Wednesday, December 29, 2010

The decisions we make.

" I miss her a lot. And tried to keep up the contacts. I thought she likes me. We used to call and chat  and ofcourse she talks like she care me a lot. This girl never showed any kind of dislike or hatred through any means or at any time. We were more than just friends, and my friends used to envy me. I thought i was in love and i was soooo happy. Days just passed and never knew that, to her i'm just a friend. Yes, just a friend. I did worry when she was forgetting me. Still not knowing its my fate or my mistake. Not knowing she is doing it purposefully or not. One day she will understand me that i cared her a lot, loved her a lot. but that day, would be ...way too far from this day and i would have been moved on.

Yes, I will move on. This is my life and I have the right to live it. Even though its hurts me a lot, I will forget you. I have to.

Sorry dear, I still love you. May god bless you."

Sunday, December 12, 2010

Real time Blogging.

After seeing the movie social network, a new concept came into my mind. I call this one as real time blogging. Its like blogging everything and anything that comes into your mind while you are working. opening a new webpage in the browser and typing all the stufffs u think about that while you are at the work. Sound like a cool idea. and ofcourse a cool thing for guy like me who always sit in front of the computer and who is always available on line.

I am not sure about this idea whether it will steel my working time or not. but i am sure that i can give a pause to my continuous straining. Anyway its taking a while to load these webpages in this 256 kps line that i am using right now. ok let me be more specific about this concept, in that film Social Network, Mark is hacking and steeling the pictures, while he was blogging at the same time. He is mentioning every step how he got into the network. this is really kinda geeky thing. but its something more like a creative article where people can read and experience the real time happening of scenario as it is. there is no editing, no grammer checks, no spell checks. Just as it is.

One of the major advantage i see is that, the narrator is live on what he is writing. He can be descriptive in situations where he thinks that a particular part need some additional explanations. He wont be loosing the overall idea of what he have done so for. This is one of the major problems seen in development areas. I mean in areas or sections where a product development is going on. This can be also used as a future reference and recap long working hours.

I'll be trying this concept for upcoming projects and works. and yeah i will be using time tags. That means each monologue that reported will be append with a time tag at their receptive time. My aim is nothing but to calculate how much time will be required to get things done. In whole from top to bottom or even in part by part.

Ok now i have been trying this blog, as i mentioned above. I was working on upgrading my company website. at the same time i am blogging. so far so good. But now i am facing one problem that since i was concentrated in writing the intro i lost the work flow in the work that i am currently doing now. and still the internet is too slow today. I am also trying to type things with out looking at the key board. Since the net is too slow i am getting enough time to blog now.

Tuesday, December 7, 2010

Clicks and Talks

Now a days i'm really missing a lot of things..
Trying to get back into track.. just they way i always like it...
always.  :( mis u .

Sunday, December 5, 2010

And finally CBI got wacked.

Today morning  i woke up with the newspaper holiding and reading the entire quarter page. A dude from neighbouring country replaced the contents of CBI website.

Then i quickly opened my laptop and started searching for the real news, and also for the owner who claim this is done by them. I found this and believe as a reliable sourse for this news. and ofcourse i checked the list of 270 websites. here is the list i found.

And trust me i have tried this one. :) they did it perfectly like a 8th grade kid, doing fancy stuff in javascript. Cool animation stolen from some on else. and bunch of crapy codes which we use for decorating cheap websites.
here is the screen shot.

There is a matrix effect, in that page. its a cool math thingy and the real coder who did it and published in his blog Richard Womersley (

There is a cool math function using javascript that make the window go round and round.

By the way many people hates maths ;). And the most funny part is that they realy gotta a message for indian folks. So glad to see that too :). here it is.

OK. enough fun ! Lets get serious. Why this happened to all these 270 websites and including.?
Answer is quiet simple. They just got exploited through the web forms they used to submit data from the user. Example. The contact-us forms. Most of the noob coders and web designers depend upon the freely available ready made forms for this purpose and its damn sure there is a lot of loop holes to get these exploited. and many of these free codes and kept there free on websites for a 'purpose', I dont believe people in these days do a quite a lot of 'charity'. I am damn sure that most of these sites just got exploited through contact forms. 

There is another possibility to replace the contents in a website by bypassing the SQL queries. Coding is tricky and bit complicated. never happened in this attacks. Every single attack use the same single method parsing php code through the POST method. 

And you know, this attack has limits. but as deadly. fortunatly most the server settings comes with readonly attibute exept to the real onwer of the account. If this wasn't the case. the pointer files like index.htm, default.htm, index.php can be easly replace with the desires content. That means instead of posting HEX786.html, they could replace the index.htm or index.php files. :) cheers.

The similar story just happened fews days before. I dont believe this is done by any one of the so called indian cyber army or stuffs.. Some crack head broke into the some pakistani website and inserted a similar page called indian.html. Cheers to those noobs.  here is the 40 lists

This attacks can create panic wide over world. but the fact is that. its a scam nothing to fear. Ofcourse it an intrution. but not at all vital. There is a lot of method you can secure your website by just following some fool proof methods.

Here they are. :
1. learn pit falls of Php and >Net than learning how to do matix calculation using them.
2. Restrict user access, use classes, subclass and includes when ever possible. protect these function in a external folder with no acess.
3. create a stripslashes function and use it when ever there is a input function from user. Theory is that never ever trust user data. Buy one, if u dont know how to make one. :) yeah buy one.
4. Use htacces efficiently. 
5. make things complicated. or fake it like complicated. 

