Tuesday, February 10, 2015

Introduction Burp Suite Part IX (Option Tab)


Suite Options
 This tab contains settings to control how Burp handles platform authentication, upstream proxy servers, SOCKS proxy, timeouts, hostname resolution, and out-of-scope requests.

Platform Authentication
 These settings let you configure Burp to automatically carry out platform authentication to destination web servers. Different authentication types and credentials can be configured for individual hosts.
 Supported authentication types are: basic, NTLMv1, NTLMv2 and digest authentication. The domain and hostname fields are only used for NTLM authentication.
The "Prompt for credentials on platform authentication failure" option causes Burp to display an interactive popup whenever an authentication failure is encountered.
(Click Image for large view)


Upstream Proxy Servers
 These settings control whether Burp will send outgoing requests to an upstream proxy server, or directly to the destination web server.
You can define multiple rules, specifying different proxy settings for different destination hosts, or groups of hosts. Rules are applied in sequence, and the first rule that matches the destination web server will be used. If no rule is matched, Burp defaults to direct, non-proxied connections.
You can use wildcards in the destination host specification (* matches zero or more characters, and ? matches any character except a dot). To send all traffic to a single proxy server, create a rule with * as the destination host. Leave the proxy host blank to connect directly to the specified host.
For each upstream proxy you configure, you can specify an authentication type and credentials if required. Supported authentication types are: basic, NTLMv1, NTLMv2 and digest authentication. The domain and hostname fields are only used for NTLM authentication.

SOCKS Proxy
 These settings let you configure Burp to use a SOCKS proxy for all outgoing communications. This setting is applied at the TCP level, and all outbound requests will be sent via this proxy.
If you have configured rules for upstream HTTP proxy servers, then requests to upstream proxies will be sent via the SOCKS proxy configured here.
If the option "Do DNS lookups over SOCKS proxy" is enabled, then all domain names will be resolved by the proxy. No local lookups will be performed.

Timeouts
 These settings specify the timeouts to be used for various network tasks. You can specify the following timeouts:
Normal - This setting is used for most network communications, and determines how long Burp will wait before abandoning a request and record that a timeout has occurred.
Open-ended responses - This setting is only used where a response is being processed which does not contain a Content-Length or Transfer-Encoding HTTP header. In this situation, Burp waits for the specified interval before determining that the transmission has been completed.
Domain name resolution - This setting determines how often Burp will re-perform successful domain name look-ups. This should be set to a suitably low value if target host addresses are frequently changing.
Failed domain name resolution - This setting determines how often Burp will reattempt unsuccessful domain name look-ups.
Values are in seconds. If an option is left blank, then Burp will never time out that function.

Hostname Resolution
 These settings enable you to specify mappings of hostnames to IP addresses, to override the DNS resolution provided by your computer.
Each hostname resolution rule specifies a hostname, and the IP address that should be associated with that hostname. Rules can be individually enabled or disabled.
This feature can be useful to ensure correct onward forwarding of requests when the hosts file has been modified to perform invisible proxying of traffic from non-proxy-aware thick client components.

Out-of-Scope Requests
 This feature can be used to prevent Burp from issuing any out-of-scope requests. It can be useful when you need to guarantee that no requests are made to targets that are not in-scope for your current work. Even if your browser makes requests for out-of-scope items, the outgoing requests will be dropped by Burp.
You can enable this feature for the current Target scope. Alternatively, you can define a custom scope using URL-matching rules.
(Click Image for large view)



Like it ? Share it.

Friday, February 6, 2015

Top Ten Best Operating Systems


An operating system (OS) is software that manages computer hardware resources and provides common services for computer programs. The operating system is an essential component of the system software in a computer system. Application programs usually require an operating system to function.
 Time-sharing operating systems schedule tasks for efficient use of the system and may also include accounting software for cost allocation of processor time, mass storage, printing, and other resources.
Below are Best Operating System: 

Ubuntu
Ubuntu is a popular linux based distribution , developed by canonical corporations. Designed to work beautifully on the latest laptops, desktops and touch screen devices, it looks incredible on high resolution screens — and with touch screen enhancements and interface refinements including individual menu bars in each application window, it’s now even easier to use.

