DIGITAL SECURITY


Protection of digital identity, internet or network equivalent of our identity is called Digital Security. It includes different tools like web services, biometric, anti-virus software which we use to secure our identity, technology and assets in both mobile and online world. 
Digital security devices includes secure personal devices like USB token, SIM card, secure chip or e-pass. These devices helps us to travel, bank, communicate or work using our digital identity in a secure, enjoyable and convenient way.
Digital technology is generating new ways and possibilities everywhere to work, transact and interact. Now a days we are surrounded by digital identities and data.
These devices facilitate us to use a variety of services. The advantages of digital technology are obvious however there are some security risks associated with it also. Doubtless, there are risks for every individual person. Government, company and personal info which we share over networks with the organization, folks and devices is also at risk.
Every device asked the following two questions to protect or limit access to these services:
 "Are you who you say you are?" and "Is my data safe with you?"
Digital Protection answers these questions with solutions. These solutions protect and enhance interactions and assets.
Examples of Inappropriate Digital Security


Followings are some examples of inappropriate digital security system
  • People are not using any security software for the protection of their computers
  • People giving their personal data and information to strangers 
  • People sending their data and information to questionable peoples/authors
  • People opening attachments, files and links from some unknown sources
  • People using storage devices without any security protection
  • People access to inappropriate site without using proxy server
  • People sharing their ID and passwords
  • People ignoring prompts appears to update software
  • People writing down their user ID and their user passwords for all web sites

Examples of Appropriate Digital Security
Some examples of appropriate digital security system are:
  • ·         Using secure software and update it responsibly
  • ·         People communicating through secured e-mail services or on secure sites with one  another
  • ·         People removing messages, links and attachments from unknown sources
  • ·         People who are aware of security breaches and report it
  • ·         People blocking inappropriate sites with the help of software.
  • ·         In order to keep system security up to date, set pc settings to do automatic scans, check and install updates.


USEFUL CMD COMMANDS

1. Add Hardware Wizard - hdwwiz.cpl
2. Add/Remove Programs - appwiz.cpl
3. Administrative Tools - control admintools
4. Bluetooth Transfer Wizard - fsquirt
5. Calculator - calc
6. Certificate Manager - certmgr.msc
7. Character Map - charmap
8. Check Disk Utility - chkdsk
9. Clipboard Viewer - clipbrd
10. Command Prompt - cmd
11. Component Services - dcomcnfg
12. Computer Management - compmgmt.msc
13. Control Panel - control
14. Date and Time Properties - timedate.cpl
15. DDE Shares - ddeshare
16. Device Manager - devmgmt.msc
17. Direct X Troubleshooter - dxdiag
18. Disk Cleanup Utility - cleanmgr
19. Disk Defragment - dfrg.msc
20. Disk Management - diskmgmt.msc
21. Disk Partition Manager - diskpart
22. Display Properties - control desktop
23. Display Properties - desk.cpl
24. Dr. Watson System Troubleshooting Utility - drwtsn32
25. Driver Verifier Utility - verifier
26. Event Viewer - eventvwr.msc
27. Files and Settings Transfer Tool - migwiz
28. File Signature Verification Tool - sigverif
29. Findfast - findfast.cpl
30. Firefox - firefox
31. Folders Properties - control folders
32. Fonts - control fonts
33. Fonts Folder - fonts
34. Free Cell Card Game - freecell
35. Game Controllers - joy.cpl
36. Group Policy Editor (for xp professional) - gpedit.msc
37. Hearts Card Game - mshearts
38. Help and Support - helpctr
39. HyperTerminal - hypertrm
40. Iexpress Wizard - iexpress
41. Indexing Service - ciadv.msc
42. Internet Connection Wizard - icwconn1
43. Internet Explorer - iexplore
44. Internet Properties - inetcpl.cpl
45. Keyboard Properties - control keyboard
46. Local Security Settings - secpol.msc
47. Local Users and Groups - lusrmgr.msc
48. Logs You Out Of Windows - logoff
49. Malicious Software Removal Tool - mrt
50. Microsoft Chat - winchat
51. Microsoft Movie Maker - moviemk
52. Microsoft Paint - mspaint
53. Microsoft Syncronization Tool - mobsync
54. Minesweeper Game - winmine
55. Mouse Properties - control mouse
56. Mouse Properties - main.cpl
57. Netmeeting - conf
58. Network Connections - control netconnections
59. Network Connections - ncpa.cpl
60. Network Setup Wizard - netsetup.cpl
61. Notepad - notepad
62. Object Packager - packager
63. ODBC Data Source Administrator - odbccp32.cpl
64. On Screen Keyboard - osk
65. Outlook Express - msimn
66. Paint - pbrush
67. Password Properties - password.cpl
68. Performance Monitor - perfmon.msc
69. Performance Monitor - perfmon
70. Phone and Modem Options - telephon.cpl
71. Phone Dialer - dialer
72. Pinball Game - pinball
73. Power Configuration - powercfg.cpl
74. Printers and Faxes - control printers
75. Printers Folder - printers
76. Regional Settings - intl.cpl
77. Registry Editor - regedit
78. Registry Editor - regedit32
79. Remote Access Phonebook - rasphone
80. Remote Desktop - mstsc
81. Removable Storage - ntmsmgr.msc
82. Removable Storage Operator Requests - ntmsoprq.msc
83. Resultant Set of Policy (for xp professional) - rsop.msc
84. Scanners and Cameras - sticpl.cpl
85. Scheduled Tasks - control schedtasks
86. Security Center - wscui.cpl
87. Services - services.msc
88. Shared Folders - fsmgmt.msc
89. Shuts Down Windows - shutdown
90. Sounds and Audio - mmsys.cpl
91. Spider Solitare Card Game - spider
92. SQL Client Configuration - cliconfg
93. System Configuration Editor - sysedit
94. System Configuration Utility - msconfig
95. System Information - msinfo32
96. System Properties - sysdm.cpl
97. Task Manager - taskmgr
98. TCP Tester - tcptest
99. Telnet Client - telnet
100. User Account Management - nusrmgr.cpl
101. Utility Manager - utilman
102. Windows Address Book - wab
103. Windows Address Book Import Utility - wabmig
104. Windows Explorer - explorer