Sunday, November 28, 2010

Unexplained Is Not Inexplicable

A lot of unanswered "why" type question from a kid made me really got irritated. I thought why this kid want to know all these stuffs? and some question made me sit like a stupid coz i dont have an answer, i mean i was not able to explain things. I was sure the questions are pretty cool and ofcourse demand an answer. for each questions these kid ask, i needed a few minutes to think. I'll give an example. "Why all fans are rotating to one side, why not to the opposite side?". A decent normal question which can be expected from an interviewer. Another one. "why people are saying 'sun rise in the east'..? isnt it 'east is the place where sun rises' ? ". 

Many people are overconfident enough to think that if they cannot explain something, it must be inexplicable and therefore a true mystery of the paranormal. An amateur archeologist declares that because he cannot figure out how the pyramids were built, they must have been constructed by space aliens. Even those who are more reasonable at least think that if the experts cannot explain something, it must be inexplicable. Feats such as the bending of spoons, firewalking, or mental telepathy are often thought to be of a paranormal or mystical nature because most people cannot explain them. When they are explained, most people respond, "Yes, of course" or "That's obvious once you see it." Firewalking is a case in point.

People speculate endlessly about supernatural powers over pain and heat, or mysterious brain chemicals that block the pain and prevent burning. The simple explanation is that the capacity of light and fluffy coals to contain heat is very low, and the conductivity of heat from the light and fluffy coals to your feet is very poor. As long as you don't stand around on the coals, you will not get burned. (Think of a cake in a 450°F oven. The air, the cake, and the pan are all at 450°F, but only the metal pan will burn your hand. It has a high heat capacity and high conductivity, while air and cake are light and fluffy and have a low heat capacity and low conductivity.) This is why magicians do not tell their secrets. Most of their tricks are extremely simple and knowing the secret takes the magic out of the trick.

There are many genuine unsolved mysteries in the universe and it is okay to say, "We do not yet know but someday perhaps we will." The problem is that most of us find it more comforting to have certainty, even if it is premature, than to live with unsolved or unexplained mysteries.

But what about the unanswered questions. Last day i went to pay the telephone bill, the time was 2 o clock. the officer said the counter will close at 1 o'clock. I asked "why you are closing at 1 o clock, what you are going to do till 4 o clock? " That was bit loud.  He was looking at me like what the hell.??  He was not sure what to say. I think this is the first time he questioned like this. Since people were watching and i don't want to make a scene there, I didn't waited for his answer.

Saturday, November 6, 2010

Lets get Hacked

OKay time to go little geeky.. ;) Nothing personal here...

 Search engines are the one of the most used and most Exploited facility available on internet, where u have to be careful not to lose your valuable data. During the first half of 2008, Microsoft removed almost 9 million copies of Win32/Zlob from infected computers - more than twice as many as any other threat. In their Security Intelligence Report 5 they described Zlob infections like this: "Once installed on the target computer, Zlob bombards the user with pop-up advertisements and fake 'spyware warnings' that are actually advertisements for rogue security software". An especially prevalent way to get Zlob during that times was to be prompted to install a missing Codec or Video player when visiting a site advertised by a spam message. The most popular type that even we are facing today. And do u know whos the major career. :) Yes ofcourse google. Ofcouse you cannot blame Google for this. May be you can appreciate the guy behind this technique :D.

On November 19th, Microsoft announced that their Malicious Software Remove Tool could now remove the newest batch of fake antivirus products, and that in the first 9 days of the new release, they had removed 994,000 of these fake products, which they refer to collectively as Win32/FakeSecSen.

Wait, HAD BEEN? Yes. To point out, that of those 944,061 machines which detected as infected, only 198,812 had an ACTIVE infection including the "exe". The other 700,000 or so had actually already had the infection declawed, either manually or by another anti-virus program, but residual files indicating the former infection were still present. In other words, the MILLION MACHINES CLEANED was really TWO HUNDRED THOUSAND MACHINES DISINFECTED, and EIGHT HUNDRED THOUSAND CLEANED UP A LITTLE BIT MORE THAN THEY ALREADY HAD BEEN. This details are from the records and that has been identified. Guess the counts of those who really dont know the fact that they have been just infected. :|

Here we go with an old example. You might have experience and wonder why would some one create a website this kind of weird name. In the current example, the hacker is using the site "", which they have just registered December 19th 2009. More than a million Google hits show that he has injected redirectors all around the Internet pointing to this site.


Sites like,, countless media outlets, magazines, universities, and other websites can be found in the search engines in this way. The hackers get these entries into Google by littering tens of thousands of blog comments, guestbook entries, and imaginary blog stories all around the Internet. So, to choose one of the non-pornography related search terms, a hacker has written a program to comment on people's blog entries with a link to:

Now, if someone is searching for the phrase "download fruityloops 6 free", (fruityloops is apparently a music mixing software) because of Microsoft's popularity, their search term will take them to the number one position on Google.

