Tuesday, 31 January 2012

Is A Large Friend List On Facebook Necessary And Safe?

In the social realm as in the business realm people seem to think more is best. While that concept works well and not so well in the real world, it is an illusion of reality on Facebook. A huge friend-list on Facebook provides people with a means to boast about their alleged popularity. However, is it necessary and even safe to have lots of people on your friend list, including those you don't even know?

I regret that I fell into that 'more is better' attitude when it comes to Facebook. As a result, I've accepted people who I don't even know. There has even been a few people who have known me for several years--but are not friends of mine--on my friend list. They are the nosy-type who only read my wall and browse my profile to know what is going in my life. Not because they genuinely care about me but because they want something to gossip about. I've since taken those people off my friend list.

It has made me realize that, sadly, Facebook is a haven for malicious gossip. The more people you have on your friend list, the more vulnerable you become to gossipers and stalkers. While you shouldn't ignore everyone who wants to connect with you over Facebook, you should be cautious about who you accept onto your friend list.

1. Browse through the person's profile. Sometimes people don't reveal much on Facebook, but others are quite liberal with their security settings. Regardless, there is always enough information there to know a little about them. The first thing you will see is their profile picture. As the saying goes, 'a picture says a thousand words'. If that person's photo raises your inner red flag, follow your intuition. Don't accept their request.

2. It's a privilege to be listed on your friend list. Treat your Facebook profile like you're the coordinator of your own social club. Any person who wants to be on your friend list must meet certain qualifications: they must either be a close friend, an acquaintance or a person with the same goals and interests. If you so much suspect that someone on your friend list is saying nasty things behind your back, that person has lost his or her privilege and should be removed from your friend list. There is also no reason for you to keep people on your friend list who you have no desire to keep in contact with.

It's not necessarily a bad thing to have a lot of people on your friend list and if you follow these two steps, you can be perfectly safe. That said, even if you trust the people on your friend list, you should be careful what you write on your wall and you should never ever post personal information--your full address and date of birth--on your profile. Facebook's privacy settings are easy to hack into. The last thing you want is someone to hack into your account and steal your identity.

Friday, 27 January 2012

How to Root any Android Phone | Unlock Root Universal Android Rooting Software

Rooting your device means obtaining "superuser” rights and permissions to your Android’s software. With these elevated user privileges, you gain the ability to load custom software (ROM’s), install custom themes, increase performance, increase battery life, and the ability to install software that would otherwise cost extra money.

Rooting is essentially "hacking” your Android device. Its same like to "Jailbreaking” your iPhone.

Why We Call it Rooting?

The word "root” comes from the Linux field and is used to describe a user who has "superuser” rights or permissions to all the files and programs in the software Operating System. The root user, because they have "superuser” privileges, can essentially change or modify any of the software code on the device.

If you see , your phone manufacturer/carrier only gives you "guest” privileges when you purchase your device. They do this for good reason… they don’t want you getting into certain parts of the software on your phone and screwing it up beyond repair. It makes it much easier for them to manage and update the devices if they lock it all down. This way, all the users are running the same unmodified version of the phone’s software. This makes it much easier for them to support the devices. But for hackers its boaring we like to play with the technology and especially for the tech-savvy crowd, only having "guest” privileges on your device is pretty lame and it locks down a lot of potentially useful features.

Problem in Rooting

The problem with Android rooting is that every phone is different, which means you need to find the right method for your particular device. But here we have a tool called Unlock Root .Unlock Root is about as simple as they come: install the USB drivers for your phone from the manufacturer's web site, plug in your phone, turn on USB debugging, and hit the big green "Root" button.

It claims to root around 250 devices from a ton of manufacturers. It can also unroot them with the click of a button, which is something not a lot of other root apps do.

Download Unlock Root:- http://www.unlockroot.com

Limitations of Rooting

Bricking

The number one reason not to root your device is the potential risk of "bricking” it. For those who do not know what is Bricking, Bricking your device means screwing up your phone software so badly that your phone can no longer function properly and is pretty much as useless as a brick. You would likely need to purchase a new Android device since the manufacturer of your device will void the warranty after any attempts at rooting.
Security Risk
There is an increased risk of unknowingly installing malicious software when you root an Android device. Root access circumvents the security restrictions that are put in place by the Android OS. There isn’t really an effective way to tell just what the application intends to do with that "superuser” power. You are putting a lot of trust into the developer’s hands. In most cases, these applications are open source and the community can take a look at the source code to assess the risk. But, nevertheless, the risk is there. May be the application your are using through rooting is from a hacker himself.

