Friends Are you interested to become an Ethical Hacker ?

Do you like to know about network security ?

Searching for a good place to learn hacking and internet security ?

Want to Learn as well as earn ?
Hey friends , here is a great opportunity to learn all about the internet security and how to get secure from hackers . " To find a criminal we have to act like a criminal " like wise to get secure from hackers we must know about the hacking techniques.


What this Course Offers ?
This course offers a exclusive syllabus and that can be learnt in online / Offline .

What is the syllabus of this course ?
The syllabus covers from basics on the internet to the extended possibilities on the study of hacking . (eg : Email hacking , google hacking )
When will i get the certificate and from whom ?
Certificates will be offered within 12 days after the completion of the course .
Certificate will be issued by W3Cert & NAG( New Delhi ).

When the course starts ?
Presently we are going to start 7th Batch on Jan 10th 2010.

How to Earn through W3cert ?
We offer an student Icon program - Students regardless of any field and any degree can participate . The students are interviewed and then selected as a student icon for W3cert. If you want to know more about the application procedures and more please visit < http://www.w3cert.com/Student-Icon >




Batch VII
Seats Allocated: 50 | Registered: 23 | Left:27
Course Duration: 36 Days
Schedule: 10-01-2010 till 21-02-2010
Online Examination Date: 21-02-2010
Learning Environment: Online / Offline *

Payment Method: Online / Offline ( Have any Queries? / Registration Form )


For more queries about this Course !!! Please Feel Free to Contact
Anand Subramanian

( optimiztik@gmail.com )
ph:9791241712


I have some about 6 google wave invitations !! If you are in need of it  you please comment this post with your mail id . I will push you in the queue of those wave friends !

Comments make caring !! 





1. Click on "Start" in the bottom left hand corner of screen
2. Click on "Run"
3. Type in "command" and hit ok

You should now be at an MSDOS prompt screen.

4. Type "ipconfig /release" just like that, and hit "enter"
5. Type "exit" and leave the prompt
6. Right-click on "Network Places" or "My Network Places" on your desktop.
7. Click on "properties"

You should now be on a screen with something titled "Local Area Connection", or something close to that, and, if you have a network hooked up, all of your other networks.

8. Right click on "Local Area Connection" and click "properties"
9. Double-click on the "Internet Protocol (TCP/IP)" from the list under the "General" tab
10. Click on "Use the following IP address" under the "General" tab
11. Create an IP address (It doesn't matter what it is. I just type 1 and 2 until i fill the area up).
12. Press "Tab" and it should automatically fill in the "Subnet Mask" section with default numbers.
13. Hit the "Ok" button here
14. Hit the "Ok" button again

You should now be back to the "Local Area Connection" screen.

15. Right-click back on "Local Area Connection" and go to properties again.
16. Go back to the "TCP/IP" settings
17. This time, select "Obtain an IP address automatically"
tongue.gif 18. Hit "Ok"
19. Hit "Ok" again
20. You now have a new IP address

With a little practice, you can easily get this process down to 15 seconds.

Note :
This only changes your dynamic IP address, not your ISP/IP address. If you plan on hacking a website with this trick be extremely careful, because if they try a little, they can trace it back

When you first turn on you computer (BEFORE DIALING INTO YOUR ISP),
open a MS-DOS Prompt window (start/programs MS-DOS Prompt).
Then type netstat -arn and press the Enter key.
Your screen should display the following (without the dotted lines
which I added for clarification).

-----------------------------------------------------------------------------
Active Routes:

Network Address Netmask Gateway Address Interface Metric
127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 1
255.255.255.255 255.255.255.255 255.255.255.255 0.0.0.0 1

Route Table

Active Connections

Proto Local Address Foreign Address State

--------------------------------------------------------------------------------

If you see anything else, there might be a problem (more on that later).
Now dial into your ISP, once you are connected;
go back to the MS-DOS Prompt and run the same command as before
netstat -arn, this time it will look similar to the following (without
dotted lines).

