Thursday, December 12, 2013

HOW TO TRACE ANY IP ADDRESS AND LOCATION

So, in this post I will show you how to trace any IP address back to it’s source.

In fact, tracing an IP address back to it’s location is a lot simpler than what many people imagine. There exists many online tools using which you can accomplish this job. One of my favorite site is IP2Location.com.
Just go to http://www.ip2location.com and enter the IP address that you want to trace in the dialog box and click on “Find Location”‘. With just a click of a button you can find the following information for any given IP address:

* Country in which the IP is located
* City to which the IP address belongs to
* Latitude/Longitude of the IP’s location
* Zip Code of the region to which the IP belongs to
* Time Zone associated with the IP
* Name of the ISP to which the IP address belong to
* Internet Speed of the computer associated with the IP
* Weather Station associated with the region of the IP
* Domain name associated with the IP address

A sample snapshot of the results from ip2location.com is given below:



You can also visually trace route any IP address back to it’s location. For this, just visit http://www.yougetsignal.com and enter the IP you want to trace in the dialog box and hit the “Proxy Trace” button. Wait for few seconds and the visual trace route tool displays the path Internet packets traverse to reach a specified destination. Hope this helps. Please pass you comments.

How to Become an Ethical Hacker?

What is Ethical Hacking or Ethical Hacker?
Ethical Hacking, also known as Penetration testing, is the process of vulnerability testing or hacking the system with a permission from corresponding vendor. Normally, organization who are in the need of security recruits Ethical Hacker or PenTester for improving their security.

Ok, let us come to the article below.


How to Become an Ethical Hacker?

                                                         ethical hacker



1- Dedication :
Dedication is the main key to become an ethical hacker. Don't plan to become pentester because of money. If you really have interest, then go ahead.

2- Reading :
Be a bookworm. Try to read books related to computer and its architecture. Buy books related to Security and Ethical hacking.

3- Should Know how hackers hack into: 
You can not solve the problem until you know what is behind the problem. So you have to learn method of hackers. How ??! Just read the articles provided in our site.

4- Programming and Scripting: 
Learn Some programming or scripting languages because most of time you will need to write a code to break into a system. Also, you have to know the coding for understanding how a system works,then only you can penetrate into. Ok, which language?! My suggestion is C. I Love C programming. It is one of best,powerful language and easy to learn. Some peoples prefer python. As far as i am concerned, once you learned one language, it is easy for you to learn any other languages. There are are plenty of online programming tutorial sites are out there.

5- Linux: Ok, it is time to switch from Windows to Linux. Learn to work with Linux.

6- BackTrack Linux Distribution:
Backtrack Linux is one of the famous Penetration Testing Linux distribution. This backtrack is funded byOffensive Security. It has almost all penetration testing tools required for security professionals.

7- Get Certification for Ethical Hackers:
 Some organization recruits based on security certification. You can learn and get ethical certification from your nearest center. Search in google for these keywords "CEH","OSCP","security certifications". Anyway, if you have dedication and confidence, you don't need a certificate and get into a firm easily.

8- Th3Hacker:  I will written plenty of articles related to Ethical hacking and penetration testing. Hope it will help you to get some knowledge. Also, you can find the latest ethical hacking techniques here. 

9- Forums: Participate in any Security or ethical Hacking related forums.
 
10- Need help? feel free to contact me

Opportunities for Ethical Hacker
There are plenty of jobs available in government organisations, banks, financial institutions, military establishments and private companies. AL requires more Ethical Hackers.

Instroduction to Computer Hacking

WHAT IS HACKING?

Hacking is the process of taking advantages of weakness in a computer or computer network to accomplish his goal. The person who is engaging in hacking activities called as 'Hacker
'. Hackers may be motivated by a multiple reasons, such as profit, protest, challenge or just for fun.


                                                         computer hacking




CrackersOne who breaks security on a system. Coined ca. 1985 by hackers
in defense against journalistic misuse of hacker (q.v., sense 8). An
earlier attempt to establish ‘worm’ in this sense around 1981–82
on Usenet was largely a failure.

Use of both these neologisms reflects a strong revulsion against
the theft and vandalism perpetrated by cracking rings. While it is
expected that any real hacker will have done some playful cracking
and knows many of the basic techniques, anyone past larval stage
is expected to have outgrown the desire to do so except for immediate,
benign, practical reasons (for example, if it’s necessary to get
around some security in order to get some work done).
Thus, there is far less overlap between hackerdom and crackerdom
than the mundane reader misled by sensationalistic journalism
might expect. Crackers tend to gather in small, tight-knit,
very secretive groups that have little overlap with the huge, open
poly-culture this lexicon describes; though crackers often like to
describe themselves as hackers, most true hackers consider them a
separate and lower form of life.

It’s clear that the term cracker is absolutely meant to be derogatory. One
shouldn’t take the tone too seriously though, as The Jargon File is done with a
sense of humor, and the above is said with a smile. As we can see from the
above, illegal or perhaps immoral activity is viewed with disdain by the “true
hackers,” whomever they may be. It also makes reference to cracker being a
possible intermediate step to hacker, perhaps something to be overcome.


Script Kiddie

The term script kiddie has come into vogue in recent years. The term refers to
crackers who use scripts and programs written by others to perform their intrusions.
If one is labeled a “script kiddie,” then he or she is assumed to be incapable
of producing his or her own tools and exploits, and lacks proper
understanding of exactly how the tools he or she uses work. As will be apparent
by the end of this chapter, skill and knowledge (and secondarily, ethics) are the
essential ingredients to achieving status in the minds of hackers. By definition,
a script kiddie has no skills, no knowledge, and no ethics.


Phreak
A phreak is a hacker variant, or rather, a specific species of hacker. Phreak is
short for phone phreak (freak spelled with a ph, like phone is). Phreaks are
hackers with an interest in telephones and telephone systems. Naturally, there
has been at times a tremendous amount of overlap between traditional hacker
roles and phreaks.


White Hat/Black Hat/Gray Hat
White Hat Hacker:
White Hat hackers are good guys who does the hacking for defensing. They probably work an organization for providing security.


Black Hat Hacker
Black hat hackers are bad guys(the malicious hackers or crackers). They usually steal the other bank information and steal the money.
They use their skills for illegal purposes.
They are creators of viruses,malware,spyware.
They will destroy your pc.


Gray Hat Hackers
Grey hats are hackers who may work offensively or defensively, depending on the situation.
This is the dividing line between hacker and cracker. Both are powerful forces on the Internet,
and both will remain permanently. And some individuals qualify for both categories. The
existence of such individuals further clouds the division between these two groups of people.
In addition to these groups, there are self-proclaimed ethical hackers, who are interested in
hacker tools mostly from a curiosity standpoint. They may want to highlight security problems
in a system or educate victims so they secure their systems properly. These hackers are
doing their “victims” a favor. For instance, if a weakness is discovered in a service offered by
an investment bank, the hacker is doing the bank a favor by giving the bank a chance to rectify
the vulnerability.

