Tuesday, 9 July 2013

How to Record who logged or try to login on PC


Have you ever thought of monitoring who else tried to log on to your PC or user account behind you, now you can monitor the login details on your Windows PC.
Hi everyone, if you are regular reader of our blog, you must be aware how to apply 4 layers of  security of your windows pc. If someone tried to access your account then you can audit the logon details, either if successful or not.Either it happened on PC or via any Network; you can get more detail about how and when who tried to log on to your PC. You must be aware of many software which try different passwords to gain access to your account, you can always have strong monitoring on these attacks.
to learn more and how to do it
click below 

Dual boot between Windows and Linux and Backtrack 5

For some purpose we need to have Linux as well as windows.
so we have to do dual boot
but some where we are getting confuse that how to do dual boot
so here is a document for you that how to do dual boot


Friday, 5 July 2013

How to configure advance firewall in windows

Firewall is actually a set of protocol that decides how an application or say port will be working from external network including internet, intranet and extra-net  For making use in every organization is extremely important for security reasons.

If you are a home user and don’t have such network, don’t ignore but ahead I’ll tell you how you can be affected by the loose control on your firewall. Okay let me tell you all the worms and root kits that are sent to our computer for stealing the information, uses the specific port number to communicating to the attackers for sending the confidential and critical data to them. By configuring your Windows Firewall with little effort, you can save lots potential harm to your PC.
Windows firewall setting located in
control Panel>> Administrator Tools>> Windows Firewall with Advance Security
Or you can quickly go to there by using Run
Run >>  ‘Firewall.cpl’ [Enter]
And Selecting Advance option from left plane.
On the Top left corner of the Advance firewall window, you will notice mainly four options
Inbound Rules
The Rules listed in your Firewall setting that decide which outer source will be allowed/deny the incoming connection via a port or to a specific application.

Outbound Rules
Outbound Rules build up the protocol which decides which application from the Windows will communicate from the internet via any know/unknown port.

Connection Security rules
This section contains the security related rules listed inside this section.

Monitoring
Here in this section, you can monitor the incoming and outgoing connection status.

Here in this section, I will tell you how you can configure the connection protocol for any specific application; this will have two sub section, inbound configuration and outbound configuration
Let’s start quickly.

Click on the Inbound Rules from Left plane,

You will see the list of Rules set to the incoming connection. You can Double click on the any rule to view the complete description on the rule.

If you want to want to set up the New Rule on the incoming connection, move your mouse on the right side information panel, Click on New Rule

his will open the New Wizard for setting up the Rules,
You will find the four options there,
* Program /* for configuring the connection for specific program */
-If you selected the Program, redirect the path of the program and proceed,
* Port /* Specify the TCP/UDP port for configuring */
- In case you selected the Port, Enter the Port number. Multiple port number can be entered by comma separated value or Range of the ports first port-last port
* Predefined /* Let you select the windows predefined applications */
- Selecting the Predefined program will let you select the sub part of the program to select
* Costume /* Let you customize the option (Expert only) */
- In case costume you have to select the executable application path
 Select the One and Proceed by clicking next
At the next step you will get the three options out there.

Allow the connection.
-          This let you allow connection to the internet via any selected port

Allow the connection if it is secure
-          This will allow connection only it is secure and encrypted.
Or

Block the connection
-          This will simply block all the incoming and outgoing connection  from the outside network

Now click Next..
Now you will get the option asking you to check the check-box having options when to apply the Rule you have created.
If you are in corporate domain and want to apply the rule check the Domain
If the network domain is private, select the private.
Or select the public for public location
Click on Next
After this you will get the option to Name this new rule and add the description for the other user (like if you are one of group of administrator) and save the Rule. After this your rule will be applied to the computer.
To prevent unwanted incoming connection to connect any application to internet, that may secretly share your data to person behind.
Prevent updating of software automatically.
Blocking the rootkits, worms to harm your computer.
Hoping this information will help you to make your computer more secure and safe

Use your Task bar work as Awesome Dock

People who think little different, they switch to dock instead of Desktop icons, and here learn how you can use Windows Task bar as multi-functional Dock.

