Sunday, 30 March 2014

History of hacking

Hacking has been around for more than a century. In the 1870s, several teenagers were flung off the country's brand new phone system by enraged authorities. Here's a peek at how busy hackers have been in the past 35 years.
Early 1960s
University facilities with huge mainframe computers, like MIT's artificial intelligence lab, become staging grounds for hackers. At first, "hacker" was a positive term for a person with a mastery of computers who could push programs beyond what they were designed to do.
Early 1970s
John Draper
John Draper
John Draper
makes a long-distance call for free by blowing a precise tone into a telephone that tells the phone system to open a line. Draper discovered the whistle as a give-away in a box of children's cereal. Draper, who later earns the handle "Captain Crunch," is arrested repeatedly for phone tampering throughout the 1970s.
Yippie social movement starts YIPL/TAP (Youth International Party Line/Technical Assistance Program) magazine to help phone hackers (called "phreaks") make free long-distance calls.
Two members of California's Homebrew Computer Club begin making "blue boxes," devices used to hack into the phone system. The members, who adopt handles "Berkeley Blue" (Steve Jobs) and "Oak Toebark" (Steve Wozniak), later go on to found Apple Computer.
Early 1980s
Author William Gibson coins the term "cyberspace" in a science fiction novel called Neuromancer.
In one of the first arrests of hackers, the FBI busts the Milwaukee-based 414s (named after the local area code) after members are accused of 60 computer break-ins ranging from Memorial Sloan-Kettering Cancer Center to Los Alamos National Laboratory.
Comprehensive Crime Control Act gives Secret Service jurisdiction over credit card and computer fraud.
Two hacker groups form, the Legion of Doom in the United States and the Chaos Computer Club in Germany.
2600: The Hacker Quarterly is founded to share tips on phone and computer hacking.
Late 1980s
The Computer Fraud and Abuse Act gives more clout to federal authorities.
Computer Emergency Response Team is formed by U.S. defense agencies. Based at Carnegie Mellon University in Pittsburgh, its mission is to investigate the growing volume of attacks on computer networks.
At 25, veteran hacker Kevin Mitnick secretly monitors the e-mail of MCI and Digital Equipment security officials. He is convicted of damaging computers and stealing software and is sentenced to one year in prison.
First National Bank of Chicago is the victim of a $70-million computer heist.
An Indiana hacker known as "Fry Guy" -- so named for hacking McDonald's -- is raided by law enforcement. A similar sweep occurs in Atlanta for Legion of Doom hackers known by the handles "Prophet," "Leftist" and "Urvile."
Early 1990s
After AT&T long-distance service crashes on Martin Luther King Jr. Day, law enforcement starts a national crackdown on hackers. The feds nab St. Louis' "Knight Lightning" and in New York grab Masters of Deception trio "Phiber Optik," " Acid Phreak" and "Scorpion." Fellow hacker "Eric Bloodaxe" is picked up in Austin, Texas.
Operation Sundevil, a special team of Secret Service agents and members of Arizona's organized crime unit, conducts raids in 12 major cities, including Miami.
A 17-month search ends in the capture of hacker Kevin Lee Poulsen ("Dark Dante"), who is indicted for stealing military documents.
Hackers break into Griffith Air Force Base, then pewwwte computers at NASA and the Korean Atomic Research Institute. Scotland Yard nabs "Data Stream," a 16-year-old British teenager who curls up in the fetal position when seized.
A Texas A&M professor receives death threats after a hacker logs on to his computer from off-campus and sends 20,000 racist e-mail messages using his Internet address.
Kevin Mitnick
Kevin Mitnick [photo / AP ]
In a highly publicized case, Kevin Mitnick is arrested (again), this time in Raleigh, N.C., after he is tracked down via computer by Tsutomu Shimomura at the San Diego Supercomputer Center.
Late 1990s
Hackers break into and deface federal Web sites, including the U.S. Department of Justice, U.S. Air Force, CIA, NASA and others.
Report by the General Accounting Office finds Defense Department computers sustained 250,000 attacks by hackers in 1995 alone.
A Canadian hacker group called the Brotherhood, angry at hackers being falsely accused of electronically stalking a Canadian family, break into the Canadian Broadcasting Corp. Web site and leave message: "The media are liars." Family's own 15-year-old son eventually is identified as stalking culprit.
Hackers pierce security in Microsoft's NT operating system to illustrate its weaknesses.
Popular Internet search engine Yahoo! is hit by hackers claiming a "logic bomb" will go off in the PCs of Yahoo!'s users on Christmas Day 1997 unless Kevin Mitnick is released from prison. "There is no virus," Yahoo! spokeswoman Diane Hunt said.
1998
Anti-hacker ad runs during Super Bowl XXXII. The Network Associates ad, costing $1.3-million for 30 seconds, shows two Russian missile silo crewmen worrying that a computer order to launch missiles may have come from a hacker. They decide to blow up the world anyway.
In January, the federal Bureau of Labor Statistics is inundated for days with hundreds of thousands of fake information requests, a hacker attack called "spamming."
Hackers break into United Nation's Children Fund Web site, threatening a "holocaust" if Kevin Mitnick is not freed.
Hackers claim to have broken into a Pentagon network and stolen software for a military satellite system. They threaten to sell the software to terrorists.
The U.S. Justice Department unveils National Infrastructure Protection Center, which is given a mission to protect the nation's telecommunications, technology and transportation systems from hackers.
Hacker group L0pht, in testimony before Congress, warns it could shut down nationwide access to the Internet in less than 30 minutes. The group urges stronger security measures.