Aaccess the Secret Hidden Menus on Android / iPhone

Here are some codes you can dial into the phone app that will access hidden information and menus in the iPhone:
  • *#06# – Displays IMEI
  • *3001#12345#* + “Call” – Accesses a hidden Field Test menu
  • *#43# + “Call” – Displays call waiting status
  • *43# + “Call” – Enables call waiting
  • #43# + “Call” – Disables call waiting
  • *#21# – Displays call forwarding status
  • ##002# + “Call” – Disables all call forwarding
  • *33*pin# – Enables call barring
  • #33*pin# – Disables call barring
  • #31#phone-number + “Call” – Blocks caller ID for the current phone call
  • *3370# + “Call” – Enables “Enhanced Full Rate” and improves voice quality on GSM networks (may impact battery life)
  • *#5005*7672# + “Call” – Displays your carrier’s message center phone number
Don’t worry, Android users, there’s some great hidden stuff on your phones as well. The problem, of course, is that Android phones all differ so much based on model and manufacturer.
Here are two notable ones — the first will work on most Android phones and the second will work on all Android phones:
  • *#*#4636#*#* – Accesses a hidden test menu with sections for network, battery information and usage stats.
  • Under the “About phone” option in Settings, tap “Build number” seven times – this will enable a new “Developer options” menu in Settings that gives you access to a treasure trove of functions.

Mobile Phone Genuine or NOT


Mobile Markets are full with Fake Phones and mobiles are being sold as original even with Branded tags next to it the replica phones are kept in the market that looks similar to the original phone, to make sure whether your phone is original or fake there would be two ways of checking it. These methods will help you during purchasing a used cell phone.

Check the following Features:

Be alert about the spellings for example, Soniericsson, Nokla and Samsang Warranties: Always ask for 12 months warranty certificate from the phone manufacturers; never trust on an oral agreement with the seller. Fake phones come with a short warranty periods as counterfeiters cannot give guarantee it will last so long Check handset in all aspects completely: Some people take phones home without testing it first.

Some dealers make you fool and encourage this, knowing the handset is fake. As you check it out,
you might observe some points of low performance or other issues such as memory which is cheap quality photos.

Appearances: like dull colours, screen size, quality of printing and paint finish, Fake built quality difference in weight, logos, location of buttons and battery, missing functions, quality control and holograms and lack of quality.

The other method is examining or checking Phones quality through 15 digit IMEI code:
                                            
                                                         Dial *#06#

IMEI stands for ( International Mobile Equipment Identity). This is a 15­ digit number and might be found in the packet of the mobile phone as well. It might be found by eliminating the back cover and it might be located on the battery.

The IMEI number may be as below:

                                             IMEI CODE
                                   3 6 9 3 9 5 0 1 2 3 5 5 6 7 8

Now view the 7th and 8th digit. These two digits will make sure your phone’s quality!
  • If the seventh and eighth digits are 00 this shows your cell phone is made in Original Factory which makes sure the best quality.
  • If the seventh and eighth digits are 01 or 10 this shows your cell phone is made in Finland which is best quality.
  • If the seventh and eighth digits are 13 this shows your cell phone is gathered in Azerbaijan which is too bad. And it is also unsafe and dangerous for health!
  • If the seventh and eighth digits are 02 or 20 this shows your cell phone is gathered in Emirates which is very cheap quality. 
  • If the seventh and eighth digits are either 03/30 04/40, this shows your phone is manufactured in China but its good quality. But is bad either as 00, 01 or 10.
  • If the seventh and eighth digits are 05 or 50 this shows your cell phone is made either in Brazil or USA or Finland.
  • If the seventh and eighth digits are 06 or 60 this shows your cell phone is made either in Hong Kong, or China or Mexico.
  • If the seventh and eighth digits are 08 or 80 this shows your cell phone is made in Germany which is good and fair quality.
  • This will help and facilitate you to select the good one but these tips might not work with the Sony Erickson Mobile Phone.

