Sunday, 22 January 2017

How IP address is structured

Guys,
Most of you must have tried to understand how IP address works and how it is built with a series of numbers separated by dots. (xx.xx.xx.xx)

There is so much behind this configuration & this may surprise you there is a big logic behind these series of numbers & all the Internet works only on this number series called as IP address.


IP ADDRESS STRUCTURE

Every station on a PSN (packet switched network) that is based on the TCP/IP protocol (your computer is one, for example. Yes, we're referring to a host that is connected to the net) must have an IP address, so it can be identified over the network, and information can be relayed and routed to it in an orderly fashion.

An IP address consists of a 32 bit logical address. The address is divided into two fields:

1. The Network Address

Assigned by Inter-NIC (Internet Network Information Center). In fact most ISP's (internet service providers) purchase a number of addresses and assign them to individuals.

2. The Host Address

An address that identifies the single nodes throughout the network. It can be assigned by the network manager, by using protocols for it such as DHCP, or the workstation itself.

[The IP networking protocol is a logically routed protocol, meaning that address 192.168.5.72 (it could be any random IP address) will be on the same physical wire as address 192.168.5.72 (of course this is not always true. It depends on the subnet mask of the network, but all of that can fill a text of its own)

IP address structure

  ---.---.---.---
   ^             ^
   |              |
network   host

Every " --- " = 8 bits.
The first bits ===> network address
The last bits  ===> host address.
with 8 bits you can present from 0-255 . (binary=(2 to the power of 8)-1)

Example:
11000010.01011010.00011111.01001010 (binary)
194.90.31.74 (decimal)
IP address CLASSES :
We can classify IP addresses to 5 groups. You can distinguish them by comparing the "High Order" bits (the first four bits on the
left of the address):



N=NETWORK , h=HOST .

Notice the address range 127.X.X.X.
These addresses are assigned to internal use to the network device, and are used as an application tool only. For example: 127.0.0.1, the most common one, is called the loopback address - everything sent here goes directly back to you, without even traveling out on the wire.

Also, some IPs are reserved for VPNs - Virtual Private Networks. These are local area networks over wide area networks that use the Internet Protocol to communicate, and each computer inside the network is assigned with an IP address. So, suppose a certain computer wants to send a data packet to another host on the network with the IP 'x', but there's also another host on the Internet that has the same IP - what happens now? So this is why you cannot use these and other forms of reserved IPs on the Internet.

EXTRA

Distinguishing different groups:

You have to compare the first byte on the left in the address as follows:




NOTES

Yes, we know, we've left A LOT of things unexplained in this text. With time, I will write more tutorials to cover these and other subjects.

weird shit (newbie note):


Multicast

(copied from RFC 1112)
IP multicasting is the transmission of an IP datagram to a "host group", a set of zero or more hosts identified by a single IP destination address. A multicast datagram is delivered to all members of its destination host group with the same "best-efforts" reliability as regular unicast IP datagrams, i.e., the datagram is not guaranteed to arrive intact at all members of the destination group or in the same order relative to other datagrams.

The membership of a host group is dynamic; that is, hosts may join and leave groups at any time.  There is no restriction on the location or number of members in a host group.  A host may be a member of more than one group at a time.  A host need not be a member of a group to send datagrams to it.

A host group may be permanent or transient.  A permanent group has a well-known, administratively assigned IP address.  It is the address, not the membership of the group, that is permanent; at any time a permanent group may have any number of members, even zero.  Those IP multicast addresses that are not reserved for permanent groups are available for dynamic assignment to transient groups which exist only as long as they have members.

Internetwork forwarding of IP multicast datagrams(ip packets)is handled by "multicast routers" which may be co-resident with, or separate from, internet gateways.  A host transmits an IP multicast datagram as a local network multicast which reaches all immediately-neighboring members of the destination host group.  If the datagram has an IP time-to-live greater than 1, the multicast router(s) attached to the local network take responsibility for forwarding it towards all other networks that have members of the destination group.  On those other member networks that are reachable within the IP time-to-live, an attached multicast router completes delivery by transmitting the datagram(ip packet) as a local multicast.