MegaUpload Site Shut down by FBI

The worlds one of the most popular file sharing websites — Megaupload — has been shut down by federal prosecutors in the United States.
 The site was hit by a major federal indictment against piracy. The founders of the site were accused of causing copyright holders to lose $500 million in revenue. Although the site is based in Hong Kong, it operated on some servers that were located in Virginia, in the United States. Arrests were made of Kim Dotcom, a Dutch citizen and three other employees in New Zealand at the request of the United States officials.
The timing of the takedown comes after websites across the internet, such as Wikipedia and Reddit went down for up to 24 hours in protest of SOPA/PIPA.
Just before the site was taken down today, it posted a statement on its homepage saying that claims they facilitated copyright infringement were ”grotesquely overblown” and went on to say ”The fact is that the vast majority of Mega’s Internet traffic is legitimate, and we are here to stay. If the content industry would like to take advantage of our popularity, we are happy to enter into a dialogue. We have some good ideas. Please get in touch.”

Important Security Tips for Ensuring Safety on Facebook

The social networking site Facebook has become a phenomenon in the modern world. People of every age group nowadays seem to have a Facebook account and besides connecting with friends, it has also become a medium for expressing their thoughts over various social matters.
Though it is a very useful medium to remain connected with friends and with the world, but it is not entirely devoid of the disadvantages. Hackers are the worst enemies of Facebook and since more and more people are joining this site, so it has become a great medium for the hackers to obtain personal information of the users by hacking their accounts. However, the user can ensure their safety of their private information by adopting the precautions described below -

Enabling SSL Encryption – Earlier, Hypertext Transfer Protocol Secure or HTTP was only used for keeping secure the password of the user but now with the increasing sophistication of attacking tactics of the hackers, Facebook has switched to SSL encryption to ensure complete security for the user. In order to enable this security feature, the user is just required to visit the Accounts Settings page and click the edit symbol after which the option of SSL Encryption appears.
Be careful about the information you are going to share – Some information shared by the user in their profile seems harmless but in some cases this small information could be used to hack the entire account. In most of the cases, the date of birth is used for hacking the account as majority of people use their birth date as the answer to certain security questions. Hence, one needs to think carefully before sharing any personal information with the public or even with friends and must choose the security questions cleverly.
.
Always Log Out of Facebook after finishing browsing – Logging out of Facebook after browsing is important to ensure safety from the hackers. It prevents the act of Likejacking which is a form of clickjacking that helps the hackers to update a status for a site that the user would not approve. There are many incidents of likejacking only because some users just forget to log out of Facebook after browsing. It is even highly recommended for the Facebook users who browse through public computers or access points.
Just as I mentioned when I started, Facebook is a highly useful medium, both for online marketing and engaging with potential prospects or making friends. But if one is ignorant about the safety issues there, things can become messy.

Wednesday, 18 January 2012

Designing a Search Engine Friendly Site

When you design a website, it’s easy to focus on what your visitors are going to see. What you have to realize, though, is that you’re going to have another kind of visitor with a completely different agenda: they’re not going to be looking at your pretty logo and they’re not going to be passing judgment on your background color. What they’re looking for is the content and structure of your page.

They’re the search engine spiders, and they are in control of probably the largest section of your traffic. You need to please these spiders if you want your site to be successful. Here’s how.
Make Your Structure Clear.

Resist the temptation to lay your page out in non-standard ways: you want it to be very clear to the search engine where the navigation is, where the content is, and where the headings are. As a rule, put navigation first in your page. Always use the heading tags (h1, h2, etc.) for headings and sub-headings.

Avoid using generic span and div tags and only making things clear to the user through CSS font sizes: instead, use every ‘semantic’ HTML tag that applies to your content. If you’re quoting someone, use the block quote tag; if you’re posting program code, use the code tag. Search engines love this.

Keep Keywords Consistent.

It’s not usually worth deliberately saturating your content with keywords in hope of a higher search ranking – the engines have pretty much wised up to this tactic – but do make sure that your keywords appear consistently when they occur naturally. For example, for these articles, I have stuck with ‘website’ throughout, as suddenly writing ‘web site’ instead would bring down my rankings.

HTML and Javascript.

It’s worth noting that search engines read HTML, but they don’t, in general, read Javascript. That means that using Javascript to insert text into your page is a bad idea if you want search engines to see the text. On the other hand, you might want to have just the text in HTML and insert all the other parts of the page with Javascript: this will tend to make your page appear more focused, although you should be careful not to insert navigation links this way if you want the search engines to follow them.

Use Meta Tags.

Yes, meta tags are out of fashion, and search engines pay no attention to them any more when it comes to ranking your site, but they’re still important in one way: the meta description tag is still often used to decide what text search engines’ users see when they find your site in their results! This can be just as important as the ranking itself – write something here that will look useful to the searcher, and you’re more likely to get them to click-through. Don’t forget that, while search engines are just machines and algorithms, the end result of it all does involve a human decision: to click, or not to click?

Avoid Splash Pages.

