TECH ZONE

enigma

Par 100 posts (V.I.P)
How to Access Blocked Websites???

Blocking access to undesirable Web sites through the use of Internet protocol filters has been a common government tactic since commercial Internet access first became available here in 1995. China and Saudi Arabia are believed to extend greater censorship over the net than any other country in the world under the pretext of information control.

Most of the blacklisted sites in Saudi Arabia are either sexually explicit or about religion, women, health, drugs and pop culture. They even block access to websites about bathing suits. So if you want to buy something to swim in, they seem to treat that as if it were pornographic in Saudi Arabia.

In China, webites containing sexually explicit content were among those blocked, but they also included sites on sensitive topics such as Tibet, Taiwan, and dissident activity. China also blocks access to Google News, Typepad and Blogger hosted blogs.

But what if an innocent website is accidentally blocked by your ISP or your government. There are always legitimate reasons to visit these blocked websites. We have listed a few methods to help you access blocked websites in school, college, office or at home.

Approach 1: There are websites Anonymizer who fetch the blocked site/ page from their servers and display it to you. As far as the service provider is concerned you are viewing a page from Anonymizer and not the blocked site.

Approach 2: To access the blocked Web site. type the IP number instead of the URL in the address bar. But if the ISP software maps the IP address to the web server (reverse DNS lookup), the website will remain blocked.

Approach 3: Use a URL redirection service like tinyurl.com or snipurl.com. These domain forward services sometimes work as the address in the the url box remain the redirect url and do not change to the banned site.

Approach 4: Use Google Mobile Search. Google display the normal HTML pages as if you are viewing them on a mobile phone. During the translation, Google removes the javascript content and CSS scripts and breaks a longer page into several smaller pages.

Approach 5: Enter the URL in Google or Yahoo search and then visit the cached copy of the page. To retrieve the page more quickly from Google's cache, click "Cached Text Only" while the browser is loading the page from cache.

Approach 6: A recent Oreilly story on accessing blocked websites suggested an approach to access restricted web sites using Google language tools service as a proxy server. Basically, you have Google translate your page from English to English (or whatever language you like). Assuming that Google isn’t blacklisted in your country or school, you should be able to access any site with this method. Visit this site via Google Proxy

Approach 7: Anonymous Surfing Surf the internet via a proxy server. A proxy server (or proxies) is a normal computer that hides the identity of computers on its network from the Internet. Which means that only the address of the proxy server is visible to the world and not of those computers that are using it to browse the Internet. Just visit the proxy server website with your Web browser and enter a URL (website address) in the form provided.
 

enigma

Par 100 posts (V.I.P)
===Tips for choosing strong passwords===

Password cracking software uses one of three approaches: intelligent guessing, dictionary attacks, and automation that tries every possible combination of characters. Given enough time, the automated method can crack any password.

However, even when password cracking tools continue to improve, it still can take months to crack a strong password. Here is one of the best tip on creating strong secure passwords:

Instead of using the same password for everything you access, choose a root password, then take the name of the service or application you’re accessing, replace a few letters with numbers (or jumble it up), and append it to the end of your root password.

Some more strong password tips:

1. Do not use names, nor words found in the dictionary. Don’t even think about “1111″, “123″ and “qwerty”.

2. Your password’s length should be at least 8 characters long.

3. Select an alphanumeric password, meaning that it contains both letters and numbers. Try appending a random number to the end of the password, or replacing one or two letters with numbers.
 

enigma

Par 100 posts (V.I.P)
***Rapidshare Tips & Tricks***

***Rapidshare Tips & Tricks***

How to disable the rapidshare.de download counter in IE or Firefox

While waiting for download, type javascript:c(countdown = 0); in the browser addressbar to eliminate the rapidshare countdown (waiting) feature. If this trick doesn't work, try the alternative below:

1. Click the Free button to initiate the download for rapidshare website
2. As the countdown timer begins, type the following URL in the location bar and press enter or click the Go button. The rapidshare direct download link should appear immediately.

javascript:var%20counta=0;var%20countb=0;var%20countc=0;var%20countd=0;var%20counte=0;var%20countf=0;var%20countg=0;var%20counth=0;var%20counti=0;var%20countj=0;var%20countk=0;var%20countl=0;var%20countm=0;var%20countn=0;var%20counto=0;var%20countp=0;var%20countq=0;var%20countr=0;var%20counts=0;var%20countt=0;var%20countu=0;var%20countv=0;var%20countw=0;var%20countx=0;var%20county=0;var%20countz=0;

3.The third option to byepass waiting time in Firefox is by using Greasmonkey extension and installing rapidshare.user.js script (rapidshare no wait). RapidLeecher is another PHP script for Rapidshare.de, Megaupload and MyTempDir services for immediate and simultaneous multiple downloads using proxy servers.