*if you don't understand the above do not worry, it is complicated and dry but reread it and read it again get a dictionary if it helps. Hacking is not easy.


MSB

Most Significent Bit

In set numbers the first number on the left is the most important because it holds the highest value as opposed to the LSB=> least significent bit, it always holds the the smallest value.


That;s it for now guys, I will be writing more articles to unleash more secrets & knowledge that somehow will help you for sure. For any doubts that you might have you always have a comment section right below, feel free to comment your query or any feedback. It will really be appreciated. 


Thank you..!!


======================================================

Visit the blog for more fun & knowledge articles. 
Follow the page, share the page & K33p visiting.

How to turn off unwanted notifications on Android phone

Hi Guys,
I am back with another article on how to stop the most annoying notifications on your android phone.

You all are using android phones & have installed so many applications with your accounts logged in there. These applications are connected to all your social accounts & that's why you receive many notifications that you even want to see. 

New, how to get rid of these shitty adds & notifications? You can turn off the notifications in particular app settings but sometimes this option isn't available for all the apps.

I have got 3 easy steps for you that will anyways stop notifications from your selected apps.

Pros:
- No external application required.
- Its available within your mobile settings.

Cons:
- Notifications will be disabled, you may miss some important notifications as well.

Lets get started with the steps now:

1. Go to the settings in your mobile.

2. Locate the "Application Settings" or "Application Manager" (option varies from android version to version)



3. Select the application whose notifications you want to get rid off. (For example you want to turn off notifications from Instagram)



4. Open that application & just hit on "Stop Notifications" checkbox, & that's it.




You will never receive any notification from that selected application until you un-check that checkbox again.

Isn't it easy guys. No more of those annoying advertisements & notifications.

Keep visiting and Keep sharing because sharing is caring. :)





======================================================

Visit the blog for more fun & knowledge articles. 
Follow the page, share the page & K33p visiting.

Sunday, 15 January 2017

Step by step guide to block a website

Hey Folks,

Ever tried to block a website, No?


There are several reasons why you might want to block a certain websites on your computer/laptop. It may be because of some virus transmitting websites, or to secure your personal data or to avoid it from your kids or many more reasons.

Well there are many ways to block any website that you wish to block, it may be using some external software, browser settings or the most efficient way is to add an entry in windows hosts file.


Site blocking


1. Blocking at OS level:

- DNS system works as a backbone of Internet, & DNS system translates IP addresses to easy to remember names (for example www.google.co.in). You can't remember IP addresses of all the web sites, so DNS system gives you privileges to give your IP address a name that you can remember easily.

See my article to know more on DNS & how it works: Click Here

Visit the link to get IP address: How to find IP address from URL

On Operating System level, we have a hosts file that keeps this information handy. And you can put the websites in this file that you want to block.


a. You must have administrator privileges to access this file.

b. This file is located in your "C" drive:

C:\Windows\System32\drivers\etc


c. Open the file in Notepad. (Double click the file, select Notepad from the list of applications)

d. At the end of this file, you can make an entry of the website that you no longer wish to visit anymore.

e. Entry should be like:

IP Address         <website URL>
IP Address         <website URL>
IP Address         <website URL>
IP Address         <website URL>

and so on.... You can make as many entries as you want.

f. For example, if you wish to block google.com, then add the details accordingly: 
"127.00.1   www.google.co.in". (without quotes)



You can make one entry per line.

g. Add all the websites that you wish to block, & save this file now.
h. Reboot the system for this file to take effect, & you are done. The websites are blocked as per your wish.


