G-TechZone

G-TechZone
TechNlog
Vulnerability Scanner
Subscribe For Free Updates!

We'll not Spam !!! We Promise.

Showing posts with label FAQ's. Show all posts
Showing posts with label FAQ's. Show all posts

May 8, 2014

Full Forms Related to IT

BASIC KNOWLEDGE OF IT.

Fellas!!!
Nowadays we All use Computers/Mobiles/Tablets etc.
As per Knowledge Sensation People only know How to Utilize it!!!
But, Does'nt Know How and What this Actually Mean??
So, I am here to Give you Important Full Forms which is Neccessary to Remember and
NOT to be DUMP :)

----------------------------
hERE We go...
=

* HTTP - Hyper Text Transfer Protocol.

* HTTPS - Hyper Text Transfer Protocol Secure.


* IP - Internet Protocol.


* URL - Uniform Resource Locator.


* USB - Universal Serial Bus.


* VIRUS - Vital Information Resource Under Seized.


* 3G - 3rd Generation.


* GSM - Global System for Mobile Communication.


* CDMA - Code Divison Multiple Access.


* UMTS - Universal Mobile Telecommunication System. 


* SIM - Subscriber Identity Module.

* AVI = Audio Video Interleave


* RTS = Real Time Streaming


* SIS = Symbian OS Installer File

* AMR = Adaptive Multi-Rate Codec

* JAD = Java Application Descriptor

* 3GP = 3rd Generation Project

* MP3 = MPEG player lll

* MP4 = MPEG-4 video file

* AAC = Advanced Audio Coding

* GIF = Graphic InterchangeableFormat

* JPEG = Joint Photographic ExpertGroup

* BMP = Bitmap

* SWF = Shock Wave Flash

* WMV = Windows Media Video

* WMA = Windows Media Audio

* WAV = Waveform Audio

* PNG = Portable Network Graphics

* DOC = Document (Microsoft Corporation)

* PDF = Portable Document Format

* M3G = Mobile 3D Graphics

* M4A = MPEG-4 Audio File

* NTH = Nokia Theme (series 40)

* THM = Themes (Sony Ericsson)

* MMF = Synthetic Music Mobile Application File

* NRT = Nokia Ringtone

* XMF = Extensible Music File

* WBMP= Wireless Bitmap Image

* DVX = DivX Video

* HTML = Hyper Text Markup Language

* WML = Wireless Markup Language

* CD - Compact Disk.

* DVD - Digital Versatile Disk.

* CRT - Cathode Ray Tube.

* DAT - Digital Audio Tape.

* DOS - Disk Operating System.

* GUI - Graphical User Interface.

* HTTP - Hyper Text Transfer Protocol.

* IP - Internet Protocol.

* ISP - Internet Service Provider.

* TCP - Transmission Control Protocol.

* UPS - UninterruptiblePower Supply.

* HSDPA - High Speed Downlink Packet Access.

* EDGE - Enhanced Data Rate for GSM [Global System for Mobile Communication] Evolution.

* VHF - Very High Frequency.

* UHF - Ultra High Frequency.

* GPRS - General Packet Radio Service.

* WAP - Wireless Application Protocol.

* TCP - Transmission Control Protocol.

* ARPANET - Advanced Research Project Agency Network.

* IBM - International Business Machines.

* HP - Hewlett Packard.

* AM/FM - Amplitude/ Frequency Modulation.

* WLAN - Wireless Local Area Network...

===============================================================

Hope you got the Best you wanted!!!
Please Like & Share on your Social Sites!
Thankyou :)

Jan 27, 2014

How to Create folders without Any Name or Symbols in Windows !!!!

Do you know how to name any Folder / File without name?  
-----------------
If Not, Read this post. You can challenge to your friends that you can name a file without the name. Here is the simple and easy Two Steps trick.







Step:1  Create a New Folder.


Step:2  Name the Folder by Holding Alt and press 6655 on Number-pad and press Enter button.That’s it now see the magic folder without the name.
 
But, make sure to press the numbers from the numpad and not from the numbers below the F1 – F12 keys. And take note that you only can create one folder without name in a directory. - See more at: http://programmer-choice.blogspot.in/2012/03/create-folder-without-name-in-windows-7.html#sthash.ZyNEAKJV.dpufame.


*******************************************************


But Make sure that you are Pressing Numbers from 'Num_Pad' and Not from the Numbers below F1 -F12 Buttons





Note: This trick works on all windows operating systems.
But, make sure to press the numbers from the numpad and not from the numbers below the F1 – F12 keys. And take note that you only can create one folder without name in a directory. - See more at: http://programmer-choice.blogspot.in/2012/03/create-folder-without-name-in-windows-7.html#sthash.ZyNEAKJV.dpuf
But, make sure to press the numbers from the numpad and not from the numbers below the F1 – F12 keys. And take note that you only can create one folder without name in a directory. - See more at: http://programmer-choice.blogspot.in/2012/03/create-folder-without-name-in-windows-7.html#sthash.ZyNEAKJV.dpuf
--------------

But, make sure to press the numbers from the numpad and not from the numbers below the F1 – F12 keys. And take note that you only can create one folder without name in a directory. - See more at: http://programmer-choice.blogspot.in/2012/03/create-folder-without-name-in-windows-7.html#sthash.ZyNEAKJV.dpuf
But, make sure to press the numbers from the numpad and not from the numbers below the F1 – F12 keys. And take note that you only can create one folder without name in a directory. - See more at: http://programmer-choice.blogspot.in/2012/03/create-folder-without-name-in-windows-7.html#sthash.ZyNEAKJV.dpuf


Do Like & Comment :)
Thank you.

Nov 25, 2013

How To Hack a website ?