You might think it’s a great idea to have a ‘splash’ page displaying a full-page version of your logo (or an ad) to every user who arrives at your site, but search engines really hate that. Using this trick will get you ranked far lower than you would usually be, so you should avoid it – it’s annoying to visitors anyway.

Include Alt Tags.

Any time you use a graphic, include alt text for it – especially if there is text in the graphic. Remember that, as far as search engines are concerned, all your graphics might as well just be big black boxes. Test by removing all your graphics and seeing if your content remains relatively intact. If it doesn’t, then you’ll be turning search engines away.

Finally, Write Great Content.

The key with modern search engines (and, at the same time, the thing you have least control over) is how many people decide to link to your page from their page. How can you make more people link to you? Make your content useful. Make it something they’ll want to quote on their blogs. Content is more King than it’s ever been, and the best way to design for search engines is to make your content really stand out.

6 Easy Ways to Increase your Adsense Revenue

How much revenue do you generate from Google Adsense?
Recently there has been a lot of discussion about people who earn over $10,000 a month just from Adsense. Furthermore, there are rumors of a few individuals who earn over $1 million a year just from using the power of Google advertisements.
So what is Google Adsense and how can you use this program to earn a six-figure income?
About two years ago, Google created this program to help websites to monetize their web-traffic.
Here’s how it works:
Webmasters obtain a special code from Google which then displays targeted ads on their website. Whenever a visitor clicks on one of these ads, the webmaster earns a commission. Unlike other online businesses, there is no selling involved. All you need to do is get people to click on the ads.
Although this is an excellent way to generate an income, many websites are not effectively maximizing their Adsense potential. As a result, they are leaving a lot of cash on the table.
The question is how can you increase your Adsense revenue without increasing the number of web visitors?
The key to earning an income with Google Adsense is to have your ads match the rest of the site, making them look like part of your content. Your focus is to avoid having the Adsense blocks look like blatant advertisements.
The following are six ways that you can do this and increase your revenue at the same time:
1) Find the right place- Most website visitors read content that is in the middle of a webpage. As a result, the best place to put your Adsense block is in the top part of the page, at the beginning of your web content. You want to weave the Google Ads into your web content to give the appearance that they are extra links which expand on the information of the page.
2) Use the Large Rectangle-With Google Adsense, you have the option of picking different ad formats. Most of the time people opt to use the Leaderboard (728×90) or Wide Skyscraper (160×600) style ads. Unfortunately, this is the wrong choice, because both look like blatant advertisements. Instead smart webmasters have found that using the Large Rectangle (336×280) yields the best amount of click-thrus.
3) Ditch the border- Many people experience a sharp increase in Adsense revenue when they changing their border. What they change is very simple…they get rid of the border on their Adsense blocks. This is another way to make the advertisements look like useful web content.
4) Adapt the font- Whenever you write content, it should be the same font size and style as your Google Adsense block. This will help make it appear that the advertisements are a natural part of your website.
5) Match the colors- In addition to changing the fonts, you also should match the colors of your website. For instance, if your content is written in black, and your hyperlinks are blue, then the Adsense blocks should also be the same color. Again, this helps the advertisements appear to be normal web content.
6) Don’t have too many distractions- On a webpage, it is important to give web visitor a limited number of options. By having too many links and graphics, the web visitor might go to a section that doesn’t help increase your profits. While it is important to inform and entertain your web visitor, it is also vital that you monetize your site. So if the main focus of your site is to earn an income through Google Adsense, then get rid of all non-essential links and graphics.
By taking the time to implement these six simple steps, you’ll see a dramatic increase in the click-thru ratio of your ads. If added to all of the content of your site, your Adsense income will skyrocket!

Basic Steps To Optimize Your Internet Security

After seeing many people complain about their weak Internet security I decided to write down some things that will help you for your Internet security.
First, here are some tips to make windows safer :
For basic security and update patches install Service Pack 2 for Windows XP or Service Pack 4 for Windows 2000.
Once a month use Windows Update so you can get the latest patches.
When you download software from the Internet make sure you download it from the original website.
Always run anti Trojan and anti virus software.
Even if you don’t use it you have to make your Internet Explorer as safe as possible.
When you access the Internet you are browsing the web using a browser such as Internet Explorer.The Internet Explorer contains several security vulnerabilities. You should make it as safe as possible or switch your default browser to an alternative. You will have to set some options from the Manage Add-Ons in the Internet Options. You will see a list of add-ons that can be activated or deactivated. If you see any unusual entries just deactivate them so you can be sure you don’t have a trojan/worm.
Under Internet Options -> Security -> Internet -> you will see the Edit Level.You should set it to high in order to disable most of the security threats.
Your Web Browser should be ok now. Let’s see what we have to do from our email point of view.
Because it’s built-in in their Windows system lots of users like to use Outlook Express for emailing. But it’s a fact that it contains many security vulnerabilities so I advise you to use alternatives. If you use a web based Email (you can browse your email with your web browser) you can delete viruses even if you don’t download them to your PC.
Make sure you have installed an Anti Virus for 100% virus protection. One that I’ve found to be very good and never disappointed me is the AVG Anti virus. If you take the time to regularly update it you will be safe enough with it.
Lots of people install Firewalls because they believe their Internet security will be higher. I personally disagree. If you do not know how to best configure it, and you have to know much about the tech behind it to do so, it will just make your PC slow and software not working.You can just use the Windows XP SP2 firewall for basic security.
All this tips should make your PC safer. I browse the Internet every single day for some time now and they worked great for me. I haven’t met a virus/worm for some time now.