Microsoft Office 2010 Professional Plus

GRMK2-8Y649-JR6YB-XJXVW-XTP8P

VYBBJ-TRJPB-QFQRF-QFT4D-H3GVB

76XCJ-YMH2W-YQQV6-XX76X-QK3K7

BGCKH-CRYRT-49VQ7-YMCG3-BRBP7

W4D2C-3YK88-KMYP2-2QTXY-28CCY

9GVVR-X6VJT-WDDXD-YB4M2-RQ7CV 

TTK27-44W3B-PVC8K-XJQW8-KJMVG

TVFJ7-76TR7-HHCKT-QQFJR-8KTTD

XF9HV-MG4CV-KCK8F-T39WK-XW3QR

YDCTD-DKK23-4C3P9-CP8RB-9VVBV

6BWCH-DPPVF-MYQ3P-FJPCV-Y494Y

828CH-G4FPY-HMH4R-32GCK-6D9BH

4DRT4-F2M76-3WDJB-XGTRR-QF8KH

GRMK2-8Y649-JR6YB-XJXVW-XTP8P

MB8VG-KB3VC-D236C-H82YB-KYRY6

YQYVG-FR8DB-29J6H-3KBF7-BX286
4FXW8-97KD9-QFKDJ-FV3QC-CY34B

DX4MW-PB7F4-YR4WT-BV3MM-4YV79
BTH8T-MTYCP-4GKX7-3QQQT-86CB6
D8BR2-DR2JY-2GK9D-D7KT4-XGJVQ
PTGBH-XTT3P-RGDC6-VJDTC-TP6GY

XD86P-7DHKT-MHWYH-GDHVT-KYM6D

6BY4V-6V892-D2HQP-T2MP7-HXK46

YQMQM-9KV3J-97G7V-8CK38-346GW

6V9J9-4D3D8-X7KKK-MG4WP-QD9X3

MRPB7-8CBBK-YGPHK-F9JWW-D9KYB

4983Y-W3D73-QY6TX-K7FQD-V7Y8Q

VXWRP-C9HMB-PV487-R7GTR-VFDG3

BQHWD-TGT8T-QC7WW-86HWT-RCT6T

P8TFP-JGFMM-XPV3X-3FQM2-8K4RP

GM3C4-HQQJV-4TQMX-3R8CP-G928Q

DDY79-433JV-2RXGX-MQFQP-PFDH8

XHG6Q-DMJWD-97PYB-Y4CMG-MQ2CG

PTD4T-F6MTH-B7G7Q-2QCX2-6Y828

M2QKF-KDQ4R-YHQKD-M4YYK-GPWVD

HYRWT-T9RWG-43TFB-4X7HQ-T2TTQ

YGQ2J-Q26GM-R8FF8-JDC7M-KKGMV

Abbreviation of major IT companies

GOOGLE :- Global Organisation of Oriented Group Language of Earth
HP :- Hewlett - Packard
IBM :- International Business Machines Corporation
HCL :- Hindustan Computer Limited
WIPRO :- Western India Product Limited
GE :- General Electric
INFOSYS :- Information System
TCS :- Tata Consultancy Services
AOL :- American Online
BPL :- British Process Laboratory
INTEL :- Integrated Electronics
CISCO :- Computer Information System Company
DELL :- michael DELL
SONY :- Sound Of New York
AMD :- Advance Micro Devices
LENOVO :- LE (Legend), NOVO (New)
COMPAQ :- Compatibility And Quality

SYMBOLS WITH KEYBOARD

HOW TO MAKE SYMBOLS WITH KEYBOARD

Alt + 0153..... ™... trademark symbol
Alt + 0169.... ©.... copyright symbol
Alt + 0174..... ®....registered trademark symbol
Alt + 0176 ...°......degre­e symbol
Alt + 0177 ...±....plus-or­-minus sign
Alt + 0182 ...¶.....paragraph mark
Alt + 0190 ...¾....fractio­n, three-fourths
Alt + 0215 ....×.....multi­plication sign
Alt + 0162...¢....the cent sign
Alt + 0161.....¡..... .upside down exclamation point
Alt + 0191.....¿..... ­upside down question mark
Alt + 1...........smiley face
Alt + 2 ......☻.....bla­ck smiley face
Alt + 15.....☼.....su­n
Alt + 12......♀.....f emale sign
Alt + 11.....♂......m­ale sign
Alt + 6.......♠.....s­pade
Alt + 5.......♣...... ­Club
Alt + 3............. ­Heart
Alt + 4.......♦...... ­Diamond
Alt + 13......♪.....e­ighth note
Alt + 14......♫...... ­beamed eighth note
Alt + 8721.... ∑.... N-ary summation (auto sum)
Alt + 251.....√.....s­quare root check mark
Alt + 8236.....∞..... ­infinity
Alt + 24.......↑..... ­up arrow
Alt + 25......↓...... ­down arrow
Alt + 26.....→.....ri­ght arrow
Alt + 27......←.....l­eft arrow
Alt + 18.....↕......u­p/down arrow
Alt + 29......↔... left right arrow

SAMSUNG MOBILE SECRET CODES

SAMSUNG MOBILE SECRET CODES.. helps make your life easier and gives you more control.. -LIKE and SHARE if you find this info useful.

This are codes collected from the internet so i take no Responsibility. try them at your own risk

*#9125# : Smiley
*#9999# : Software Version
*#06# : IMEI Number
*#0001# : Serial Number
*#9998*523# : LCD Contrast
*#0228# or *#8999*228# : Battery Info
*#8999*636# : Display Storage Capacity
*#8999*778# : Display SIM Card Information
*#8999*782# : Show Date And Alarm Clock
*#8999*786# : The Display During Warning
*#8999*837# : Samsung Hardware Version
*#0523# - *#8999*523# : Display Contrast
*#8999*638# : Show Network Information
*#9998*246# : Battery Status- Memory Capacity
*#9998*324# - *#8999*324# : Debug Screen
*#9998*842# - *#8999*842# : Vibration Test
*#9998*289# - *#8999*289# : Alarm Beeper - Ringtone Test
*#8999*9266# : Display Received Channel Number And Received Intensity

*#8999*364# : Watchdog ON/OFF
*#8999*427# : WATCHDOG Signal Route Setup
*2767*3855# : Full Reset (Caution every stored data will be deleted.)
*2767*2878# : Custom Reset
*2767*927# : Wap Reset
*2767*226372# : Camera Reset (deletes photos)
*2767*688# : Reset Mobile TV
#7263867# : RAM Dump (On or Off)
#*4773# : Incremental Redundancy
#*7785# : Reset wake-up & RTK Timer Variables
#*7200# : Tone Generator Mute

#*3888# : BLUETOOTH Test Mode
#*7828# : Task Screen
#*2562# : Restarts Phone
#*2565# : No Blocking? General Defense.
#*3353# : General Defense, Code Erased.
#*3837# : Phone Hangs on White screen.
#*3849# : Restarts Phone
#*7337# : Restarts Phone (Resets Wap Settings)
#*2886# : Auto Answer ON/OFF
#*7288# : GPRS Detached/Attached
#*7287# : GPRS Attached
#*2077# : GPRS Switch

#*22671# : AMR REC START
#*22673# : Pause REC
#*22674# : Resume REC
#*22675# : AMR Playback
#*22676# : AMR Stop Play
#*22677# : Pause Play
#*22678# : Resume Play
#*77261# : PCM Rec Req
#*77262# : Stop PCM Rec
#*77263# : PCM Playback
#*77264# : PCM Stop Play
#*22679# : AMR Get Time
#*7666# : White Screen

#*7693# : Sleep Deactivate/Activate
#*2286# : Data Battery
#*2679# : Copycat Feature Active/Deactivate
#*3940# : External Loop-Test 9600 bps
#*4263# : Hands Free Mode Activate/Deactivate
#*2558# : Time ON
#*3941# : External Loop-Test 115200 bps
#*5176# : L1 Sleep
#*7462# : SIM Phase
#*7983# : Voltage/Freq
#*7986# : Voltage
#*8466# : Old Time
#*2255# : Call Failed