NETWORK SECURITY HACKS, 2ND EDITION

In the fast-moving world of computers, things are always changing. Since the first edition of this strong-selling book appeared two years ago, network security techniques and tools have evolved rapidly to meet new and more sophisticated threats that pop up with alarming regularity. The second edition offers both new and thoroughly updated hacks for Linux, Windows, OpenBSD, and Mac OS X servers that not only enable readers to secure TCP/IP-based services, but helps them implement a good deal of clever host-based security techniques as well. This second edition of Network Security Hacks offers 125 concise and practical hacks, including more information for Windows administrators, hacks for wireless networking (such as setting up a captive portal and securing against rogue hotspots), and techniques to ensure privacy and anonymity, including ways to evade network traffic analysis, encrypt email and files, and protect against phishing attacks. System administrators looking for reliable answers will also find concise examples of applied encryption, intrusion detection, logging, trending and incident response. In fact, this “roll up your sleeves and get busy” security book features updated tips, tricks & techniques across the board to ensure that it provides the most current information for all of the major server software packages. These hacks are quick, clever, and devilishly effective.


DOWNLOAD LINK:           LINK 1

MICROSOFT ASKS FOR UBUNTU 8.10 REMOVAL FROM HOSTING SERVICE CLAIMING COPYRIGHT INFRINGEMENT

Microsoft has been made responsible for the removal of an Ubuntu image from a Polish file hosting service.


Most of the legit file hosting services try to discourage people from uploading illegal files, such as pirated Windows 8 images or games, but they rarely dispute the claims made by the parties involved.

This seems to be the case with the Polish file hosting website Chomikuj.pl, which received a copyright infringement letter from Microsoft regarding one of the files hosted on their servers, ubuntu-8.10-desktop-i386.iso.

According to di.com.pl, the hosting website immediately removed the files, leaving its owner wondering what he had done wrong.

Most likely, the files have been discovered by a search algorithm, which can look at several factors. The name, which in this case contains 8.10, might have been a trigger, which is also the most likely explanation.

On the other hand, it might have been an illegal copy of Windows 8.1 renamed to Ubuntu 8.10, and the search algorithm just looked at the size and hash sum.

In any case, it would be interesting to see how far these Microsoft infringement letters can go. Is everything with 8.10 in the name now in danger if it's hosted in the cloud?

Check out the Google translated link.

Sunday, December 8, 2013

Used memory sticks being sold online contains sensitive Government data


Selling an used memory sticks often pose an information security risk- We might be thinking that we completely erased the data from it, but it is possible to recover the files that are not properly deleted with the help of some tools.
A recent study found that "old memory sticks" being sold online contain sensitive Australian Government data.

The research paper which is to be presented at a cyber security conference in Perth reveals how researchers discovered the confidential Government data while they are researching the used memory sticks, The Australian news reports.

The study found that sellers are sending memory cards without properly erasing the data. The recovered data not only contains a personal info but also appears to be information belong to Australian government.

"It is evident that actions must be taken by second hand auction sites, and the media to raise awareness and educate end-users on how to dispose of data in an appropriate manner," the study says.

PRIVATE CLOUD COMPUTING: CONSOLIDATION, VIRTUALIZATION, AND SERVICE-ORIENTED INFRASTRUCTURE

Private cloud computing enables you to consolidate diverse enterprise systems into one that is cloud-based and can be accessed by end-users seamlessly, regardless of their location or changes in overall demand. Expert authors Steve Smoot and Nam K. Tan distill their years of networking experience to describe how to build enterprise networks to create a private cloud. With their techniques you'll create cost-saving designs and increase the flexibility of your enterprise, while maintaining the security and control of an internal network. Private Cloud Computing offers a complete cloud architecture for enterprise networking by synthesizing WAN optimization, next-generation data centers, and virtualization in a network-friendly way, tying them together into a complete solution that can be progressively migrated to as time and resources permit.


Describes next-generation data center architectures such as the virtual access-layer, the unified data center fabric and the "rack-and-roll" deployment model
Provides an overview of cloud security and cloud management from the server virtualization perspective
Presents real-world case studies, configuration and examples that allow you to easily apply practical know-how to your existing enterprise environment
Offers effective private cloud computing solutions to simplify the costly and problematic challenge of enterprise networking and branch server consolidation.

DOWNLOAD LINK:      LINK 1

Android Phone's Secret Codes to Check Details !

Hey friends see here some of the tricks on your Android Operating System/ android OS cellphone.
Please note: Some codes mentioned here can be dangerous.




*#*#4636#*#* - Phone / Battery / USage information
*#*#7780#*#* - factory data reset
*2767*3855# - factory format
*#*#34971539#*#* - information about phone camera
*#*#7594#*#* - End Call / Power
*#*#273283*255*663282*#*#* - File copy / backup
*#*#197328640#*#* - Service mode.

WLAN, GPS and Bluetooth Test Codes:

*#*#232339#*#* OR *#*#526#*#* OR *#*#528#*#* - WLAN test (Use "Menu" button to start various tests)
*#*#232338#*#* - Shows WiFi MAC address
*#*#1472365#*#* - GPS test
*#*#1575#*#* - Another GPS test
*#*#232331#*#* - Bluetooth test
*#*#232337#*# - Shows Bluetooth device address
*#*#8255#*#* - This code can be used to launch GTalk Service Monitor.

GET FIRMWARE VERSION INFORMATION:

*#*#4986*2650468#*#* - PDA, Phone, H/W, RFCallDate
*#*#1234#*#* - PDA and Phone
*#*#1111#*#* - FTA SW Version
*#*#2222#*#* - FTA HW Version
*#*#44336#*#* - PDA, Phone, CSC, Build Time, Changelist number

CODES TO LAUNCH VARIOUS FACTORY TESTS:

*#*#0283#*#* - Packet Loopback
*#*#0*#*#* - LCD test
*#*#0673#*#* OR *#*#0289#*#* - Melody test
*#*#0842#*#* - Device test (Vibration test and BackLight test)
*#*#2663#*#* - Touch screen version
*#*#2664#*#* - Touch screen test
*#*#0588#*#* - Proximity sensor test
*#*#3264#*#* - RAM version
Have fun with these secrets codes .....:)
Stay tune for next tutorial on Android OS rooting and Binding android and Ubuntu (Linux) Together

INSIDE CYBER WARFARE: MAPPING THE CYBER UNDERWORLD

The necessary handbook for the 21st century.

