Monday, September 26, 2011

Who started the concept of Hacking? History researched


John Draper
Draper was one of the first well known phone hackers, and the first famous “phone phreak”. He was honorably discharged from the US Air Force in 1968 after posting in Vietnam, and then became an engineer at the electronics company National Semiconductor.
Steve Worniak
Worniak is a computer engineer and the co-founder of Apple Inc. (with Steve Jobs.) Worniak is credited with greatly contributing to the personal computer revolution of the 1970s. The Apple II gained a sizable amount of popularity, eventually becoming one of the best selling personal computers of the 1970s and early 1980s.
Kevin Mitnick
Mitnick has been undeniably titled the greatest hacker of our time. He has forever changed the way we handle information security and trust both computer and social networks. He was on the run from the F.B.I. for 3 years using fake identities. Police Officials were scarred of Kevin locking him up for 4 years without a trial
Draper, Worniak and Mitnick laid the foundation of hacking through the 1970s. So you may ask, how was hacking started, and why? ? In the 1970s phone companies started relying on computers to track phone calls. Which saved a lot of time and money for the companies, but also created havoc as “phone phreaking” began. John Draper began “phone phreaking” by using a whistle he dug out of a Captain Crunch box.(earning him his nickname “Captain Crunch” or “Crunchman”)
Draper was “phone phreaking” by calling some one blowing his whistle, after his whistle is blown the phone call is not tracked, thus giving him a 10 second charge for a phone call he can make to anywhere in the world.
Draper soon created the “blue box”. The blue box was an electronic device that simulates a telephone operator’s dialing console. It functioned by replicating the tones used to switch long-distance calls and using them to route the user’s own call, bypassing the normal switching mechanism. This box made “phone phreaking” a lot easier and understandable to do.
The phone companies were finding out how their computers were being tricked and investigated. Journalist Ron Rosenbaum smelt a big story and longed to be the author. Ron started to interview many “phone phreakers.” Every interview led to one person, “Captain Crunch.” The article explained Draper’s blue box , how it worked, and even how it was built. The printing of this article brings in Steve Worniak. (Worniak was in his second year at the University Of Burkley majoring in Engineering)
Worniak read Ron’s article and instating became hooked. He tried to reproduce Draper’s “blue box” as described in Ron’s article. Enthusiastic Worniak called Draper and asked if he could make a visit to his dorm at UC Burkley. Draper could not ignore his enthusiasm and agreed. Draper showed him how to manipulate the blue box to call anyone in the world. Worniak asked if he could call the Pope, Draper got the number and they called. The Pope was sleeping, it was four in the morning. That night Worniak absorbed all the codes he could from Draper and other attending guests.
Wile all this “phone phreaking” was going on computers were a rare commodity that only large Businesses had the Luxury to own. This all changed with the new altair 8800, the altair 8800 was the first minicomputer kit. The release of the altair was appealing to many people in the bay area. This appealment led to the beginning of the homebrew computer club, (Steve Worniak was one of the hundreds of members) they had built their atair’s but what was next, what does it do? The homebrew meetings were a place to learn and share new tips and ideas to other members. The homebrew members soon began building their own computers. When you finish building your computer you would bring it to the next meeting and share your experience making it.
After Worniak built his first computer is was obvious he was above the other members. Worniak’s college roommate Steve Jobs talked him into inventing computers to sell for a profit. Jobs was the marketer, Worniak the designer. Their company, Apple Inc introduced the Apple I in the 1970s. Apple Inc. stayed ahead of the competition with the release of the Top Selling Apple II. The Apple II was made based on the idea of making a computer home ready straight out of the box. By 1982 Apple was worth half a billion dollars. With Worniak’s business’ thriving he soon found his love for the homebrew club dieing. He found he could not tell his secrets to other members of the homebrew club. In 1986 the homebrew club disbanded, leaving behind 23 computer companies founded by its members.
The Hackers who had built the computers and created the software where now being looked at as convicts. This revolution started with Kevin Mitnick. Mitnick brought to the table of hacking, social engineering. Social engineering is a collection of techniques used to manipulate people into performing actions or divulging confidential information. For example Mitnick would call phone companies and pretend he was with a different office to retrieve useful information. At age 17 Mitnick broke into the phone companies data base and stole millions of dollars worth of information. (being underage he spent 7 months in juvenile hall)
The movie “War Games” over night changed the term hacker. Steve Worniak who transformed the computer world was a hacker. And now teenagers who had nothing better to do then crack into data bases, were being described as the same term, “hacker.”
Mitnick found his teenage hobby sticking with him. Mitnick, now choosing bigger companies to hack, in 1988 hacked into the network of computer giant DEC, and copied details of top secret software. Later in 1988 the police caught up with Mitnick and arrested him. He was charged to have copied four million dollars worth of software. Mitnick was held in isolation for a year based on the idea he could start a war through the pay phone the inmates used to make collect calls.
Once released Mitnick tapped his investigation officers at Pac Bell. Soon he was issued a warrant for his arrest in 1992. Kevin mad at the injustice of his arrest, ran. Mitnick settled in Denver and worked for a law firm under the name Eric Wies. Kevin was now hacking into the phone companies to get useful information to stay a step ahead of the police.
In 1994 the police caught up with Mitnick in North Carolina under the name Tom Case. Mitnick spent four and half years in jail without trial. Finally going to trial Mitnick was sentenced to five years in prison. After his release Mitnick was not allowed to touch a computer..
Draper,Worniak, and Mitnick established hacking through different methods, “phone phreaking”, hacking to improve computers, and crack into phone files. Although they all used different methods they all contributed to the hacking history