#*5376# : Delete All Sms!!!!
#*2337# : Permanent Registration Beep
#*2474# : Charging Duration
#*2834# : Audio Path (Hands-free)
#*3270# : DCS Support Activate/Deactivate
#*3282# : Data Activate/Deactivate
#*3476# : EGSM Activate/Deactivate
#*3676# : Format Flash Volume!!!
#*4760# : GSM Activate/Deactivate
#*4864# : White Screen
#*7326# : Accessory
#*7683# : Sleep Variable
#*3797# : Blinks 3D030300 In RED
#*7372# : Resetting The Time To DPB Variables

*#8999*667# : Debug Mode
*#92782# : Phone Model (Wap)
#*5737425# : JAVA Mode
*#2255# : Call List
*#232337# : Bluetooth MAC Address
*#5282837# : Java Version
*#8999*8376263# : All Versions Together
*#8999*8378# : Test Menu
*#4777*8665# : GPSR Tool
*#8999*523# : LCD Brightness
*#8999*377# : Error LOG Menu
*#8999*327# : EEP Menu

*7465625*228# : Active Lock ON
#7465625*228# : Active Lock OFF
*7465625*28638# : Auto Network Lock ON
#7465625*28638# : Auto Network Lock OFF
*7465625*28782# : Auto Subset Lock ON
#7465625*28782# : Auto Subset Lock OFF
*7465625*2877# : Auto SP Lock ON
#7465625*2877# : Auto SP Lock OFF
*7465625*2827# : Auto CP Lock ON
#7465625*2827# : Auto CP Lock OFF
*7465625*28746# : Auto SIM Lock ON
#7465625*28746# : Auto SIM Lock OFF

*#7465625# : Check the phone lock status
*7465625*638*Code# : Enables Network lock
#7465625*638*Code# : Disables Network lock
*7465625*782*Code# : Enables Subset lock
#7465625*782*Code# : Disables Subset lock
*7465625*77*Code# : Enables SP lock
#7465625*77*Code# : Disables SP lock
*7465625*27*Code# : Enables CP lock
#7465625*27*Code# : Disables CP lock
*7465625*746*Code# : Enables SIM lock
#7465625*746*Code# : Disables SIM lock

WINDOWS 8- HACKS AND TWEAKS

WINDOWS 8- HACKS AND TWEAKS:
Hey guys.. so now lets look at some hacks and tweaks to customize your windows 8...If you have used it,, you may have noted that microsoft decided to put the metro interface as their default start screen..as this screen is well suited for touch devices and not PC's, so those of you who would prefer to be switching to the desktop right away on start of the operating system, youmay be interested in bypassing the Metro interfaceautomatically. This method is not disabling Metronor the interface enhancements that go along withit. A tap on the Windows-key for instance bringsyou right back to the Metro interface.

To automatically switch to the desktop during startof the system you need to complete the following
steps:

Create a new plain text document on yourdesktop or another location. You can do so with
a right-click and the selection of New > TextDocument from the context menu. Add the following contents to the new documentand save it afterwards:

[Shell]
Command=2
IconFile=Explorer.exe,3
[Taskbar]
Command=ToggleDesktop

Rename the text document to metro.scf. Make icon before and after the renaming: it should be different after you have renamed it. Now it is time to add the file as a Task to the Task Scheduler. The easiest way to open the Windows Task Scheduler is to press the Windows-key to get into Metro (how ironic), enter schedule, switch to the settings filter on the right, and select the scheduler from the results listing. Select Task Scheduler Library in the new window, right-click in the task listing, and pick the create new task option from the context menu. Enter a name for the task, e.g. Metro, and switch to the triggers tab. Click on the add button here and select at log on in the begin the task menu at the top of the new window. Switch to the actions tab afterwards, select browse, and then the metro.scf file that you have created previously. When you restart Windows 8 now, the operating
system should automatically bypass the Metro interface. On most PCs, This will work..

FREE INTERNET PHONE CALLS

Most of the free phone call applications I list below are PC to phone programs, meaning you can make a free call from your computer to a real telephone number so you don't even need a telephone yourself. Some of the other free internet phone programs will connect your real phone to another real phone for free, making a long distance plan unnecessary.
No matter how it works, it's a free call!
To make a free call using an Internet phone, you might have to download free phone call software or use a soft phone from an Internet phone                                                                                      provider website.

1. Google Voice

As of September 2011, Google Voice is the very best way to make free Internet phone calls. With Google Voice, you can make free phone calls, free PC to phone calls (via Google Talk browser plugin), and free PC to PC calls (also via Google Talk).
Google Voice is much more than a way to make free phone calls on the Internet. Google Voice is primarily a way to manage the phone numbers in your life and can be used to intelligently route incoming calls to your free phone number provided by Google Voice to any other phone you have. With Google Voice, you can also get free SMS, make a free conference call, and get free voice mail services.
Free calls you make with Google Voice must be to numbers in the United States or Canada.
Google Voice is available as a web app that you can use in any browser, including mobile browsers (as pictured here). Dedicated apps are available for Android, BlackBerry, and iPhone users.
Free phone calls with Google Voice are limited to three hours. However, you can continue to make a free call to the same number over and over again.

2. iCall

iCall is another tool you can use to make free internet phone calls. With iCall, you can make free calls from PC to phone using their free software.
The computer that you make calls from can be anywhere in the world but for the call to be free, the number you call must be in the United States or Canada. You can't make free phone calls using iCall if you're calling outside the US or Canada.
iCall is available as a free desktop application for Windows, Mac OS X, or Linux and as a free iPhone app. Free phone calls will be disconnected after a short five minutes but you can call the number back again as many times as you want. You will also hear an advertisement before each call that's around ten seconds long.
A flash-based version of iCall is also available on their website but free calls here are limited to three minutes.

3. EvaPhone

EvaPhone is yet another way to make free Internet phone calls. EvaPhone lets you make free, but incredibly short, PC to phone calls all from a Flash-based interface right on their website.
What makes EvaPhone unique is that you can call nearly any phone in the entire world for free. Another thing that makes EvaPhone unique is how incredibly short that free call is. Free calls range from ten seconds to one minute in length, depending on the destination. You're also also limited to just two calls per day.
After dialing a number on EvaPhone, you'll watch a short video advertisement and then your free call will begin. A countdown timer will begin so you know when you'll be disconnected.
I certainly don't think EvaPhone is the best way to make a free call on the Internet, but if you need to tell someone something fast, don't have your own phone, and don't want to pay for the call or download software, EvaPhone might be the perfect free Internet phone for you.