How to Make Windows XP Startup Faster

How to Make Windows XP Startup Faster
Do you often get frustrated while you wait around for your slow Windows XP computer to startup? Windows XP will automatically load and startup all the programs that are in the startup folder whether you intend to use them or not. This article will show you how you can speed up the bootup process of your XP PC by removing the programs that usually bog it down.


1.      Click on Start, then Run, and type "msconfig". Wait for a new window to pop up.


2.      Look under the "BOOT.INI" tab. You will see a box labeled "Timeout:", and a numerical value. By default, it's 30, which means 30 seconds of wait time before boot. This can be changed, make it 4 seconds. (Note: if you have more than one operating system, this means the wait time to startup to the highlighted Operating System is longer. Sometimes you might want a bit more than 4 seconds, then you can opt 5 or 10 seconds)


3.      Delete The Temporary Files Periodically From Your Computer To Make The Applications Run Faster. Type %temp% in the run dialog box by clicking on Start -> Run, and click on "OK". You will see an open folder with many files. Click on the Edit menu and click on Select all and then click on the File menu and select Delete. Note: Always confirm that the folder which is opened has the word "temp" on the top of the menu bar and the folder indicates that it is a temporary folder.


4.      Perform a Scandisk To See That Your Computer Hard Drive is in Healthy Condition and it helps Your Computer Run Faster.


5.      After doing all this, another method you can do is to allow the computer to hibernate. Hibernation closes and opens Windows faster than usual. However, Hibernation is a good long-term recommended solution, as it does save electricity.


6.      Go to Start->Control Panel->Power Options. Click on the Hibernate tab.


7.      Click on the box that says "Enable hibernation" to check it.


8.      Click on the Advanced tab and change the Power buttons options if you want to hibernate by pressing the sleep button or the power button. Otherwise, holding the Shift key while in the Turn Off Computer menu will give you the option to hibernate.


9.      Restart your computer every week or so to clean your computer.
10.  The power can then be completely turned off, even at the socket so that no power is wasted.
 

Saturday, 29 March 2014

Hack your friends PC using IP address

Hack your friends PC using IP address
Literally, hacking is to get something or someone on the internet without their consent or interest. While speaking of a short, hacking is a very easy job, it is as if instead of the using front door, finding a hidden door of a house and the seizure of valuables(hijacking the precious things). Among the main hacking, hacking through the IP address is one of the most common yet with a powerful beggining.

You may want to hack the website and put your advertisement there or grab some
database information.
In this type of hacking, you are playing with the web server’s computer instead of the administrator’s computer.
Because for eg. www.website.com is in a separate Web server instead of the personal computer.

Another might be to access the computer of your friend from your home. Again, based on IP, and it is only possible when your friend’s computer is online. If it is off or not connected to the Internet, allowing external IP hacking(remote IP Hacking) is quite impossible.

 
Well, both have the same process. So Let's summarize what we should do.

First Of All Confirm the site or the computer you wanna hack.

1. Discover or trace their IP addresses.

2. Verify that the IP address is online

3. Scan open ports

4. Check the doors Venerability(for venerable ports)

5. Access through the door(probably the port).

6. Brute force username and
password

Now let me just briefly describe the basic
steps that a child can also understand if you didnt get.

First, get the IP address of the victim.

To get the IP address of the victim's website, ping for it in command prompt.

For example,

ping www.google.com
=>
To retrieve the IP address of google.com. You can find an image of cmd below 

 
That's how we can get the IP address of the victim's website.

What about your friend's PC? You can't do www.yourfriendname.com, huh?
Finding the IP address of your friend's PC is a bit complicated and most difficult, if it has a dynamic IP address, which changes constantly.

A common method to detect the IP address of your friend is talking to him.

Go Here From your Friend's Computer:
http://www.tracemyip.org/
From Here You Can Check Out His IP-Address & Note It Down somewhere.

Now, did you have the IP address?
If yes then do check it out if he/she's online? ITo know the online status just ping the IP address, if it is online it will reply.

If the IP address is online, scan for the open ports. Open ports are like closed doors, without locks, you can get in and out easily.

Use the
Advanced Port Scanner to scan all open and venerable ports/doors.
Now that you have the IP address and open port of the victim, now you can use telnet to try to access it
  Make sure you have telnet enabled on your computer or install it from:Control Panel > Add or Remove Programs > Add Windows Components


Then open command prompt and use the telnet command to access the IP address.
Use the following syntax for the connection.
 You will be prompted for login information.
 In this way, you will be able to hack remote computer using just the IP address. !!