Software Collection to Password Decrypters: Crack Passwords from any file


Have you ever came across any application zipped which you want badly but the sad situation is that it is password protected and in no way you can able to crack it. Then in  such a situation most of us favor to just left out that version and start searching for any alternative application. But do you know there are still some application which can recover passwords from such files easily and are easily accessible via Rapidshare. Few days back I have came across a bundle of such tools called password decrypters… have a look at them.
The list includes:
-Access Driver
-Brutus-AEt2
-Cain and Abel 4.2
-FileZilla PWDump 0.1
-ForceSQL
-John The Ripper 1.7.1 Win
-KMd5 1.03b
-LC3
-MailForce2.4
-MD5 (Linux)
-MD5 Backup (Linux)
-MD5 GUI
-MD5 Toolbox 1.0
-MD5brute 1.0
-Passware 5.0 + Serial
-POP3 BruteForcer
-Sam Decrypt
-Unsecurev1.2
-VNCrack (Linux) 1.21
-VNCrack (Win32) 1.21
These are some of the widely used tool from very past and are most described so if you are also interested to have them in your application arsenal then go through the link below to download the total collection.
Download here

List of most used tool to Hack Login Accounts from several Websites


The word Hacking has gone in such a mad way that everyone would like to try out their hands on how the most of the hackers claims to have hacked any website or login accounts. But most of them fails to do the same as they don’t have the right software. Today in this post i have found several software which hackers were using from a very long time and fortunately all of them are from Rapidshare. If you wanted to try them out any one of them just go through the link provided and use them at your own risk this blog will not be held responsible in any ways.
————————————————————————————–
AccessDiver_4.402
http://rapidshare.com/files/73578278/ad4…r.rar.html
Logins: pop-up
Basic tool. check http://accessdiver.com/ for updates and info!
————————————————————————————–
CForce
http://rapidshare.com/files/73575691/CFV1.01b.zip.html
Logins: pop-up, Form, Strongbox
A very simple and useful tool. Many start with this one.
————————————————————————————–
Sentry_1.4
http://rapidshare.com/files/73574138/sentry1.4.rar.html
Sentry_2.1
http://rapidshare.com/files/73574356/Sentry2.1.zip.html
Sentry_Videotutorial
http://rapidshare.com/files/73574858/Sentry.rar.html
Logins: Mainly pop-up
A very good tool
————————————————————————————–
HTTPBugger_v2.2
http://rapidshare.com/files/73577305/Htt…2.rar.html
Logins: Form/OCR
A tool for advanced people. even sites like pixandvideo or
peternorth are crackable with this little tool.
————————————————————————————–
Charon_0.6
http://rapidshare.com/files/73578915/Cha…6.rar.html
Proxy-checker!
[HIGHLIGHT="red"]Anonymity is most important.[/highlight]
Check your proxies with charon! Highly recommended.
————————————————————————————–
STAPH_1.25
http://rapidshare.com/files/73580097/StA…p.rar.html
Combo-leecher
Leech combos for themed combolists with STAPH!
————————————————————————————–
Raptor_3
http://rapidshare.com/files/73579738/Raptor.rar.html
Wordlister!
Build your own wordlists with Raptor!
—————————————————————————————-

So just go through with this whole list and enjoy whatever you wanted to do….

What are session cookies? How they used to hack email accounts?


Once again welcome back a very interesting article about Session Cookies, which many hackers claiming to have used to hack email accounts or password of several other websites. In this tutorial you will learn how to hack yahoo account using session cookies.
Before we start any further let all you know what these session cookies are… sometimes which called Magic Cookie or Session ID?
However, if we try go in deep, there can be written whole article about these session id’s but in simple ways… these are the string stored when we tends to login our account. But with unfortunate with hackers luck these strings have very short span of life i.e. gets automatically deleted after a set period of time. Now the question where these strings are stored -  In any situation there are only two places where these keys gets stored first one is itself the server and the second one is the browser cookies. And the destruction takes place at three ways first is when you close your web browser, second is when you sign out of your account and third is if you left your account open for more than 20 minutes idle.
How this Cookies accessed on Local System?
As in this article we are using Yahoo account, so to get understand what this cookie is first you need to open yahoo.com and login to your account. After that you have login to yo ur account copy the below code written in bold and then paste in browser address bar.
javascript:alert(document.cookie);
This will open a popup box with a text something like this which is just not able to understand but we even not need to do so.. as only we need this code only.