Windows 8.1
Windows 8.1 is a version of Windows NT family of operating systems and an upgrade for Windows 8. Windows 8.1 is available free of charge for retail copies of Windows 8 and Windows RT users via Windows Store. Unlike service packs on previous versions of Windows, users who obtained 8 outside of retail copies or pre-loaded installations must obtain 8.1 through new installation media from their respective subscription or enterprise channel.

Macintosh
The Macintosh, marketed as Mac, is a line of personal computers (PCs) designed, developed, and marketed by Apple Inc. It was initially targeted mainly at the home, education, and creative professional markets. Since the introduction of the Macintosh, the computer has seen significant evolution, now making it one of the most powerful general purpose computers on the market. It now targets the business, science, and law markets as well.

Windows 7
Windows 7 is a personal computer operating system developed by Microsoft, a version of Windows NT. Development of 7 occurred as early as 2006 under the codename "Blackcomb". Windows 7 was released to manufacturing on July 22, 2009, and became generally available on October 22, 2009, less than three years after the release of its predecessor, Windows Vista. Windows 7's server counterpart, Windows Server 2008 R2, was released at the same time.

Fedora
Fedora is an operating system based on the Linux kernel, developed by the community-supported Fedora Project and owned by Red Hat. Fedora contains software distributed under a free and open source license and aims to be on the leading edge of such technologies.

Linux Mint
Linux Mint is an Ubuntu-based distribution whose goal is to provide a more complete out-of-the-box experience by including browser plugins, media codecs, support for DVD playback, Java and other components. It also adds a custom desktop and menus, several unique configuration tools, and a web-based package installation interface. Linux Mint is compatible with Ubuntu software repositories.

Debian
Debian is an operating system composed of free software mostly carrying the GNU General Public License. The operating system is developed by an internet collaboration of volunteers aligned with The Debian Project.
Debian GNU/Linux is one of the most popular Linux distributions for personal computers and network servers

OpenSuse
openSUSE is a free and Linux-based operating system for your PC, Laptop or Server. openSUSE is a general purpose operating system built on top of the Linux kernel, developed by the community-supported openSUSE Project and sponsored by SUSE and a number of other companies. After Novell acquired SUSE Linux in January 2004, Novell decided to release the SUSE Linux Professional product as a 100% open source project.

Sun Solaris
Solaris is a Unix operating system originally developed by Sun Microsystems. It superseded their earlier SunOS in 1993. Solaris is known for its scalability, especially on SPARC systems, and for originating many innovative features such as DTrace, ZFS and Time Slider. Solaris supports SPARC-based and x86-based workstations and servers from Oracle and other vendors, with efforts underway to port to additional platforms. Solaris is registered as compliant with the Single Unix Specification.

Mandriva
Mandriva Linux was launched in 1998 under the name of Mandrake Linux, with the goal of making Linux easier to use for everyone. At that time, Linux was already well-known as a powerful and stable operating system that demanded strong technical knowledge and extensive use of the command line; MandrakeSoft saw this as an opportunity to integrate the best graphical desktop environments and contribute its own graphical configuration utilities to quickly become famous for setting the standard in Linux ease of use. In February 2005, MandrakeSoft merged with Brazil's Conectiva to form Mandriva S.A., with headquarters in Paris, France. The company's flagship product, Mandriva Linux, offers all the power and stability of Linux to both individuals and professional users in an easy-to-use and pleasant environment.



Like it ? Share it.

Friday, January 16, 2015

HTML in 10 Simple steps

Type: E-Book

Welcome to HTML in 10 Simple Steps or Less. Our mission in writing this book is to provide a quick and accessible way for you to learn Hypertext Markup Language — the lingua franca of the World Wide Web. We hope this book provides a resource that beginning and intermediate HTML coders can use to improve their Web development skills. It is also our hope that it fills multiple roles as both a teaching tool and a reference once you expand your skills.

What This Book Is
Each part in this book pertains to a different aspect of HTML and Web production, and we devote each task within the parts to building a specific piece of Web page content. We’ve laid out these tasks in 10 steps or less so they’re easy to internalize and become part of your personal skill set.

How to Use This Book
We think of this book as a multipurpose tool — perhaps the Swiss Army knife of HTML coding. Not
only can you employ it as a guide to creating individual pieces of Web page content, but you can also use this book as a valuable teaching tool. By working through the book’s tasks in sequence, you will learn the basics of Web page development — from constructing tags (the core components of Hypertext Markup Language) to publishing complete sites to a Web server.