Free PC to PC Phone Calls

I compiled this list of ways to make free Internet phone calls assuming that you're looking for ways to call "real" telephones. However, if you're only interested in free PC to PC calls, several programs can do that.
A few of the many programs that offer free PC to PC calls that I didn't already mention above include Skype,Yahoo! Voice, and Windows Live Messenger.

HACKING TOOLS

winAUTOPWN v3.0 Released - System vulnerability exploitation Framework
WINAUTOPWN ACTIVE SYSTEMS TRANSGRESSOR GUI [ C4 - WAST ] is a Systems and Network Exploitation Framework built on the famous winAUTOPWN as a backend. 
C4 - WAST gives users the freedom to select individual exploits and use them.
BSDAUTOPWN has been compiled, like always for various flavours and has been upgraded to version 1.8                                                                                                  alongwith all applicable exploits
WINAUTOPWN requires PERL,PHP,PYTHON,RUBY and its dependencies alongwith a few others' too for smooth working of exploits included in it.
The Mole: Automatic SQL Injection Exploitation Tool
Mole is an automatic SQL Injection exploitation tool. Only by providing a vulnerable URL and a valid string on the site it can detect the injection and exploit it, either by using the union technique or a Boolean query based technique. The Mole uses a command based interface, allowing the user to indicate the action he wants to perform easily.
Sqlninja 0.2.6
Features:

 >> Fingerprint of the remote SQL Server (version, user performing the queries, user privileges, xp_cmdshell availability, DB authentication mode)
>>  Bruteforce of 'sa' password (in 2 flavors: dictionary-based and incremental).
>> Creation of a custom xp_cmdshell if the original one has been removed
>> Upload of netcat (or any other executable) using only normal HTTP requests (no FTP/TFTP needed).
>> TCP/UDP portscan from the target SQL Server to the attacking machine, in order
to find a port that is allowed by the firewall of the target network
and use it for a reverse shell.
>> Direct and reverse bindshell, both TCP and UDP
>> ICMP-tunneled shell, when no TCP/UDP ports are available for a direct/reverse
shell but the DB can ping your box.
>>
 DNS-tunneled pseudo-shell, when no TCP/UDP ports are available for
 a direct/reverse shell, but the DB server can resolve external hostnames
 (check the documentation for details about how this works).
>>
 Evasion techniques to confuse a few IDS/IPS/WAF.
>> Integration with Metasploit3, to obtain a graphical access to the remote DB
 server through a VNC server injection.
HexorBase - The DataBase Hacker Tool
HexorBase is a database application designed for management and audit multiple database servers simultaneously from a single location, is able to perform SQL queries and brute force attacks against servers common database ( MySQL, SQLite, Microsoft
SQL Server, Oracle, PostgreSQL ).
This tool is simple to use and very practical, may have to know a little SQL, but the basics.
Net Tools 5.0 (Net Tools 5.x)
This tools is a hacker friendly. Net Tools is a comprehensive set of host monitoring, network scanning, security, administration tools and much more, all with a highly intuitive user interface. It's an ideal tool for those who work in the network security, administration, training, internet forensics or law enforcement internet crimes fields. Net Tools is mainly written in Microsoft Visual Basic 6, Visual C++, Visual C# and Visual Studio .NET.
There has a 175 tools list in one software..
DRIL – Domain Reverse IP Lookup Tool
DRIL (Domain Reverse IP Lookup) Tool is a Reverse Domain Tool that will really be useful for penetration testers to find out the domain names which are listed in the the target host, DRIL is a GUI, JAVA based application which uses a Bing API key.

DRIL has a simple user friendly interface which will be helpful for penetration tester to do their work fast without a mess, this is only tested on Linux but as it is JAVA it should work on Windows too.
There are various other tools which carry out similar tasks..
SQL MAP 0.9
sqlmap 0.9 has been released and has a considerable amount of changes including an almost entirely re-written SQL Injection detection engine.

Sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a kick-ass detection engine, many niche features for the ultimate penetration tester and a broad range of switches lasting from database fingerprinting, over data fetching from the database, to accessing the underlying file system and executing commands on the operating system via out-of-band connections. Its a good tools for find Sql Vulnerability.

New Features/Changes-->

Rewritten SQL injection detection engine (Bernardo and Miroslav).
Support to directly connect to the database without passing via a SQL injection, -d switch (Bernardo and Miroslav).
Added full support for both time-based blind SQL injection and error-based SQL injection techniques (Bernardo and Miroslav).
Implemented support for SQLite 2 and 3 (Bernardo and Miroslav).
Implemented support for Firebird (Bernardo and Miroslav).
Implemented support for Microsoft Access, Sybase and SAP MaxDB (Miroslav).
Added support to tamper injection data with –tamper switch (Bernardo and Miroslav).
Added automatic recognition of password hashes format and support to crack them with a dictionary-based attack (Miroslav).
Added support to fetch unicode data (Bernardo and Miroslav).
Added support to use persistent HTTP(s) connection for speed improvement, –keep-alive switch (Miroslav).
Implemented several optimization switches to speed up the exploitation of SQL injections (Bernardo and Miroslav).
Support to parse and test forms on target url, –forms switch (Bernardo and Miroslav).
Added switches to brute-force tables names and columns names with a dictionary attack, –common-tables and –common-columns.
Ani-Shell
Ani-Shell is a simple PHP shell with some unique features like Mass Mailer , A simple Web-Server Fuzzer , DDoser, Back Connect , Bind Shell etc etc ! This shell has immense capabilities and have been written with some coding standards in mind for better editing and customization.

