Ofer For You (1)

Sunday 31 August 2014

Airtel GPRS Trick/ AIrtel Free Internet

By "Kunal Vohra", Director@H2K




This is a proxy trick by using which you can enjoy free browsing and downloading on Airtel.

You just have to create a new Airtel GPRS settings.

Do the following settings
  • Profile name: TechExtremity
  • Access point name (APN) :- airtelgprs.com
  • proxy:- koxy.de
  • port :- 80
  • Homepage :-  buddies.airtelmone.in
Thats it. Create this airtel GPRS setting and activate it for all connections. You are set to enjoy free internet on airtel.
Still Having Problem..!!! Connect with Admin 
 Kunal Vohra
Download Our Official Android App & Get Free Internet
"The Hackers Street"

For Daily Updates 

Saturday 30 August 2014

15 Coolest Firefox Tricks Ever

By "Kunal Vohra", Director@H2K



Everybody’s favorite open-source browser, Firefox, is great right out of the box. And by adding some of the awesome extensions available out there, the browser just gets better and better.
But look under the hood, and there are a bunch of hidden (and some not-so-secret) tips and tricks available that will crank Firefox up and pimp your browser. Make it faster, cooler, more efficient. Get to be a Jedi master with the following cool Firefox tricks.
1) More screen space. Make your icons small. Go to View – Toolbars – Customize and check the “Use small icons” box.
2) Smart keywords. If there’s a search you use a lot (let’s say IMDB.com’speople search), this is an awesome tool that not many people use. Right-click on the search box, select “Add a Keyword for this search”, give the keyword a name and an easy-to-type and easy-to-remember shortcut name (let’s say “actor”) and save it. Now, when you want to do an actor search, go to Firefox’s address bar, type “actor” and the name of the actor and press return. Instant search! You can do this with any search box.
3) Keyboard shortcuts. This is where you become a real Jedi. It just takes a little while to learn these, but once you do, your browsing will be super fast. Here are some of the most common (and my personal favs):
  • Spacebar (page down)
  • Shift-Spacebar (page up)
  • Ctrl+F (find)
  • Alt-N (find next)
  • Ctrl+D (bookmark page)
  • Ctrl+T (new tab)
  • Ctrl+K (go to search box)
  • Ctrl+L (go to address bar)
  • Ctrl+= (increase text size)
  • Ctrl+- (decrease text size)
  • Ctrl-W (close tab)
  • F5 (reload)
  • Alt-Home (go to home page)
4) Auto-complete. This is another keyboard shortcut, but it’s not commonly known and very useful. Go to the address bar (Control-L) and type the name of the site without the “www” or the “.com”. Let’s say “google”. Then press Control-Enter, and it will automatically fill in the “www” and the “.com” and take you there – like magic! For .net addresses, press Shift-Enter, and for .org addresses, press Control-Shift-Enter.
5) Tab navigation. Instead of using the mouse to select different tabs that you have open, use the keyboard. Here are the shortcuts:
  • Ctrl+Tab (rotate forward among tabs)
  • Ctrl+Shft+Tab (rotate to the previous tab)
  • Ctrl+1-9 (choose a number to jump to a specific tab)
6) Mouse shortcuts. Sometimes you’re already using your mouse and it’s easier to use a mouse shortcut than to go back to the keyboard. Master these cool ones:
  • Middle click on link (opens in new tab)
  • Shift-scroll down (previous page)
  • Shift-scroll up (next page)
  • Ctrl-scroll up (decrease text size)
  • Ctrl-scroll down (increase text size)
  • Middle click on a tab (closes tab)
7) Delete items from address bar history. Firefox’s ability to automatically show previous URLs you’ve visited, as you type, in the address bar’s drop-down history menu is very cool. But sometimes you just don’t want those URLs to show up (I won’t ask why). Go to the address bar (Ctrl-L), start typing an address, and the drop-down menu will appear with the URLs of pages you’ve visited with those letters in them. Use the down-arrow to go down to an address you want to delete, and press the Delete key to make it disappear.
8) User chrome. If you really want to trick out your Firefox, you’ll want to create a UserChrome.css file and customize your browser. It’s a bit complicated to get into here, but check out this tutorial.
9) Create a user.js file. Another way to customize Firefox, creating auser.js file can really speed up your browsing. You’ll need to create a text file named user.js in your profile folder (see this to find out where the profile folder is). Created by techlifeweb.com, this example explains some of the things you can do in its comments.
10) about:config. The true power user’s tool, about.config isn’t something to mess with if you don’t know what a setting does. You can get to the main configuration screen by putting about:config in the browser’s address bar.