How to Protect Yourself When Shopping Online

Online shopping offers many benefits that you won’t find shopping in a brick and mortar store or by mail. The Internet is always open seven days a week and 24 hours a day. Internet-only deals and bargains can be numerous online. Shopping on the Internet is no less safe than shopping in a store or by mail. Keep the following tips in mind to help ensure that your online shopping experience is a safe one.
1. While Online Order Only On A Secure Server.
Use a secure browser and shop only at websites that offer encryption protection. A protected website will have one or more of these three features:
a) The small lock or key symbol at the bottom of your browser window;
b) An address that starts with https (“s” for “secure”) instead of just http; and
c) A security warning box that pops up at the point of purchase.
Your browser should comply with industry security standards, such as Secure Sockets Layer (SSL). These standards scramble the purchase information you send over the Internet, helping to secure your transaction.
2. Pay The Safest Way.
Use a credit card or Debit Card with a safe online shopping guarantee. Look for a card with specific guarantees, like 100% coverage for any losses due to fraud when shopping on the Internet. Many companies offer an online shopping guarantee that ensures you will not be held responsible for any unauthorized charges made online, and some cards may provide additional warranty, return and/or purchase protection benefits.
3. Protect Your Privacy.
Look for and read a website’s privacy and security policy. Stay clear of a website that either doesn’t have one or does not guarantee your personal information will not be sold. This policy should disclose what information is being collected on the Web site and how that information is being used.
4. Know Who You’re Dealing With.
Research your merchant. Look at the ratings consumers give them and stay clear of websites that either aren’t listed or receive poor marks. Shop with companies you know. Anyone can set up shop online under almost any name. If you’re not familiar with a merchant, ask for a paper catalogue or brochure to get a better idea of their merchandise and services. Also, determine the company’s refund and return policies before you place your order. These should be posted on the company’s Web site.
5. Keep A Record.
Print out a copy of your order and confirmation number for your records. Reputable merchants will usually send you an email confirming your order. However a hard copy is always good to have in case your order is lost, deleted or not delivered as promised.
6. Guard Your Online Password.
Keep your password(s) private. Be creative when you establish a password, and never share your website passwords with anyone. Write them down and store them in a safe place. Avoid using a telephone number, birth date or a portion of your Social Security number. Instead, use a combination of numbers, letters and symbols. Do not use the same username and password at every website. Should your personal information be compromised, a thief won’t get very far if you use different passwords and usernames on different websites.
7. Track Your Purchases.
Use only one credit card to shop with online. This helps keep track of your online purchases during the holidays, and will make it easier to spot purchases that are fraudulent. Look for a card that allows you to review transactions online as well — you’ll be more likely to notice a problem early on.
8. Keep Personal Information Private.
Don’t enter more information at a merchant website than is absolutely necessary. There is usually no reason why you should have to supply information such as birth dates or Social Security numbers when making a purchase. Fill in only the bare essentials necessary to make your purchase. If you have children, teach them to check with you before giving out personal – or family – information online.

How To Get Free High-speed Internet On MTS MBLAZE

Want To Access MTS Mblaze Free Internet?
Here Is The New MTS MBlaze Free Internet Tricks
When Your Recharge Is Expired,Then Follow Below Steps:
  • Connect Your Device
  • After Getting MTS MBlaze Internet Interface
  • Connect Your Internet
  • After Connecting Internet
  •   Type Below Address In The Address Bar:-
Http://Yahoo.com.bypass-proxy.appspot.com/website
For Example:
Http://yahoo.com.bypass-proxy.appspot.com/hackintruths.org
You Can Replace hackintruths.org with any url you want to visit.
Try These All Addresses In Address Bar:–

Get the serial number for any Software by searching on Google

Get any serial number you need by searching on Google!! It’s too easy.. Try your self.
Step 1: Go to Google.
Step 2:  In the search field type: "Product name" 94FBR
Step 3: Where, "Product Name" is the name of the item you want to find the serial number for.
Step 4: And voila – there you go – the serial number you needed.