The same technique has been used for many hundreds of phrases associated with pornography and software piracy. Some example search terms (and there are TENS OF THOUSANDS) all of which will give you the Microsoft open redirector as the #1 search result on Google:

"microsoft office 2002 download"
"hacking private myspace accounts"
"download runescape password hack"
"xxx rated joke"
"live free hardcore sex cams"


Some of the other sites with open redirectors being targeted by this attacker include:,,,,,,,,,,,,,,,,,,,,,,,,,

Visiting the website redirects the visitor to, which in turn currently redirects the user to the site:, which pops up a warning:

 Clicking "OK" on the warning, SEEMS to start a scan of your system, but a closer look will indicate that you are actually only seeing an animation playing from the website: look at the url.
 this is some kinda pshining method. When the scan is completed, a "Windows Security Alert" seems to pop up, although in reality you are still on the website. Clicking the "Remove All" button, which seems to be the reasonable thing to do, actually prompts the download of "install.exe".

Hackers use different method to increase their clicks to their site and so that they will get on top of the search engines. This is nothing but the same thing that people do in search engine optimization. Yes but profesionals do it in a profesisonal way while hacker exploit the vulnerabilities of other site.

Using the poor POST and GET validation methods, hackers can insert active javascripts and Iframes in the pages of victim sites. So when ever a click goes to the victims webite one or two or more free clicks are gone to the hackers site.

see the image. site belongs a one company. but the script inside open another php page that does not belong to this website or company.

 god only knows what up to. cheer and play safe. oh dudes thats and indian site !

Wednesday, November 3, 2010

In house Plants

For some reason , i decided to make a in houseplant in my living room. For this i had to do little bit of research. Houseplants, also called indoor plants, brighten up our home or office. Caring for houseplants makes for a great hobby throughout the year.

First reason for this attempt is that i was gifted with two planter vases from a friend. Its really a costly thing and can be found in rare interiors. Its neither 100% fibre nor 100% plastic. But it is having a cool pattern and design and has got that unusual stuff kinda feeling that people ask, from where u bought this?

Ok. no its time for the worst part - some theories.. 

4 main reason that kills the plant:
1) not opening the curtains in the room they are in so they don’t get enough light
2) putting them in rooms or corners of rooms where there is very little natural light, even when he does remember to open the curtains
3) underwatering or overwatering (it depends on the plant, but generally once a week with enough water to make the soil damp but not soggy seems to be about right. Don’t leave them sitting in water – i.e. with water in the saucer under the pot – unless either they are bog plants and really need a load of water or you have left them to dry out so much that any water you pour on the soil goes straight through).
4) Keeping the room they are in too hot or cold, house plants generally like to be about the same temperature as people do.

The benefits of indoor gardening are numerous. Good air is provided by indoor plants that take in carbon dioxide (which you exhale) and in turn release oxygen for you. Indoor plants also brighten the room, providing a cheerful sight for those grey and often dreary winter days. Bougainvillea, star jasmine, passion-flower, hoya, and stephanotis are but a few of the many vining plants that can be grown as house plants and that -in season-favor you with colorful or fragrant bloom, as well as perennially pleasing foliage. You’ll need to provide all of these plants with higher humidity (50 percent) during the cold, winter months. When summer comes, a shady, out door location will keep them healthy until cold weather makes its appearance.

I have one more Vase, its white. I am going to plan Jasmine in that. :)

Thursday, September 30, 2010

Fake scam Mails. 1

Recently when i started using this and etc. My inbox started filling with spam mails. In which most of them where scam mails. I know the fact nobody is going to lend me a single dollar with out any guarantee or assurance that I'll return it. This is a common fact that any one can just think about. Still people are falling for these scams. And of-course I would like to mess around with these people.

Here is the one sample.

fromWestern Union Head Office <>
reply-toWestern Union Head Office <>
dateSun, Sep 19, 2010 at 7:01 PM
subject150, 000.00$ Pick Up

How are you today?

This is to inform you that we have already sent USD5000.00 dollars through
Western Union as we have been mandated to transfer the payment of
compensation the total sum of USD150, 000.00 through Western Union by the
UN government.

In this connection, I tried to call yesterday to provide this information
via telephone in order to avoid the potential for cyber criminals to
laying hold of this vital information, but could not reach you. So I
decided to send MTCN, sender's name and relevant information, so you can
pick up this USD5000.00 so we can send another USD5000.00 tomorrow as you
know, we will be sending only USD5000.00 per day. Please collect this
information and go to any Western Union office near you in your country to
collect USD5000.00 and email us so we can continue with the amount of rest

Mr. Roy Charlton Manager

call or email once I picked up this USD5000.00 today.
Here is the information from Western Union to collect compensation

MTCN: 622 159 4597
Sender's Name: Linda Benson
Question: Honesty
Answer: Trust
Amount: USD5000.00

I am waiting for your call once you pick this transfer

Director of Operations
Western Union ® Moneytransfer

People.. this is one of the mail that i received. By a single glance at this page, i could make it that this mail is written by someone who dont know even how to write an official email.

1. check the mail address. Western union , director of operation dont have his own domain name? that sucks.
2. How are you today? - fk thats none of his business. Who the hell is he to ask me.
3. MTCN details : I dont want to loose a chance to get $5000for free. Who knows if he have actully sent 5000 to trap me in his future plan. So , i checked it online, (a bit opportunistic :P hi hi hi .. 5000 $ yummy).
but here is the result. Bit disappointing.

4. Thats a phone number!!. If this scum was in my country, I would have fooled him around like anything. Any way i have one Voip going to expire soon, will call him. Lets see how it  goes.

this is just one example.