  Customization

1. Email Trace back is set to Off as default and emails will not be sent , If you are setting
this feature on make sure you change the default email address (lionaneesh@gmail.com)
 to Your email address , Please Change it before using.
2. Username and Passwords are set to lionaneesh and lionaneesh respectively , Please change them for better
security.
3. As a default Lock Mode is set to on! This should not be change unless you want your shell exposed.

Default Login
Username : lionaneesh
Password : lionaneesh

Features

    Shell
    Platform Independent
    Mass - Mailer
    Small Web-Server Fuzzer
    DDoser
    Design
    Secure Login
    Deletion of Files
    Bind Shell
    Back Connect
    Fixed Some Coding errors!
    Rename Files
    Encoded Title
    Traceback (Email Alerts)
    PHP Evaluate
    Better Command Execution (even supports older version of PHP)
    Mass Code Injector (Appender and Overwriter)
    Lock Mode Customization

Latest Version Addition
    Mail Bomber (With Less Spam detection feature)
    PHP Decoder
    Better Uploader
    Fixed some Coding errors

Intercepter Sniffer
Intercepter is a sniffer tool which offers various capabilities including sniffing for password hashes related to ICQ/IRC/AIM/FTP/IMAP/POP3/SMTP/LDAP/BNC/SOCKS/HTTP/
WWW/NNTP/CVS/TELNET/MRA/DC++/VNC/MYSQL and ORACLE. It also sniffs ICQ/
AIM/JABBER/YAHOO/MSN/GADU-GADU/IRC and MRA protocols. It has a built-in arp poisoning module, can change MAC addresses of LAN adapters, and has various other interesting functionality.

COMPUTER BASIC

Easy Learn Computer will discuss about computers ranging from the most basic. Before going on to further yahap is useful to know the basic computer first. In this case the basic knowledge to be learned about the introduction of Hardware and Software. 

HARDWARE
Computer hardware can be divided into several parts :

     CPU (Central Processing Unit)
     Input Device
     Output Devices
                                                                                                  Storage Device

CPU (Central Processing Unit)
The CPU is the most important part of a computer. In it there is a lot of hardware to connect and work processes input devices and send the results to the Output Device. CPU Unit consists of: main board, processor, RAM / Memory, Power Supply, Input / Output Controller, Display Controller, Multimedia Controller, Network Controller.
  • Main board
Main board serves to put the whole device controllers. Including Processor, RAM, Power Supply, I / O Controller, Display Controller and all the equipment is placed in the socket provided by the main board. Manufacturer Main board: Asus P5Series, AMPTRON, Compaq, Chip PC, Gigabyte, ECS, Dell, IBM
  • Processor
Processor is the brain of the computer, such as the human brain in all commands and command results in the process by the Processor. The processor is a chip that is often called "Microprocessor" which is now the size has reached Gigahertz (GHz). The measure is a matter of the speed of the processor to process data or information. Part of Processors the most important part of the processor that is divided into three: Arithmetic’s Logical Unit (ALU) Control Unit (CU) Memory Unit (MU) The more velocity and higher processor technology, the better the performance of the computer.
Interface = Socket 370 (P-3), Socket 478 (P-4), Socket A / B (AMD), PGA 778 (Dual Core and up) For example, Intel P1, P2, P3, P4, Dual Core, AMD Duron, Athlon, etc. 
Manufacturers processors are widely circulated in the market are AMD, Apple, VIA Cyrix, IBM, IDT, and Intel.
  • RAM / Memory
Random Access Memory file storage program executed by the computer functions. The greater the capacity, the more closely the process as well. My experience with the system Windows XP CPU will be very responsive to 2:00 GHz with 512MB RAM. 
Type / Interface = EDO (oldest), SDRAM, DDR1, DDR2, DDR3 (newest, fastest, cheapest)
  • Power Supply
Power Supply serves as the resources used to use all the tools available on the computer. Recommendations When Power Supply for your computer is one that has great power, better computer power advantages. 
Pin Type: 12 Pin Interface (old type), 20 Pin ATX, ATX 20 Pin + 4 Pin, ATX 24 Pin + 4 Pin (Latest)
  •  I / O Controller
Controller to manage devices connected to the I / O ports (Port Serial, PS2, LPT). Examples of devices that connect to the PS2 Mouse, Keyboard P2, Printer LPT.
Interface = ISA, PCI
  • IDE controller and SCSI Controller
The controller is to manage the performance of the devices connected to the IDE or SCSI port. The tools are used to connect hard drives, floppy disks, CD Rom.
Interface = ISA, PCI
  • Display Controller
Display Controller to produce a display to a monitor or TV. There are two types of the first on board, both are often called VGA Card. VGA has its own RAM larger capacity, greater RAM then the display on the monitor will be more subtle. VGA Card also serves to reduce load performance RAM / Memory on the use of certain 3D games, 3D video, and programs that require high-resolution graphics. 
Example RAM VGA: 16, 32, 64, 128, 224, 256, 512, 1G. 
Interface = ISA (Old Type), PCI (Old Type), AGP, PCI-Express (New) 
Manufacturer VGA: Nvidia, S3 Trio, SIS, ATI Rage Series, etc.
  • Multimedia Controller
Multimedia Controller for producing sound often called a Sound Card (Sound). Sound Card Technology Today technology developed to support 3D Surround 5.1 (mean 5 speakers with 1 Central as Base 6 Channel). 
Manufacturer: Realtek, CMedia, ESS, Creative Sound Blaster. Interface = ISA, PCI
  • Network Controller / Network Adapter / LAN Card
Network Controller / Network Adapter / LAN Card are used as a port that connects two or more computers. Usually used for Chat, File Transfer, Database Programs, internet access (if using a modem), Multi Player Games, etc. 
Interface = ISA, PCI


INPUT DEVICE
Device used to enter commands.
  • Keyboard
This tool is to include input ASCII characters to be translated so that the system will generate an order.
Port Interface = Serial / PS2 / USB
  • Mouse
This tool is a pointing device (pointer) that will help to access the computer.
Port Interface = Serial / PS2 / USB
  • Scanner
This tool will convert real image into Image File (File Photo)
Port Interface = LPT / USB
  • Joystick
This tool as a game controller.
Port Interface = LPT / USB


Output Devices 
That tool works issued the results of a command input device.
  • Monitor
To display the results of the CPU.
  • Printer
As a means of printed documents. 1. Laser printers, this printer to print quality documents the approach documents have been processed in a computer. 2. Ink-jet printers, laser printers compared to New Media, the initial cost of the printer type more efficiently. 3. Dot matrix printer, this being the most preferred type ON PC era. In this type of printer, the image produced by a collection of the check point spread short distances so it looks uneven. 4. Plotter, printers use a pen set to make World Prints related engineering or architecture. 
Manufacturer : Canon, Epson, HP, Lexmark, Apollo, etc. Port Interface = LPT, USB
  • Speaker 
As the sound output device. We can also use earphones.