Hello everyone,
I like my desktop clean and free from the bunch of icons, instead I used Rocket Dock sometime before, then I realized the free space on my Task bar and something hit my mind. Yeah, I am now using Windows Task bar as the dock with much functionality without wasting any extra processor/RAM resource of my computer
Please go on with this document given below-----

How to Protect Google Chrome by Password

Are you using Google Chrome Like king, you must be having lots of tabs and History along with your personal Bookmarks there, don’t you want to protect even if someone open your Chrome?

Hi everyone, Privacy is one of the most important when you are online, whatever browser you are using you need to be private and safe from attacker from another side of net or from even your side.

You can imagine how much data your browser has, especially in Google Chrome where people not only browse but do a lot more than that.
to know how to make your Google Chrome password protected click on that link

How to Recover Deleted files in Linux

So you are in the middle of the situation when you have to use or submit your document or file and accidentally you have deleted completely from your Linux PC, or something like this. You know that when you were using windows then you can search and find the plenty of freeware, shareware application that can easily recover your files. But it’s a tedious job to find the one for your Linux environment. But remember, your files can be recovered from the location, where no other files have been saved because probably have overwritten those deleted file (Means Completely loss). So make sure that deleted file should be recovered as soon as possible. And try best not to put any single file on that partition; this will make better chances of file condition.


PhotoRec is the Free and open source application that allow you to recover the files from your hard drive, flash drive, Digital camera, CD/DVD ROM. Not only this, it deeply look into the file detail and can recover your files on the bases of the file type used, like your Documents, Music, Videos, photos etc.
This Application is powerful enough that it can work on almost all type of file system even when the file system is damaged or formatted and this makes the best data recovery tools for Linux
 You will get your all information that how to restore your files u will get here

Ultimate Guide to Google Play: Android Beginners

Google Play launched specially for android, a smashing replacement for android store which have millions of certified apps by open source developer which used Google code library to build them and let the user use it.

Hi everyone, in this post, I am doing nothing but answering some of the frequently asked question about Google play which will let you understand about the Google play to the level of expert.
Let’s start with 10 frequently asked questions about Google play.



1. How do I Access Google play on Android device?

When you get a new android phone, Google play is pre-loaded on your device, you can open Application and search for Google Play icon, purple blue red mixed color triangle making Play button, yeah this is you got, Google play. Some of the tablet may not have Google play pre-loaded but this is quite rare.

2. Do I need an Account to Sign in to Google Play?

And the answer is YES. When first you open Google play, Google play Store will asked you to Sign in on it using your Google account, if you don’t have one, you can create the new Google account instantly. This simple and easy process is too fast and your device will remember you for the next time.

3. Can I try Google Play apps on Android device?

Most of the Google Play Apps are free. But some of the application is not so you can have option of trying those application before you buy and decide if these application worth buying. Note that, functionality of the application may be limited or trial period or may be working fully but for short time.

4. Why most of the Application on Google Play is Free?

Most of the developer are using free and open source code to develop the applications, these applications most of the time are ad-supported. This means you may see some advertising on application while using it. Developer/Author of those applications monetizes their app by advertising. However you may stop seeing those app by paying full version, that’s another way they can get worth.

5. Should I read Users review on Google Play?

The best ever way to get to know the usefulness of the application is to known the other users experience. On every app you can see the users review, this will help you to decide If those applications are worth using/buying or trying or just waste of time. More the users review more the like and standard of the application.

6. If the Android Applications Safe on Google Play?

Almost all the Android application on Google Play is perfectly safe. But still you can make sure it is safe on your side too, whatever application you use, require to access some data, for example map application require location data and you should allow it. But you need to think before you grant permission, for example if a free game require to read your contact, be aware something is wrong. Check the application website, certification detail and again, users review to be on safe side.

7. Are Android Apps better then iOS?

Yes and No!! Some of the application is better on iOS platform but most of the applications are better on Android. Good news to know is most of the developer working on Android is also working on iOS so backend gap is almost no. and most of the apps are similar just some interfacing is different, and rest gap is minimum.

8. How many apps are on Google play?

Around the November 2012, there were more than 1,50,000. So no doubt you are able to find all the utility you wish you just you need to read the users review and keep the patient on finding and the best use the Google to find app on Google play.

9. How easy to use Google play store is?

Google pays ultimate attention to the UI and user experience of the applications, and Google play is itself tweaked many times to make all the possible. Google play will let you easily find the applications from the vast collection and easy to select and download.