Truths behind this Trick:
Quite simple really. 94FBR is part of a Office 2000 Pro cd key that is widely distributed as it bypasses the activation requirements of Office 2K Pro. By searching for the product name and 94fbr, you guarantee two things. 1) The pages that are returned are pages dealing specifically with the product you’re wanting a serial for. 2) Because 94FBR is part of a serial number, and only part of a serial number, you guarantee that any page being  returned is a serial number list page.
See these example searches:
"Photoshop 7" 94FBR
"Age of Mythology" 94FBR
"Nero Burning Rom 5.5" 94FBR

WHAT IS TROJAN HORSE

Hi Friends today I am going to tell you about Trojan horse. but First of all I would like to tell you the Difference between Trojan , Viruses and Worm. Some people think that Trojan and virus both are same but I will tell you what the differences between them are.


Trojan horse- It is a program, using this program it will make the victim system to make listen on particular port, so that attacker can do anything on your system, i.e. he can tamper with, steal, and destroy the data etc...., a Trojan horse won’t spread in to the system like a virus so it won't effect the system performance.


virus- It is a malicious program, using this program it will damage your system, by injecting the virus in to another programs are files, so that it will regrade your system performance. Virus will come to the system with user interaction only.


worm- It is also one type of virus, using this program it will damage your system like virus, not only system it will spread through out the network and checks for honey pot of your os, and enter into the os, it will regrade your system performance and also it will eat your network bandwidth.


Trojans are executable programs, which mean that when you open the file, it will perform some action(s). In Windows, executable programs have file extensions like "exe", "vbs", "com", "bat", etcTrojan may allow a hacker remote access to a target computer system. Once a Trojan has been installed on a target computer system, a hacker may have access to the computer remotely and perform various operations, limited by user privileges on the target computer system and the design of the Trojan. Some Trojan horse viruses will simply be annoying and will not necessarily harm your computer in any way, while others can and will be able to cause serious damage to your computer by deleting files and destroying vital information on your system

How to protect from Trojans
There are several steps that you can take to protect your computer from viruses such as Trojan horses. You should always make sure that your operating system is up to date. You should never go without antivirus software on your computer, and you need to remember to use this frequently, about once or twice a week. You must make sure that you are consistently getting updates on these programs. You will also want to make sure that the antivirus program which you have has the ability to scan emails and other files which are downloaded from the Internet, as this is the primary resource where computers are attacked by viruses.

All Windows Password Breaking Tool

Hello friends I have found for you a very easy and effective method for Breaking windows Password. With this software you can easily break Administrator password , user account passwords .you can also break advance level of passwords like SYSKEY password , Facial Expression Password , and Thumb Recognition passwords. the Syskey password is very strong password if you forget the password there is no option to recover this password .you will have to install new windows. But now there is no need to install windows .you can easily break any password of windows in any OS. If you have forgotten your password, or your computer is locked out, or you do not have access to the password of the system, you only need to boot from this software from CD/DVD/USB to reset your lost password. Then you can get back into your system in a minute. No need to call a technician, no need to re-install anything, and you certainly don't need to reformat.


Click the link below to download the ISO file of windows password recovery tool.

http://www.ziddu.com/download/18266312/passwordremoverbytarunarora.zip.html

List of Facebook Keyboard Shortcuts

Facebook has a small, but useful set of keyboard shortcuts you can use to navigate the social networking site.

Here are the keyboard shortcuts for Facebook:
Windows
Firefox modifier: Shift + Alt + #
Chrome modifier: Alt + #
Mac
Firefox modifier: Control + #
Chrome modifier: Control + Option + #
Safari modifier: Control + Option + #
Shortcuts
1 : home
2 : timeline/profile
3 : friends
4 : messages
5 : notifications
6 : general account settings
7 : privacy settings
8 : Facebook's Facebook page
9 : legal terms
0 : help center
m : new message
? : search
That's it. If you're wondering why Internet Explorer 9 was left out, it's because only the home and timeline shortcuts seem to work. If you want to use IE9 anyway, the modifier is Alt + #, then Enter.

Monday, 16 January 2012

Send Anonymous Mail to anyone|Set up your own server In easy way

Every one wants to send Anonymous Mails to his/her enemy,friend,teachers. Well here I am sharing that technique.Hope you like this.

email-spoofing-2

Things you need.

1.webhosting (like x10hosting.com , my3gb.com)
2.Php script. (click here to download)
Now go to x10hosting.com (your webhosting server , here I am using x10hosting.com) and login using your username and passwords. And upload the file “mail.php” (which we have downloaded) to “public_html” folder.
Now go to this page
yourhosturl/mail.php
Change the yourhosturl with your website url which you gave it when you register in x10hosting.com
For eg:
yourfavorites.x10.mx/mail.php
Usually the default will be "name.x10.mx"
When you visit you will see the form just like this:
1

And now fill the form with your victim mail address and message subject and send.
Don't give your details in the sender field.
Just fill with any organization name.
For Eg:
Rockstar

Change the facebook login screen

Hi folks. If you are also get bored with the Old facebook login page like me and want to get rid off it then keep reading. By using a simple extension you can put any image as background of facebook login page

This trick works only on Google chrome. Sorry to other browser users but I promise to bring this trick for Firefox users sooner.
Just follow the simple steps to configure your page:
  • Download the FB refresh extension from Chrome web store. click here.
  • select Add to Chrome. It'll automatically get attach with your chrome.
  • Now reopen your browser and go to www.facebook.com. You'll see the default image as background.