2. Blocking at Browser level:

There are many browsers available, but the most popular ones are "Google Chrome" & "Mozilla Firefox". Both these browsers gives many add-ons that can serve your purpose. One of the popular add-on is BlockSite, this is available for both the browsers.

a. Once you have installed the extension in your browser, go to extensions page (inside settings, extensions at left side bar)

b. Go to its options, & add the site name that you wish to block in the text bar provided.

c. Save the settings, & that it. The site is blocked now.

======================================================

Visit the blog for more fun & knowledge articles. 
Follow the page, share the page & K33p visiting.

DNS - Domain Name System

DNS - Domain Name System

Guys, how about the world with only IP addresses? Ever wondered if you have to open google.com but instead of this simple URL, you have to type in its IP address every time? In fact for all the web-sites you use, you have to use its IP address to open it up. How the life would be? So just give it a thought.

This is the importance of DNS (Domain name system).

What is DNS

Domain Name System is undoubtedly a central part of Internet, providing a way to resolve a series of numbers to a name. Every device say mobiles, laptops, tablets, phablets, computers, watch connected to internet has got its own unique series of numbers called as IP address that locates the device over the internet. For example you laptop has got an IP address 192.168.12.134 (click to find your IP address), obviously it is very hard to remember. Also if you think of remembering one IP address, there are hell lot of IP addresses you go to everyday. How many will you remember? Here is when DNS comes into picture. You are typing google.com in your browser, but in backend it is calling its IP address that you don't even know & the page will be opened ready for you to access. This is what DNS does in your daily life.


How DNS works

DNS is based on client server architecture. DNS client (any internet user) send requests to and receive responses from DNS servers. Requests called containing a name, that result in IP address being returned from the server, are called forward DNS lookups. On the other hand Requests containing IP addresses and resulting in a name are called as reverse DNS lookup. DNS functions on a distributed database to keep these names and last known address information for all public hosts over the internet.

When client like web browsers issue requests involving internet host names, it first contacts the DNS server to find its IP address, if the current server doesn't have the IP address it will automatically forward it to next DNS server. After several forwardings the IP address for the given host eventually resolves & come back with an opened page on the clients side.



======================================================

Visit the blog for more fun & knowledge articles. 
Follow the page, share the page & K33p visiting.

Top 5 VLC tricks that you will love

VLC is the best known media player in today's world. It just runs anything you give it to play. But what if it has many other hidden features that you all will probably love and that make it even great then you ever think off.

Lets start with the hidden secrets of VLC.

1. Merge subtitles with movies

Foreign language movies is a passion for all in today's date. But what if you don't have subtitles engaged with the movie? Don't worry VLC will take care of this problem. Subtitles are available for most of the movies in all the languages.


Just download the subtitle file for your movie & add the subtitle file in the above window opened in your VLC player. And enjoy the original subtitles with your foreign movie. Simple? :)

2. Integrate YouTube videos with your VLC

What if you can watch YouTube videos within your VLC player. Sounds interesting. huh?
Yes, that is a possible thing you can do. VLC player can stream YT videos for you, you just have to give a link to VLC & it will take care of streaming. just follow the below steps to get this done:

1. Just hit CTRL+N key.
2. Below screen will open on your VLC.



3. Just get your youtube video link & paste it in the textbox given (highlighted in yellow in above screenshot).
4. Hit on Play button & that's it. :)


3. Record your screen

VLC media player isn't just a media player, but it is a bunch of features that you have to dig out by playing around with it. Here is one another amazing feature of this player, it can record your screen & you can play this recording later anytime. Want to know the steps:

Just scroll down then. :)

1. Open your VLC player (obviously).
2. Hit the keys CTRL+R
3. Navigate down to the option Covert/Save.
4. A new window will follow after this.
5. Click on Capture Device tab from the top list of tabs given.
6. Make the settings accordingly & at last click on Covert / Save button at the bottom. 


And that's it. You are done with the screen recording feature and save the recording for future time.