Storage Device 
That the tool serves as a place to store data in a file.
  • Fixed Hard disk / Hard Disk 
Chasing placed inside the CPU, is used to store files in a very large capacity. At present, the production capacity of hard disk storage has reached more than 512 GB. 
1KB = 1024 B 
1MB = 1024 KB 
1GB = 1024 MB 
For example, file documents / letters usually only takes 200kb, 4MB MP3, Video CD 50MB / song, 700MB / CD full. 
Interface = IDE, SCSI, SATA Manufacturer: Samsung, Maxtor, Seagate
  • Floppy disk Drive
Floppy disk drive is the additional storage that can be moved - moved / not fixed, including the Removable disk. Since capacity is only 1.44 MB floppy disk now abandoned and turned to flash a current capacity up to 8GB, safer and maintenance free. 
Interface = floppy interface 
Manufacturer: Panasonic, Samsung
  • CD / DVD Drive
Used as a media reader CD (Compact Disk / Disk tile) or a DVD. CD / DVDRW can be used to read the CD / DVD, and burn to CD / DVD. The storage capacity of a standard 700MB CD, DVD 1 Layer 4.48 GB, 8.15 GB DVD 2 Layer. 
Interface = IDE, SCSI, SATA 
Manufacturer: Samsung, Liteon, LG, Pioneer
 
Other Device (Other Devices)
  • Flash Disk 
Flash Disk is also included in the Storage Device, floppy disk the same function, but has a large capacity and maintenance free. My experience using a floppy disk is very uncomfortable and unsafe, because it must be protected from dust, sunlight, water, magnets, etc. A common mistake because unreadable. Flash disk capacity from 512, 1GB, 2GB, 4GB, 8GB and growing. 
Interface: USB
  • Bluetooth Adapter 
This tool converts the digital data into a particular frequency radio signals to connect with other tools such as HP, other PCs, Bluetooth Mouse, Bluetooth Speaker, etc.
Interface: USB
  •  TV Tuner
This tool serves to convert the RF signal (TV signals) into digital signals. With this tool for watching TV on the computer is not a problem. Usually equipped with a radio. 
Interface: PCI / USB
  • External Hard Drive 
Function and capacity similar to a fixed disk / hard drive. The difference this device can be taken anywhere, because it includes the Removable Disk. 
Interface: USB 
SOFTWARE
Software is a program, device drivers, and files on the computer. Namely;
  • Operating System (OS)
The operating system is the software that controls the performance of the main system. In determining the OS to consider the compatibility (support for programs to third parties, as well as support for hardware), stability (Often Mistake or not), and Price Range (OS Windows XP Home Edition for dollar cost nearly 800ribu, Linux offers a free OS such as Ubuntu). 
Example OS, DOS 6.22, Windows 3.11, Windows 95, 97, 98, 2000 Server, XP, 2003, Vista, Linux Mandrage, Linux Ubuntu, Suse Linux, etc.
  • Program Application
The application program is a supplemental program to support the performance of the computer. (Price Software Microsoft Office Word, Excel Access to 1.7 million). Example Applications, Office (Word, Excel, etc.), Winamp, Power DVD, Pascal, Application Games, etc.
  • Device Driver 
All the hardware described above will not work without a Device Driver is installed in the Operating System. For example, the printer cannot print without a Device Driver. For Exsample : Suppose we want to install a TV tuner card installed in the PCI slot. Once the computer is turned on it will be confirmation that the new hardware found and then the computer asks Device Drivers for new hardware. This could mean that the computer wants to know what the name, the function and workings of the new hardware and ask identifier wheel / in the form of software (usually included in the package tool). After we gave the driver files in the form of software, the computer will know that the name of this tool is the TV Tuner, Brand A, mounted on a PCI-X slot, and so on. However, the operating system has been equipped with many hardware-hardware drivers that are often used in PCs. If we put a new tool to the computer then the tool is ready for use, it is called Tool Compatible. Stay updated drivers so we can work optimally. For example, flash, LX-300 Printer, Monitor

SOFTWARE KEYS AND SERIALS

Serial numbers (a.k.a. key codes, product keys, installation keys, serials, etc.) are needed before you can install almost any popular software program. Serials and key codes are often required during installation or after using a program for a certain period of time.
If you've lost your serial number or product key code, there is a really easy way to find it if the program is still installed. You might even be able to find a program's serial number if you've uninstalled the software but only if the serial number information was left in the Windows Registry during the uninstall process.
The easiest way to find a lost serial number or product key code is with a free product key finder program.
Product key finder programs are software tools that automatically search your computer for the serials and keys stored in the registry. When you installed your operating system and other software, the serial numbers and product keys used during their installations were stored inside the registry.
You could look in the registry for the serials and keys yourself but they can be very hard to find and are often encrypted.
Most product key finder programs were originally designed to find the serial numbers and key codes for operating systems like Windows 7, Windows Vista, or Windows XP but many of them find serials and keys for many other programs too.
 In your search for help with serials and key codes, you've probably come across software cracking tools, keygen programs or maybe even lists of key codes free for the taking. It's very important to realize that none of those resources are legal ways of obtaining serial numbers, key codes, product keys, or any other unique code designed to protect programs from being pirated. The only legal way of installing software is by using a valid serial number or key code obtained through a legal purchase of the software program.

NEW PC SOFTWARES SERIAL KEYS IN UR MOBiLE Just sMs JOIN LAL2011 to 9219592195.
Convert u r PC in 3D.
 
