick and good to go :) here 
For the time being,here is how you can enable the hidden boot screen in Windows Vista -
Now..Here's the default boot screen:

Track USB drive users


I got an interesting email from my friend RD who asked me that how he can track users who used his USB  

drive after he has given it to someone. He wanted to get the usernames of the accounts where the pendrive was used. I thought for a while and told him that he can achieve this feat either by using Trojans or a combination of Batch and Autorun files. However,you must advise users to not to format the pendrive in order for this to work.The second option of Batch files was easy and less suspicious.So Here is how I made it possible to get the usernames when the pendrive was plugged into the PC -

Use Windows Key for Start Menu in Linux


Yesterday I installed Vmware and tested Ubuntu Linux on it,however being a keyboard ninja,I felt clunked whenever I hit  the Windows key (another windows habit of bringing Start Menu) to bring the Ubuntu Panel at the top of screen as nothing happened at that time. Ubuntu Panel is a dropdown menu which is used to launch applications, which is quite similar to the way Windows has the start menu. However If you are a windows user new to Ubuntu, you might want to have the windows key launch the applications menu. Thankfully this is an easy thing to do in Ubuntu.
Go to the System \ Preferences \ Keyboard Shortcuts menu item:

Hide files using Alternate Data Streams



Windows has its share of threats which can be manipulated by a creative hacker.Microsoft incorporated  NTFS system which allowed for  greater data   compression and file storage algorithms but a relatively less known compatibility feature of NTFS, Alternate Data Streams (ADS) provides hackers with a method of hiding root kits or hacker tools on a breached system and allows them to be executed without being detected by the computer user.
However,dangerous it sounds,its amazingly easy to create ADS and require almost little or no skill on the part of hacker.ADS works by storing 2 data streams on single memory location,and simple DOS commands like “type” are used to create an ADS. These commands are used in conjunction with a redirect [>] and colon [:] to fork one file into another.
For instance:  the command
type c:\anyfile.exe > c:\winnt\system32\cmd.exe:anyfile.exe
will fork the common windows command program with an ADS “anyfile.exe.”
Once can hide his/her files using this method and they are almost impossible to detect.

Compress Videos to smallest size

Okay..A video is nothing but a series of still images moving in fast motion such that they appear to be moving.I mean a sequence of still images representing scenes in motion.Frame rate, the number of still pictures per unit of time of video,ranges from PAL (Europe, Asia, Australia, etc.) and SECAM (France, Russia, parts of Africa etc.) standards specify 25 frame/s, while NTSC (USA, Canada, Japan, etc.) specifies 29.97 frame/s.The minimum frame rate to achieve the illusion of a moving image is about 15 frames per second or the video will be too jerky and you will be a dead jerk. 

 
Design by gitstein | Bloggerized by Kuldeep