***Byepass the Rapidshare data download limit***

Rapidshare limits each user to a certain amount of downloading per day based on the users IP address. You can easily cheat rapidshare by showing a different IP address.

1. Clear your browser cookies.
2. Open the command prompt (Start - Run - cmd.exe)
3. Run the following simple commands:
ipconfig /flushdns
ipconfig /release
ipconfig /renew
4. Type exit to close the DOS window. Restart the rapidshare download job.

This trick may not work if your ISP has assigned you a static IP address. (BSNL assigns a dynamic IP)

OR

Shut down ur Pc and start it again n continue downloading


***If Rapidshare blocks your IP, change proxy***
Rapidshare might block an IP from download for sometime. To byepass this restriction, change your IP. First obtain a IP and it's port from publicproxyservers.com. Then use that IP and port in your browser Connection settings window. Click OK.


***Free Rapidshare Premium Account***
To login into the RapidShare - PREMIUM-Zone without using your credit card or PayPal, During certain periods, Rapidshare provides free premium account to normal users. The free premium rapidshare links are valid for 24 hours. The URL to try is rapidshare.de/cgi-bin/freeaccount.cgi It may be possible that all rapidshare free premium accounts are taken so try again later.
 

creat!ve

Par 100 posts (V.I.P)
aware all the tricks above, about the 3rd trick, tht does work fine with BSNL

thanx for sharing though.
 
Thanks a lot enigma....

How do we search for files uploaded on rapidshare, megaupload, etc???
are there any softwares or websites for the same???
 

enigma

Par 100 posts (V.I.P)
***Is anyone else reading your email ?***

Is your friend, boss or even some coworker secretly reading your email ? Are the Federal agencies snooping your email messages ? Following are two simple techniques that can help you confirm your suspicion - it detects snoopers and can track the address of the computer that is watching your email.

Remember that for steps 3 & 4, you can create a free account on geocities.com, create a dummy HTML file that contains Statcounter or Google Analytics tracking script.

1. Set up a Hotmail account in US and and a second email account with a non-U.S. provider. (eg. Rediff.com or IndiaTimes.com)
2. Send messages between the two email accounts which might be interesting to the email snooper or NSA who may be monitoring your email.
3. In each message, include a unique URL to a Web server (link to the dummy file on geocities.com containing the tracking code) that you have access to its server logs. This URL should only be known by you and not linked to from any other Web page. The text of the message should encourage an NSA monitor or email snooper to visit the URL.
4. If the server log file ever shows this URL being accessed, then you know that you are being snooped on. The IP address of the access can also provide clues about who is doing the snooping.

The other technique uses Google Analytics for tracking the email impressions.

1. Create an email email message such that Urchin with the following HTML code to embed the __utm.gif image anywhere in your email message.

<img src="http://www.google-analytics.com/__utm.gif?
utmt=imp&utmac=C&utmcsr=news1&utmcmd=email&utmctr=em&uctr=k">

The email impressions would be credited to the source "news1" and the medium "email". As soon as someone ones your email, the impression will be registered on Google Analytics server as the gif file is downloaded on the spying computer.

2. If the email recipient has disabled automatic downloading of internet images, you can create a campaign link to track the email referrals. Tag these links using the utm_ campaign variables.

Continuing with the example above of an email message which you track using the source "news1" and the medium "email," your tagged link might look like this:

< a href="www.mywebsite.com/?utm_source=news1&utm_medium=email" <click here</a>
 

enigma

Par 100 posts (V.I.P)
***Useful Windows XP DOS Commands & Tricks***

Typing DOS commands on the Windows Command Line prompt is a most efficient and faster way of doing things in Windows XP. Here's a run-down of the most useful DOS commands available in Windows XP. Some of these DOS commands even do not have an visual alternative.