11) Add a keyword for a bookmark. Go to your bookmarks much faster by giving them keywords. Right-click the bookmark and then select Properties. Put a short keyword in the keyword field, save it, and now you can type that keyword in the address bar and it will go to that bookmark.
12) Speed up Firefox. If you have a broadband connection (and most of us do), you can use pipelining to speed up your page loads. This allows Firefox to load multiple things on a page at once, instead of one at a time (by default, it’s optimized for dialup connections). Here’s how:
  • Type “about:config” into the address bar and hit return. Type “network.http” in the filter field, and change the following settings (double-click on them to change them):
  • Set “network.http.pipelining” to “true”
  • Set “network.http.proxy.pipelining” to “true”
  • Set “network.http.pipelining.maxrequests” to a number like 30. This will allow it to make 30 requests at once.
  • Also, right-click anywhere and select New-> Integer. Name it “nglayout.initialpaint.delay” and set its value to “0″. This value is the amount of time the browser waits before it acts on information it receives.
13) Limit RAM usage. If Firefox takes up too much memory on your computer, you can limit the amount of RAM it is allowed to us. Again, go to about:config, filter “browser.cache” and select “browser.cache.disk.capacity”. It’s set to 50000, but you can lower it, depending on how much memory you have. Try 15000 if you have between 512MB and 1GB ram.
14) Reduce RAM usage further for when Firefox is minimized. This setting will move Firefox to your hard drive when you minimize it, taking up much less memory. And there is no noticeable difference in speed when you restore Firefox, so it’s definitely worth a go. Again, go to about:config, right-click anywhere and select New-> Boolean. Name it “config.trim_on_minimize” and set it to TRUE. You have to restart Firefox for these settings to take effect.
15) Move or remove the close tab button. Do you accidentally click on the close button of Firefox’s tabs? You can move them or remove them, again through about:config. Edit the preference for “browser.tabs.closeButtons”. Here are the meanings of each value:
  • 0: Display a close button on the active tab only
  • 1:(Default) Display close buttons on all tabs
  • 2:Don’t display any close buttons
  • 3:Display a single close button at the end of the tab bar (Firefox 1.x behavior)
Got any favorite Firefox tips or tricks of your own? Let us know in the comments.

Still Having Problem..!!! Connect with Admin 
 Kunal Vohra
Download Our Official Android App & Get Free Internet
"The Hackers Street"

For Daily Updates 

Passwords aren't the problem -- we are

By "Kunal Vohra", Director@H2K

A billion stolen passwords or no, we can all benefit from exercising common sense when it comes to online security




The world is abuzz with news that a Russian hacker conglomerate may have stolen more than 1.2 billion email addresses and passwords. Whether or not the report turns out to be true, with all the ways the bad guys can get your credentials, you're fooling yourself if you think you don't have to worry about ever being compromised.
But I'm not here to tell you use stronger passwords (for the most part, that doesn't work), to only use two-factor authentication (not available on most websites), or to change all your passwords (though you probably should).