Don't you like this default image..?? Yeah you can replace it with an Image of your choice. Keep reading folks...
  • go to an image hosting site. I would suggest you to use Picasa or Flickr
  • There upload your image and copy its URL
  • In you chrome browser click on settings > Tools > Extensions then on FB refresh select option you'll see something like this.

  • Now enter your URL in the box which you copied on step 5 and click save.
Finally you are DONE. Just reopen the browser to see the changes. Enjoy your new Facebook login page.

Extreme Guide To Perl | Exploit Launching With Perl

Perl is a high-level, general-purpose, interpreted, dynamic programming language. Perl was originally developed by Larry Wall in 1987 as a general-purpose Unix scripting language to make report processing easier. Since then, it has undergone many changes and revisions and become widely popular amongst programmers.
In the web development environment, Perl is a very powerful way to create dynamic web pages. Perl can be used for virtually any web application you can think of, from hit counters to database management.
Perl is worth learning for practical reasons; it’s very widely used for active web pages and system administration, so that even if you never write Perl you should learn to read it. Many people use Perl in the way I suggest you should use Python, to avoid C programming on jobs that don’t require C’s machine efficiency. You will need to be able to understand their code.
Python VS Perl
The differences are they are two different languages, and nothing more. Just like the differences between PHP and Python, C Sharp and Python, C and Python and so on.
There are always people that like one language or hear something about a language and believe what they hear, and use those feelings to act like one is better than the other. None of these are true.
All of these languages are excellent. In fact, Perl is more mature than most and offers better reliability and security than most (comparing it to things like PHP, for example, but that’s not to say PHP is bad).
 Hackers and Perl
Perl as we  all know, is one of the powerful languages available on the web. And especially very popular among hacking communities. To write exploits for vulnerability available in any software. Here is a procedure which a Perl coder follows while writing an exploit for vulnerability found in any software.
From many underground communities and forums, many exploits are introduced, and for launching them hackers/crackers/pentesters use Perl platform, it’s very easy to fire an exploit towards the target. So how do they do that? Let’s see.

Downloading Active Perl
activeperl
Step 1:- Go to www.perl.org and click on download
Here we have three platforms if you are using Linux click the first one i.e. Unix/Linux , and on the other side MAC OS X and Windows platform is also available  for downloading .
Step 2:-   As you click on Windows you will be redirected to another website link from where you can download the perl language . The new website will look like as below image
activestate
 Just click on Download Active Perl 5.14.2, it’s for 32bit operating systems. After downloading it,  install it
Step 3:- It’s a total 15Mb of setup file. To install it, double click on the setup file.
perl installation

Finding Exploit from the Web
Well, now we have installed Perl into your machine  and what we need to do next is to find an exploit. There are two options that you can do;  we can make our own exploit or we can get a Perl exploit from the web.(Underground Forums, Blog etc).
Here are some forums from where you can get the latest exploits almost for free.
Another very good section for getting latest Perl exploits is in hackforums.net coding section .
perl programming
More than 600 exploit scripts available to play with. Go to hackforums.net and see the coding section.
These are other websites available from where you can get the latest Perl exploits. For beginners, obviously it’s very difficult to make his/her own exploit. So in short time you can get your required exploit from the above links, but again I recommend building your own exploit is very important because no doubt there are many exploit codes that are available on the web but it does not matter in some cases, maybe there is a possibility in which you have the requirement for an exploit for a Router but on the web you are unable to find that script, In that case you have to develop your own exploit for the vulnerability you found.
I am not saying that you are not a hacker if you do not know any language but if you want to be a TRUE hacker then you should know coding in core, if not at least that much , which helps you to fulfill your requirements.

Getting and Launching the Exploit
Step 1:- First go to any of above site and download the required Perl exploit in my case I am downloading an Admin Page Finder script in Perl and Password Generation Script, that will help us to find Administrator Pages and will help us generate random passwords respectively.
Step 2:- Here is the code of Admin Page Finder Script. You can download it from this link, you just have to copy this script and paste it into notepad and save it as adminperl.pl.  ’.pl’ extension represents Perl script.
adminperl.pl
Save it and your script will look like the same image file above  which is adminperl.pl.