How to hack email account using session cookies
Now create one fake account on yahoo.com and login in that account and retrieve the cookie in same manner and notice the changes in session ID’s.
Now come to the main point hacking using the session ids…. For hacking the session cookies we first need the session cookies of the victim and its quite simple to get the session cookies of the victim. You just need to send him one link as soon as he clicks on that we will get his session cookie.
Here you should note this point as we have already mentioned that session hacking removes the authentication on the server as we have the AUTO LOGIN cookie. In this type of attack when victim sign out , then hacker will also sign out. But in case of YAHOO its little bit different, when victim signout but attacker still have the access to his account. Yahoo maintains the session for 24 hours and then destroy the session ID’s from its server.
Now how to step further to steal Session Cookies … follow the steps behind…
1. Go to the Website and register there:
http://www.my3gb.com/register.jsp
2. Download the Cookie stealer files:
3. Now upload the four files on the website and create one empty directory naming Cookies as shown below:

4. Send the link of yahoo.php to victim. Now what will happen when user clicks on the yahoo.php is that its cookies are get stored into directory Cookies and simultaneously he is redirected to his account.
5. Now open the link Hacked.PHP to access the cookies. In my files the password is “password”. You need to put that to access the files.

6. You must have got the username of victim’s account. Simply Click on it and it would take you to inbox of victim’s yahoo account without asking for any password.

Now it doesn’t matter if victim signs out from his account, you would remain logged into it. 
Note: You can try this attack by using two browsers. Sign into yahoo account in one browser and run the code. Then sign in through other browser using stolen session.

Learn how do a Yahoo Chatting can Hack a Yahoo Account: Hacking via Chatting


Though this is not a 100% full proof trick as on some location it seems to work while another time it doesn’t. So if you are in the process of learn hacking then not a bad thing to worth a try. Now let’s we look at the possibilities, as I have already said it has only fraction of chances that would yield the positive result.
Now look at the process goes on while we do yahoo chatting
1) When we chat on yahoo every thing goes through the server.Only when we chat that’s messages.
2) When we send files yahoo has 2 options
a) Either it uploads the file and then the other client has to down load it.
Either it connects to the client directly and gets the files
3) When we use video or audio:-
a) It either goes thru the server or it has client to client connection.
And when we have client to client connection the opponents IP is revealed.On the 5051 port.So how do we exploit the Chat user when he gets a direct connection. And how do we go about it.Remember i am here to hack a system with out using a TOOL only by simple net commands and yahoo chat techniques.Thats what makes a difference between a real hacker and new bies.
So the Conclusion
1. It is almost impossible to trace the IP address of guy we are catting with.
2. There are only we have 50% chances of tracing an IP address hen you send files
3. Again 50 % chances of getting IP when you use video or audio.
So finally we have a chance of only 50% so now let’s explore our luck of hacking an Yahoo Account..
1) Go to dos
type ->
netstat -n 3
You will get the following output.Just do not care and be cool Active Connections
Proto Local Address Foreign Address State
TCP 194.30.209.15:1631 194.30.209.20:5900 ESTABLISHED
TCP 194.30.209.15:2736 216.136.224.214:5050 ESTABLISHED
TCP 194.30.209.15:2750 64.4.13.85:1863 ESTABLISHED
TCP 194.30.209.15:2864 64.4.12.200:1863 ESTABLISHED

Active Connections
Proto Local Address Foreign Address State
TCP 194.30.209.15:1631 194.30.209.20:5900 ESTABLISHED
TCP 194.30.209.15:2736 216.136.224.214:5050 ESTABLISHED
TCP 194.30.209.15:2750 64.4.13.85:1863 ESTABLISHED
TCP 194.30.209.15:2864 64.4.12.200:1863 ESTABLISHED

Just i will explain what the out put is in general.In left hand side is your IP address.And in right hand side is the IP address of the foreign machine.And the port to which is connected.Ok now so what next ->
2) Try sending a file to the Target .
if the files comes from server.Thats the file is uploaded leave it. You will not get the ip.But if a direct connection is established HMMMM then the first attacker first phase is over. This is the output in your netstat. The 5101 number port is where the Attacker is connected.
Active Connections
Proto Local Address Foreign Address State
TCP 194.30.209.15:1631 194.30.209.20:5900 ESTABLISHED
TCP 194.30.209.15:2736 216.136.224.214:5050 ESTABLISHED
TCP 194.30.209.15:2750 64.4.13.85:1863 ESTABLISHED
TCP 194.30.209.15:2864 64.4.12.200:1863 ESTABLISHED
TCP 194.30.209.15:5101 194.30.209.14:3290 ESTABLISHED

