Wednesday, July 13, 2011

How To Trace Mobile Number Location with Google Latitude

The one drawback of being so heavily into both the latest technologies and cool Internet applications is that when the two seamlessly combine to form the ultimate, ultra-useful application with unlimited potential – it causes you to break into a cold sweat from just the excitement alone. Once I realized that someone can trace a mobile phone location with Google Latitude was possible, I had to run around the block a few times to burn off my excitement before sitting down to write this article.

How Tracing a Mobile Phone Location Wi

th Google Latitude Works

radar

The cool thing about Google Latitude is that there are really no fancy, expensive gadgets requ
ired. All you need is a mobile phone and you can build what’s essentially a GPS network of friends, without the need for GPS technology. Wondering whether your buddy Jim is still at work? Just log onto Google Latitude, or check Google Maps on your phone, and sure enough, Jim’s icon shows up on the map where he works. Did your best friend go missing after her date the other night? If she left her phone on, all of her friends can check out where she’s currently located.
The potential uses of this technology are amazing, and Google is just getting started by integrated it’s cellular triangulation technology with Google Maps. MakeUseOf authors previously covered similar applications, such as NavXS and BuddyWay. However, BuddyWay requires that the phone or PDA is GPS enabled. The convenience of Google Latitude is that you don’t need GPS, and it’ll work on almost any mobile phone that can use Google Maps. According to Google, these include Android-powered devices, iPhone, BlackBerry, Windows Mobile 5.0+ and Symbian.

tracing a mobile phone location
Setting it up is as easy as typing your phone number into the entry field on the Google Latitude main page, or you can visit “google.com/latitude” with your mobile device and install it directly. It’s basically the latest version of Google Maps with Latitude embedded. Once you’ve installed this version on your phone, you’re good to go – just click on “Menu” and then “Latitude.”


Setting Up Google Latitude With a Network of Friends

Setting up the application on your mobile device is a piece of cake. Once you open Latitude on your phone, you can immediately start adding friends with their email address. If none of your friends have Latitude installed on their phones yet, forward them this article and tell them to install it!
trace mobile number location
When you first fire up the map after you’ve enabled Latitude with your profile, you’ll immediately see your regular Google map pointer replaced by your picture icon, email address and your location the last time your device was polled.
trace your cell phone
Application does a great job keeping the map updated with your status within a certain radius, depending on where the nearest cell towers are. However, while keeping track of yourself on the map while you’re driving or walking around town is fun, it can get pretty boring when you’re doing it alone. Latitude lets you have a little bit of fun with your network of friends by letting you add each of them to your Latitude “friends” list so that you can see their locations too. To test this feature, I called up a friend of mine with a Blackberry down in Derry, New Hampshire, and asked him to fire up Latitude and add me as a friend. Once we confirmed each other as friends, I instantly showed up on his map and he showed up on mine!
added friend
When you click on your friend’s icon, you can see their contact and location information, or you can choose how you want to share your own information with this specific friend. This means that you can pick and choose the level of privacy that you want for your own status updates based on individual friends. You can provide your exact location to your best friend, while keeping your details somewhat vague for your parents. Also, within the Latitude menu, you can set your privacy level for everyone across the board.
privacy
You can toggle your privacy settings back and forth, so that when you’re somewhere that you don’t want anyone to know about, you just flip your status to “Hide your location.” When you’re back where you’re supposed to be, you just flip your privacy back to “Detect your location.” If you want to fool your friends (or your boss) into thinking that you’re somewhere you’re not, you can manually set your location.