--Lewis Shepherd, Chief Tech Officer and Senior Fellow, Microsoft Institute for Advanced Technology in Governments

"A must-read for policy makers and leaders who need to understand the big-picture landscape of cyber war."

--Jim Stogdill, CTO, Mission Services Accenture

You may have heard about "cyber warfare" in the news, but do you really know what it is? This book provides fascinating and disturbing details on how nations, groups, and individuals throughout the world are using the Internet as an attack platform to gain military, political, and economic advantages over their adversaries. You'll learn how sophisticated hackers working on behalf of states or organized crime patiently play a high-stakes game that could target anyone, regardless of affiliation or nationality.

Inside Cyber Warfare goes beyond the headlines of attention-grabbing DDoS attacks and takes a deep look inside multiple cyber-conflicts that occurred from 2002 through summer 2009.

Learn how cyber attacks are waged in open conflicts, including recent hostilities between Russia and Georgia, and Israel and Palestine
Discover why Twitter, Facebook, LiveJournal, Vkontakte, and other sites on the social web are mined by the intelligence services of many nations
Read about China's commitment to penetrate the networks of its technologically superior adversaries as a matter of national survival
Find out why many attacks originate from servers in the United States, and who's responsible
Learn how hackers are "weaponizing" malware to attack vulnerabilities at the application level

DOWNLOAD LINK:    LINK 1

Get Free Credits for SMS Global (SMS SPOOFING) !



I will tell you a Trick How to increase Crack credits Of Sms Global,Worlds Best Sms spoofing Website

SO just follow these intructions & you will GEt 125 Free Credits.


1) For this go to a website which help you click here
Register yourself on SMSglobal but before register, The Trick lies Here: go to link for Sign Up

SMSglobal allow only 25 instant credits for free user means you only send 25 SMS but i will tell you a trick by which you will gain 125 credits means 125 free SMS for send globally. When you fill the registration foam,you see a blank space for PROMO CODE here you write the "WPRESS " like given below...



You only fill the:-

1: Username
2: Account type---> Personal
3: Complete Contact Information:: Please write right Mobile Number because Website send you password of the account.Do not add personal address.
4: Write Promo Code "WPRESS".Accept terms and condition and fill Verification Code.
You will get 125 free SMS for send Globally by any Number.

Thursday, December 5, 2013

How to Install Skype on Ubuntu Linux !

Many People feel unsecured while chatting on Skype in windows platform due to the FUD (Fully Undetectable Viruses) threat. Hence today in this tutorial i will tell you how you can run Skype in Linux Platform which is almost 98% secure from RAT and other malicious viruses.

Here we Have two methods of installing Skype in Ubuntu Linux

1. Through Ubuntu Software Center
2. Manual Method

Skype Through Ubuntu Software Center
For this just go to Ubuntu Software Center and in search type Skype , Ubuntu 11.10 Support Skype 2.0 Version for Linux. Click on install and in few minutes you are ready to use the Skype.

Installing Skype Through Manual MethodThis is the easiest method to install from the command line. There are three commands that you must use to install Skype correctly.

Open your terminal and copy paste this commands 

sudo apt-get install libqt4-gui
wget -c -O /tmp/skype.deb http://www.skype.com/go/getskype-linux-ubuntu

sudo dpkg -i /tmp/skype.deb



Now you can see the Skype on your menu bar and you are ready to use Skype no need to worry about RAT and other trojan.

Google to Businesses: Don't Use Google+ (Yet) !

Twitter isn't just about tweeting what you had for lunch, and there's more to Facebook than 'poking' your friends and growing your farm. If you're a business owner, social networking is a great tool for promoting your brand, and at some point, Google+ will join the fray. For the time being, however, Google is asking businesses, universities, and other organizations not to bother with its social networking service.
"Right now we're very much focused on optimizing for the consumer experience, but we have a great team of engineers building a similarly optimized business experience for Google+," Christian Oestlien, product manager for Google+, said in a YouTube video. "We are very excited about it and we hope to roll it out later this year."
Oestlien said the business version will include things like rich analytics and the ability to connect a business profile to other parts of Google, such as AdWords.
"We will be doing some testing," Oestlien said. "We're going to take a small group of brands, businesses, and other entities and create profiles for them and see how users interact with them via circles, through the stream, and even how they communicate through hangouts."
In the meantime, Oestlien asked businesses to refrain from creating consumer accounts, warning that Google+'s policy team will actively work with profile owners to shut down non-user profiles.

How to Improve Your System's Overall Speed | Amit Khajuria





I knw you all are very good in computers but why i am writing this post is because, what i found is when every i got any pc of a B.Tech student(BookWorm Especially) or a Business Man. The worst thing i found is that their systems are full of unwanted software and adding charm on that they have not formatted computer from last 3 or 4 years. That means from the day of purchasing a new laptop they are using the same windows from last 3 years.


And at last they will say in Hindi ( Yaar dekhna iski speed badi slow ho gyi hai, In my heart i reply :- Abey speed to kam hogi hi bachee ki jaan lega 3 saal se to). Anyways so if you are from one of these which i think no one will be accepting ha ha then please read the below tips and make your PC run like a Firebullet :).

1.Let your PC boot up completely before opening any applications.

2.Refresh the desktop after closing any application. This will remove any unused files from the RAM.

3.Do not set very large file size images as your wallpaper. Do not keep a wallpaper at all if your PC is low on RAM.

4.Do not clutter your Desktop with a lot of shortcuts. Each shortcut on the desktop uses up to 500 bytes of RAM

5.Empty the recycle bin regularly. The files are not really deleted from your hard drive until you empty the recycle bin.

6.Delete the temporary internet files regularly.


7.Defragment your hard drive once every two months. This will free up a lot of space on your hard drive and rearrange the files so that your applications run faster.


8.Always make two partitions in your hard drive. Install all large Softwares (like PSP, Photoshop, 3DS Max etc) in the second partition. Windows uses all the available empty space in C drive as virtual memory when your Computer RAM is full. Keep the C Drive as empty as possible.


9.When installing new Software disable the option of having a tray icon. The tray icons use up available RAM, and also slow down the booting of your PC. Also disable the option of starting the application automatically when the PC boots. You can disable these options later on also from the Tools or preferences menu in your application.


10. Protect your PC from dust. Dust causes the CPU cooling fan to jam and slow down thereby gradually heating your CPU and affecting the processing speed. Use compressed air to blow out any dust from the CPU. Never use vacuum.

Google Plus invite or Facebook video calling: What do you prefer !

What would you prefer, Google Plus invite or Facebook video calling? If you ask this question to anyone, the unequal response is known to us all. It will be Google+

It has not been launched yet. Nonetheless it is being talked about in very positive words and everyone seems to be smitten by it. So are we closer to yet another great product from Google, the search and advertising czar.