The fact is that long and strong passwords, for the most part, don't work. The bad guys' methods for stealing them will prevail, no matter how good your password. Even if your login credentials aren't caught up in batch of stolen passwords making the latest news headlines, chances are that one or more of your passwords have been stolen or will be stolen in the near future. It's the Internet, and it's very insecure. It's a dangerous, wild, wild, West often controlled by outlaws and criminals. It's going to remain that way for the foreseeable future.
Instead, I'll encourage each of you to send a letter to all your friends and the businesses you engage with. I'm more than half-kidding, but I think if our friends and businesses used more common sense, we would all be safer. Here's my letter:
Dear friends and businesses,
There is a good chance that all of our Internet passwords are already stolen. In light of that assumption, let me share what the real me would not do, along with other hints. That way, if you get an email or commercial transaction supposedly from me, you'll be able to quickly separate the legitimate wheat from the rogue chaff. Here are my hints:
For businesses:
  • I will not ever buy a product and have it shipped to another country.
  • If I buy any product and ask you to ship it to anywhere besides my long-held home address, you have permission to call me on my long-held phone number to verify.
  • I will never change my mailing address, phone number, and email address, then also transfer all my money to another bank within the same day, much less same Web session.
  • You should never transfer all my money to another bank or country without first calling my long-held phone number.
  • I will never sell all my stock, at a loss, and try to transfer the money to a foreign bank during the same day.
  • I will not call you reset my online password and be unable to easily verify information such as my last transaction, purchase, user, or origination location of the last session.
  • My debit and credit cards have my picture on them. If I'm buying in person, I should at least look like a little like my picture.
For friends:
  • I will not ask any of my friends to run a new Facebook app.
  • I will not email you or use Facebook to tell you I'm trapped in another country and ask you for money to rescue me.
  • I will not ask you to look at this cool new website in an email without any other text that actually sounds like it is coming from me.
  • I will never ask for your password or give you mine, especially over email or social media websites.
  • I will never offer to give you some of my money if you give me your bank account details.
  • I will never offer to pay you full price for your item and pay shipping.
  • I will never offer to buy something from you and suggest my "personal, trusted escrow company" you've never heard of.
  • I will never send you an email saying you'll have bad luck if you don't forward it to 25 other people.
  • I will never tell you to sell me an item you're advertising on a well-known auction service by taking communications offline and bypassing all their protections.
  • I will never send you an email from an email address you've never seen before and ask you to click on a weird link.
  • My email address will always match the embedded email link behind the visible email address.
  • I will never send you an email and tell you to run a program.
  • I will not start a new Facebook page and invite you to friend it while still keeping my current Facebook page.
  • I will not knowingly invite you to share your friend list to look at a video.
If my trusted friends and preferred businesses could understand these rules, I wouldn't have to worry nearly as much about my online logon credentials being stolen.
What would your letter contain?


Still Having Problem..!!! Connect with Admin 
 Kunal Vohra
Download Our Official Android App & Get Free Internet
"The Hackers Street"

For Daily Updates 

Useful Chrome Extensions to Help You Stay Focused 


Distraction!!! A never ending fight... You are in the middle of work  and suddenly you felt like checking your facebook updates  and bamm! it has been an hour and you are still chatting with your friends..
Admit it, this happens more than you’d like to admit ,unless you have the concentration power of a monk. so today here i bring links to some tiny productivity gems that make us more productive, more effective, more communicative, and generally more everything… 

Stay Focused:

Stay Focused  helps you stay focused on work by restricting the amount of time you can spend on time-wasting websites.
Once your allotted time has been used up, the sites you have blocked will be inaccessible for the rest of the day.
tay Focused Chrome Extension
It is highly configurable, allowing you to block or allow entire sites, specific subdomains, specific paths, specific pages, even specific in-page content (videos, games, images, forms, etc).

BE LIMITLESS :



It turns the new tab into a beautiful dashboard to easily identify where your time is wasted and gives productivity suggestions. The dashboard also includes a smart notepad that makes to-dos, reminders and countdowns easy to create and remember. Create goals and achieve them with inspiring images and quotes.




Note Anywhere:

Sticky notes on any web page. I really like the stickies on my Mac, but these are great for leaving little notes all over the web. Similar to apps like Diggo or Webnotes, but just the stickies.

Save to Pocket:

When you find something on the web that you want to view later, put it in Pocket. It automatically syncs to your phone, tablet or computer so you can view it at any time, even without an internet connection.




View definitions easily as you browse the web.  All you got to do is just Double-click any word to view its definition in a small pop-up bubble. even the Foreign words are automatically translated to your language of choice.



