OK i am back, its been long since i posted anything so i am posting some tricks now....
Everyone must have heard of the blackberry messenger app which provides instant messaging to the BlackBerry users. You can send instant messages with BlackBerry Messenger with images, video, voice notes, but you can also use BBM to make free voice calls on your BlackBerry device. Sadly it was available only for BlackBerry users. but don't lose hope guys the BBM app will be soon available for your android and iOS platform.
Hello , The topic of this article is "Brute Force".In this article i will explain the meaning of bruteforce and will provide some top Brute force softwares to download.Lets Strat....
Brute force (also known as brute force cracking) is a trial and error method used by application programs to decode encrypted data such as passwords or Data Encryption Standard (DES) keys, through exhaustive effort (using brute force) rather than employing intellectual strategies. Just as a criminal might break into, or "crack" a safe by trying many possible combinations, a brute force cracking application proceeds through all possible combinations of legal characters in sequence.
'SixthSense' is a wearable gestural interface that augments the
physical world around us with digital information and lets us use
natural hand gestures to interact with that information.
We've evolved over millions of years to sense the world around us.
When we encounter something, someone or some place, we use our five
natural senses to perceive information about it; that information helps
us make decisions and chose the right actions to take. But arguably the
most useful information that can help us make the right decision is not
naturally perceivable with our five senses, namely the data, information
and knowledge that mankind has accumulated about everything and which
is increasingly all available online. Although the miniaturization of
computing devices allows us to carry computers in our pockets, keeping
us continually connected to the digital world, there is no link between
our digital devices and our interactions with the physical world.
Information is confined traditionally on paper or digitally on a screen.
SixthSense bridges this gap, bringing intangible, digital information
out into the tangible world, and allowing us to interact with this
information via natural hand gestures. ‘SixthSense’ frees information
from its confines by seamlessly integrating it with reality, and thus
making the entire world your computer.
The SixthSense prototype is comprised of a pocket projector, a
mirror and a camera. The hardware components are coupled in a pendant
like mobile wearable device. Both the projector and the camera are
connected to the mobile computing device in the user’s pocket. The
projector projects visual information enabling surfaces, walls and
physical objects around us to be used as interfaces; while the camera
recognizes and tracks user's hand gestures and physical objects using
computer-vision based techniques. The software program processes the
video stream data captured by the camera and tracks the locations of the
colored markers (visual tracking fiducials) at the tip of the user’s
fingers using simple computer-vision techniques. The movements and
arrangements of these fiducials are interpreted into gestures that act
as interaction instructions for the projected application interfaces.
The maximum number of tracked fingers is only constrained by the number
of unique fiducials, thus SixthSense also supports multi-touch and
multi-user interaction.
The SixthSense prototype implements several applications that
demonstrate the usefulness, viability and flexibility of the system. The
map application lets the user navigate a map displayed on a nearby
surface using hand gestures, similar to gestures supported by
Multi-Touch based systems, letting the user zoom in, zoom out or pan
using intuitive hand movements. The drawing application lets the user
draw on any surface by tracking the fingertip movements of the user’s
index finger. SixthSense also recognizes user’s freehand gestures
(postures). For example, the SixthSense system implements a gestural
camera that takes photos of the scene the user is looking at by
detecting the ‘framing’ gesture. The user can stop by any surface or
wall and flick through the photos he/she has taken. SixthSense also lets
the user draw icons or symbols in the air using the movement of the
index finger and recognizes those symbols as interaction instructions.
For example, drawing a magnifying glass symbol takes the user to the map
application or drawing an ‘@’ symbol lets the user check his mail. The
SixthSense system also augments physical objects the user is interacting
with by projecting more information about these objects projected on
them. For example, a newspaper can show live video news or dynamic
information can be provided on a regular piece of paper. The gesture of
drawing a circle on the user’s wrist projects an analog watch.
The current prototype system costs approximate $350 to build. Instructions
on how to make your own prototype device can be found here (coming soon).