Using Google Latitude Online

Of course, tracing a mobile phone location isn’t enough for Google. This is the part that really made me raise my eyebrows. Google has incorporated this mobile technology into an online gadget that you can view and manipulate from your iGoogle page.
igoogle5
This means that even if you don’t have your mobile phone with you, but you have access to the Internet, you can check out where all of your friends are at the moment, or update your own location on Latitude so that they know where you are. This whole concept takes the whole architecture and intent of Twitter and adds another entire level of graphical interactivity to it, with visual, real-time status updates for your friends. The next evolution of this technology that I envision is the ability to embed a Google Latitude widget in your blog or web page that allows you to share your own Latitude location information with your readers. Since the status bar already exists for short text updates, this feature would turn Google Latitude into a more graphical version of Twitter.
Have you ever used any of the latest “friend tracking” mobile phone technologies for tracing a mobile phone location? Which one is your favorite? Share your opinion in the comments section below.


How To Create a CON Folder In Windows

Can you create a folder named "CON” in windows?

The Answer is NO and YES!

Why the answer is NO.
NO because when create a new folder and try to rename it to any one of the above specified names, you know what happens! In Windows XP the folder name automatically changes back to "New Folder” no matter you try any number of times. Where as in Windows Vista/7 when you try to rename the file you get an error message "The specified device name is invalid”.

Why it is not possible to create a folder names CON?

Before we proceed further, let me tell you a small secret you can’t even create a folder named

CON, PRN, AUX, NUL, COM1, COM2, COM3, COM4, COM5, COM6, COM7, COM8, COM9, LPT1, LPT2, LPT3, LPT4, LPT5,
LPT6, LPT7, LPT8
, and LPT9.and many others.

YES the reason you can’t create a folder with these names is because these are reserved keywords used by DOS. The below list is taken from Microsoft’s website shows a list of reserved keywords in DOS.

NAME - FUNCTION
CON - Key board and display.
PRN - System list device, usually a parallel port.
AUX - Auxiliary Device, usually a serial port.
CLOCK$ - System real-time clock.
NUL - Bit-bucket device.
A: - Z: - Drive letters.
COM1 - First serial communication port.
LPT1 - First parallel printer port.
LPT2 - Second Parallel printer port.
LPT3 - Third Parallel printer port.
COM2 - Second serial communication port.
COM3 - Third serial communication port.
COM4 - Fourth serial communication port.


If you try creating a folder with any of these names, the name automatically changes back to the default "New Folder”.
And this is what has caused the confusion. Instead of automatically renaming the folder, had an explanatory warning message popped up.

Yes we can create a folder named CON.


There is actually a way to create a folder named CON, or any other name from the above list of reserved keywords. This can be done through command prompt. But it is advisable not to do so, as it might result in your system becoming unstable.
To create a folder named CON, go to command prompt and type "MD \\.\D:\CON” (without quotes). This will create a folder named CON in D:. See the screen-shot below.(see the folder at the bottom)




You cannot delete this folder by normal delete. To delete the folder, again go to command prompt and type

"RD \\.\D:\CON” without quotes. See the screen-shot below.(see the folder is gone now)


I’ll again recommend you not to try this on your system, as it might become unstable. In case
you can’t stop yourself, don’t do it on a drive on which Windows is installed (generally C:).
So next time if any one tells you that we cannot rename a folder to con the create it and show
them.

How to Create Your Own Customized Run Commands

Submitted by Ankit on Tuesday, 19 April 2011

Run commandThe Run command on Microsoft Windows operating system allows you to directly open an application or document with just a single command instead of navigating to it’s location and double-clicking the executable icon. However, it only works for some of the inbuilt Windows programs such as Command prompt (cmd), Calculator (calc) etc. So, have you ever wondered how to create your own customized Run commands for accessing your favorite programs, files and folders? Well, read on to find out the answer.

Creating the Customized Run Command

Let me take up an example of how to create a customized run command for opening the Internet explorer. Once you create this command, you should be able to open the Internet explorer just by typing “ie” (without quotes) in the Run dialog box. Here is how you can do that.

1. Right click on your Desktop and select New -> Shortcut.

2. You will see a “Create Shortcut” Dialog box as shown below

Create Shortcut

3. Click on “Browse”, navigate to: Program Files -> Internet Explorer from your Root drive (usually C:\) and select “iexplore” as shown in the above figure and click on “OK”.