10. How do I update my apps from Google play?

Newer version of apps are if available on Google play, your app will notify you, even some of the apps updates in background and you don’t need to do it manually. Though some application may ask you to do manually, if you think it is certified and trusted apps go ahead or manually download newer version after good review.

Bottom line
Google play is in better position if compare to Apple store or similar store, due to trust of Google, free availability easy to use and more interaction, Google play is becoming popular day by day. Hope you find it useful and worth sharing with your friends.

Protect your Folders without any software

Sometimes its too hectic to protect your private folders from others. using software its too easy, but today you will be able to protect it just by few minute trick.
firstly you need to create the batch file for the working.

Here are steps for creating batch file

1. Open Notepad file and Copy the following code into it
Download the codes-click here
2. Replace the code with your code after the line

3. Save file as name Locker.bat

4. Now open the file Locker.bat  by double click  it

5. it will create a folder for you. add your data in that file and then again double click on the file  Locker.bat


With this you can protect your data for free without any software if you want to change the password then right click on the locker file and then edit it. also you can copy the files to various location and create the folder (Protected) there too

How to Add custom Background in Google

Want to give the feel to your Google Home page? Want to have complete personalize background on you Google Home page in your Browser? You’re 2 minute away from that.

Even after Google pull down the costume background option on November 2012, Google chrome use can now still add their desired image on Google Home page.
All you need be user of Google Chrome, and Install Google chrome background extension from Google Chrome web store.

Install the extension from there and you will be able to explore and customize your Google Home page to complete new style. Beside changing your image, you can do a lot with this extension. Once you installed this,
A new tab will open there you will be asked to choose image, you cannot just upload image from your Computer, but a link from Web as well you can find new photo just searching from there.

When you’ll open new Chrome Window, a tab will be there for Custom background.

After selecting your Image, you can even select multiple images.


You can randomize the selected images on your Google Home page each time you visit the page.

You can even hide the Google Log
You can Hide search Button, just Hit Enter to search

You can Hide “I’m feeling Lucky” Button on Google Home page.

You can Hide/show Footer on Google Home page.

Even you can hide the Language and Promotion links from the home page.

Imp: This app will not collect your Data.

Imp: This Application can Access your browsing data and tab you opens.

Thursday, 4 July 2013

Use your Bluetooth Java(s40) Mobile as Remote Control

One side is there when Android is making the Mobile smarter and iOS and Windows are too using a lot of this kind of features. A simple Nokia s40 Series mobile with even Bluetooth connectivity can not do such smart work with Free software for Mobile. In today’s post i am going to tell this new thing to you.Just Imagine you can run Windows Media player, VLC media player, Explorer, Control your mouse, use it in your PPT presentation and lots more features and for all that you don’t have to get your head down just because you are using a simple java based Nokia phone which having Bluetooth support but having no more uses then to send/receive files and all. So should we start?
ou can have many full proof features and for all this you have to have 2 Requirements.
You have to install an application to your mobile via Nokia Suite/Nokia PC suite/Nokia Ovi suite.(click here to download the application)
If you are not able to install the App from Nokia software then you have another way to Download and install the apps by visiting this site from your nokia s40 phone. Visit www.blueshareware.com/brc_40.jar for Downloading this Client.
On Downloading the Apps you will get 3 files
            brc_40.jar
            BRC_Setup.exe
            Key.reg
First install the brc_40.jar file to your s40 phone.
Install BRC_setup.exe on your pc and after that
Run key.reg to convert it to full version.
Now start the Application in phone and computer as well making sure both device have Bluetooth on and in discoverable state.
In application(in computer) menu Add the phone and do the same in phone and connect to the PC.
After that in phone you will see a list of Application like

-          Powerpoint presentation controlled by Javas40 phone

-          iTunes controls via phone

-          Mouse Controller via Phone

-          Media player Remote

-          WinAMP Remote control

-          Computer File browser(Explorer) in Mobile 

-          Powerpoint light

-          Windows Control

-          Key Maps

-          Disconnect Log in log off shutdown computer via bluetooth mobile
  • Power point selection will open a new page where you can open the powerpoint by pressing middle Key.
  • After that pressing 8 will start slide show and use the right and left key for previous and next slide navigation.
  • iTune will help you to control iTune in your computer.
  • Mouse controller will do  control your mouse and it will also make the image of your screen on the mobile so that it will be easier to use.
  • Similarly you can launch Windows Media player and control all the play pause next forward function.
  • WinAMP a popular media player will be control by winAMP selection.
  • If you just want to play and control the slide show you can simply choose the Power point light and use your left and right arrow to do the same
  • File browser will open your My computer drive and you can use it as a File explorer.
  • Windows option will let you control volume/Lock the PC/Shout down/Reboot the computer.
  • You can find many more application inside the key map menu. Many other useful application like VLC media player Power DVD and Adobe reader will be able to control by this app