3) so what next???
Hmmm…….. Ok so make a DOS attack now
Go to dos prompt and
Just do
nbtstat -A Attackers IPaddress.Can happen that if system is not protected then you can see the whole network.
C:\>nbtstat -A 194.30.209.14
Local Area Connection:
Node IpAddress: [194.30.209.15] Scope Id: []
NetBIOS Remote Machine Name Table
Name Type Status
———————————————
EDP12 <00> UNIQUE Registered
XYZ <00> GROUP Registered
XYZ <20> UNIQUE Registered
XYZCOMP1 <1E> GROUP Registered

MAC Address = 00-C0-W0-D5-EF-9A
Ok so you will ask now what next???
No you find what you can do with this network than me explaining everything.
so post ur comments and lemme know….
So the conclusion is never exchange files , video or audio till you know that the user with whom you are chatting is not going to harm you.
1) When we chat on yahoo every thing goes through the server.Only when we chat thats messages.
2) When we send files yahoo has 2 options
a) Either it uploads the file and then the other client has to down load it.
Either it connects to the client directly and gets the files
3) When we use video or audio:-
a) It either goes thru the server or it has client to client connection.
And when we have client to client connection the opponents IP is revealed.On the 5051 port.So how do we exploit the Chat user when he gets a direct connection. And how do we go about it.Remember i am here to hack a system with out using a TOOL only by simple net commands and yahoo chat techniques.Thats what makes a difference between a real hacker and new bies.
So lets analyse
1) Its impossible to get a Attackers IP address when you only chat.
2) There are 50 % chances of getting a IP address when you send files
3) Again 50 % chances of getting IP when you use video or audio.
So lets exploit those 50 % chances .
I’ll explain only for files here which lies same for Video or audio
1) Go to dos
type ->
netstat -n 3
You will get the following output.Just do not care and be cool
Active Connections
Proto Local Address Foreign Address State
TCP 194.30.209.15:1631 194.30.209.20:5900 ESTABLISHED
TCP 194.30.209.15:2736 216.136.224.214:5050 ESTABLISHED
TCP 194.30.209.15:2750 64.4.13.85:1863 ESTABLISHED
TCP 194.30.209.15:2864 64.4.12.200:1863 ESTABLISHED

Active Connections
Proto Local Address Foreign Address State
TCP 194.30.209.15:1631 194.30.209.20:5900 ESTABLISHED
TCP 194.30.209.15:2736 216.136.224.214:5050 ESTABLISHED
TCP 194.30.209.15:2750 64.4.13.85:1863 ESTABLISHED
TCP 194.30.209.15:2864 64.4.12.200:1863 ESTABLISHED

Just i will explain what the out put is in general.In left hand side is your IP address.And in right hand side is the IP address of the foreign machine.And the port to which is connected.Ok now so what next ->
2) Try sending a file to the Target .
if the files comes from server.Thats the file is uploaded leave it. You will not get the ip.But if a direct connection is established HMMMM then the first attacker first phase is over. This is the output in your netstat. The 5101 number port is where the Attacker is connected.
Active Connections
Proto Local Address Foreign Address State
TCP 194.30.209.15:1631 194.30.209.20:5900 ESTABLISHED
TCP 194.30.209.15:2736 216.136.224.214:5050 ESTABLISHED
TCP 194.30.209.15:2750 64.4.13.85:1863 ESTABLISHED
TCP 194.30.209.15:2864 64.4.12.200:1863 ESTABLISHED
TCP 194.30.209.15:5101 194.30.209.14:3290 ESTABLISHED

3) so what next???
Hmmm…….. Ok so make a DOS attack now
Go to dos prompt and
Just do
nbtstat -A Attackers IPaddress.Can happen that if system is not protected then you can see the whole network.
C:\>nbtstat -A 194.30.209.14
Local Area Connection:
Node IpAddress: [194.30.209.15] Scope Id: []
NetBIOS Remote Machine Name Table
Name Type Status
———————————————
EDP12 <00> UNIQUE Registered
XYZ <00> GROUP Registered
XYZ <20> UNIQUE Registered
XYZCOMP1 <1E> GROUP Registered

MAC Address = 00-C0-W0-D5-EF-9A
Ok so you will ask now what next???
No you find what you can do with this network than me explaining everything.
so post ur comments and lemme know….
So the conclusion is never exchange files , video or audio till you know that the user with whom you are chatting is not going to harm you.