Wednesday, September 1, 2010

From the speech of Dr. Abdul Kalam

Why is the media here so negative?
Why are we in India so embarrassed to recognize our own strengths, our achievements?
We are such a great nation. We have so many amazing success stories but we refuse to acknowledge them. Why?

We are the 
first in milk production.
We are 
number one in Remote sensing satellites.
We are the second largest producer of wheat.
We are the 
second largest producer of rice.

Look at Dr. Sudarshan , he has transferred the tribal village into a self-sustaining, self-driving unit.. There are millions of such achievements but our media is only obsessed in the bad news and failures and disasters.

I was in Tel Aviv once and I was reading the Israeli newspaper. It was the day after a lot of attacks and bombardments and deaths had taken place. The Hamas had struck. But the front page of the newspaper had the picture of a Jewish gentleman who in five years had transformed his desert into an orchid and a granary. It was this inspiring picture that everyone woke up to. The gory details of killings, bombardments, deaths, were inside in the newspaper, buried among other news.
In India we only read about death, sickness, terrorism, crime.. Why are we so NEGATIVE? Another question: Why are we, as a nation so obsessed with foreign things? We want foreign T.Vs, we want foreign shirts. We want foreign technology.

Why this obsession with everything imported. Do we not realize that self-respect comes with self-reliance? I was in Hyderabad giving this lecture, when a 14 year old girl asked me for my autograph. I asked her what her goal in life is.. She replied: I want to live in a developed India . For her, you and I will have to build this developed India . You must proclaim. India is not an under-developed nation; it is a highly developed nation.

YOU say that our government is inefficient.
YOU say that our laws are too old.
YOU say that the municipality does not pick up the garbage.
YOU say that the phones don't work, the railways are a joke. The airline is the worst in the world, mails never reach their destination.
YOU say that our country has been fed to the dogs and is the absolute pits.
YOU say, say and say.. What do YOU do about it?

Take a person on his way to Singapore . Give him a name - 'YOURS'. Give him a face - 'YOURS'. YOU walk out of the airport and you are at your International best. In Singapore you don't throw cigarette butts on the roads or eat in the stores. YOU are as proud of their Underground links as they are.. You pay $5 (approx. Rs.. 60) to drive through Orchard Road (equivalent of Mahim Causeway or Pedder Road) between 5 PM and 8 PM. YOU come back to the parking lot to punch your parking ticket if you have over stayed in a restaurant or a shopping mall irrespective of your status identity… In Singapore you don't say anything, DO YOU? YOU wouldn't dare to eat in public during Ramadan, in Dubai .. YOU would not dare to go out without your head covered in Jeddah.

YOU would not dare to buy an employee of the telephone exchange in London at 10 pounds (Rs..650) a month to, 'see to it that my STD and ISD calls are billed to someone else.'YOU would not dare to speed beyond 55 mph (88 km/h) in Washington and then tell the traffic cop, 'Jaanta hai main kaun hoon (Do you know who I am?). I am so and so's son. Take your two bucks and get lost.' YOU wouldn't chuck an empty coconut shell anywhere other than the garbage pail on the beaches in Australia and New Zealand ..

Why don't YOU spit Paan on the streets of Tokyo ? Why don't YOU use examination jockeys or buy fake certificates in Boston ??? We are still talking of the same YOU. YOU who can respect and conform to a foreign system in other countries but cannot in your own. You who will throw papers and cigarettes on the road the moment you touch Indian ground. If you can be an involved and appreciative citizen in an alien country, why cannot you be the same here in India ?

In America every dog owner has to clean up after his pet has done the job. Same in Japan ..
Will the Indian citizen do that here?' He's right. We go to the polls to choose a government and after that forfeit all responsibility.

We sit back wanting to be pampered and expect the government to do everything for us whilst our contribution is totally negative. We expect the government to clean up but we are not going to stop chucking garbage all over the place nor are we going to stop to pick a up a stray piece of paper and throw it in the bin. We expect the railways to provide clean bathrooms but we are not going to learn the proper use of bathrooms.

We want Indian Airlines and Air India to provide the best of food and toiletries but we are not going to stop pilfering at the least opportunity.

This applies even to the staff who is known not to pass on the service to the public.
When it comes to burning social issues like those related to women, dowry, girl child! and others, we make loud drawing room protestations and continue to do the reverse at home. Our excuse? 'It's the whole system which has to change, how will it matter if I alone forego my sons' rights to a dowry.' So who's going to change the system?

What does a system consist of? Very conveniently for us it consists of our neighbours, other households, other cities, other communities and the government. But definitely not me and YOU. When it comes to us actually making a positive contribution to the system we lock ourselves along with our families into a safe cocoon and look into the distance at countries far away and wait for a Mr.Clean to come along & work miracles for us with a majestic sweep of his hand or we leave the country and run away.

Like lazy cowards hounded by our fears we run to America to bask in their glory and praise their system. When New York becomes insecure we run to England . When England experiences unemployment, we take the next flight out to the Gulf. When the Gulf is war struck, we demand to be rescued and brought home by the Indian government. Everybody is out to abuse and rape the country. Nobody thinks of feeding the system. Our conscience is mortgaged to money.

Dear Indians, The article is highly thought inductive, calls for a great deal of introspection and pricks one's conscience too….. I am echoing J. F. Kennedy's words to his fellow Americans to relate to Indians…..