Google started off as a search engine. Initially it tried to find ways to satisfy its investors about its viability and its ability to generate fund and make profit. But when it discovered the moneymaking ability through its small adds on every other page on the internet, everything else fell in line.

Now it is the biggest advertisement agency along with being the largest search engine with close to sixty five percent of the search engine market across the world.

For the last two years there has been increased talk of Facebook overtaking Google not just in its reach but business as well. Facebook at one point of time was increasing its membership at menacing speed.

But now things are changing. Even before Google Plus became a talking point, there were reports that Facebook membership in its key markets in Europe and USA was declining. In the last few months alone Facebook lost close to 16 million users in the US market. And mind you, US market is financially most important market in websphere followed by Europe.

Now with Google Plus, facebook is now facing an existential threat from the internet giant that has killed many big time players in websphere. Yahoo, Hotmail, MSN just to name a few were among the top players. But they don’t remain at the same level any more.

So is it the turn of Facebook to face the onslaught from Google with Google Plus? During the more than a week it seems that everyone has been smitten by Google plus and its affiliates including Hangouts, circles besides other Google Plus adages.

Nmap 5.59 BETA1 - 40 new NSE scripts & improved IPv6 !

Nmap 5.59 BETA1 - 40 
New NSE scripts & improved IPv6

Official Change Log:

o [NSE] Added 40 scripts, bringing the total to 217! You can learn
more about any of them at http://nmap.org/nsedoc/. Here are the new
ones (authors listed in brackets):

+ afp-ls: Lists files and their attributes from Apple Filing
Protocol (AFP) volumes. [Patrik Karlsson]

+ backorifice-brute: Performs brute force password auditing against
the BackOrifice remote administration (trojan) service. [Gorjan
Petrovski]

+ backorifice-info: Connects to a BackOrifice service and gathers
information about the host and the BackOrifice service
itself. [Gorjan Petrovski]

+ broadcast-avahi-dos: Attempts to discover hosts in the local
network using the DNS Service Discovery protocol, then tests
whether each host is vulnerable to the Avahi NULL UDP packet
denial of service bug (CVE-2011-1002). [Djalal Harouni]

+ broadcast-netbios-master-browser: Attempts to discover master
browsers and the Windows domains they manage. [Patrik Karlsson]

+ broadcast-novell-locate: Attempts to use the Service Location
Protocol to discover Novell NetWare Core Protocol (NCP)
servers. [Patrik Karlsson]

+ creds-summary: Lists all discovered credentials (e.g. from brute
force and default password checking scripts) at end of scan.
[Patrik Karlsson]

+ dns-brute: Attempts to enumerate DNS hostnames by brute force
guessing of common subdomains. [Cirrus]

+ dns-nsec-enum: Attempts to discover target hosts' services using
the DNS Service Discovery protocol. [Patrik Karlsson]

+ dpap-brute: Performs brute force password auditing against an
iPhoto Library. [Patrik Karlsson]

+ epmd-info: Connects to Erlang Port Mapper Daemon (epmd) and
retrieves a list of nodes with their respective port
numbers. [Toni Ruottu]







+ http-affiliate-id: Grabs affiliate network IDs (e.g. Google
AdSense or Analytics, Amazon Associates, etc.) from a web
page. These can be used to identify pages with the same
owner. [Hani Benhabiles, Daniel Miller]

+ http-barracuda-dir-traversal: Attempts to retrieve the
configuration settings from a Barracuda Networks Spam & Virus
Firewall device using the directory traversal vulnerability
described at
http://seclists.org/fulldisclosure/2010/Oct/119. [Brendan Coles]

+ http-cakephp-version: Obtains the CakePHP version of a web
application built with the CakePHP framework by fingerprinting
default files shipped with the CakePHP framework. [Paulino
Calderon]

+ http-majordomo2-dir-traversal: Exploits a directory traversal
vulnerability existing in the Majordomo2 mailing list manager to
retrieve remote files. (CVE-2011-0049). [Paulino Calderon]

+ http-wp-plugins: Tries to obtain a list of installed WordPress
plugins by brute force testing for known plugins. [Ange Gutek]

+ ip-geolocation-geobytes: Tries to identify the physical location
of an IP address using the Geobytes geolocation web service
(http://www.geobytes.com/iplocator.htm). [Gorjan Petrovski]

+ ip-geolocation-geoplugin: Tries to identify the physical location
of an IP address using the Geoplugin geolocation web service
(http://www.geoplugin.com/). [Gorjan Petrovski]

+ ip-geolocation-ipinfodb: Tries to identify the physical location
of an IP address using the IPInfoDB geolocation web service
(http://ipinfodb.com/ip_location_api.php). [Gorjan Petrovski]

+ ip-geolocation-maxmind: Tries to identify the physical location of
an IP address using a Geolocation Maxmind database file (available
from http://www.maxmind.com/app/ip-location). [Gorjan Petrovski]

+ ldap-novell-getpass: Attempts to retrieve the Novell Universal
Password for a user. You must already have (and include in script
arguments) the username and password for an eDirectory server
administrative account. [Patrik Karlsson]

+ mac-geolocation: Looks up geolocation information for BSSID (MAC)
addresses of WiFi access points in the Google geolocation
database. [Gorjan Petrovski]

+ mysql-audit: Audit MySQL database server security configuration
against parts of the CIS MySQL v1.0.2 benchmark (the engine can
also be used for other MySQL audits by creating appropriate audit
files). [Patrik Karlsson]

+ ncp-enum-users: Retrieves a list of all eDirectory users from the
Novell NetWare Core Protocol (NCP) service. [Patrik Karlsson]

+ ncp-serverinfo: Retrieves eDirectory server information (OS
version, server name, mounts, etc.) from the Novell NetWare Core
Protocol (NCP) service. [Patrik Karlsson]

+ nping-brute: Performs brute force password auditing against an
Nping Echo service. [Toni Ruottu]

+ omp2-brute: Performs brute force password auditing against the
OpenVAS manager using OMPv2. [Henri Doreau]

+ omp2-enum-targets: Attempts to retrieve the list of target systems
and networks from an OpenVAS Manager server. [Henri Doreau]

+ ovs-agent-version: Detects the version of an Oracle OVSAgentServer
by fingerprinting responses to an HTTP GET request and an XML-RPC
method call. [David Fifield]

+ quake3-master-getservers: Queries Quake3-style master servers for
game servers (many games other than Quake 3 use this same
protocol). [Toni Ruottu]

+ servicetags: Attempts to extract system information (OS, hardware,
etc.) from the Sun Service Tags service agent (UDP port
6481). [Matthew Flanagan]

+ sip-brute: Performs brute force password auditing against Session
Initiation Protocol (SIP -

http://en.wikipedia.org/wiki/Session_Initiation_Protocol)

accounts. This protocol is most commonly associated with VoIP
sessions. [Patrik Karlsson]