-------------------------------------------------------------------------------------

Active Routes:

Network Address Netmask Gateway Address Interface Metric
0.0.0.0 0.0.0.0 216.1.104.70 216.1.104.70 1
127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 1
216.1.104.0 255.255.255.0 216.1.104.70 216.1.104.70 1
216.1.104.70 255.255.255.255 127.0.0.1 127.0.0.1 1
216.1.104.255 255.255.255.255 216.1.104.70 216.1.104.70 1
224.0.0.0 224.0.0.0 216.1.104.70 216.1.104.70 1
255.255.255.255 255.255.255.255 216.1.104.70 216.1.104.70 1

Route Table

Active Connections

Proto Local Address Foreign Address State
TCP 0.0.0.0:0 0.0.0.0:0 LISTENING
TCP 216.1.104.70:137 0.0.0.0:0 LISTENING
TCP 216.1.104.70:138 0.0.0.0:0 LISTENING
TCP 216.1.104.70:139 0.0.0.0:0 LISTENING
UDP 216.1.104.70:137 *:*

--------------------------------------------------------------------------------

What you are seeing in the first section (Active Routes) under the heading of
Network Address are some additional lines. The only ones that should be there
are ones belonging to your ISP (more on that later). In the second section
(Route Table) under Local Address you are seeing the IP address that your ISP
assigned you (in this example 216.1.104.70).

The numbers are divided into four dot notations, the first three should be
the same for both sets, while in this case the .70 is the unique number
assigned for THIS session. Next time you dial in that number will more than
likely be different.

To make sure that the first three notation are as they should be, we will run
one more command from the MS-DOS window.
From the MS-DOS Prompt type tracert /www.yourispwebsite.com or .net
or whatever it ends in. Following is an example of the output you should see.

---------------------------------------------------------------------------------------

Tracing route to /www.motion.net [207.239.117.112]over a maximum of 30 hops:
1 128 ms 2084 ms 102 ms chat-port.motion.net [216.1.104.4]
2 115 ms 188 ms 117 ms chat-core.motion.net [216.1.104.1]
3 108 ms 116 ms 119 ms www.motion.net [207.239.117.112]
Trace complete.

------------------------------------------------------------------------------------------

You will see that on lines with the 1 and 2 the first three notations of the
address match with what we saw above, which is a good thing. If it does not,
then some further investigation is needed.

If everything matches like above, you can almost breath easier. Another thing
which should you should check is programs launched during startup. To find
these, Click start/programs/startup, look at what shows up. You should be
able to recognize everything there, if not, once again more investigation is
needed.

-------------------------------------------------------------------------------------------

Now just because everything reported out like we expected (and demonstrated
above) we still are not out of the woods. How is this so, you ask? Do you use
Netmeeting? Do you get on IRC (Internet Relay Chat)? Or any other program
that makes use of the Internet. Have you every recieved an email with an
attachment that ended in .exe? The list goes on and on, basically anything
that you run could have become infected with a trojan. What this means, is
the program appears to do what you expect, but also does just a little more.
This little more could be blasting ebay.com or one of the other sites that
CNNlive was talking about.

What can you do? Well some anti-virus software will detect some trojans.
Another (tedious) thing is to start each of these "extra" Internet programs
one at a time and go through the last two steps above, looking at the routes
and connection the program uses. However, the tricky part will be figuring
out where to tracert to in order to find out if the addresses you see in
step 2 are "safe" or not. I should forewarn you, that running tracert after
tracert, after tracert might be considered "improper" by your ISP. The steps
outlined above may not work exactly as I have stated depending upon your ISP,
but with a true ISP it should work. Finally, this advise comes with NO
warranty and by following my "hints' you implicitly release me from ANY and
ALL liability which you may incur.


