Wednesday, 5 February 2014

Been a while...

I haven't posted in a while, i've been kinder busy with college and everything. However, i'm all settled in now, and you should see some more good stuff soon. I have a load of new things to be talking about so make sure you follow the blog to keep up to date. I have loads of useful software for you guys to take a looksie at. Anyway, for a quick peek take a look at Rainmeter. A brilliant free desktop application which allows you too have loads of awesome cool widget type things floating around. Look at my set-up:

(i can make all the things here into a pack for you by request - including all plugins, saved layouts, and the wallpaper)
My Rainmeter


So remember to follow to blog and keep posted for some more awesome information; and remember - Sharing is Caring.


Get it here:
http://adf.ly/pZJpp

Sunday, 5 May 2013

ROFLMAO

Computers, phones and many other devices withhold the ability to contact each other; Life is short, so you have to make things quick. We don't have time to sit down and type long essays to just send a simple messages to each other. This is why acronyms have become so popular and are used all over the world and everywhere! Here are some common ones you might have seen:

LOL - Laugh Out Loud ( LoL - Means League of Legends, a role play, fantasy thingy game.)

FML - F*** My Life

G2G - Got too go

BTW - By The Way

OMG - Oh My God

LMAO - Laughing My Ass Off

WTF - What The F***

ROFLMAO - Rolling On the floor laughing my ass off

GUI - Graphical User Interface

VPN - Virtual Private Network

IDK - I don't know

IDC - I don't care

LAN - Local Area Network

WLAN - Wireless LAN
A Personal Favourite
OMGLMAOROTFPMPHTB - Oh My God Laughing My Ass Off Rolling On The Floor Peeing My Pants Having Trouble Breathing.
Acronyms

They are just some simple ones to know there are many, many more. If you want a good resource for finding out what something means, go check out 'Urban Dictionary'. Some other useful tips for not being misunderstood:

keke - This is the same as hehe or haha, used to simulate the laughter of a person via text. This is usually more popular in Asian chatrooms or IRC channels.

555555 - If you see this repeated multiple times, take caution. When talking to someone from thailand '555' simulates laughter as the character for this was replaced with the 5. However, chinese girls will use '555' to denote 'sobbing' or 'to cry' this is because the chinese word for 5 is wu, so repeated = wuwuwuwuwu, which sounds like crying.

Anything i haven't covered here? :O smileys1! Check back soon for a post on emoticons.


Friday, 12 April 2013

P2P - File Sharing

Sharing is Caring, that's why P2P (Peer-to-Peer) is the largest contributor to all internet traffic.. Everyone makes wonderful things that we just want to share, so everyone else can each have a little enjoyment. Now, recently there has been a lot of stink on file sharing. Big issues with copyright infringement, some even say it is theft. Now down below you will find a post all about that, but this is about sharing. So this is how to download, almost everything and anything.



So first you will need a Torrent client, something like:

Bittorrent

UTorrent

BitComet

Then once you got one of them, you can download any torrents from these sites:

Torrentz

IsoHunt

Aha Share

1337x

KAT (Kickass torrents new/old domain)

Once you find a decent file on one of those sites, you can either click the magnet link or just download the torrent file, then open it with your client. Now you have access to whatever you want. However, scan all files that you download as some can be malicious.



Tips:


  1. If it sounds too good to be true, it probably is.
  2. If you want a film or game that isn't out yet you have no chance, you will spend hours downloading a locked .zip file.
  3. Don't be afraid to shop around a little, see if there are better torrents on the other sites.
  4. Go for the torrents with higher seeds. High number of leechers can also slow you down.
  5. Once you have got your file, seed for a while to let others download. (Keep the torrent alive.)

Tuesday, 9 April 2013

DANGER!

SQL Injection, phishing, trojan horses and social engineering are all techniques to gain unortharised access to a network, computer or even commit identity theft. Ultimately there is no real way to completely protect your personal and sensitive information. However, there is ways to make is increasingly difficult for today's Black Hats. There are a bunch of freeware tools that can protect you to a certain extent. These tools include:

Free Proxys/VPNs (To mask your IP)



Free Anti-Virus



BackTrack - A very powerful tool for 'Security Testing'
L0L H4X0R BLU3 H4T5


The first thing that you need to do when protecting yourself is to create strong passwords. Never use anything like these:
  1. password
  2. 123456
  3. 12345678
  4. qwerty
  5. abc123
  6. monkey
  7. 1234567
  8. letmein
  9. trustno1
  10. dragon
  11. baseball
  12. 111111
  13. iloveyou
  14. master
  15. sunshine
Another tip for creating strong passwords is that you should never use your name, birthday or nickname. The most popular methods for cracking passwords involve try all those combinations and eventually if a neaophyte is desperate, brute force will be use. No matter how useless and slow and terrible it is it may still be used. So the best way to protect yourself i hear you say ? Have a password that is miss-spelled. As all the words in the dictionary will be used for your password, if you use a miss spelling, if will not be picked out.