+ sip-enum-users: Attempts to enumerate valid SIP user accounts.
Currently only the SIP server Asterisk is supported. [Patrik
Karlsson]

+ smb-mbenum: Queries information managed by the Windows Master
Browser. [Patrik Karlsson]

+ smtp-vuln-cve2010-4344: Checks for and/or exploits a heap overflow
within versions of Exim prior to version 4.69 (CVE-2010-4344) and
a privilege escalation vulnerability in Exim 4.72 and prior
(CVE-2010-4345). [Djalal Harouni]

+ smtp-vuln-cve2011-1720: Checks for a memory corruption in the
Postfix SMTP server when it uses Cyrus SASL library authentication
mechanisms (CVE-2011-1720). This vulnerability can allow denial
of service and possibly remote code execution. [Djalal Harouni]

+ snmp-ios-config: Attempts to downloads Cisco router IOS
configuration files using SNMP RW (v1) and display or save
them. [Vikas Singhal, Patrik Karlsson]

+ ssl-known-key: Checks whether the SSL certificate used by a host
has a fingerprint that matches an included database of problematic
keys. [Mak Kolybabi]

+ targets-sniffer: Sniffs the local network for a configurable
amount of time (10 seconds by default) and prints discovered
addresses. If the newtargets script argument is set, discovered
addresses are added to the scan queue. [Nick Nikolaou]

+ xmpp: Connects to an XMPP server (port 5222) and collects server
information such as supported auth mechanisms, compression methods
and whether TLS is supported and mandatory. [Vasiliy Kulikov]

o Nmap has long supported IPv6 for basic (connect) port scans, basic
host discovery, version detection, Nmap Scripting Engine. This
release dramatically expands and improves IPv6 support:
+ IPv6 raw packet scans (including SYN scan, UDP scan, ACK scan,
etc.) are now supported. [David, Weilin]
+ IPv6 raw packet host discovery (IPv6 echo requests, TCP/UDP
discovery packets, etc.) is now supported. [David, Weilin]
+ IPv6 traceroute is now supported [David]
+ IPv6 protocol scan (-sO) is now supported, including creating
realistic headers for many protocols. [David]
+ IPv6 support to the wsdd, dnssd and upnp NSE libraries. [Daniel
Miller, Patrik]
+ The --exclude and --excludefile now support IPV6 addresses with
netmasks. [Colin]

o Scanme.Nmap.Org (the system anyone is allowed to scan for testing
purposes) is now dual-stacked (has an IPv6 address as well as IPv4)
so you can scan it during IPv6 testing. We also added a DNS record
for ScanmeV6.nmap.org which is IPv6-only. See
http://seclists.org/nmap-dev/2011/q2/428. [Fyodor]

o The Nmap.Org website as well as sister sites Insecure.Org,
SecLists.Org, and SecTools.Org all have working IPv6 addresses now
(dual stacked). [Fyodor]

o Nmap now determines the filesystem location it is being run from and
that path is now included early in the search path for data files
(such as nmap-services). This reduces the likelihood of needing to
specify --datadir or getting data files from a different version of
Nmap installed on the system. For full details, see
http://nmap.org/book/data-files-replacing-data-files.html. Thanks
to Solar Designer for implementation advice. [David]

o Created a page on our SecWiki for collecting Nmap script ideas! If
you have a good idea, post it to the incoming section of the page.
Or if you're in a script writing mood but don't know what to write,
come here for inspiration: https://secwiki.org/w/Nmap_Script_Ideas.

o The development pace has greatly increased because Google (again)
sponsored a 7 full-time college and graduate student programmer
interns this summer as part of their Summer of Code program!
Thanks, Google Open Source Department! We're delighted to introduce
the team: http://seclists.org/nmap-dev/2011/q2/312

o [NSE] Added 7 new protocol libraries, bringing the total to 66. You
can read about them all at http://nmap.org/nsedoc/. Here are the new
ones (authors listed in brackets):

+ creds: Handles storage and retrieval of discovered credentials
(such as passwords discovered by brute force scripts). [Patrik
Karlsson]

+ ncp: A tiny implementation of Novell Netware Core Protocol
(NCP). [Patrik Karlsson]

+ omp2: OpenVAS Management Protocol (OMP) version 2 support. [Henri
Doreau]

+ sip: Supports a limited subset of SIP commands and
methods. [Patrik Karlsson]

+ smtp: Simple Mail Transfer Protocol (SMTP) operations. [Djalal
Harouni]

+ srvloc: A relatively small implementation of the Service Location
Protocol. [Patrik Karlsson]

+ tftp: Implements a minimal TFTP server. It is used in
snmp-ios-config to obtain router config files.[Patrik Karlsson]

o Improved Nmap's service/version detection database by adding:
+ Apple iPhoto (DPAP) protocol probe [Patrik]
+ Zend Java Bridge probe [Michael Schierl]
+ BackOrifice probe [Gorjan Petrovski]
+ GKrellM probe [Toni Ruotto]
+ Signature improvements for a wide variety of services (we now have
7,375 signatures)

o [NSE] ssh-hostkey now additionally has a postrule that prints hosts
found during the scan which share the same hostkey. [Henri Doreau]

o [NSE] Added 300+ new signatures to http-enum which look for admin
directories, JBoss, Tomcat, TikiWiki, Majordomo2, MS SQL, WordPress,
and more. [Paulino]

o Made the final IP address space assignment update as all available
IPv4 address blocks have now been allocated to the regional
registries. Our random IP generation (-iR) logic now only excludes
the various reserved blocks. Thanks to Kris for years of regular
updates to this function!

o [NSE] Replaced http-trace with a new more effective version. [Paulino]

o Performed some output cleanup work to remove unimportant status
lines so that it is easier to find the good stuff! [David]

o [Zenmap] now properly kills Nmap scan subprocess when you cancel a
scan or quit Zenmap on Windows. [Shinnok]

o [NSE] Banned scripts from being in both the "default" and
"intrusive" categories. We did this by removing dhcp-discover and
dns-zone-transfer from the set of scripts run by default (leaving
them "intrusive"), and reclassifying dns-recursion, ftp-bounce,
http-open-proxy, and socks-open-proxy as "safe" rather than
"intrusive" (keeping them in the "default" set).