What is Facebook Freezer: How it used to hack Facebook Account


Hacking term which seems to be very tough word but in reality it is neither a tough job nor an easy one. Not a tough job if you have the right software but even though you have the good applications to perform several tricks you need to have quite careful this is why I have said it nor an easy one. Now tell me what is the most loved social networking site… I know without any argument it is Facebook, this is why it is said to be the most prone area over the web, to get any hacker attention.
Being so popular there are so many tools and tricks developed claiming that they can hack any Facebook account, today we will discuss one such tool called Facebook Freezer, which prevents victim from logging to his account even when he enters his right login credentials.
What is Facebook Freezer; How it Works: As we all know Facbook suspends any account for a while if it detects that wrong login-id and password entered several times, that’s is the trick Facebook Freezer implements. It selects random login id and password combination to login to victim account. Due to wrong login attempts, Facebook temporarily bans the victim from logging in to his account.  But even if Facebook detects that unauthorized activity still on the way Facebook bans victim from logging in to his account as long as Freezer is running. Thus, in-spite of correct login id and password, victim is unable to login to his Facebook account. Thus, we are able to hack Facebook account using Facebook Freezer.
How to use Facebook Freezer:
Well, its very easy to use Facebook freezer to hack Facebook account.
1. Free Download Facebook Freezer to hack Facebook account.
2. Unzip the file and run Facebook freezer.exe file (works perfectly on Windows XP and Windows Vista) on your computer.
3. You will see something like this

4. Now, enter the login id of the victim whose you wanna hack facebook account and hit on “Freeze”. Facebook Freezer will start its work and within few minutes, victim’s Facebook account will be freezed.
Note: For Facebook Freezer to freeze account, victim must logout from his Facebook account. So, use Facebook Freezer whenever you find victim not online on Facebook.
I hope this you can now hack Facebook account using this Facebook Freezer. Facebook Freezer is one of the simplest ways used to hack Facebook account. If you have any problem in using this Facebook freezer to hack Facebook account, please mention it in comments.
Enjoy Facebook Freezer to hack Facebook account…

Wanted to be a Hacker! The best Operating System for Hacking


These days the word Hacking is one of the most popular keywords searched or being interrogated. Though there are so many articles we can get around over the web which claims to have the best hacking materiel as well as there are so many tools also available to get the idea of hacking. On this blog as we have several articles written related to hacking world; but on this post today we will know about the best operating system .. preferred by several  hacker….
To get so I have searched many forums and articles and reached a final conclusion that the favorite Operating System for Hackers is a Linux Based Operating called BackTrack Linux… as well as the Microsoft Windows XP. These are also one of the easiest operating system as well but have so many functionality and feature you would love to know. Windows XP is still the most loved windows operating system and there is nothing left secret so here i think I need not to have it explained… so here just we will discuss only BackTrack Linux.
Best Operating System used by Hackers: Backtrack Linux
As I have already said Backtrack Linux is the most loved operating system not because it is the easiest but because it has the functionality that aids security professionals in the ability to perform assessments in a purely native environment dedicated to hacking. Regardless if you’re making BackTrack your primary operating system, booting from a Live DVD, or using your favourite thumb drive, BackTrack has been customized down to every package, kernel configuration, script and patch solely for the purpose of the penetration tester.
This operating system not only suited to the experienced profession but early newcomers can also get the information they need to start their carrier. BackTrack promotes a quick and easy way to find and update the largest database of security tool collection to-date. Back Track is quite possibly the most comprehensive Linux distribution of security tools. Both hackers and crackers can appreciate the features of this distribution. For black-hat hackers, it provides an easy access to software that facilitates exploitations for secured systems and other reverse engineering. For white-hatters, it is a penetration tester that finds holes in a security scheme. See, everybody wins!
Why we favor BackTrack Linux Major Features
The linux Distribution  BackTrack has the latest in security penetration software with the installation. You don’t need any special driver installation packages to be installed as it has the latest Kernel system perfectly patched for attacks. For example, an Atheros-based wireless networking adapter will no enter monitor mode or inject packets without the MadWiFi driver patch. With BackTrack, you don’t need to worry about that. It’s just plug-and-play ready-to-go!
What’s great is that this Linux distribution comes Live-on-CD. So, no installation is needed. However, what you experience BackTrack, you will realize that it is a must to download this operating system and install it on your Laptop. At the very least, download the VMWare Virtual Appliance for Backtrack. Make sure you also install the VMWare Tools for Linux as well. Many features will still work in VMWare mode.
  • Based on: Debian, Ubuntu
  • Origin: Switzerland
  • Architecture: i386
  • Desktop: Fluxbox, KDE
  • Category: Forensics, Rescue, Live Medium
  • Cost: Free
Hacking Tools:
BackTrack provides users with easy access to a comprehensive and large collection of security-related tools ranging from port scanners to password crackers. Support for Live CD and Live USB functionality allows users to boot BackTrack directly from portable media without requiring installation, though permanent installation to hard disk is also an option.
BackTrack includes many well known security tools including:
  • Metasploit integration
  • RFMON Injection capable wireless drivers
  • Kismet
  • Nmap
  • Ettercap
  • Wireshark (formerly known as Ethereal)
  • BeEF (Browser Exploitation Framework)
A large collection of exploits as well as more common place software such as browsers. BackTrack arranges tools into 11 categories:
  • Information Gathering
  • Network Mapping
  • Vulnerability Identification
  • Web Application Analysis
  • Radio Network Analysis (802.11, Bluetooth, Rfid)
  • Penetration (Exploit & Social Engineering Toolkit)
  • Privilege Escalation
  • Maintaining Access
  • Digital Forensics
  • Reverse Engineering
  • Voice Over IP
and much more…. the list endless and lot more such features….