Other options

Display protocol statistics and current TCP/IP network connections.
Netstat [-a] [-e] [-n] [-s] [-p proto] [-r] [intervals]

-a.. Display all connections and listening ports.
-e.. Display Ethernet statistics. This may be combined with the -s option.
-n.. Diplays address and port numbers in the numerical form.
-p proto..Shows connections for the protocol specified by proto; proto may be
TCP or UDP. If used with the -s option to display per-protocol statistics,
proto may be TCP, UDP, of IP.
-r.. Display the routing table.
-s.. Display per-protocol statistics. By default, statistics are shown for TCP
UDP and IP; the -p option may be used to specify a subset of the default
interval..Redisplay selected statistics, pausing intervals seconds between each
display. If omitted. netstat will print the current configuration information
once


World most famous technologies are
1.Bio-technology
2.Artificial intelligence
In addition the Bio-technology be used in the medical side with the technological instruments for process or demanding purpose likewise, Artificial intelligence was developed in the impression of ROBORTICS, programmer are given the outstanding routine by encoding the Artificial intelligence, appropriate to this the robots be able to walk, talk, swim, constant it can drive a car for the user probability.

WHY WE GO FOR THE MATRIX: Most of the significant Organization will modify their area of importance in the manufacturing of the ROBOTS, this will bring the enormous fight in the midst of other organization for the best and consequence, and they produce a lot special assortment of robot for special purpose, and in conclusion robots population will go up, ultimately if this exist various kinds of robots will structure a set of connections and there may be a opportunity to relocate the data form one to another robots, eventually the robots may get a possibility to survive the complete humankind. As a final point we deduce to demolish the robots, at this stage the mankind can't battle with the robots because they are finished up of tough steel and metal. But we can fight with our NATURAL INTELLIGENCE, for this we move on to the MATRIX.


WHAT IS MATRIX?

Matrix is nothing other than the extraction of information from the human brain, and for interact the outside machine with the medium. In other word the permutation of the NEUROLOGY and TECHNOLOGY.


HOW THE MATRIX IS CREATED:

Linking with the Brain:

Decades of basic research have clarified how individual neurons pass signals to one another and along pathways to the brain or muscles. Scientists know how electrical events trigger an impulse within a neuron, and how chemical processes transmit the signal from one neuron to another or to a muscle cell. Scientists also are able to monitor or stimulate a single neuron. The passage of information is a matter of electrical input and output on a minute scale, and technological advances have allowed researchers to measure these transmissions and impart their own. On a very basic level, the language spoken by humans and machines is the same.

This understanding has led to the development of neuroprosthetics, artificial devices that link the body's nervous system (mainly the brain) with the external environment. Neuroprosthetics allow passage of electrical signals in either direction. They can transmit sensory information from the external world to the brain, they also can receive commands from the brain to create motion through artificial limbs or communicate thoughts or wishes.

wanna know more about this article leave your comment we will provide you further info about this . Visit us again !!

Hi Friends this is to show you how to install a kis/kav keys . This is no more to demonstrate just have a look at this GIF Image !!

Jus Click this image and Have a look!!!!



INTRODUCTION:
Dos is a disk operating system with a set of programs that act as a translator between the user
and the computer in order to perform the task of the user. Ms-Dos is a popular operating system on Micro-Computers.
Related systems include MS-DOS, PC DOS, DR-DOS, Free DOS, PTS-DOS, ROM-DOS, JM-OS, and several others.This is the first program that is installed when an OS get installed. There are many version ranging from v2.0 to v7.0 .

Dos commands are of two types:

Internal Commands:
Cls : This command is used to clear the screen.

Ver : This helps us to know the later version of dos.

Vol : This command shows the label of the current drive & and its serial number.

Date : This command display the current date. Also called as the system date.

Time.
: This command display the current time and also the message to enter the new time

Dir : This command display the list of files and directory in the mentioned directory or drive.

Dir/P : This command show all the files pagewise. Once the screen is full of filename a message saying “press any key to continue” is displayed, he user can take his/ her own time o view the files & its details.

Dir/w : This command is used to display the content of disk i.e files width wise i.e:- five filenames perline.

Wild Characters : There are 2 wild characters.
?: denoted any one single characters.
* : denotes any no of characters.

Type : This command is used to see the content of a specific file on the screen.