Saturday, August 28, 2010

ERP first - Quick Step

There are 3 types of people/companies that we interact with. Either a
person or a company is a prospect, a customer, BOTH prospect and customer,
or neither. Now what we need to do is before we even decide what a
company or person is, we need to first figure out the sales and procurement process.

1. Sales staff meets PERSON X from COMPANY X.
2. PERSON X is considered a CONTACT
3. PERSON X works for COMPANY X
4. COMPANY X can have many people working for it.
5. Sales staff meets PERSON Y from COMPANY X.
6. PERSON Y also works for COMPANY X
7. a Company is considered a THIRD PARTY


10. If we are planning to do business with COMPANY X, then COMPANY X is a PROSPECT
11. If we are ALREADY doing business with COMPANY X, then COMPANY X is a CUSTOMER
12. If COMPANY X has done business in the past, but has not used our services for a while, then COMPANY X is a PROSPECT/CUSTOMER
13. If COMPANY X is a supplier or not a company we wish to do or plan to do business with, then they are considered NOR PROSPECT NOR CUSTOMER


14. If COMPANY X becomes our customer, CHANGE this data in the db and
put as CUSTOMER (Any customer who has not used our services in 90 days is to be
changed to prospect/customer)
15. Create a PROJECT for the customer
16. Edit all project details and break down tasks
17. Create invoice based on project
18. Add products/services to invoice
19. Validate and email out invoice to customer
20. Receive payment from customer and indicate in

Monday, August 23, 2010

Do u think you are really secured ? part 1

Hai people. This time am going little geeky. Nothing but useful materials. I used to spend a lot of time investigating on these stuffs. Just for the sake interest..okay. Lets cut the bate.

Hotspots are very popular and widely available in all places. And most of us do make use of it while we are on move. And no one is really concerned about the potential vulnerability of these facilities. Ofcourse its very convinient and handy to make use of internet access from each and every nuke and corner of the world. But do u think that you are secured your datas and passwords all never been gonna loose.? If your answer is yes please read on. U might wanna reconsider your answer.

What is wifi?

def: A Wireless Local Area Network (WLAN) links two or more devices using some wireless distribution method (typically spread-spectrum or OFDM radio), and usually providing a connection through an access point to the wider internet. This gives users the mobility to move around within a local coverage area and still be connected to the network.

 blah blah blah...cut it.

This Wireless Distribution System is a system that enables the wireless interconnection of access points in an IEEE 802.11 network. Which is nothing but the so called protocol. For noobs : a set of rules and regulations or standards.

Here plays 2 cases. case 1: Most of the hotspots are open and does not use any encryption standards and keys to secure its authentication. Case 2: on the other side if it is a secrued it will have to use a encryption standard and key, which is probably not applicable in the case of hotspots. That means in both cases the data is transmitted through air. But in the open hotspots any one can capture these radio signals and read it. In the second case, even though anyone can capture it. They wont be able to read this without encryption key.

Now let me introduce an Application that has been used as a tools for professionals who deal with the deployment, maintenance, and security of WLANs.WireShark is free software that sniffs packets on wireless networks. Learn tips on configuring and using this tool when analyzing and troubleshooting 802.11 wireless networks. - Its the defenition given by the developers. Wireshark, a powerful wireless packet sniffer, network monitor, and protocol analyzer designed for WLAN administrators, security professionals, network programmers. Its a wonderful tool if we look at the good side. And ofcourse who cares.. "hot sushi" for like minded people ;)

Fortunately,Wireshark has sophisticated wireless protocol analysis support to help administrators troubleshoot wireless networks.With the appropriate driver support, Wireshark can capture traffic “from the air” and decode it into a format that helps administrators track down issues that are causing poor performance, intermittent connectivity, and other common problems. Possibly there is always a big chance to replace the term administrator by some one else. Remember this is a free tool. Any one can use it.

Using Wireshark’s display filtering and protocol decoders, you can easily sift through large amounts of wireless traffic to identify security vulnerabilities in the wireless network, including weak encryption or authentication mechanisms, and information disclosure risks. Yes, your commonly using email services like Gmail, yahoo, hotmail etc uses standard encryption and tranfer methods like GET and POST. You what what i mean by standard? "its already defined" every one knows it..

Let me give an over all idea how to do it.

1. Identifying open channel and selecting one.

Today most AP uses multiple channels. Even if two wireless users are sitting side-by-side, their computers may be operating on different wireless channels. If the attacke aim a particular user. he have to find which channel the victim is using. BIG TASK :) but not necesserly for random trap.

2. Set the filers up .

This is a techinque that is dont to reduce the junk of data that is being trapped while sniffing. The attacker can filter whathe need ny making using a varity of paramaters like Protocol, Port address, IP , mac etc.

3. Start snifing :)

The packet capture will display the details of each packet as they were transmitted over the wireless LAN. This is a screenshot of a sample packet capture window. The top panel of the window identifies each packet’s source and destination nodes, protocol implemented, and information about each packet. You can select a specific packet to display more details. The one selected in Figure 1, packet 3, is an 802.11 beacon frame. The middle panel displays information about this packet, and you can choose a specific field of the packet (such as Duration field shown in the figure), and the contents of that field are displayed in hex and ASCII format in the bottom panel. As a result, you’re able to analyze the flow and view each field (including data field payloads) of all packets.