In this article I will explain you how you can hack a 

website using SQL injection havij.


Just Follow these easy steps :-

-----------------------------------------------------------


1. First download havij from here 





2. Run Havij SQL Injection software and copy and paste 

vulnerable website link





3. Now click in the “Analyze” Button





4. Then It shows some messages there. Be alert on it 

and be show patience for sometime to find it’s 

vulernable and type of injection and if db server is 

MySQL   it will find database name.Then after get it’s 

database is name like xxxx_xxxx





5. Then Move to another operation to find tables by 

clicking “tables”. Now click “Get tables”

 Then wait some time if needed




6. After founded the tables ,you can see there will be 

“users” Put mark on it and click in the ” get columns ” 

tab






7. In that Just put mark username and password and 

click “Get data”




8. Finally you got now Username and Password of the 

Admin









Nov 22, 2013

Who Want To Become A Hacker ??

I see some People Around saying that I am a Hacker just because they use Some 3rd Party Software & Simply follw the Instructions given by software.
But , I say to you that Doing Such things are just a Crap & Nothing else Because They Don't have GeEk knowledge in Computers & Technology..









---

Here I will Give youSome Advice For You for those who want to become an HACKER.


********************************************

1) Never trust sites that ask you for money in return of Hacking Softwares or who claim to Hack Email Id’s in return of money. All such things are Scam . Nothing Works.




2) There is NO DIRECT    SOFTWARE to Hack Facebook ,    Google , Yahoo or any other big website. All the softwares that claim to do so are scam. They are just meant to take your money and in worse
cases, those softwares have trojans or keyloggers in them.  As a result your account gets Hacked trying to Hack others.




3) NEVER EVER use the keyloggers or trojans you find as freeware on internet. Hackers are not fools. They compile keyloggers and trojans almost with any such software and when you install
them , you are already hacked before even trying to hack others.




4) You are never going to be a good hacker without the knowledge of programming and scripting languages. When you are going to use only ready made softwares and would depend on them for hacking anything then your functionality would be limited upto the functionality of the software. When you are not going to use your brain , just doing the copy paste thing, then how can you even think of being a good hacker.






5) If you are a good Hacker, you already become a good
programmer , a good script
writer , a good web developer
and an excellent security
expert.
Well any good Hacker will/should have good knowledge of various aspects
and programming languages.
to do XSS (Cross Site
Scripting ) , PHP INJECTION , SQL
INJECTION , PHISHING , FOOTPRINTING etc… you will
have to be good at
programing and scripting. And
when you know the Various
loop holes , vulnerabilities and
security tips, you already become a Computer Security
Expert.
So Never Ever Under estimate
the term Hacker. A Hacker Is
Not a person who just hacks
email id’s or servers but a True.






--------------------=============--------------------




Hacker is a Computer Genius
who the knowledge of computers more than anyone.




Nov 15, 2013

How To Became A Great hacker ?


Many people are asking "How to become a Good Hacker?" .
 If you want to be a good Hacker and professional then you've to learn
 the basics.
Many good hackers defaces the site, they know coding.
If you know coding then
 your career is easy at all.
Now,
 what to learn in coding first?
 Try
 with HTML and PHP. 
These two are the basic languages you must know to code a website.
By knowing these two coding languages you'll be able to find
the mistake of the coder of the website and hackers always use the opportunity .




If you Want to Real Hacker then you will have to Learn Following Languages Given Below :-


1. Learn TCP/IP, Basic Information
 gathering, Proxies, Socks, SSL, VPN,
 VPS, RDP, FTP, POP3, SMTP, Telnet,
 SSH.

 2. Learn Linux, Unix, Windows -
 You can do this using VMware or
 any virtual desktop utility.

 3. Learn a programming language
 that's compatible with all OS - Perl,
 Python, C, ASM

 4. Learn HTML, PHP, Javascript, ASP,
 XML, SQL, XSS, SQLI, RFI, LFI. . . . . . .





Nov 6, 2013

4 Ways To Be Anonymous Online

Want to be anonymous online to view blocked websites, protect your self from hackers or want to hack some one and stay un-traced?. In the following post i will explain 4 easy ways by which you can stay anonymous online!
----------------------------------


1. Using Proxies

A proxy is an address ( IP address ) of a Server (proxy server) that is placed between your computer and the Internet The advantage of a proxy is that your real IP address is Hidden so when you hack your giving the IP address of the proxy sever and not your real IP address Same way if your a normal Internet user the hacker won't get your real IP but the IP of the proxy server.You can use it to enter site or forum that you are IP is banned. To know more about proxies les me know above this post and I will post a full tutotial about it.

2. Using Tor

Tor-proxy is a free proxy-server service that Internet users can use to hide their IP address while surfing the Web. Tor (The Onion Router) is free software for enabling online anonymity. Tor directs Internet traffic through a free, worldwide volunteer network consisting of more than three thousand relays to conceal a user's location or usage from anyone. I have written a complete How to guide on how to use tor - just let me know if you need it

3. SSH Tunneling

SSH tunnel is an encrypted tunnel created through an SSH protocol connection. SSH tunnels may be used to tunnel unencrypted traffic over a network through an encrypted channel.In easy language,you can surf net without being monitored and even surf blocked sites too. To know more about SSH and SSH tunneling let me know if you would like to read: SSH tunneling guide.

4. Using VPN

Virtual Private Network. Basically it’s a private network which lets users to connect to other users or remote sites using a public network usually internet. It uses “virtual” connections routed through the Internet from the company’s private network to the remote site or employee instead of physical connections. In short, it is private network constructed within a public network infrastructure, such as the global Internet. The Biggest difference between proxy and VPN is everything in a VPN is encrypted which gives an additional layer of security.