Rescue Time:

If you are the kind of person who like to make sure you are at equal, if not better than the average person, this is a good way to gauge that. Rescue Time not only measures the time you are slacking, it also compares you to the average user.





By "Kunal Vohra", Director@H2K

Still Having Problem..!!! Connect with Admin 
 Kunal Vohra
Download Our Official Android App & Get Free Internet
"The Hackers Street"

For Daily Updates 

Friday 29 August 2014

Winners Will Announce In 7 Days


Lucky Winners for the Free Internet Trick would be Announced on 07/09/2014, As it is My Birthday so it would be my pleasure to give giftsto all our lucky followers who rated our App H2K: The Hackers Street 5 Out Of 5. As I promised Free Internet for 3 months would be provided to all 5 winners. Till now we have 24 entries. If you also want to participate in the competition simply rate us 5 and get the chance to win free Internet, Simply rate us 5 out of 5 and keep sharing the app to get yourself up in the list of winners.

We are looking forward to your responses and also soon this app would going to be paid after 1000 Downloads. In last 3 weeks we got exact 350 downloads. And it seems a very good response. If we search ethical hacking on play store then our app is top listed.

Tap Below Image To Rate Our App Directly To Get Yourself In The List Of Winners



Regards
Kunal Vohra
Director @ H2K Cyber Experts

Trace Your Facebook Profile Visitors

By " ", Author@H2K





Now here we found who recently visited your profile. 
Follow below steps for get to know your FB recent visitors.

 Go to your Facebook Profile Page.

 Now Press Ctrl + U from your keyboard for see source code of your profile page.
 Now press Ctrl + F from your keyboard to open search box.
 Now search this code {"list":



 You find some Facebook Profile Ids are like shown below. Click on example image for zoom.


There are some Facebook Profile Ids of your friends who visited recently.
 The first one ID's are showing visits the most number of time. 
 Now if your want to findout, Open a new tab Enter below link :www.facebook.com/Facebook Profile Id
For Example : www.facebook.com/1642100693
Enjoy The Trick... who knows, you may get butterflies in your stomach  ;)



Still Having Problem..!!! Connect with Admin 
 Kunal Vohra
Download Our Official Android App & Get Free Internet
"The Hackers Street"

For Daily Updates 

Thursday 28 August 2014

Hackers attack Nuclear Regulatory Commission 3 times in 3 years

By "Kunal Vohra", Director@H2K





The organization overseeing the safety of U.S. nuclear reactors has fallen victim to overseas hackers three times in the past three years.

Citing an internal investigation, the Nextgov website reports that computers at the Nuclear Regulatory Commission were successfully hacked on three occasions. Two of the attacks were conducted by foreigners and a third came from “an unidentifiable individual,” according to Nextgov, which obtained an Office of Inspector General report through an open-records request.

Experts say that foreign powers could use the NRC's sensitive information for surveillance or even sabotage, although the Commission says that the handful of attacks were detected and dealt with.

In one incident, which was traced to a hacker in an unnamed foreign country, emails were sent to about 215 NRC employees in "a logon-credential harvesting attempt," according to the Inspector General report. Employees were invited to verify their user accounts by clicking a link and logging in, with victims taken to "a cloud-based Google spreadsheet." A dozen NRC employees clicked the link.

NRC spokesman David McIntyre told FoxNews.com that, based on the mere fact of clicking on the link, the Commission cleaned their systems and changed their user profiles. What the employees put on the spreadsheet is unknown, he added.

The Inspector General report also said that hackers attacked NRC employees with ‘spearphishing’ emails linked to malicious software. Investigators wrote that a URL embedded in the emails linked to "a cloud-based Microsoft Skydrive storage site," which held the malware. There was one “incident of compromise,” according to the report, with the attack also traced to an unnamed foreign country.

In another incident, hackers broke into the personal email account of an NRC employee and sent malware in the form of an infected PDF attachment to 16 other workers in the employee’s contact list.