In short with the help of HTTP filter in wireshark can capture any web data that is being transmitted over air. :) including your username and password, credit card numbers, etc. :P

Saturday, August 14, 2010

The 10 things...

Alright another Tag.. from my sweet blogger friend :) Lopa ..

Um.. Its really about somethings that i can't pretend. ok I'll post th eriles first the lets go for what i think..

Rules of Tagging:

  • Tell your readers 10 things about yourself that they may or may not know, but are true.
  • Tag 10 people with the award, and be sure to let them know they’ve been tagged (a quick comment on their blog will do).
  • Link back to the blogger who tagged you.
10 things huh .. sound easy. Let me give t a try..

As a small briefing i tell u .. i dont like to tell about my self. i feel like little awkward. I would dare to ask a girl her number or for a date or for movie on the first meeting itself. but this is little weird. ok starting.. lets keep it  short and cute.

1. first one let me make it simple in one sentence . i am Noobcake, pretentious & 'hot blooded',  used to try to fill in a minimal sketch of the playing field before delving into concepts and i follow the ethics with basic rules that generally dont fall into the category of so called 'assholes' & 'vanilla buffers'

2. dont care about style.. :)  .. like casual jeans with less tearing and holes.

3. I like dancing .. Argentinan tango, Hip hops, rumba..  but dont know any one of these.

4. I love football, i mean soccer ..I love it. i love it, i love it ..  i love this game so much that even 'girls' comes  after it, in my list of interests. and i am better in dancing with the football in ground . :D

5. I can cook :) i like cooking.. :P  *secret ..  Dont tell my friends for this reason they will eat me for one month.*

6. Camera (moble) is one f the weakness i used carry in my pocket. First thing that come into my mind if i ever see a beautiful or interesting stuff.. "Click it bro ... click it".

7. Changes are the one (some) thing that i like very much.

8. I really dont want to be the one who battles all the truth. I am sure about the power of the almighty and never want to mess up with him, his people and his likings. I dont know whats worth fighting... whats worth crying .. whats worth screaming.. whats worth shouting.. whats worth my head weight.. whats worth my time.. whats worth my money.. whats worth my health... whats worth my deeds.. what worth my do's and dont,s. Inside real life i am confused. All i need is to make my self sure that i believe in god. Yes i believe in him and i have a thousand reason for it.

9. i love my dad and mom and my brothers. but i dont know how to express it. :(

10. i'm single :)   pheeeeeeew ha ha ha..:D  lol i cant find any other best that suits here,

and here my award

ok lets get to the Give away.. mm i dont know how many of them likes tags.

1. Raaji
2. PP
3. Nasra
4. Hasna Fathima
5 Tanvi
6. Aruna
7. Anu

Wednesday, July 21, 2010

Tech Support jokes

Technical support. The toughest job in the world. It is said that the tension and stress that these tech support suffering during their job is 7 times to that of the pilot handling a Boeing 707. In fact its a 90 %  true. One of my friend is working in major concern in south India. They have Punching kits, Boxing kit, Shouting room, and smokers room... just to make their self relaxed. lol these funny stuffs are always fun to read. I'm in the mood for a good laugh. How 'bout you? :D

Customer: Hi, this is Celine. I can't get my diskette out.
Tech support: Have you tried pushing the Button?
Customer: Yes, sure, it's really stuck.
Tech support: That doesn't sound good; I'll make a note.
Customer: No, wait a minute… I hadn't inserted it yet… it's still on my desk… Sorry….

Tech support: What kind of computer do you have?
Female customer: A white one…
Tech support: Click on the 'my computer' icon on to the left of the screen.
Customer: Your left or my left?

Tech support: Good day. How may I help you?
Male customer: Hello… I can't print.
Tech support: Would you click on "start" for me and…
Customer: Listen pal; don't start getting technical on me! I'm not Bill Gates.

Customer: Hi, good afternoon, this is Martha, I can't print. Every time I try, it says 'Can't find printer'. I've even lifted the printer and placed it in front of the monitor, but the computer still says he can't find it…

Customer: I have problems printing in red…
Tech support: Do you have a color printer?
Customer: Aaaah………………..thank you.

Tech support: What's on your monitor now, ma'am?
Customer: A teddy bear my boyfriend bought for me at the 7-11.

Customer: My keyboard is not working anymore.
Tech support: Are you sure it's plugged into the computer?
Customer: No. I can't get behind the computer.
Tech support: Pick up your keyboard and walk 10 paces back
Customer: OK
Tech support: Did the keyboard come with you?
Customer: Yes
Tech support: That means the keyboard is not plugged in. Is there another keyboard?
Customer: Yes, there's another one here. Ah…that one does work…

Tech support: Your password is the small letter "a" as in apple, a capital letter V as in Victor, the number 7.
Customer: Is that 7 in capital letters?

Customer: I can't get on the Internet.
Tech support: Are you sure you used the right password?
Customer: Yes, I'm sure. I saw my colleague do it.
Tech support: Can you tell me what the password was?
Customer: Five stars.

Tech support: What anti-virus program do you use?
Customer: Netscape.
Tech support: That's not an anti-virus program.
Customer : Oh, sorry…Internet Explorer.

Customer: I have a huge problem. A friend has placed a screen saver on my computer, but every time I move the mouse, it disappears.

Tech support: How may I help you?
Customer: I'm writing my first e-mail.
Tech support: OK, and what seems to be the problem?
Customer: Well, I have the letter 'a' in the address, but how do I get the circle around it?