4. Now click on “Next” and type any name for your shortcut. You can choose any name as per your choice; this will be your customized “Run command”. In this case I name my shortcut as “ie”. Click on “Finish”.

5. You will see a shortcut named “ie” on your desktop. All you need to do is just copy this shortcut and paste it in your Windows folder (usually “C:/Windows”). Once you have copied the shortcut onto your Windows folder, you can delete the one on your Desktop.

6. That’s it! From now on, just open the Run dialog box, type ie and hit Enter to open the Internet Explorer.

In this way you can create customized Run commands for any program of your choice. Say “ff” for Firefox, “ym” for Yahoo messenger, “wmp” for Windows media player and so on.

To do this, when you click on “Browse” in the Step-3, just select the target program’s main executable (.exe) file which will usually be located in the C:\Program Files folder. Give a simple and short name for this shortcut as per your choice and copy the shortcut file onto the Windows folder as usual. Now just type this short name in the Run dialog box to open the program.

I hope you like this post! Pass your comments.

How to Hack Windows Administrator Password

Submitted by Ankit on Thursday, 12 February 2010


Simple way to reset non-administrator account passwords

Here is another simple way through which you can reset the password of any non-administrator accounts. The only requirement for this is that you need to have administrator privileges. Here is a step-by-step instruction to accomplish this task.

1. Open the command prompt (Start->Run->type cmd->Enter)

2. Now type net user and hit Enter

3. Now the system will show you a list of user accounts on the computer. Say for example you need to reset the password of the account by name John, then do as follows

4. Type net user John * and hit Enter. Now the system will ask you to enter the new password for the account. That’s it. Now you’ve successfully reset the password for John without knowing his old password.

So in this way you can reset the password of any Windows account at times when you forget it so that you need not re-install your OS for any reason. I hope this helps.

Another way to reset non-administrator account passwords

This hack will show you how to reset Windows administrator password (for Win 2000, XP, Vista and Win 7) at times when you forget it or when you want to gain access to a computer for which you do not know the password.

Most of us have experienced a situation where in we need to gain access to a computer which is password protected or at times we may forget the administrator password without which it becomes impossible to login to the computer. So here is an excellent hack using which you can reset the password or make the password empty (remove the password) so that you can gain administrator access to the computer. You can do this with a small tool called Offline NT Password & Registry Editor. This utility works offline, that means you need to shut down your computer and boot off your using a floppy disk, CD or USB device (such as pen drive). The tool has the following features.

  • You do not need to know the old password to set a new one
  • Will detect and offer to unlock locked or disabled out user accounts!
  • There is also a registry editor and other registry utilities that works under linux/unix, and can be used for other things than password editing.

How it works?

Most Windows operating systems stores the login passwords and other encrypted passwords in a file called sam (Security Accounts Manager). This file can be usually found in \windows\system32\config. This file is a part of Windows registry and remains inaccessible as long as the OS is active. Hence it is necessary that you need to boot off your computer and access this sam file via boot. This tool intelligently gains access to this file and will reset/remove the password associated with administrator or any other account.

The download link for both CD and floppy drives along with the complete instructions is given below

Offline NT Password & Reg Editor Download

It is recommended that you download the CD version of the tool since floppy drive is outdated and doesn’t exist in today’s computer. Once you download you’ll get a bootable image which you need to burn it onto your CD. Now boot your computer from this CD and follow the screen instructions to reset the password.

Monday, June 27, 2011

How to Install Windows 7 From a USB Drive

Submitted by Ankit Sharma on Friday, 20 June 2011

Windows-7-USBInstalling Windows from a USB flash drive has several advantages – First of all, the overall speed of the installation process will increase significantly, carrying a USB stick is much more convenient than a DVD, and finally it becomes possible to install the OS even on those systems that do not have a DVD drive, such as a netbook.

In this post, I will show you how to load the Windows installation on to your USB flash drive and make it bootable just like the DVD.