Some Google Search Tricks you should know


Though I have already posted some great and useful google tricks in the blog already but today here you will some more very useful Google tricks to play with them. These trick can also be considered in the ctaegory “You shold Know while using google” when searching something in Google search engine.
1) Searching Musics in Google search engine
Just copy and paste the code in Google search engine and just replace the values in red.
Method 1

“parent directory” NAME OF THE SONG OR ARTIST -xxx
-html -htm -php -shtml -opendivx -md5
-md5sums

Example:

“parent directory” EMINEM -xxx
-html -htm -php -shtml -opendivx -md5
-md5sums
If method 1 doesn’t work try method 2
Method 2

intitle:”index.of” (mp4|mp3|avi) NAME OF THE SONG OR ARTIST -asp -htm -html -cf -jsp
Example:

intitle:”index.of” (mp4|mp3|avi) EMINEM -asp -htm -html -cf -jsp
2) Searching images in Google with “Advanced Image Search”
Just visit this site – http://www.google.com/advanced_image_search
3) Google + Social Networking Sites = Free Stuff
Searching for free stuff online? Such as wallpaper, stock images, WordPress templates, ringtones or icons?
Just copy and paste the code in Google. You can change the values in red if want to search for other stuffs.
site:del.icio.us free “stock images”
site:reddit.com free “wordpress templates”
site:stumbleupon.com free icons
Example:
site:reddit.com free “wordpress templates”
site:stumbleupon.com free icons
site:digg.com free “desktop wallpaper”
4) Search for Free E-Books
You can also visit this site and request for free E-Books.
-inurl:(htm|html|php) intitle:”index of” +”last modified” +”parent directory” +description +size +(pdf|doc) “TITLE OF THE E-BOOK″
Example:
-inurl:(htm|html|php) intitle:”index of” +”last modified” +”parent directory” +description +size +(pdf|doc) “COOKING″
Results for Cooking
5) Search for Videos
-inurl:(htm|html|php) intitle:”index of” +”last modified” +”parent directory” +description +size +(mpg|wmv) “TITLE OF VIDEO”
Example:
-inurl:(htm|html|php) intitle:”index of” +”last modified” +”parent directory” +description +size +(mpg|wmv) “SUPERMAN”
Results for Superman
6) Search for Free Anonymous Web Proxies
If you want to search for free proxies, copy the code below. You can also read this tutorial on how to setup on your own proxy on your web browsers.
inurl:”nph-proxy.cgi” “start using cgiproxy”
inurl:”nph-proxy.cgi” “Start browsing through this CGI-based proxy”
Example:
inurl:”nph-proxy.cgi” “start using cgiproxy”
inurl:”nph-proxy.cgi” “Start browsing through this CGI-based proxy”
7) Additionals
  • link:URL = lists other pages that link to the URL.
  • related:URL = lists other pages that are related to the URL.
  • site:domain.com “search term = restricts search results to the given domain.
  • allinurl:WORDS = shows only pages with all search terms in the url.
  • inurl:WORD = like allinurl: but filters the URL based on the first term only.
  • allintitle:WORD = shows only results with terms in title.
  • intitle:WORD = similar to allintitle, but only for the next word.
  • cache:URL = will show the Google cached version of the URL.
  • info:URL = will show a page containing links to related searches, backlinks, and pages containing the url. This is the same as typing the url into the search box.
  • filetype:SOMEFILETYPE = will restrict searches to that filetype
  • -filetype:SOMEFILETYPE = will remove that file type from the search.
  • site:www.somesite.net “+www.somesite.net” = shows you how many pages of your site are indexed by google
  • allintext: = searches only within text of pages, but not in the links or page title
  • allinlinks: = searches only within links, not text or title
  • WordA OR WordB = search for either the word A or B
  • “Word” OR “Phrase” = search exact word or phrase
  • WordA -WordB = find word A but filter results that include word B
  • WordA +WordB = results much contain both Word A and Word B
  • ~WORD = looks up the word and its synonyms
  • ~WORD -WORD = looks up only the synonyms to the word 