A woman customer called the Canon help desk with a problem with her printer.
Tech support: Are you running it under windows?
Customer: "No, my desk is next to the door, but that is a good point. The man sitting in the cubicle next to me is under a window, and his printer is working fine."

And last but not least…
Tech support: "Okay Bob, let's press the control and escape keys at the same time. That brings up a task list in the middle of the screen. Now type the letter "P" to bring up the Program Manager"
Customer: I don't have a P.
Tech support: On your keyboard, Bob.
Customer: What do you mean?
Tech support: "P"…..on your keyboard, Bob.

Saturday, July 10, 2010

Having a summer in Desert

Hi guys and gals... just got into some pleasure trip, to nowhere but in middle of a desert. Its 48 digree outside. Dusty and freezing hot. Yes, exactly in middle of desert. This is the first time am travelling alone in an international flight. Everthing went easy, and especially one of the staff in imigration dept was so cute and soo cool ;). I think she had an eye on me. She was blusing when i asked some doubts. I dont know why.. may be because i acted a little stupid asking stupid question at a stupid time.. or may be :D.. lol *cut*  *cut*..  I should have asked her number :P

This is the second time am in middle east. I was here in UAE with my parents when i was a kid. And i have only few snaps in my memory about it. I could recollect some of those soon i landed here. I am now exactly in Sanaya, Doha. 20 km from Doha international airport. Its an industrial area, were lots and lots of indutrial building spread over kilometers. Its too hot in mid day and not so cool in night. Today i visted a near by mosque for prayer. I just purchased a new sim card, for my mobile phone. and i have to say, when its comaperd to india, here local calls goes around  rupees 5  per minute and 10 rupees for ISD, where in india its too cheap like 50 paise for local call and 7 rupees for international calls.

But rust of the things like startionaries, choclates etc here its very cheap. and the most cheapest thing here is ofcourse, Petrol and Electricity.. :) And in india its going like i hike..

Monday, July 5, 2010

Time to change .. !

Dont u think its little wired to say that i am changing my bloggy's page.. Yeah i think so. By the way am not an utter pessimist to through up my idea all over internet and get noticed by people and media. (I wish though... :( ) .. hell what ever happens here ..nobody in my area or in my place gonna get a clue what i'm doing in my blog. No chance .. No even a single chance. So i'm gonna rip rap and I am gonna copy codes from different templates and gonna create a massacre template here. (wow sounds great !!!)

I mean really some hard core re-engineering, like what we say. There is a famous quote used very often in software industry. "If the feets dont fit in the shoe. Cut the fingers" Thats what am goin do here.

And any way i googled around to look for some thing that i can start with and found this ugly-dugly templete.. I am gonna do little coding.. brush ups, photoshoping and make ups. Hope the real owners wont find me out :D .You know even though this IT rules and acts are pretty good to protect our products, i really hate that.  actually am an openhearted open-sourse enthusiast and i appreciate the concept of technology for all. Like once, when i explained about the term and conditions regarding copyright and copy-protection to and old friend (i mean aged senior citizen) of mine,  he said " technology is nobodies in-laws property, u just do what u want". ( I like that term - in-laws property).

OK after a few research i found its so simple. All we need is html, xml, and css. And of-course some good images.  But i'm not sure about the API that we use like widgets. Well i'll dig into that later. Let me finish the frame work first. and i really have a thing, a feeling towards the white templates. Its kinda cool. and am thinking of video blogging too along with this. And twitter too . anything else?

and oooo, i forgot, Y dont u guys pls put some ideas to work out. :)

Thursday, June 24, 2010

Chat mapping .. how i wasted my time.

I found this in a chat log file..

Chat with a geek studying in UK...

1:23 PM me: hi u there?
1:24 PM he: busy...... catch u later...... take care/.
 me: 1 sec..
 he: k
 me: check whether its is getting or not.
1:25 PM he: yes.
 me: thx

Chat with a like minded dude.. in calicut

1:03 PM ####R: da
 me: yes
 ####Ra: now u can register domain name space thrg our web too
1:04 PM me: i just got unlimited storage and unlimited BD and unlimited subdomains and unlimited email :D
  from hostgator
  american server.
1:05 PM ####Ra: ok how much u pay 4 tht
 me: i dont knw.. company registered.
 ####Ra: oookkk
1:06 PM now u can purchase domain name n webhosting online frm our web
 me: ok ok reseller .. ryt?
 ####Ra: yeah

12 minutes
1:19 PM me: da u there?