Tools Required:

1. USB flash drive with a minimum capacity of 4 GB.

2. Windows 7 set-up DVD.

Step-1: Plug-in your USB flash drive and backup all the existing data in it.

Step-2: Open the command prompt. If you are using Windows 7/Vista then open it with administrator rights*.

* Goto Start -> All Programs -> Accessories -> Right-click on “Command Prompt” and select “Run as Administrator”.

Step 3: In the command prompt, type in the following command:

     [ DISKPART ]


This will start the Microsoft DiskPart utility as shown below:
Microsoft DiskPart

Now issue the following command:

     [ LIST DISK ]


This will show you a list of available disks on your system. Disk 0 is usually the hard disk. In my case, Disk 5 is the USB drive (this can be a different one in your case). Now issue the command as shown below:
  [ SELECT DISK 5 ]


Install Windows 7 from USB
NOTE: In the above command, 5 is the USB drive number on my system. If you have a different number on your system, then you need to replace 5 with that number.

Step-4: Now issue the following list of commands one by one as shown below:

[ CLEAN 

CREATE

PARTITION

PRIMARY


SELECT PARTITION 1

ACTIVE

FORMAT FS=NTFS QUICK

ASSIGN

EXIT ]

Install Windows 7 from USB

Minimize the command prompt and proceed to the next step.

Step 5: Insert the Windows 7/Vista installation disc and note down the “drive letter” of your DVD drive. In my case, it is “H:”. Now type the following list of commands as shown below:

[ H: CD BOOT

CD BOOT

BOOTSECT.EXE /NT60 M:(NOTE: M: is your USB drive letter)

EXIT ]


Win 7 from USB flash drive

Step-6: Copy the contents of your Windows 7/Vista installation disk into the USB flash drive.

That’s it! Your USB stick is now ready to boot and install the OS for you. Don’t forget to enable the “USB Boot” option and change the “boot priority to USB device from hard disk” in your BIOS settings.

Friday, May 27, 2011

Password Hacking

-: Password Hacking :-


Password cracking is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password.
Most passwords can be cracked by using following techniques :

1) Hashing :- Here we will refer to the one way function (which may be either an encryption function or cryptographic hash) employed as a hash and its output as a hashed password.
If a system uses a reversible function to obscure stored passwords, exploiting that weakness can recover even 'well-chosen' passwords.
One example is the LM hash that Microsoft Windows uses by default to store user passwords that are less than 15 characters in length.
LM hash breaks the password into two 7-character fields which are then hashed separately, allowing each half to be attacked separately.

Hash functions like SHA-512, SHA-1, and MD5 are considered impossible to invert when used correctly.


2) Guessing :- Many passwords can be guessed either by humans or by sophisticated cracking programs armed with dictionaries (dictionary based) and the user's personal information.

Not surprisingly, many users choose weak passwords, usually one related to themselves in some way. Repeated research over some 40 years has demonstrated that around 40% of user-chosen passwords are readily guessable by programs. Examples of insecure choices include:

* blank (none)
* the word "password", "passcode", "admin" and their derivatives
* the user's name or login name
* the name of their significant other or another person (loved one)
* their birthplace or date of birth
* a pet's name
* a dictionary word in any language
* automobile licence plate number
* a row of letters from a standard keyboard layout (eg, the qwerty keyboard -- qwerty itself, asdf, or qwertyuiop)
* a simple modification of one of the preceding, such as suffixing a digit or reversing the order of the letters.
and so on....

In one survery of MySpace passwords which had been phished, 3.8 percent of passwords were a single word found in a dictionary, and another 12 percent were a word plus a final digit; two-thirds of the time that digit was.

A password containing both uppercase & lowercase characters, numbers and special characters too; is a strong password and can never be guessed.


Check Your Password Strength



3) Default Passwords :- A moderately high number of local and online applications have inbuilt default passwords that have been configured by programmers during development stages of software. There are lots of applications running on the internet on which default passwords are enabled. So, it is quite easy for an attacker to enter default password and gain access to sensitive information. A list containing default passwords of some of the most popular applications is available on the internet.