Step 3:- For launching the exploit you have to use the command prompt.
cmd
Step 4:- Now for launching just go to the path directory of your Perl and type the name of the exploit
launching exploit
Step 5:- Here your script is working now just fill in the name of the site whose admin page you want to find for the further security assessments. And in the page type just type ‘any’ for the language input.
admin control panel finder
In the  image below you can see that its finding the admin page in my website by matching the page name with its pre-built database.
rahultyagi
For Further Learning  in Perl I prefer you should subscribe this link on youtube.
youtube
Limitations of Perl
If you want to run your program on a different computer, you can’t always be sure that Perl is installed everywhere. It is common enough on most modern Linux and Solaris installations, although some system administrators choose not to install it for various reasons. On Windows, though, it is not so common and you need to install it. The installation is easy to get and free, but it needs to be done before you can run anything.
Moreover, if you write a script which uses modules from CPAN, and want to run it on another computer, you need to install all the modules on that other computer, which can be a drag.

All time favourite Hacking Movies

Nowadays Hollywood and even Bollywood tries to put the real hackers attitude in the Movies.  Today almost every watchable action or drama movie contains at least one hacking related part. Here I'm sharing some of my all time favourite hacking based movies. If you haven't watched any of it then must give them a try.


Hackers (1995):

A small kid is banned from using computer because of writing a computer virus. After years, he and his friends discover a plot to unleash a dangerous computer virus.


Matrix (1999):

If you're a geek then I don't think that you miss this awesome series. A computer hacker learns to find the nature of its reality and fight against its creators. This movie will surely brings the new world of computer programmes.


Takedown (2000)
:
This movie is based on the story of the capture of computer hacker "Kevin Mitnick" which actually popularised the Social Engineering.


Antitrust (2001):
A computer programmer dreams of working in a high profile company. His dream turns into a nightmare when he discovers that the owner of the company is involved in criminal activities and killing the programmer's for their codes.


Revolution OS (2001):
This documentary features the rise of Linux/GNU and the Open Source Movement. A most recommended movie for Computer System geeks.


Swordfish (2001):
A secret group fights against the terrorism and sometimes do robbery in banks just to fund themselves. They higher the computer professionals for all their high tech crimes.


The Italian Job (2003):
This movie is based on 1969 Michael Caine film of the same name. A group of thieves planning to go for GOLD by creating the huge traffic on the streets of Los Angeles.


Live Free of Die Hard 4 (2007):
My all time favourite and an awesome movie in the die hard series. John McClane gets the duty to take a computer hacker to the Headquarters. Then they messed with a computer hacker's group which are planning to take the whole US economy down.




If you like this post then you can buy me a drink :P

Some Great Hacker Conferences

A good way to get motivated and keep yourself up to date with new technology is by attending conferences. In these hacking and tech conferences you always meet with real working minded peoples. These places are worth enough because the great peoples not only share their ideas but also help others to solve problems. If you think you are the only coolest geek around then.... trust me at such places there are many guys who can remove this shit from your mind.

I'm sure if you are willing to learn then you never want to miss such hack and tech conferences. If you ever get a chance to participate in any of them then it'll be a life changing experience. Here, I'm sharing the list of some great hacking conferences with a short description. You can visit their official website for more details.


Defcon (www.defcon.org):
It is a continuous running and one of the oldest hacker conferences. It started in 1993, it was meant to be a party for member of “Platinum Net”, a Fido protocol based hacking network out of Canada. It always help the real hackers to get an international spotlight. Venue for elite security researchers.

RSA conference (www.rsaconference.com):
Running since 19 years, RSA always attracted the top security expert. Its main agenda is always to solve many Information Security related issues and bring some great hacking minds under one roof. It takes place Europe, U.S. and Japan.

Dnscon (www.dnscon.org) :
DNS is a data network security conference. UK's longest running open information security conference provides an opportunity to find new threats to information security.

ShmooCon (www.shmoocon.org):
Its an annual East coast hacker conference providing an excellent atmosphere for hacking, exploitation and also helps in solving many software and hardware related problems. Its a three days event, fist day is dedicated to speed talks and other two days are for three tracks called: Break it !!, Build it !! and Bring It On!!

Blackhat (www.blackhat.com) :
It was started in 1997 as a single annual conference in Las Vegas and now turned into a global conference series with annual events in Washington DC, Amsterdam, Las Vagas and Tokyo. It has also become a premier venue for best security trainers to find their audience.

It is also one of the oldest hacking conferences. Running since 1994, becomes a venue for computer hackers, phone phreaks, net activists and for all the curious peoples from all over the world. HOPE stands for Hackers On Plane Earth.

ChicagoCon (www.chicagocon.com):
A must attend conference for network guys who want to advance their career with Info Sec. Featuring exams on-site followed by a two-day ethical hacking conference.

It's Asia's largest network security conference held annually in Kuala Lumpur, Malaysia and more recently in Middle East.

HackerHalted (www.hackerhalted.com) :
Its an educational conference as well as workshop which focuses to educate its participants to overcome the information Security related issues running these days.