DOS Command-line tools must be run at the prompt of the Cmd.exe command interpreter. To open Command Prompt, click Start, click Run, type cmd, and then click OK.

ipconfig - Windows IP configuration
Useful for troubleshooting your internet connection. Displays the current IP address of your computer and the DNS server address. If you call your ISP for reporting a bad internet connection, he will probably ask you to run ipconfig.

fc - Free BeyondCompare in XP
FC is an advanced DOS Command that compares two files and displays the differences between them. Though the file comparison results are not as interactive as BeyondCompare or Altova DiffDog, fc is still very useful. You can even set fc to resynchronize the files after finding a mismatch.

type - open text files sans Notepad
Similar to Unix cat command, Type is my favorite DOS command for displaying the contents of a text files without modifying them. When used in combination with more switch, type splits the contents of lengthy text files into multiple pages. Avoid using the type command with binary files or you'll hear alien PC beeps and see some greek characters on your PC.

ping - Say hello to another computer
Ping network command followed by the web-address or IP address tells you about the health of the connection and whether the other party is responding to your handshake request. Ping tool can also be used to convert the web address to a physical IP address.

tree - visual directory structure
You often need to take prints of your physical directory structure but XP has no simple "visual" commands for printing directory contents. Here, try the Tree DOS command and redirect the output to a text file.

tree > mydirectory.txt
print mydirectory.txt

attrib - make hidden files visible
Attrib lets you change attributes of System files and even hidden files. This is great for troubleshooting Windows XP. Say your XP doesn't boot ever since you edited that startup boot.ini file (Hidden), use attrib to remove the Hidden attibute and edit the file using EDIT dos command.

assoc - which program will open that .xyz file
The assoc DOS command can be used to either isplay or even modify the file name extension associations. The command assoc .htm will quickly tell you the name of your default web browser (see picture)

move - more flexible than copy-paste
Say you got a lot of XLS and DOC files in you MyDocuments folder and want to move only those XLS files that have their name ending with 2006. In XP Explorer, you have to manually select each file and then cut-paste to another folder. However, the DOS move command make things much simpler. Just type the following at the command prompt:
move *2006.xls c:\2006Reports\

find - advanced file search with filter
Find is the most powerful DOS command and even more useful than the Windows Desktop Search tool or the Windows Find Wizard. The find command searches for a specific string of text in a file or files. After searching the specified file or files, find displays any lines of text that contain the specified string.

To search your hard disk to find and display the file names on drive C: that contain the string "Google" use the pipe (|) to direct the results of a dir command to find as follows:
dir c:\ /s /b | find "Google"

Quick tip - Drag to avoid typing: When your command acts on a file or folder, you must type the path to that folder after the command. You can save typing time by dragging the file or folder from Windows Explorer into the command window.

To view help at the command-line, at the command prompt, type the following:
CommandName /?
 

enigma

Par 100 posts (V.I.P)
***Downloading software Serials or Cracks***

When you are downloading cracked software, you are by definition dealing with people who have bad intentions. This makes downloading cracks a dangerous thing to do. When you download a crack, you can be almost certain that some bad things will be included.

If you are looking for a serial number, a crack, or a keygen, the following information can save you a lot of time and money.

Most crackers will include trojans that they have written themselves and are therefore not detected by virus scanners. Many cracks will include spyware. The trojans allow the cracker to access your computer. If you use your computer to make payments by credit card or to do online banking, the cracker will have access to your passwords and pin codes and will use your credit card or bank account to buy things.

The spyware can break many things in your computer. It can make your browser unusable. There is also a good chance that viruses are included.

Now you may think that serials are safer. You don't need to install anything on your computer to use them. But if you think this, you are wrong. The web pages where you find the serials are a dangerous place. Many of these web pages exploit security holes in your browser, and can install trojans, spyware and viruses on your computer just by visiting the web page.

Just searching on the web for web pages that contain serials can damage your computer, can give the crackers access to your credit card, and can install spyware that tracks everything you do.

If you want to save lots of time and money, don't use the cracks, but instead spend this little bit extra money on a legal and safe version of the software. You will save lots of time and money later.

If you really can't afford the software you are looking for, contact the author and explain your situation. There is a big chance that you get a reduction or that you get the software for free.
 
Top