Always disable or change the applications' (both online and offline) default username-password pairs.

4) Brute Force :- If all other techniques failed, then attackers uses brute force password cracking technique. Here an automatic tool is used which tries all possible combinations of available keys on the keyboard. As soon as correct password is reached it displays on the screen.This techniques takes extremely long time to complete, but password will surely cracked.

Long is the password, large is the time taken to brute force it.

5) Phishing :- This is the most effective and easily executable password cracking technique which is generally used to crack the passwords of e-mail accounts, and all those accounts where secret information or sensitive personal information is stored by user such as social networking websites, matrimonial websites, etc.
Phishing is a technique in which the attacker creates the fake login screen and send it to the victim, hoping that the victim gets fooled into entering the account username and password. As soon as victim click on "enter" or "login" login button this information reaches to the attacker using scripts or online form processors while the user(victim) is redirected to home page of e-mail service provider.

Never give reply to the messages which are demanding for your username-password, urging to be e-mail service provider.

It is possible to try to obtain the passwords through other different methods, such as social engineering, wiretapping, keystroke logging, login spoofing, dumpster diving, phishing, shoulder surfing, timing attack, acoustic cryptanalysis, using a Trojan Horse or virus, identity management system attacks (such as abuse of Self-service password reset) and compromising host security.
However, cracking usually designates a guessing attack.

Sunday, January 30, 2011

Orkut Tricks

Orkut Trick for posting Blank Scrap

Wonder How to write blank scrap / blank post ?
If you like this simple trick, please do refer your friends.

For writing blank scrap, follow the steps:

1) Open any scrapbook.
2) Write [i] in the scrapbook.
3) Do NOT write anything else in the scrapbook, and submit the scrap.
That's all.
NOTE:
You can also use [b] tag instead of [i] tag
You can also use this method to post a blank entry in any community forum.
&
Or Just Type The following in any Scrap




Write Your Name in Heart Shape


Click here

_________AnkitAnk____________AnkitAnki
______AnkitAnkitAnki_______AnkitAnkitAnkitA
____AnkitAnkitAnkitAnki___AnkitAnkitAnkitAnki
___AnkitAnkitAnkitAnkitAnkitAnkitAn_______Anki
__AnkitAnkitAnkitAnkitAnkitAnkitAn_________Anki
_AnkitAnkitAnkitAnkitAnkitAnkitAnkitA_______Ankit
_AnkitAnkitAnkitAnkitAnkitAnkitAnkitAnkit______Ank
AnkitAnkitAnkitAnkitAnkitAnkitAnkitAnkitAnki__AnkitA
AnkitAnkitAnkitAnkitAnkitAnkitAnkitAnkitAnkitAn_Ankit
AnkitAnkitAnkitAnkitAnkitAnkitAnkitAnkitAnkitAnkitAnk
AnkitAnkitAnkitAnkitAnkitAnkitAnkitAnkitAnkitAnkitAn
_AnkitAnkitAnkitAnkitAnkitAnkitAnkitAnkitAnkitAnkit
__AnkitAnkitAnkitAnkitAnkitAnkitAnkitAnkitAnkitAn
____AnkitAnkitAnkitAnkitAnkitAnkitAnkitAnkitAn
______AnkitAnkitAnkitAnkitAnkitAnkitAnkitAn
_________AnkitAnkitAnkitAnkitAnkitAnkitA
____________AnkitAnkitAnkitAnkitAnkit
______________AnkitAnkitAnkitAnkit
_________________AnkitAnkitAnk
__________________AnkitAnki
___________________AnkitA
____________________Anki
____________________An


Orkut scrap trick for mirror message


Let your text show view its face in the mirror.

example: Trickfriend = dneirfkcirT

For writing mirror scrap, follow the steps:

1. Type the text in the scrapbook or any text box.

2. Type &#8238 without spaces before the message in the text box.

3. Now ENTER.