Rename or Ren : This command is used to change the filename.

Del (Deleting) : This command is used to erase the file from the disk.

Copy : This commands is used to duplicate the content of one file in to another file.

Directories : A directories is a separate area on the disk to store some files.
Md
Rd

Edit : is a Dos Editor. It is an internal command.

External Commands :
External commands are ones which requires certain special Dos files for their execution.

Tree : This command display path and optionally list the content of each directory and sub directory on the specified drive.

Sort : The sort filter reads input ,sorts the data and then writes the sorted data screen or to a file or another device.

Find : Locates all the lines which contain a specific string of text in a file or files.

Print : This command used to print to content of the files.

Chkdsk: This command is used to display the report regarding the status of the disk.

Diskcopy: This command is used to copy the content of one disk to another.

Attrib : Each and every file has some attributes stored for it.

Backup: The hardisk can sometimes suffer a head crash. In such occasion all data on the disk is lost and irrecoverable.

Format : To make a floppy or hardisk capable of storage.

Del tree: It is used to delete all files or directories from the drive or directory from drive or directory.

DOS Shell

DOS shell, which first appeared with DOS 4 is a program that attempts to provide an easier interface to DOS. DOS shell provides a graphical front end to DOS commands allowing most of them to be executed using the mouse, with minimal keyboard input. Note that DOS shell was not provided with MS-DOS version 6.

To run the DOS shell program type DOSSHELL

Opening Screen Display

Once DOSSHELL is launched the first screen displays a menu bar to the top, directly beneath it a list of drives which can be accessed, and then three small windows. The windows are the Directory Tree window (in which you select a directory on the currently highlighted drive), the Files window (displaying the contents of the selected directory), and a Main window giving access to the DOS command prompt, editor, DOS Q-Basic and some disk utilities.

Help from within DOS Shell

You can get help on using the DOS shell environment in the following ways –

By using the Mouse - clicking on the Help option in the menu bar

By using the keyboard - by pressing Alt+H

In both cases a pull down menu appears and you select from the menu by moving the selection bar to one of the options with either the mouse or the andarrow keys and then clicking on your chosen option or pressing to activate it. Once you have done this a dialogue box will appears corresponding to the selection made.Another way of obtaining help is by simply highlighting the item you need help on using the mouse, and then pressing the F1 key. This has the effect of displaying a dialogue box whose content relates directly the item which was highlighted.

Basic Keys for using the Menus

Alt Activates the Menu Bar
← → Selects a menu
Activates selected menu

↓↑Selects a menu option
Activates the option

Esc Leaves the menu bar

Basic Keys for using the windows

Tab Moves between Drives, Directories, Files and Main windows
Arrow Keys Selects option within window

Activates option

Quitting DOS Shell

There are several ways of quitting from the DOS shell environment

Press Alt+F4
Press F3

From the menu select File and choose Exit

RedTacton is a Human Area Networking technology, which is under development, that uses the surface of the human body as a safe, high speed network transmission path. RedTacton uses weak electric fields on the surface of the body as a transmission medium. Nippon Telegraph and Telephone Corporation, developing the conducting field trials for a radical new “human area networking” technology called RedTacton that uses the naturally-occurring electrical fields of human skin to transmit data. The slim, PCMCIA- based RedTacton transceiver combines an optical receiver circuit equipped with a super-sensitive photonic electrical field sensor and a crystal to transmit data over the surface of human body at up to 10 megabits per second between wearable devices. Linked only by touch, the transceivers can also connect to similar transceivers worn by other users or embedded in any objects in real space, such as turnstiles or consumer electronics. Promising better security and far less interference than short-range wireless technologies such as Bluetooth, ZigBee and

Near-Field Communications, RedTacton will likely be targeted for use in applications such as wireless headphones, wearable medical devices, security applications, and point-of-sale interactions.

HOW REDTACTON WORKS
Using a new super-sensitive photonic electric field sensor, RedTacton can achieve duplex communication over the human body at a maximum speed of 10 M bps.