3. Rotate your Videos

or

3. Change orientation of your videos

Videos that are originated from some other devices like mobiles, tabs, action cams or DSLR's are sometimes captured with wrong orientations & when you play these videos in VLC, it is not able to orient it according to your convenience. But you can rotate the video as you want to. Steps are below:

1. Open your VLC player (obviously).
2. Hit the keys CTRL+E.
3. A new window will follow after this.
4. Click on 'Video Effects' tab from the top list of tabs given.
5. Now you will see a new series of tabs, hit on 'Geometry' tab.



6. Set the rotational geometry according to you & have fun with your wrongly captured videos.


5. Video running on Desktop

Ever heard of this? Yes, you can play any video on your desktop window. This is a great feature of VLC where you can run any video on your desktop, it might be distracting for you but this is an additional add-on in VLC media player.

Below are the steps:

a. Navigate to tools >> preferences.
b. Choose video from left menu, & on the output field choose: 'DirectX video output'
c. Save it.
d. Restart your VLC player.
e. Right click on screen & navigate to your required video> DirectX Wallpaper.

and that's it, video will run on your desktop, enjoy watching it on your desktop itself.

Other than these some more VLC tricks unleashed here, just hit the link below:
http://cyb3rgeek.blogspot.in/2016/12/cool-tricks-for-vlc-users.html



Saturday, 7 January 2017

How to remotely shutdown any Computer

How to remotely shutdown any computer


Hi Mates,

Have you ever came across something where your computer got shutdown/restart/logged off automatically. I guess it happened with many of you. 

Ever wondered how this happened? Because of some computer fault or someone's intentions? :)
Well it could be both the reasons. But yes you can shutdown one's computer from your computer. This is remote shutdown trick I am going to tell here.

THIS TRICK CAN HARM SOMEONE'S WORK, SO TRY IT WITH SOMEONE WHO WOULDN'T CARE.

Lets get started now:

  1. To perform this, you will have to find out IP address of the victim's computer. IP address is basically is the address of computer on Internet. Easiest way to find out IP address is using command prompt. Click on Start and then Run. Type in cmd in text box.
  2. Once cmd in opened, type a command "ipconfig" (without quotes)


3. Note down the IP address as highlighted in above screenshot, & go to some other computer from where you will attack the victim.
Make sure the victim doesn't notice that you have stolen the IP address.

4. Again open cmd on your computer and run the command shutdown -i as in screenshot:


After firing the above command, a pop up window will open as below:


5. Click on "Add", add the IP address of the victim.
6. Choose the action that you want to perform i.e Shutdown, restart, log-off, Hibernate.
7. You can even set the time as per your requirement. (after how many minutes you wish to attack)
8. Click OK, and you are done.

TIP: In the comment box at the bottom, you can put any message you wish. For example, if you are doing this for fun. you can write, "HAHA, you have been fooled. your system will destroy in 20 seconds. :) "
You can play around with many more cmd tricks.


If you wish to Dive deep in to command prompt:
Here is your pool to jump in & explore more on cmd:


Just click on the links below and have an ultimate fun or play around with your friends:






======================================================

Visit the blog for more fun & knowledge articles. 
Follow the page, share the page & K33p visiting.

Sunday, 1 January 2017

How to modify exe files

Guys, today I am gonna show you how you can modify exe files. 

Note: Do this if you are highly confident on what you are doing, else you will end up corrupting your exe file.



How to modify exe files

Learn how to change *.exe files, in 5 easy steps:

1. Don't try to modify a prog by editing his source in a dis-assembler. Why?
Cause that's for programmers and assembly experts only.

Try to view it in hex you'll only get tons of crap you don't understand.
First off all, you need Resource Hacker. 

It's a resource editor and very easy to use.
You can download it at http://www.users.on.net/johnson/resourcehacker/


2) Unzip the archive, and run ResHacker.exe. You can check out the help file too.