Hi, I am back today with a most usefull article..Hope all of you willLike It ! Here i will show you that "How to Hack Softwares to use them Forever ?" . That really a useful article,because in our daily life we need thousand of softwares today,which of most are highly paid..So how to use them Freely for whole Like ??
Most of us are familiar with many softwares that run only for a specified period of time in the trial mode.Once the trial period is expired these softwares stop functioning and demand for a purchase.But there is a way to run the softwares and make them function beyond the trial period. Isn’t this interesting?
Before I tell you how to hack the software and make it run in the trial mode forever, we have to understand the functioning of these softwares.I’ll try to explain this in brief.Because Purpose if ICA is 1st to clear your basics.So,When these softwares are installed for the first time, they make an entry into the Windows Registry with the details such as Installed Date and Time, installed path etc.After installation every time you run the software, it compares the current system date and time with the installed date and time.So, with this it can make out whether the trial period is expired or not.
So with this being the case, just manually changing the system date to an earlier date will not solve the problem.For this purpose there is a small Tool known as RunAsDate.
RunAsDate is a small utility that allows you to run a program in the date and time that you specify. This utility doesn’t change the current system date, but it only injects the date/time that you specify into the desired application.
Hello, I am back with a most funny and mysterious artice.. Hope all of you will enjoy to know all this... One day my Sir told me that he got a mail the message written on that is almost as below...
Nobody can create a FOLDER anywhere on the computer which can be named as “CON”. This is something pretty cool…and unbelievable… At Microsoft the whole Team, including Bill Gates, couldn’t answer why this happened! TRY IT NOW !!
This is not the first time I listen about this funny question that "why we can't create a folder with name 'CON' " ?, and I’m sure most of ICA member also try to make folder "CON" just now after reading the title of article ! if no,then go and 1st try it .... If you try creating a folder named CON, as the mail claims, it’ll get renamed automatically to New Folder. But there is no mystery behind this, and the team at Microsoft very well knows the reason for this. :-)
Why is it not possible to create a folder named CON ? Before we proceed further, let me tell you a small secret you can’t even create a folder namedPRN, AUX, NULand many others.
The reason you can’t create a folder with these names is because these are reserved keywords used by DOS. The below screen-shot taken from Microsoft’s website shows a list of reserved keywords in DOS.
If you try creating a folder with any of these names, the name automatically changes back to the default “New Folder”. And this is what has caused the confusion. Instead of automatically renaming the folder, had an explanatory warning message popped up.
You can actually create a folder named CON !! There is actually a way to create a folder named CON, or any other name from the above list of reserved keywords. This can be done through command prompt. But it is advisable not to do so, as it might result in your system becoming unstable.
Step 1: To create a folder named CON, go to command prompt and type “MD \\.\D:\CON” (without quotes). This will create a folder named CON in D:. See the screenshot.
Step 2: You cannot delete this folder by normal delete. To delete the folder, again go to command prompt and type “RD \\.\D:\CON” without quotes.
Step 3: I’ll again recommend you not to try this on your system, as it might become unstable. In case you can’t stop yourself, don’t do it on a drive on which Windows is installed (generally C:).
What are session IDs or session cookies ?
Talking in simple language, whenever we sign into an account it
generates a unique piece of string. One copy is saved on server and
other in our browser as cookie. Both are matched every time we do
anything in our account. This piece of string or login session is
destroyed when we click on 'Sign Out' option.
Just login to yahoo.com. Type in browser javascript:alert(document.cookie);
You would get a pop up box showing you the cookies. Now login to your
account and do same thing, you would see more elements added to the
cookies. These represent sessions ids .
Note: By saying , stealing sessions or stealing cookies, I mean
the same thing. Sessions are stored in our browser in form of cookies.
An attacker can steal that session by convincing victim to run a piece
of code in browser. Attacker can use that stolen session to login into
victim's account without providing any username/password. This attack is
very uncommon because when the victim clicks 'Sign out' , session gets
destroyed and attacker too also gets signed out.