NRC spokesman David McIntyre told FoxNews.com that only one of the 16 workers opened the attachment, causing their computer to become infected and subsequently replaced.

Experts say that the incidents reinforce the need for extra-tight security within organizations. “As can be seen from the Skydrive and Email incidents, it only takes one wrong click to give attackers access the ‘keys to the kingdom’,” wrote Tal Klein, vice president of Strategy at Palo Alto, Calif.-based cloud security specialist Adallom, in a statement emailed to FoxNews.com. “These sort of advanced phishing attacks go under the radar, undetectable by traditional endpoint protection and network firewalls, similar to the ‘Ice Dagger’ attack we uncovered last year.”

“In the cyber era of numerous state-sponsored targeted attacks with the motive of cyber espionage, surveillance, or sabotage, it is not very surprising that Nuclear Regulatory Commission (NRC) has been targeted multiple times,” added Deepen Desai, director of security research for San Jose, Calif.-based Zscaler ThreatLabZ, in an emailed statement. “The sensitive information maintained by NRC will be of prime interest to some foreign states with the motives ranging from espionage, surveillance, or sabotage. This makes it very important for the organizations like NRC that maintains nation’s critical infrastructure information to not only continuously train their employees but also update their training content more frequently.”

NRC spokesman McIntyre told FoxNews.com that the Commission is always concerned about the potential for cyber intrusions into its networks. “Every NRC employee completes mandatory annual training on computer security that covers phishing, spear phishing and other attempts to gain illicit access to agency networks,” he said. “The NRC’s Computer Security Office detects and thwarts the vast majority of such attempts, through a strong firewall and reporting by NRC employees.”

“The few attempts documented in the OIG Cyber Crimes Unit report as gaining some access to NRC networks were detected and appropriate measures were taken,” he added.

Overseas cyberattacks have been attracting plenty of attention recently. Earlier this month, for example, research specialist Hold Security, which has a strong track record of uncovering data breaches, reported that a Russian crime ring has got its hands on more than a billion stolen Internet credentials.

This was followed by news that U.S. Investigation Services (USIS), the main provider of background checks to the U.S. government, had been targeted in an attack possibly launched by a foreign power.


Still Having Problem..!!! Connect with Admin 
 Kunal Vohra
Download Our Official Android App & Get Free Internet
"The Hackers Street"

For Daily Updates 

Wednesday 27 August 2014

Installing LINUX on a Pre-Installed Windows 8 (64-bit) System (UEFI Supported)

By " ", Author@H2K




PCs that come with Windows 8 and Windows 8.1 include UEFI firmware instead of the traditional BIOS. By default, the machine’s UEFI firmware will only boot boot loaders signed by a key embedded in the UEFI firmware. This feature is known as “Secure Boot” or “Trusted Boot.” 


Secure Boot
On traditional PCs without this security feature, a rootkit could install itself and become the boot loader. The computer’s BIOS would then load the rootkit at boot time, which would boot and load Windows, hiding itself from the operating system and embedding itself at a deep level. So the computer with secure boot  will only boot trusted software, so malicious boot loaders won’t be able to infect the system.

How to Disable Secure Boot

You can control Secure Boot from your UEFI Firmware Settings screen. To access this screen, you’ll need to access the boot options menu in Windows 8. To do this, open the Settings charm — press Windows Key + I to open it — click the Power button, then press and hold the Shift key as you click Restart.
restart-from-settings-charm
Your computer will restart into the advanced boot options screen. Select the Troubleshoot option, select Advanced options, and then select UEFI Settings. (You may not see the UEFI Settings option on a few Windows 8 PCs, even if they come with UEFI — consult your manufacturer’s documentation for information on getting to its UEFI settings screen in this case.)
access-uefi-firmware-settings
You’ll be taken to the UEFI Settings screen, where you can choose to disable Secure Boot or add your own key.
surface-pro-2-uefi

Boot From Removable Media

You can boot from removable media by accessing the boot options menu in the same way — hold Shift while you click the Restart option. Insert your boot device of choice, select Use a device, and select the device you want to boot from.
After booting from the removable device, you can install Linux as you normally would or just use the live environment from the removable device without installing it.