The Operating system Used by the hackers

BackTrack is an Operating system which is especially made for Hackers,ethical Hackers,Penetration testers etc.This operating system includes all the security assessments and features till date.This OS was made by a large community of Ethical Hackers and Penetration testers. BackTrack is the ” highest rated and acclaimed Linux security distribution to date. BackTrack is a Linux-based penetration testing arsenal that aids security professionals in the ability to perform assessments in a purely native environment dedicated to hacking

Live-hacking Operating System : This is also one of the favorites for the Penetration testers and Hackers,because this Operating system is completely Bundled up with lots of Scripts and Packages ready to Hack.So this is also one of the Powerful flavor used by the Renewed Hackers.This Operating system is made by Dr. Jahangiri, a world-renowned information security expert, presents the next must-have in IT training: LIVE HACKING, the definitive and comprehensive workshop for White-hat computer hacking

Kali Linux is a new open source distribution that facilitates penetration testing. Whereas BackTrack was built on Ubuntu, Kali is built from scratch and constructed on Debian and isFHS-compliant. Kali also has improved software repositories that are synchronized with the Debian repositories so it makes it easier to keep it updated, apply patches and add new tools. It is also easy to customize your own Kali Linux so that it contains only the packages and features that are required. You can also customize your desktop environment to use Gnome(default), KDE, LXDE, XFCE or whatever you prefer

Tutorials for Backtrack 5: Don't miss it..

Friends here are some BackTrack tutorials 
** BackTrack 5 training guide Part V Pen-testing in a nutshell tutorial 
    to get it    click here

**BackTrack oracle tutorial
   to get it     click here

**BackTrack guide tutorial
    to get it    click here

**BackTrack CUDA  tutorial
   to get it     click here

** WiFi hacking tutorials
    to get it click here

Wednesday, 3 July 2013

Why you will choose Linux

Friends I know you are not using Linux as your operating system. Some of you are using Windows And some of you using Mac. They also are good. for for the development Linux is th
e best operating system.
Friends you think that the operating system is  using by you is compatible for developing permanently.
Linux is freeware and its source code is easily available. you can develop it and make a new version but u can not have the right to develop windows or mac and make a new version of it.
For the beginner programmers Linux is the best environment for practicing programming.
Those who are in interested in Hacking they should use Linux. You can do any kind of change in Linux and make a Next generation Operating system
It is very much safe operating system.There is no problem with virus in Linux. virus files are not readable in Linux operating system.
friends lets have some changes in our life about computers. Linux helps you to understand your computers.
so use it and make a new world.
download it
Download Ubuntu 13.04       Download Ubuntu 12.04

Wanna Develop Android Apps...

For developing Android apps you should know C programming language

and you should have have SDK Tools and platform be Linux or Windows or Mac

you can use eclipse environment in windows for developing and NetBeans.

If you don't have eclipse then toy can download it from here.

for NetBeans Click here.

Social Apps For Android and Apple Phones

* Avocado
    a new apps for your Android and Apple phone
   with it  You can give even virtual hug
   Click here to download it  

*Tune In Radio
   With this apps you can download music as well as listening Radio also
  On Android phones it doesn't come with this apps
  Click here to download it

*BytNotes
   with this application you can write down the notes
   as your remainder of works
  Click here to download it

*Adobe Photoshop Express
  As you all know what is the  work function of Photoshop.
  so i don't have tell about it
  Click here to download it

Games for Android And Apple

1) GTA Vice City
download link-  http://dgit.in/gtaanniv


2)KungFu Worrior
download link-  http://dgit.in/FTKungFu

3)Max Payne Mobile
download link-   http://dgit.in/FTMaxPayne

4)Modern Combat 4:Zero Hour
download link- http://dgit.in/FTModernCombat

5)Real Raceing 2
download link- http://dgit.in/FTRealRacing2

6)Asphalt 7:Heat
download link- http://dgit.in/FTAsphalt7