Like it ? Share it.

Wednesday, January 7, 2015

Hackers Beginners Guide

Type: E-Book

"Computer hacker," is someone who lives and breathes computers, who knows all about computers, who can get a computer to do anything. Equally important, though, is the hacker's attitude. Computer programming must be a hobby, something done for fun, not out of a sense of duty or for the money. (It's okay to make money, but that can't be the reason for hacking.) In one sense it's silly to argue about the "true" meaning of a word. A word means whatever people use it to mean.
The concept of hacking entered the computer culture at the Mas-sachusetts Institute of Technology in the 1960s. Popular opinion at IT posited that there are two kinds of students, tools and hackers. A "tool" is someone who attends class regularly, is always to be found in the library when no class is meeting, and gets straight As. A "hacker" is the opposite: someone who never goes to class, who in fact sleeps all day, and who spends the night pursuing recreational activities rather than studying. There was thought to be no middle ground. What does this have to do with computers? Originally, nothing but there are standards for success as a hacker, just as grades form a standard for success as a tool. The true hacker can't just sit around all night; he must pursue some hobby with dedication and flair. It can be telephones, or railroads (model, real, or both), or science fiction fandom, or ham radio, or broadcast radio. It can be more than one of these. Or it can be computers, the word "hacker" is generally used among IT students to refer not to computer hackers but to building hackers, people who explore roofs and tunnels where they're not supposed to be.
There are specialties within computer hacking. An algorithm hacker knows all about the best algorithm for any problem. A system hacker knows about designing and maintaining operating systems. And a "password hacker" knows how to find out someone else's password. Someone who sets out to crack the security of a system for financial gain is not a hacker at all. It's not that a hacker can't be a thief, but a hacker can't be a professional thief. A hacker must be fundamentally an amateur, even though hackers can get paid for their expertise. A password hacker whose primary interest is in learning how the system works doesn't therefore necessarily refrain from stealing information or services, but someone whose primary interest is in stealing isn't a hacker.






Like it ? Share it.

Sunday, January 4, 2015

Complete Laptop Repair Training Video Tutorials

Language : English

This is a fully comprehensive instructional Video tutorials in getting into the business of repairing all makes of laptops. The fantastic train greater than 700 educational publications in PDF style and over 20 GB+ of video Tutorial training documents.

Price : Rs. 1999 + Postal Charge 
Size : 20 GB +
Format : HD Video + PDF Books

Laptop Repair Training include:

- Motherboard Replacement Procedure
- How to replace the LCD
- Laptop repair if a shutdown continued
- Repair the power supply.
- Training replace hinges
- Power Adapter Fix
- Training solder AC adapters
- Learn about Liquid Liquid LCD
- Training prevent overheating laptops
- Replacement of RAM, a DVD drive, hard drive and wireless cards
- And Much More…

How to Purchase :
1. Email Us With The Name of Video Tutorial. Ex - Complete Laptop Repair Training Video Tutorials
2. Mail Us Your Full Name, Postal Address and Mobile number.  
3. We will reply you back with our Bank Details as soon as possible.
4. After Depositing Cash at Bank. Please Attach Bank Receipt and Mail Us.
5. After Your Payment Verification we will send you your Video Tutorial by INDIAN SPEED POST and Tracking number will be send through SMS at your Mobile Number. You can Track Your Video Tutorial from http://www.indiapost.gov.in/tracking.aspx .
6. Maximum shipping Time - 7 Days. ( Depends on the Indian Speed Post Service)
7. Contact Us Click Here

Payment Mode:
1. Bank Deposit 
2. Paypal





Like it ? Share it.

Thursday, December 18, 2014

Micromax launches YUREKA with CyanogenMod


Micromax launches YUREKA with CyanogenMod OS, Snapdragon 615 SoC, 4G LTE for Rs. 8999


Micromax’s YU just launched YUREKA (AO5510), the company’s first YU branded smartphone as expected. It has a 5.5-inch (1280 x 720 pixels) IPS display, is powered by a Octa-Core 64-bit Qualcomm Snapdragon 615 (4×1.5GHz + 4×1.0GHz) processor and runs on CyanogenMod OS 11 based on Android 4.4 (KitKat) with OTA updates every month. It features a 13-megapixel auto focus rear camera with LED Flash and a 5-megapixel front-facing camera. It has 2GB RAM, 16GB of internal storage with expansion slot and packs a 2500mAh battery. It has Cat4. LTE support, including support for 4G LTE bands (TDD B40 2300MHz and FDD B3 1800MHz) for India.