o [NSE] Added a credential storage library (creds.lua) and modified
the brute library and scripts to make use of it. [Patrik]

o [Ncat] Created a portable version of ncat.exe that you can just drop
onto Microsoft Windows systems without having to run any installer
or copy over extra library files. See the Ncat page
(http://nmap.org/ncat/) for binary downloads and a link to build
instructions. [Shinnok]

o Fix a segmentation fault which could occur when running Nmap on
various Android-based phones. The problem related to NULL being
passed to freeaddrinfo(). [David, Vlatko Kosturjak]

o [NSE] The host.bin_ip and host.bin_ip_src entries now also work with
16-byte IPv6 addresses. [David]

o [Ncat] Updated the ca-bundle.crt list of trusted certificate
authority certificates. [David]

o [NSE] Fixed a bug in the SMB Authentication library which could
prevent concurrently running scripts with valid credentials from
logging in. [Chris Woodbury]

o [NSE] Re-worked http-form-brute.nse to better autodetect form
fields, allow brute force attempts where only the password (no
username) is needed, follow HTTP redirects, and better detect
incorrect login attempts. [Patrik, Daniel Miller]

o [Zenmap] Changed the "slow comprehensive scan" profile's NSE script
selection from "all" to "default or (discovery and safe)"
categories. Except for testing and debugging, "--script all" is
rarely desirable.

o [NSE] Added the stdnse.silent_require method which is used for
library requires that you know might fail (e.g. "openssl" fails if
Nmap was compiled without that library). If these libraries are
called with silent_require and fail to load, the script will cease
running but the user won't be presented with ugly failure messages
as would happen with a normal require. [Patrick Donnelly]

o [Ncat] ncat now listens on both localhost and ::1 when you run ncat
-l. It works as before if you specify -4 or -6 or a specific
address. [Colin Rice]

o [Zenmap] Fixed a bug in topology mapper which caused endpoints
behind firewalls to sometimes show up in the wrong place (see
http://seclists.org/nmap-dev/2011/q2/733). [Colin Rice]

o [Zenmap] If you scan a system twice, any open ports from the first
scan which are closed in the 2nd will be properly marked as
closed. [Colin Rice].

o [Zenmap] Fixed an error that could cause a crash ("TypeError: an
integer is required") if a sort column in the ports table was unset.
[David]

o [Ndiff] Added nmaprun element information (Nmap version, scan date,
etc.) to the diff. Also, the Nmap banner with version number and
data is now only printed if there were other differences in the
scan. [Daniel Miller, David, Dr. Jesus]

o [NSE] Added nmap.get_interface and nmap.get_interface_info functions
so scripts can access characteristics of the scanning interface.
Removed nmap.get_interface_link. [Djalal]

o Fixed an overflow in scan elapsed time display that caused negative
times to be printed after about 25 days. [Daniel Miller]

o Updated nmap-rpc from the master list, now maintained by IANA.
[Daniel Miller, David]

o [Zenmap] Fixed a bug in the option parser: -sN (null scan) was
interpreted as -sn (no port scan). This was reported by
Shitaneddine. [David]

o [Ndiff] Fixed the Mac OS X packages to use the correct path for
Python: /usr/bin/python instead of /opt/local/bin/python. The bug
was reported by Wellington Castello. [David]

o Removed the -sR (RPC scan) option--it is now an alias for -sV
(version scan), which always does RPC scan when an rpcinfo service
is detected.

o [NSE] Improved the ms-sql scripts and library in several ways:
- Improved version detection and server discovery
- Added support for named pipes, integrated authentication, and
connecting to instances by name or port
- Improved script and library stability and documentation.
[Patrik Karlsson, Chris Woodbury]

o [NSE] Fixed http.validate_options when handling a cookie table.
[Sebastian Prengel]

o Added a Service Tags UDP probe for port 6481/udp. [David]

o [NSE] Enabled firewalk.nse to automatically find the gateways at
which probes are dropped and fixed various bugs. [Henri Doreau]

o [Zenmap] Worked around a pycairo bug that prevented saving the
topology graphic as PNG on Windows: "Error Saving Snapshot:
Surface.write_to_png takes one argument which must be a filename
(str), file object, or a file-like object which has a 'write' method
(like StringIO)". The problem was reported by Alex Kah. [David]

o The -V and --version options now show the platform Nmap was compiled
on, which features are compiled in, the version numbers of libraries
it is linked against, and whether the libraries are the ones that
come with Nmap or the operating system. [Ambarisha B., David]

o Fixed some inconsistencies in nmap-os-db reported by Xavier Sudre
from netVigilance.

o The Nmap Win32 uninstaller now properly deletes nping.exe. [Fyodor]

o [NSE] Added a shortport.ssl function which can be used as a script
portrule to match SSL services. It is similar in concept to our
existing shortport.http. [David]

o Set up the RPM build to use the compat-glibc and compat-gcc-34-c++
packages (on CentOS 5.3) to resolve a report of Nmap failing to run
on old versions of Glibc. [David]

o We no longer support Nmap on versions of Windows earlier than XP
SP2. Even Microsoft no longer supports Windows versions that old.
But if you must use Nmap on such systems anyway, please see

https://secwiki.org/w/Nmap_On_Old_Windows_Releases.

o There were hundreds of other little bug fixes and improvements
(especially to NSE scripts). See the SVN logs for revisions 22,274
through 24,460 for details.

Download Here

Linked In Confirms Data Breach, Here's What You Can Do !

Phishers are coming out of the woodwork trying to bait panicked or otherwise unsuspecting LinkedIn users into supposedly 'confirming' their account, but what they're really doing is hijacking login credentials. They're also compounding the situation, whereby LinkedIn has now confirmed it suffered a data breach in which encrypted user passwords were compromised. Here's what you should do.
First and foremost, log into LinkedIn by typing the site's address directly into your browser and change your password. Don't click on any links in emails, even if they appear to be legit, which some of them do. It's unclear whether or not LinkedIn has begun notifying its members of the data breach via email, but according to security firm ESET, plenty of legitimate looking phishing emails are making the rounds.

The next thing you should do is change your password on any other site that uses the same login credentials. You should be using different passwords for different sites anyway, but if not, now's a great time to get into the habit of separating your online accounts.
According to reports, around 6.5 million LinkedIn passwords fell into malicious hands, so there's a good chance yours is one of them. If you want to know for sure, LastPass has an online tool that will compare the SHA-1 hash of your password with those that have been compromised. But is it safe to fork over your LinkedIn password to LastPass?


"The above tool asks you to enter your LinkedIn password, and then computes its SHA-1 hash and sends the result to LastPass.com to search the list of 6.5 million leaked password hashes. A hash is a mathematical function that is simple to perform in one direction, but very difficult to reverse. Meaning, the tool will convert your password into a series of characters in such a way that it will be very difficult to re-construct your original password," LastPass explains.
LastPass says that only the hash of your password is sent to LastPass.com's servers, not your actual password. And according to Mashable, LastPass doesn't store your hash on its servers. Still, if you're feeling uneasy, go ahead and change your LinkedIn password regardless.

World IPv6 Launch Gives Crowded Internet Much Needed Breathing Room !