3) You will see that the interface is simple and clean. Go to the menu FileOpen or press Ctrl+O to open a file. Browse your way to the file you would like to edit. You can edit *.exe, *.dll, *.ocx, *.scr and *.cpl files, but this tutorial is to teach you how to edit *.exe files, so open one.


4) In the left side of the screen a list of sections will appear.
The most common sections are
-String table;
-RCData;
-Dialog;
-Cursor group;
-Bitmap;
-WAV.
*Icon: You can wiew and change the icon(s) of the program by double-clicking the icon section,chossing the icon, right-clicking on it an pressing "replace resource". After that you can choose the icon you want to replace the original with.
*String table: a bunch of crap, useful sometimes, basic programming knowladge needed.
*RCData: Here the real hacking begins. Modify window titles, buttons, text, and lots more!
*Dialog:Here you can modify the messages or dialogs that appear in a program. Don't forget to press "Compile" when you're done!
*Cursor group: Change the mouse cursors used in the program just like you would change the icon.
*Bitmap: View or change images in the programs easy!
*WAV:Change the sounds in the prog. with your own.


5) In the RCData,Dialog,Menu and String table sections you can do a lot of changes. You can modify or translate the text change links, change buttons, etc.


TIP: To change a window title, search for something like: CAPTION "edit this".

TIP: After all operations press the "Compile Script" button, and when you're done editing save, your work @ FileSave(Save as).

TIP: When you save a file,the original file will be backed up by default and renamed to Name_original and the saved file will have the normal name of the changed prog.

TIP: Sometimes you may get a message like: "This program has a non-standard resource layout... it has probably been compressed with an .EXE compressor." That means that Resource Hacker can't modify it because of it's structure.




This is how you can modify your exe files and make them work as you want. So you guys have this article now and you have your exe files, why not play around with them. ;)


======================================================

Visit the blog for more fun & knowledge articles. 
Follow the page, share the page & K33p visiting.

Saturday, 31 December 2016

How to delete an undeletable file

Delete An "undeletable" File

1. Open a Command Prompt window and leave it open.
2. Close all open programs.
3. Click Start, Run and enter TASKMGR.EXE
4. Go to the Processes tab and End Process on Explorer.exe.
5. Leave Task Manager open.
6. Go back to the Command Prompt window and change to the directory the AVI (or other undeletable file) is located in.
7. At the command prompt type DEL <filename> where <filename> is the file you wish to delete.
8. Go back to Task Manager, click File, New Task and enter EXPLORER.EXE to restart the GUI shell.
Close Task Manager.


Or you can try this

Open Notepad.exe

Click File>Save As..>

locate the folder where ur undeletable file is

Choose 'All files' from the file type box

click once on the file u wanna delete so its name appears in the 'filename' box

put a " at the start and end of the filename
(the filename should have the extension of the undeletable file so it will overwrite it)

click save,

It should ask u to overwrite the existing file, choose yes and u can delete it as normal


Here's a manual way of doing it. I'll take this off once you put into your first post zain.

1. Start
2. Run
3. Type: command
4. To move into a directory type: cd c:\*** (The stars stand for your folder)
5. If you cannot access the folder because it has spaces for example Program Files or Kazaa Lite folder you have to do the following. instead of typing in the full folder name only take the first 6 letters then put a ~ and then 1 without spaces. Example: cd c:\progra~1\kazaal~1
6. Once your in the folder the non-deletable file it in type in dir - a list will come up with everything inside.
7. Now to delete the file type in del ***.bmp, txt, jpg, avi, etc... And if the file name has spaces you would use the special 1st 6 letters followed by a ~ and a 1 rule. Example: if your file name was bad file.bmp you would type once in the specific folder thorugh command, del badfil~1.bmp and your file should be gone. Make sure to type in the correct extension.




======================================================

Visit the blog for more fun & knowledge articles. 
Follow the page, share the page & K33p visiting.