Trick to find only high quality videos from YouTube with download links


As we all are very fond of YouTube Videos but not every time we are lucky with those videos with a maximum satisfaction…. because many times the videos came through the result page… of very low quality.
Now today here is a YouTube trick which will force it display only high quality videos just follow the steps given below
Step1: Click to video that you want to see, the link will display on Address bar.
Example:  http://www.youtube.com/watch?v=Ne1l6VNkuLM
Step2: Add &fmt=6 to the end of that string.
After adding the code the address will look like this-  http://www.youtube.com/watch?v=Ne1l6VNkuLM&fmt=6
You can also change the value 6 to 8 which would result in more high quality videos as shown in the steps below
Add   &fmt=18 to the end of that string, you’ll have the best quality video with direct download link !
http://www.youtube.com/watch?v=Ne1l6VNkuLM&fmt=18

Enjoy watching youtube

The Top Ten Lessons Steve Jobs Can Teach Us - If We'll Listen


In a few years from now, your kids and grandkids will ask you what it was like to be alive when Steve Jobs was the CEO of Apple (AAPL).  They will say: “Jobs was the best CEO in business.  What was he like? What did you learn from him?”
What will your answer be?


It’s human nature to overlook the importance of the here and now.  Those who are great and live among us seem more normal because they’re breathing the same air that we are.
But, make no mistake, once Steve Jobs is no longer with us, there will be an outpouring of emotion.  The tributes will be endless.  And there will be collective regret that we weren’t more awake, paying attention, while he was with us.
The wisdom he shared with us at every major speech, or on an earnings call, or in a casual chat put up on YouTube will seem 10 times wiser because he’s no longer with us.
So, let’s pause today and try to remind ourselves of some lessons Steve Jobs has taught us all — if we’ve been willing to pay attention:

1. The most enduring innovations marry art and science – Steve has always pointed out that the biggest difference between Apple and all the other computer (and post-PC) companies through history is that Apple always tried to marry art and science.  Jobs pointed out the original team working on the Mac had backgrounds in anthropology, art, history, and poetry.  That’s always been important in making Apple’s products stand out.  It’s the difference between the iPad and every other tablet computer that came before it or since.  It is the look and feel of a product.  It is its soul.  But it is such a difficult thing for computer scientists or engineers to see that importance, so any company must have a leader that sees that importance.
2. To create the future, you can’t do it through focus groups – There is a school of thought in management theory that — if you’re in the consumer-facing space building products and services — you’ve got to listen to your customer.  Steve Jobs was one of the first businessmen to say that was a waste of time.  The customers today don’t always know what they want, especially if it’s something they’ve never seen, heard, or touched before.  When it became clear that Apple would come out with a tablet, many were skeptical.  When people heard the name (iPad), it was a joke in the Twitter-sphere for a day.  But when people held one, and used it, it became a ‘must have.’  They didn’t know how they’d previously lived without one.  It became the fastest growing Apple product in its history.  Jobs (and the Apple team) trusted himself more than others.  Picasso and great artists have done that for centuries.  Jobs was the first in business.
3. Never fear failure – Jobs was fired by the successor he picked.  It was one of the most public embarrassments of the last 30 years in business.  Yet, he didn’t become a venture capitalist never to be heard from again.  He didn’t start a production company and do a lot of lunches.  He picked himself up and got back to work following his passion.  Eight years ago, he was diagnosed with pancreatic cancer and told he only had a few weeks to live.  As Samuel Johnson said, there’s nothing like your impending death to focus the mind.  From Jobs’ 2005 Stanford commencement speech:
No one wants to die. Even people who want to go to heaven don’t want to die to get there. And yet death is the destination we all share. No one has ever escaped it. And that is as it should be, because Death is very likely the single best invention of Life. It is Life’s change agent. It clears out the old to make way for the new. Right now the new is you, but someday not too long from now, you will gradually become the old and be cleared away. Sorry to be so dramatic, but it is quite true.
Your time is limited, so don’t waste it living someone else’s life. Don’t be trapped by dogma — which is living with the results of other people’s thinking. Don’t let the noise of others’ opinions drown out your own inner voice. And most important, have the courage to follow your heart and intuition. They somehow already know what you truly want to become. Everything else is secondary.
4. You can’t connect the dots forward – only backward – This is another gem from the 2005 Stanford speech.  The idea behind the concept is that, as much as we try to plan our lives ahead in advance, there’s always something that’s completely unpredictable about life.  What seems like bitter anguish and defeat in the moment — getting dumped by a girlfriend, not getting that job at McKinsey, “wasting” 4 years of your life on a start-up that didn’t pan out as you wanted — can turn out to sow the seeds of your unimaginable success years from now.  You can’t be too attached to how you think your life is supposed to work out and instead trust that all the dots will be connected in the future.  This is all part of the plan.
Again, you can’t connect the dots looking forward; you can only connect them looking backwards. So you have to trust that the dots will somehow connect in your future. You have to trust in something — your gut, destiny, life, karma, whatever. This approach has never let me down, and it has made all the difference in my life.
5. Listen to that voice in the back of your head that tells you if you’re on the right track or not – Most of us don’t hear a voice inside our heads.  We’ve simply decided that we’re going to work in finance or be a doctor because that’s what our parents told us we should do or because we wanted to make a lot of money.  When we consciously or unconsciously make that decision, we snuff out that little voice in our head.  From then on, most of us put it on automatic pilot.  We mail it in.  You have met these people.  They’re nice people.  But they’re not changing the world.  Jobs has always been a restless soul.  A man in a hurry.  A man with a plan.  His plan isn’t for everyone.  It was his plan. He wanted to build computers.  Some people have a voice that tells them to fight for democracy.  Some have one that tells them to become an expert in miniature spoons.  When Jobs first saw an example of a Graphical User Interface — a GUI — he knew this was the future of computing and that he had to create it.  That became the Macintosh.  Whatever your voice is telling you, you would be smart to listen to it.  Even if it tells you to quit your job, or move to China, or leave your partner.