Toorcon (www.toorcon.org):
This conference takes place in the beautiful sunny city of San Diego. it brings the new security experts to present their research and new tricks.

HACKING FAQ - A Best guide for Beginners

If you are a beginner in the art called Hacking then it is the ultimate hacking FAQ you must go with. Eric S. Raymond share his views on the most popular questions among the beginners. This FAQ will definitely help you to clear the picture of hacking culture if you are really serious with this Art.
Feeling Excited ?? keep reading folks......
HACKING FAQ :
Q: How do I tell if I am already a hacker?
A: Ask yourself the following three questions:

  • Do you speak code, fluently?
  • Do you identify with the goals and values of the hacker community?
  • Has a well-established member of the hacker community ever called you a hacker?
If you can answer yes to all three of these questions, you are already a hacker. No two alone are sufficient.
Q: Will you teach me how to hack?
A: Since first publishing this page, I've gotten several requests a week (often several a day) from people to "teach me all about hacking". Unfortunately, I don't have the time or energy to do this; my own hacking projects, and working as an open-source advocate, take up 110% of my time.
Even if I did, hacking is an attitude and skill you basically have to teach yourself. You'll find that while real hackers want to help you, they won't respect you if you beg to be spoon-fed everything they know.
Learn a few things first. Show that you're trying, that you're capable of learning on your own. Then go to the hackers you meet with specific questions.
Q: How can I get started, then?
A: The best way for you to get started would probably be to go to a LUG (Linux user group) meeting. You can find such groups on the LDP General Linux Information Page; there is probably one near you, possibly associated with a college or university. LUG members will probably give you a Linux if you ask, and will certainly help you install one and get started.
Q: When do you have to start? Is it too late for me to learn?
A: Any age at which you are motivated to start is a good age. Most people seem to get interested between ages 15 and 20, but I know of exceptions in both directions.
Q: How long will it take me to learn to hack?
A: That depends on how talented you are and how hard you work at it. Most people who try can acquire a respectable skill set in eighteen months to two years, if they concentrate. Don't think it ends there, though; in hacking (as in many other fields) it takes about ten years to achieve mastery. And if you are a real hacker, you will spend the rest of your life learning and perfecting your craft.
Q: Would you help me to crack a system, or teach me how to crack?
A: No. Anyone who can still ask such a question after reading this FAQ is too stupid to be educable even if I had the time for tutoring. Any emailed requests of this kind that I get will be ignored or answered with extreme rudeness.
Q: I've been cracked. Will you help me fend off further attacks?
A: No. Every time I've been asked this question so far, it's been from some poor sap running Microsoft Windows. It is not possible to effectively secure Windows systems against crack attacks; the code and architecture simply have too many flaws, which makes securing Windows like trying to bail out a boat with a sieve. The only reliable prevention starts with switching to Linux or some other operating system that is designed to at least be capable of security.
Q: I'm having problems with my Windows software. Will you help me?
A: Yes. Go to a DOS prompt and type "format c:". Any problems you are experiencing will cease within a few minutes.
Q: Where can I find some real hackers to talk with? 
A: The best way is to find a Unix or Linux user's group local to you and go to their meetings (you can find links to several lists of user groups on the LDP site at ibiblio).
(I used to say here that you wouldn't find any real hackers on IRC, but I'm given to understand this is changing. Apparently some real hacker communities, attached to things like GIMP and Perl, have IRC channels now.)
Q: Can you recommend useful books about hacking-related subjects?
A: I maintain a Linux Reading List HOWTO that you may find helpful. The Loginataka may also be interesting.
For an introduction to Python, see the tutorial on the Python site.
Q: What language should I learn first? 
A: XHTML (the latest dialect of HTML) if you don't already know it. There are a lot of glossy, hype-intensive bad HTML books out there, and distressingly few good ones. The one I like best is HTML: The Definitive Guide.
But HTML is not a full programming language. When you're ready to start programming, I would recommend starting with Python. You will hear a lot of people recommending Perl, but it's harder to learn and (in my opinion) less well designed.
C is really important, but it's also much more difficult than either Python or Perl. Don't try to learn it first.
Windows users, do not settle for Visual Basic. It will teach you bad habits, and it's not portable off Windows. Avoid.
Q: I want to contribute. Can you help me pick a problem to work on? 
A: No, because I don't know your talents or interests. You have to be self-motivated or you won't stick, which is why having other people choose your direction almost never works.
Try searching on web for projects. When you see one that makes you think "Cool! I'd like to work on that!", join it. check Freshmeat 
Q: Where can I get a free Unix?
A: If you don't have a Unix installed on your machine yet, elsewhere on this page I include pointers to where to get the most commonly used free Unix. To be a hacker you need motivation and initiative and the ability to educate yourself. Start now...