Stranger Danger. I know this may seem a little stupid, but it is very important.Meeting new people and making new friends can be a wonderful experience. Although, not everyone just wants to be your bff. The simple and most effective way to access personal information is to ask for it. By becoming friends hackers have unlimited access to anything they want to know. With this in mind, stay away from sites like Omegle as they can be disturbing... and dangerous. Also if you're female, and under the age of 18 get off the internet right now, just run, please. On the other hand, they don't even need to ask... 
      Think right know how many social networking sites you are on ? How many accounts you have with different sites. Oh thats fine i hear you think, only facebook you say ? Well you better watch out, your settings by default share way too much information that is deemed safe. Social networking sites can now be used to even simulate your character and personality just by scanning your comments, likes and photos. They make identity theft way too easy.

Identity Theft - An increasingly common issue.


Don't worry, it's not too late. You can adjust who sees what on most sites which contain your personal information, if you can't hide it, or if it's not needed, don't put it on your profile. On Facebook for example change all privacy settings to only me, or close friends. Do you really want everyone to know your mobile number or email address? Your house address or post code? Where you are now and where you will be in 15 minutes? Most people have all this information on show, so change it now before you are a target. If you want someone to have your mobile number or if you want someone to have your email, message them. Tell only them, not the other one thousand people you have on your friends list, any of which could be after your accounts.

Ok so now you have hidden your sensitive data, am i safe now ? The answer is no, you will never be 100% safe. That's why you should never fully think you are protected. Always be on your guard. Another way to make sure you stay safe though is to disable cookies. WiFi passwords are easy to crack so getting into your network is no problem, giving the Black Hat is in your proximity. With that they can Inject a bad cookie into your browser and get all of your passwords. Sound bad doesn't it, so disable cookies, and try not to use WiFi. Just use a Ethernet cable running straight from your rooter.

Overall, try your best to keep safe. At the end of the day you are one of many. Unless you piss off an elite hacker, don't worry about being hacked or your identity stolen. Just try your best at protecting yourself, and you will be fine.

Downloading Videos/Flash Animations Without Third Party Software

There are many awesome and cool things on the internet, most of which you will just browse over and never see again, or you can never find again. If you come across a site which does not give you the option to download. Never fear. All you need is to be using Google Chrome, a free web browser provided by Google. You can download that Here.

So how to download what ever you want:

  1. While on the site, go ahead and press F12.
  2. Click on the tab that reads [ Network ] 
  3. Reload the page and look for the 'thing' you want. If this is a flash game it would end with .swf or if it's a movie look for a .flv
  4. Now right click and open in new tab. All you have to do is - save link as.
  5. You can now go and download anything you want !
For downloading YouTube videos just replace www. with ss for example.

https://www.youtube.com/watch?v=uuqzaf9dma0

Turns into
ssyoutube.com/watch?v=uuqzaf9dma0

You will be redirected and then in a few seconds an option to download will appear.
Download Anything



Monday, 8 April 2013

Denial-of-service attack's and 'Hacktivism'

In today's world the internet is now increasingly important, and so are computers. However, the endless lists of benefits from keeping in touch to controlling the right conditions for life can be challenged by the threats of e-safety.



4% percent of all internet traffic is DoS packets. DoS attacks are getting more popular with wannabe hackers so to speak. These attacks are attempts to make a network unavailable for its intended use. Targets and motives of these DoS attacks may vary but the majority of the time they aim to suspend access to the internet or networks.
     DoS'ing requires no knowledge of networking or how anything works (Hence the phrase, monkey with a rocket launcher), as many pieces of software have been made to make this process much more simple. For example:

Low Orbit Ion Cannon

iDisconnect

ServerDeath
 I am not responsible for the use of these tools, DoS'ing is illegal.

A DoS attack is not very effective against large networks. This is where a DDoS attack is more likely to take place. A DDoS is a Distributed-Denial-of-service attack. These are when multiple computers take place in an attack at the same time, in some cases they can transfer up to and over 150GB of data at any one time. The most popular choice to organize a DDoS attack is by convincing a bunch of people to take place in a DoS attack at the same time, an example of this... The infamous Anonymous.
     Anonymous is 'Hacktavist' group who represent freedom and are anti-censorship. They also believe that people have the right to know all the dirty secrets of the higher ups. They aim to take down anyone in their path and humiliate all that goes against their views. Anonymous consist of normal people who take it into their own responsibility to do right. The vigilante that choose to represent Anonymous do it in all kinds of ways from protests and riots to DDoS attacks. Anonymous would convince all of its 'Members' to take part in these things instead of using a botnet,
     A Botnet comes from the words 'Robot' and 'Network' a person would take control of a group of computers and then using them they would DDoS a server/computer.

Saturday, 6 April 2013

Ever seen &|amp|; somewhere online?

The & sign is called the ampersand (that's why the 'amp' part).
& in HTML means "Start of Character Reference" so the word following the & sign would refer to a character. The reason for you to see (&amp;) is due to an error in the website or on your browser, as the code is telling your browser to replace &amp; < with an ampersand.
Same thing applies &trade; (™).