Still Having Problem..!!! Connect with Admin 
 Kunal Vohra
Download Our Official Android App & Get Free Internet
"The Hackers Street"

For Daily Updates 

Stealing Encryption Keys Just by Touching a Laptop

By "Kunal Vohra", Director@H2K


Stealing encryption keys
As far sci-fi movies have been entertaining the public, but their ideas have always been a matter of adoption in real life. Just like in any other sci-fi movie, simply touching a laptop can be enough to extract the cryptographic keys used to secure data stored on it.

A team of computer security experts at Tel Aviv University (Israel) has come up with a new potentially much simpler method that lets you steal data from computers — Just Touch it — literally.

WAYS TO ATTACK ENCRYPTION
There are different ways of attacking encryption systems. On one side, there are security vulnerabilities and weakness in the encryption algorithms themselves that make it possible to figure out the cryptographic keys.

On the other side, there are flaws and weaknesses in the people themselves that make it easier than it should be to force them to offer up the keys to decrypt something. But, Flaws and weaknesses in neither of which is necessarily quick or easy to find out, as there are several dependencies.

TOUCH AND VICTIMIZE ANY COMPUTER
According to Eran Tromer, Daniel Genkin, and Itamar Pipman, computer security experts at Tel Aviv University, using a simple electrical trick is enough for sophisticated hackers to gain access to thousands of encrypted keys through solely touching the chassis of the computer.

Access to encrypted keys could be used to make hundreds of digital signatures used all the time by people when creating passwords, signing contracts, or perhaps most importantly, using credit and debit cards online.

In order to victimize any computer, all you need to do is wear a special digitizer wristband and touch the exposed part of the system. The wristband will measure all the tiny changes in the ground electrical potential that can reveal even stronger encryption keys, such as a 4,096-bit RSA key.

In fact, in some cases, you don't even have to touch the system directly with your bare hands. You can intercept encryption keys from attached network and video cables as well. Researchers called it a side-channel attack.

"Our attacks use novel side channels and are based on the observation that the 'ground' electric potential in many computers fluctuates in a computation-dependent way," the researchers wrote their finding on a paper [PDF]. "An attacker can measure this signal by touching exposed metal on the computer's chassis with a plain wire, or even with a bare hand. The signal can also be measured at the remote end of Ethernet, VGA or USB cables."

The researchers also note that this attack works better in hot weather, due to the lower resistance of sweaty fingers. The team will present their research in a talk titled Get Your Hands Off My Laptop: Physical Side-Channel Key-Extraction Attacks On PCs, at Workshop on Cryptographic Hardware and Embedded Systems 2014 (CHES 2014) in Korea, on September 23th.

The actual attack can be performed quickly. According to the research, "despite the GHz-scale clock rate of the laptops and numerous noise sources, the full attacks require a few seconds of measurements using medium frequency signals (around 2 MHz), or one hour using low frequency signals (up to 40 kHz)."

The team could retrieve keys from multiple test machines running a popular open source encryption software called GnuPG, which implements the OpenPGP standard. The end results are mind-blowing, as the researchers write:

Using GnuPG as our study case, we can, on some machines:
  • distinguish between the spectral signatures of different RSA secret keys (signing or decryption), and
  • fully extract decryption keys, by measuring the laptop's chassis potential during decryption of a chosen ciphertext.
Although, the information retrieval was better when used with high-end lab equipment. The researchers also have successfully executed this attack by using a smartphone connected to Ethernet shielding via its headphone port, which they found sufficient in some scenarios.

The good news is that there is nothing to worry about overly grabby strangers stealing your data just yet, because the technique primarily focuses on GnuPG's encryption software, which already got a patch ready to fix the problem to limit the effects. Attackers also have to monitor the electricity changes during the decryption process, so they get hold of your data, which isn't quite easy.


Still Having Problem..!!! Connect with Admin 
 Kunal Vohra
Download Our Official Android App & Get Free Internet
"The Hackers Street"

For Daily Updates