If you're reading this, you must be online, and if you're online, let us say 'Welcome to a larger Internet.' Today kicks off theWorld IPv6 Launch event organized by the Internet Society and intended to bring major internet service providers (ISPs), home networking equipment manufacturers, and web companies around the world together to enable and embrace the IPv6 protocol for their products and services.
Count Google among them. As the sultan of search points out, few could have imagined that the Internet today would serve nearly 2.5 billion people and 11 billion devices when it was launched operationally back in 1983. But that's what happened, and suddenly the Internet is running out of addresses.
As constructed, there's room for around 4.3 billion addresses. Internet Protocol version 6 expands that number exponentially, to "about 340 trillion, trillion, trillion!," Google says.
"Today's World IPv6 Launch, coordinated by the Internet Society, marks the day that participating websites, Internet Service Providers (ISP), and network hardware manufacturers switch on IPv6 permanently in parallel with IPv4," Google said in a blog post. "We’re proud to be one of the founding participants; virtually all Google’s services have been available over IPv6 for a while, but IPv6 access was only available to networks participating in the 'Google over IPv6' program. From now on, they will be made available to any IPv6 network on the Internet (well, almost any).
IPv6 still has a ways to go in terms of widespread adoption. Most ISPs haven't embraced the new standard yet, and the same is true for many websites. Not all home network equipment supports IPv6 either, though some can be upgraded with a relatively simple firmware updates. Others will need to be replaced entirely.
Are you ready? If you want to test your setup and infrastructure, head here.

Dell Launches Inspiron 14z Ultrabook, 'Fashionable' Inspiron 15R and 17R Laptops !

The very last thing in the world students heading out into summer vacation want to think about right now is the fact they'll have to go back to school in a few months. Parents, however, know the back-to-school season is coming, and they're the ones Dell is pitching its "tailored line-up of Inspiron laptops" to, including Dell's first Inspiron Ultrabook model, the 14z.

Dell's 14z rolls off the lot with a Core i3 processor, though you can upgrade to a Core i5 or Core i7 Ivy Bridge processor before driving it home. It's only Dell's second Ultrabook model, joining the XPS 13, and it sports a brushed aluminum finish in Moon Silver or (later this summer) Fire Red. A baseline build weighs 4.12 pounds and measures 0.83 inches at its chunkiest point. And if that's too big, Dell also announced a 13-inch version (13z) that weighs 3.81 pounds. Pricing starts at $700 for the 14z and $600 for the 13z.

In addition to Ultrabooks, Dell today rolled out new Inspiron 15R and 17R laptops with high definition displays and a variety of processor, memory, and storage options. They also feature optional color SWITCH lids, Intel Wireless Display technology, and Waves MaxxAudio 3 sound processing. Special Edition versions up the ante with Full HD displays, Blu-ray options, Skullcandy speakers, and Nvidia graphics options (17R). Pricing starts at $550 for the 15R ($900 for the Special Edition) and $600 for the 17R ($1,300 for Special Edition).
Image Credit: Dell

Wednesday, December 4, 2013

Get 5000 Free Backlinks For Your Website Or Blog Instantly !

I am here with new trick to getfree backlinks for your blog or website. Backlinks play very important role to get " High PR ranking " and " Alexa High Ranking " for free.

Yes, its true that if you have a website or blog and not having " Enough Traffic" and want to get " Good PR ranking " and " Alexa High Ranking" then this method will work for you easily and that too free also. By using this method you will see change in " Alexa Ranking " easily with in four days.


It is true that the back bone of a websites rank is ‘ Backlinks ’. If you have good backlinks then your blog is expected to do good in SEO.The problem is that backlinks are not easy as making oatmeal, it can take you forever to make ton of backlinks So you have to be patient while doing this. There are many ways to get backlinks, such as: Social bookmarking, Blog commenting, Forum posting and article submission.

Get Free Backlink For Website Instantly


I have applied all the below listed methods to " Get Premium Backlinks " for free . So don't worry! this all methods are working very fine


Generate automatic Backlinks – There are several sites which allow free auto backlinks service. Some of them are


1. Freesitescripts.com – About 1000 Premium Backlinks For Free
2. IMTalk – About 2500 Premium Backlinks For Free
3. Webmasterdeck – 500 Premium Backlinks For Free

I hope you like this methods though some tells that this " BlackHat SEO Method To Get High Ranking " but according to me this is Ethical method to " Get Free Backlinks "


Thankyou for reading this article and don't forget to comment..


keywords:-
search engine optimization, backlinks, get free backlinks, free backlinks, how to get free backlinks for website, seo, blackhat seo,whitehat seo.

10 Killer Ways To Boost Your Alexa Ranking | SEO Tricks !

Hi friends I hope you all are fine, After my previous post for " How To Recover Lost Data With Recuva For Computer " . I am here as promised with " new tricks " . This trick is related to SEO . Today I am going to post a review about alexa and " How To Increase Alexa Ranking " . This all methods are provened by webmaster and also checked by me

Alexa is a service that ranks websites based on information gathered from the web. For webmasters, it is very important to improve Alexa Ranking. I am presenting a list of 10 easy tips to improve position(rank) on Alexa.
As Per Alexa Notice
Alexa’s traffic rankings are based on the usage patterns of Alexa Toolbar users and data collected from other, diverse sources over a rolling 3 month period. A site’s ranking is based on a combined measure of reach and pageviews. Reach is determined by the number of unique Alexa users who visit a site on a given day. Pageviews are the total number of Alexa user URL requests for a site
Follow These Killer Tips To Increase Alexa Rank



1- Download And Install Alexa Toolbar
2-Put an Alexa rank widget on your blog/ website.
3- Install Alexa Redirect Plugin for WordPress.
4- Visit to the Alexa website and claim your website to get maximum authority
5- Write an article about Alexa in your blog with a link to their site.
6- Get Dugg or Stumbled. This will bring a numbers of visitors to your blog
7- Set your Blog as home page in your default web browser
8- Get your blog / website listed in as many number of blog directories as possible.
9- Popular webmaster forums are great promotion tools
10- Encourage or ask some of your friends or visitors to install Alexa toolbar So follow all above steps 11- which will definitely help you to increase your Alexa traffic ranking and thus the value of your blog in the eyes of a advertisers. Please add any other ways to increase the Alexa Rank if you feel I have missed something.

Monday, December 2, 2013

The Art of Deception {TOP HACKING BOOK EVER} MUST DOWNLOAD !

Kevin Mitnick's exploits as a cyber-desperado and fugitive from one of the most exhaustive FBI manhunts in history have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison in 2000, Mitnick has turned his life around and established himself as one of the most sought-after computer security experts worldwide. Now, in The Art Of Deception, the world's most famous hacker gives new meaning to the old adage, "It takes a thief to catch a thief."