Price : 8,999

Specifications: 

Design
Screen Size
5.5 inches (13.97cm)
Screen Resolution
HD (1280 * 720)
Screen Type
IPS with Corning Gorilla Glass 3
Color Depth
16M
Colors
Moonstone Grey
Chipset
Type
MSM 8939
Frequency
1.5Ghz Octa Core
Processor
Qualcomm Snapdragon 615(64 Bit)
OS
OS Version
Cyanogen OS 11/ Android Kitkat 4.4.4
Camera
Camera Resolution
13MP AF Rear(3120 * 4208), 5MP FF Front (1944 * 2592)
Flash
Yes, Rear Camera Only
Autofocus
Yes, Rear Camera Only
Recording
1080p
Connectivity
Frequency Band
LTE TDD B40 2300MHz
LTE FDD B3 1800MHz
WCDMA 900/2100MHz
GSM 900/1800/1900MHz
Network
GSM/GPRS/WCDMA/LTE
HSPA
WCDMA (DL-42Mbps/UL-11Mbps)
LTE (DL-150Mbps/UL-50Mbps)
Wi-Fi
802.11b/g/n
Bluetooth
Version 4.0
Location: GPS
Yes
Storage
RAM
2GB DDR3
ROM
16GB
Internal Ph Memory
12.5 GB (For apps and mass storage)
Expandable Memory
Up to 32 GB
Sensors
G-Sensor/Proximity/Light Sensor/Gyroscope
Connectors
USB V
Micro USB
Ear Jack
3.5 mm
Dual Sim Support
Yes (Micro)
Applications
Applications
YUniverse Browser and Google Default Applications
MultiMedia
Video Format
MP4, MKV, M4V, FLV, AVI, 3GPP
Video Resolution
1080p
Video Frame Rate
30fps
Audio Formats
AAC/AMR/AWB/MID/MP3/M4A/OGG/WAV/FLAC
FM
Yes
Battery
Capacity
2500mAh
Standby Time
210 Hours*
Talktime
8 Hours*
Browsing Time
7 Hours*

The YU YUREKA comes in Moonstone Grey color and is priced at Rs. 8,999. It will be available exclusively on Amazon.in and registrations will start on December 19th at 2PM. It goes on sale in the second week of January 2015. It will only be available online. The company will sell leather cover and tempered glass separately. It has unlockable boot loader and offers warranty even if the phone is rooted. It will also release kernel source code. It also offers free repair or replacement at doorstep.

Friday, December 5, 2014

Enable/ Disable Folder Option Manually


The Folder Options dialog box lets users set many properties of Windows Explorer, such as Active Desktop, Web view, Offline Files, hidden system files, and file type. Folder option" is most usable thing in Windows System. You can do a lot by using Folder option like hide/show files etc.

How to Disable Folder Option (Step 1 to Step 6)
1. Press Windows + R and Type regedit and Click on OK
(Click image for large view)

2. Registry Editor Window will appear. Now Go to -
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
Note - If Explorer is not there, then right click on Policies and Click on New and Key. Type Explorer and press Enter.
Then, Right Click on White pane then follow New and Click on DWORD (32-bit) Value 

3. Now Rename this file NoFolderOptions 

4. Right Click on NoFolderOptions and Click on Modify

5. Set Value Data : 1 and Click OK

6. Now go to your control panel you will see there is no Folder Option.

7. Restart System

How to Enable Folder Option after Disabling it. (Step 8) 
8. Right Click on NoFolderOptions and Click on Modify then Set the Value Data: 0 and Click OK

9. Restart System

Alternate for Enabling (If above step is not working then follow below steps)
10. Open Registry Editor (Step 1) then go to  HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
and Delete NoFolderOptions 

11. Click Yes for confirming delete.

12. Again go to  HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer
and if there is any NoFolderOptions then Delete this (Step 10 and Step 11)
(Click image on large view)

13. Restart System


Like it ? Share it.