CubeDesktop Pro 1.4.0 Download at www.cubedesktop.com Serial: KI55I- BQRM5-DKTA4-IXE6Y-KNIBK.
 
IDM V6.05 Serial: N3QM3-BQBR3-EWKOZ- WJ6TC VQ6UH-CS1K6-7WN2V-IY2NA S375D-1TPSQ-Q2330-8CQR9
 
Note: Offline. TUNE UP UTILITES.2011 KEY JDV194- TAB6KJ-X661V2- Y9NHN2-34FRR7- B2JW2Q OR J250BQ-JV7CKD-57MEQ9- TNQY37- T227VK-NNKJ0F
 
Avg 2011 antivirus key: P9UZV8- UZ77YE-1DN92W-PCRMH7- B6QK52- MEH05T.
 
MS office 2007 KGFVY-7733B-8WCK9- KTG64- BC7D8.
 
Nero 9.4.26.0 9M03-01A1-PCX7- K31A-8A94-98PT-KT2E-522A.
 
Malwarebytes Serials ID:8LA62 Key:MY5WD0CT75QT60C1 ID:2TN84 Key:MTQ78EXCEVM0JECN ID:9QX86 Key:4P6YR7J9GFRD9BEH ID:6IA26 Key:AT8HKXXTFATNMDF9
 
Bigasoft FLV Converter 3.5.0.3947 Serial Bigasoft FLV Converter 3.5.0.3947 Serial Serial :- 0169- AB70-49A9-5A51- FD1F-3D95- DBBF-BC9B
 
ESET Nod32 Antivirus [all versions] Username & Password Username: EAV-36902568 Password: efpsuf6btn Usrnm: EAV-36902580 Psswrd: 566k3ap8ep Usrnm: EA
 
Adobe photoshop cs4 Name: Cyberspirit 21 s/n: 1325-1454-5884-7210-4830-3247.
internet download manager Y30OZ- DNQH7-FRWPW-YYZÍA.
 
Nero Multimedia Suite 10 Platinum HD Nero Multimedia Suite 10 Platinum HD: - 9X13-01AA- TU89-2UCZ-L852-H2P8- PP40-K0XE 9X03-014M-337H-H1CZ- L2KK-229X-1Z.
 
Cinema 4D Keys Cinema 4D Keys Cnma 4D:- 10901034523-CFVZ-NMRF-MBGK- XPTZ BodyPaint:- 31000034523- CJLT- DJLP-RTNM-PJPV Cnma 4D 9.5:- 39500034523-RDXP-N.
 
Tune Up Utilities 2011 Serial Tune Up Utilities 2011 Serial Serial :- J250BQ- JV7CKD-57MEQ9- TNQY37-T227VK- NNKJ0F
 
4Media HD Video Converter 6.0.12.0914 Serial 4Media HD Video Converter 6.0.12.0914 Serial User Name :- Adrian Dennis Srl Number:- Adrians Cool Subscr
 
DivX Plus 8.1 Build 1.0.8.22 Serial DivX Plus 8.1 Build 1.0.8.22 Serial Serial:- 6TRBSNAHECFKIVYPDJNZ
 
Nero Serials New Serials :- Nero Multimedia Suite 10:- Serial number: 9X03-0154-4H84-WWPL-1WPZ- AP64- K532-XMML Srl nmbr: 9X03-016C- MXEX-4536-T0L7-2W2
 
Cool Record Edit Pro v7.9.9 Serial Cool Record Edit Pro v7.9.9 Serial Name:- Adrian Dennis Key:- CPRO- TF477-46YM4-W74MH-6YDQ8
 
CorelDRAW Graphics Suite X5.v15.0.0.486.Keymaker ( CorelDRAW Graphics Suite X5.v15.0.0.486.Keymaker Size:-20Kb Download Link :- http:// adf.ly/6sTE
 
Ahead Nero v7.5.1.1Keymaker or Keygen Ahead Nero v7.5.1. Keygen Size:-121Kb Download Link :- http:// www.ziddu.com/ download/11714194/ Ahead.Nero.v7.5.1
 
iPhone Ringtone Maker Serial iPhone Ringtone Maker Serial Name:- Adrian Dennis License Code:- STX! LZ67251577250Z3U4C68- FAB1-73B2-5D1E
 
ESET NOD32 SMART SECURITY Username Password Sep 14 ESET Nod32 Antivirus [all versions] Username & Password Username:EAV-34426223 Password:vpvepun3vf
 
Adobe Acrobat v9.0.0 Pro Extended Patch Adobe Acrobat v9.0.0 Pro Extended Patch Size:- 288kb Download Link :- http:// adf.ly/6eb5
 
Xilisoft Video Converter Ultimate 6.0.3.0416 Patch Xilisoft Video Converter Ultimate 6.0.3.0416 Patch Size:-302Kb Download Link :- http:// tinyurl.com
 
Emicsoft Video Converter v 4.1.16 Patch Emicsoft Video Converter v 4.1.16 Patch Download Link :- http:// adf.ly/6SkR
 
AVG 9.0 antivirus software key valid till 2018 and aslo update ur antivirus: 9A- ABL8Y-29G62-C33BA-QTNSH- GETW3.
 
Subliminal Flash-3.0 Crack Subliminal Flash-3.0 Crack Download Link :- http:// www.ziddu.com/ download/11577120/ subliminal- flash-3.0CrackbyMAnju.rar.ht
 
Adobe Photoshop CS5 Serial Serials :- 1188-1702-9219-4234-2059-4581 1330-1281-8916-6015-7348-5124 1325-1558-5864-4422-1094
 
System Mechanic V9.5 Serial System Mechanic V9.5 Serial Name:- ReanimatoR 3.7i Standard Edition:- 64898- ST524-7299881907 Professional Edtn:- 58959-P
 
StyleXP 3.13 Keygen Download Link :- http://www.ziddu.com/ download/11466753/ Style.XP.3.13KeygenByMAnju.zip.html
 
Red Call Recorder 1.1 Serial Red Call Recorder 1.1 Serial 1.Install Application 2.2 register Just use this serial Serial:564fdf867g9a65d47fg987h