6. Expect a lot from yourself and others – We have heard stories of Steve Jobs yelling or dressing down staff.  He’s a control freak, we’ve heard – a perfectionist.  The bottom line is that he is in touch with his passion and that little voice in the back of his head.  He gives a damn.  He wants the best from himself and everyone who works for him.  If they don’t give a damn, he doesn’t want them around.  And yet — he keeps attracting amazing talent around him.  Why?  Because talent gives a damn too.  There’s a saying: if you’re a “B” player, you’ll hire “C” players below you because you don’t want them to look smarter than you.  If you’re an “A” player, you’ll hire “A+” players below you, because you want the best result.

7. Don’t care about being right.  Care about succeeding – Jobs used this line in an interview after he was fired by Apple.  If you have to steal others’ great ideas to make yours better, do it.  You can’t be married to your vision of how a product is going to work out, such that you forget about current reality.  When the Apple III came out, it was hot and warped its motherboard even though Jobs had insisted it would be quiet and sleek.  If Jobs had stuck with Lisa, Apple would have never developed the Mac.
8. Find the most talented people to surround yourself with – There is a misconception that Apple is Steve Jobs.  Everyone else in the company is a faceless minion working to please the all-seeing and all-knowing Jobs.  In reality, Jobs has surrounded himself with talent: Phil Schiller, Jony Ive, Peter Oppenheimer, Tim Cook, the former head of stores Ron Johnson.  These are all super-talented people who don’t get the credit they deserve.  The fact that Apple’s stock price has been so strong since Jobs left as CEO is a credit to the strength of the team.  Jobs has hired bad managerial talent before.  John Sculley ended up firing Jobs and — according to Jobs — almost killing the company.  Give credit to Jobs for learning from this mistake and realizing that he can’t do anything without great talent around him.
9. Stay hungry, stay foolish - Again from the end of Jobs’ memorable Stanford speech:
When I was young, there was an amazing publication called The Whole Earth Catalog, which was one of the bibles of my generation. It was created by a fellow named Stewart Brand not far from here in Menlo Park, and he brought it to life with his poetic touch. This was in the late 1960′s, before personal computers and desktop publishing, so it was all made with typewriters, scissors, and polaroid cameras. It was sort of like Google in paperback form, 35 years before Google came along: it was idealistic, and overflowing with neat tools and great notions.
Stewart and his team put out several issues of The Whole Earth Catalog, and then when it had run its course, they put out a final issue. It was the mid-1970s, and I was your age. On the back cover of their final issue was a photograph of an early morning country road, the kind you might find yourself hitchhiking on if you were so adventurous. Beneath it were the words: “Stay Hungry. Stay Foolish.” It was their farewell message as they signed off. Stay Hungry. Stay Foolish. And I have always wished that for myself. And now, as you graduate to begin anew, I wish that for you.
Stay Hungry. Stay Foolish.
10. Anything is possible through hard work, determination, and a sense of vision – Although he’s the greatest CEO ever and the father of the modern computer, at the end of the day, Steve Jobs is just a guy.  He’s a husband, a father, a friend — like you and me.  We can be just as special as he is — if we learn his lessons and start applying them in our lives.  When Jobs returned to Apple in the 1990s, it was was weeks away from bankruptcy.  It’s now the biggest company in the world.  Anything’s possible in life if you continue to follow the simple lessons laid out above.
May you change the world.