37 minutes
1:56 PM ####Ra: Yes da.. what da?
2:00 PM me:
  pls check
  u getting
2:01 PM ####Ra: s
 me: ok i min, try this one also
  username test
  password 123456
2:02 PM ####Ra: sorry
  cnt login
 me: try again... oncemore
2:04 PM da try again
2:07 PM username : test
  password : kottakkal
2:08 PM try this
 ####Ra: not working
2:09 PM me: whats the error message?
 ####Ra: invalid login
2:12 PM me: once again
  test kottakkal
2:13 PM hello
 ####Ra: sss
  not working
  not getting

30 minutes
2:44 PM ####Ra: how is it going???
2:46 PM me:
  username abdulla
  password 123456
2:48 PM ####Ra: ok now ok
 me: good
  did u changed password?
 ####Ra: no
  wanna change?
 me: change it to kottakkal
 ####Ra: ok
2:49 PM k done
 me: try logoff and login again.
2:50 PM is it woring fine?
 ####Ra: not working yaar
2:52 PM okk
 me: change password to kottakkal
2:53 PM try logout and login again.
 ####Ra: k
2:54 PM me: now????
2:55 PM ok?
 ####Ra: no
  reset it
2:56 PM me: ok
  ok reset.
2:57 PM whats the error mesage?
 ####Ra: same
 me: password : 123456
 ####Ra: ok wait .. ooo i got it.. i understood nw
2:59 PM ok now.... ok
 me: voice?
 ####Ra: but u must use alphanumerical code
3:00 PM abcd1234
 me: this is the current password
 ####Ra: yes.. did u mean what .. yes it think so.. let me chk again.. wait ####Ra: ooo sorry da..its :P ####Ra: :0) ok its working :D hi hi hi thanks..  Lol look at the time on left side  Chat with a classmate girl..

9:32 PM TS: hello
  Whats happening.. no mind at all..
 me: hi
  I was talking with K on phone...
9:33 PM TS: What did he tell?
 me: He was just talking the stuffs from .. he will get permenent only after he pass his assesments etc.
9:34 PM TS: what assessment..
  He stated there?
 me: yes assesmen .. u know... .......TS: why is it its because ... blah bahTS: when.....blah blahme: i dont know may be ... blah bah...................................
10:52 PM kk then bye
10:54 PM me:ok thn.. see u tmrw

Its messy out there

I lost my cell phone.. Nokia E61i. He just passed away, with out saying a word. I tried to admit him my nearest service center... but the technicians said.. "If have any one to inform, may be its the right time." I was pretty sure that he wont wake up after he fell from my shirt pocket at a one floor height. Well i tried my best. He was a good friend of mine..for 2 years. I can still remember those days we spent sniffing down wifi spots in bangalore and cochin. He used to keep all my secrets, even my password of 3 bank accounts ATM card, a lot of contacts, all sweet sms that i dont want to delete, all those girls numbers in fake names, All nimbuzz chat friends, Twitter updates, cute little opera mini... Those amazing office tools with him helped me a lot to prepare presentations and notes. He also used to keep my favorite songs and ...

I miss u my friend. But those pictures u took will remain with me and our lappy, as a token of our friendship. oh i forgot I am using ur head phone now with our lappy now. Lappy and our bluetooth miss u so much. see u dude..

I year after graduation. I still dont have my certificate in my have. I am so glad about it. at least i can find an excuse for staying home. Now everything is messy.. i think i have lost my control on the time table that i used to follow. Its seems like this freedom is something what i wanted. No office.. only some freelance Project works and football and rain... sleeping till 10 o'clock, nothing to study, no home work, no hard feeling, no girl friends .. wow. this is nice.
I think i might have lost some of my friends in this blogger world, because i have been sooooooo lazy for these days for posting some stupid stuffs.

Tuesday, June 8, 2010

World Cup special..

Finally the England squad has been announced. Here it is.

Robert Green, Joe Hart, David James
Jamie Carragher, Ashley Cole, Rio Ferdinand, Glen Johnson, Ledley King, John Terry, Matthew Upson, Stephen Warnock
Gareth Barry, Michael Carrick, Joe Cole, Steven Gerrard, Frank Lampard, Aaron Lennon, James Milner, Shaun Wright-Phillips
Peter Crouch, Jermain Defoe, Emile Heskey, Wayne Rooney

Which means that Theo Walcott, Darren Bent, Adam Johnson, Scott Parker, Michael Dawson, Leighton Baines and Tom Huddlestone will not be on the plane to South Africa.

forget about those unselected...i'd like to see how England tackle their opponents from the very first start. I could not afford to see England fail again this time.. I hope England can make it, at least to the semi finals. I'm a loyal England fan ever since a kid, just because of Beckham. lets make it this time. Heskey this is your last chance please do whatever you can. Please dont screw up with these good players. Use them wisely. Rooney please mature no looking for trouble, save the energy for some blast kicks, not on the face of opponents. remember Beckam were shown the red card before .hard to believe sometimes, Walcott should learn from this. Any way he got plenty of time. Let the mature guys deal the deal. Lennon could be seen as the best with his speed.go Tigers go we support you from India. Rooney ... we wanna see what u r dong for ManU. Dont scrw this world cup. Good luck guys.

Monday, May 3, 2010

Prisoners' v/s Employees...!!!! a forward mail.

Prisoners' v/s Employees...!!!!

you spend the majority of your time in an 8'X10' cell . you spend most of your time in a 6'X8' cubicle ....

you get three meals a day (free). you only get a break for one meal and probably have to pay for it yourself .
you get time off for good behavior. you get rewarded for good behavior with more WORK.

a guard locks and unlocks the doors for you .. you must carry around a security card and unlock open all the doors yourself .

you can watch TV and play games. you get fired for watching TV and playing games.

they allow your family and
friends to visit.

you can not even speak to your family and friends.
all expenses are paid by taxpayers with no work at all. You get to pay all the expenses to go to work and then they deduct taxes from your salary to pay for the prisoners.    

Which Sounds Better?

So what are you waiting for.........

Kill your Boss

You might like this.

Related Posts Plugin for WordPress, Blogger...

My Blog List