Inviting you into the complex mind of the hacker, Mitnick provides realistic scenarios of cons, swindles, and social engineering attacks on business - and the consequences. Focusing on the human factors involved with information security, Mitnick explains why all the firewalls and encryption protocols in the world will never be enough to stop a savvy grifter intent on rifling a corporate database or an irate employee determined to crash a system. He illustrates just how susceptible even the most locked-down information systems are to a determined con artist impersonating an IRS agent or any other seemingly innocent character. Narrated from the points of view of both the attacker and the victim,

The Art Of Deception explores why each attack was so successful - and how it could have been averted - in an engaging and highly readable manner reminiscent of a true-crime novel.

Most importantly, Mitnick redeems his former life of crime by providing specific guidelines for developing protocols, training programs, and manuals to ensure that a company's sophisticated technical security investment will not be for naught. He shares his advice for preventing security vulnerability in the hope that people will be mindfully on guard for an attack from the gravest risk of all - human nature.



Download:          LINK 1

Mozilla Firefox 13 Hits Release Channel, Brings New Homepage and Tabs !


The latest and greatest version of Mozilla's Firefox web browser -- Firefox 13 -- doesn't alter the browser scene with earth shaking innovation or groundbreaking feature additions, nor have we come to expect such gargantuan leaps in browser development since Mozilla swithced to a rapid release schedule. That said, there is a new version of Firefox on the Release channel, and here's what it brings to the table.
First and foremost, Firefox's new default homepage offers quicker access to bookmarks, history, settings, and more. The other notable change has to do with tabs. When opening a new tab, Firefox presents users with their most visited pages.
Other than those two additions, Mozilla mainly just sprinkled in a few changes to how the browser behaves and resolved a bunch of bugs, as it usually does with each new Firefox release. Restored background tabs are no longer loaded by default, a move intended to speed up the startup process, and smooth scrolling is now enabled by default. On the developer side, Mozilla said it made 72 total improvements to Page Inspector, HTML panel, Style Inspector, Scratchpad, and Style Editor.
The complete list of changes is here, and you can download the latest Firefox release here.



How to get your website ranked on search engines | Amit Khajuria


There are many factors involved in getting your website ranking on search engines. Below are some key things to take into consideration, and we hope that it will help you to increase traffic on your blog website or forum :)

Anchor text
The anchor text of inbound links coming to your website is very important as search engines use this to determine what your site is about and what it should rank well for. Your anchor text should be your keywords that you want your website to rank for. For example, instead of using your company name or your website URL for inbound links, consider using keywords as your anchor text.



Use keywords in your title tag and other meta tags
Meta tags still have an impact on where your website will rank on search engines. The weight of the meta tags may be minimal, but it is still recommended that you choose keywords relevant to each webpage. It is an effective way for search engines to categorise your webpages and gives search engine spiders an idea of what your webpage is about.



Links to your website
The largest factor that influences search engine rankings is the number and quality of links that are pointing to your website. The more quality links that you have coming to your website, search engines will think your website has authority.
Keyword use in the root domain
Although it's possible to use subdomain or dedicated pages to get your keywords in a URL, nothing beats having your keywords in your domain name. For example, goldcoastaccommodation.com.au.
Apply the proper tags to your page
This means using H1, H2, and H3 tags in your headings and sub-headings.



Include a html sitemap and an xml sitemap on your website
Including a sitemap on your website makes it easy for search engine spiders to access all your webpages and index your site accordingly.



Make sure all images have an ALT text
Your image alt text is read by search engine spiders, so make sure you include keywords in your alt text. Label your images properly too, for example, instead of calling it bedroom.jpg, call it melbourne-accommodation-1-bedroom-apartments.jpg.


Source

Free Domain Names | Get Professional Domains For Free With All Features !

Below are the websites which provides " Free Domain Hosting " for your blog. This all listed below website provides the features and benefits which a professional .com domain hosting website provides . So watch carefully these website and have your register their for free.

CC.CC


CC.CC offers simple, memorable custom domain for Google Apps, Blogger, etc..
This site provides the domain name registration tools and DNS setup wizard.
You can configure your .cc.cc Domain for Blogger, Gmail, Google sites, Tumblr, Bandcamp, Hotmail, Facebook, Twitter, Myspace, etc.. The service is provided at no cost, no ads. Enjoy our free service!

CO.CC

CO.CC offers simple, memorable custom domain for Google Apps, Blogger, etc.. This site provides the domain name registration tools and DNS setup wizard.

You can configure your .cc.cc Domain for Blogger, Gmail, Google sites, Tumblr, Bandcamp, Hotmail, Facebook, Twitter, Myspace, etc.. The service is provided at no cost, no ads. Enjoy our free service!

CZ.CC

CZ.CC provides free domain regsitration service. You can register all available domain names instantly. They offers free or paid dynamic dns service with full MX, CNAME, A and SOA records. The service they provide is exactly same as .co.cc. Register on .cz.cc

CO.TV

co.tv is strong yet free domain registration service provider. You are limited upto 3 domains with single user account. Like .co.cc, .co.tv also supports full MX, CNAME, A and SOA records. Register on co.tv




CO.NR

co.nr has free domain name package was designed to provide domain name free, subdomain services mainly for advanced internet users, who have some basic knowledge about the DNS (Domain Name
System) and process of setting up name serversas well as other DNS records (NS, A, MX, CNAME, TXT, etc.) for the domain name to work properly. Also it provides subdomain hosting, i.e. subdomain.domain.co.nr

SmartDots.com

Smartdots.com is one of them who provide variety of domain names. One of the famous domain people owns from smartdots is .net.tc. Besides these you can have other domain names listed in their
website. They supports variety of features, like meta tag generator, automatic search engine submission, etc. To know more about their features visit them.

CyDots.com

CyDots.com is one of them who provide variety of domain names. One of the famous domainpeople owns from smartdots is .net.tc. Besides these you can have other domain names listed in their website. They supports variety of features, like meta tag generator, automatic search engine submission, etc. To know more about their features visit them.

How to Use Google Search Via SMS in India !

Yeah, now you can also search anything, anytime, anywhere on Google without a internet connection. Google on your mobile either it’s a Smartphone or low cost phone it will help you with his SMS service. You don’t need to buy a expensive phone’s out of your budget to just surf for internet on the go.

Please follow the following step:-

1. You have to just type your keywords (You want to search) in your phone message box (create message).


2.Then add receipt send it to 9773300000. And it will comeback you the answer within a few seconds.

3. You will feel like you are surfing Google on the Internet.

It helps me when I went to Delhi with friends at late night and we have to search for movie Showtime’s. Then I messaged on that number movie Delhi. And I stunned, got minimum 12-13 messages about movies Showtime’s or ratings of the movies. At different theater.

Note: Charge May Apply.