Your Ad Here

Free GPRS from Reliance GSM

Reliance India is offering R-World on its GSM service for free which is similar to Airtel Live.


Like the loopholes which were there in Airtel Live through Which you could access free internet now same is applicable to Reliance also. So gear up guys for the accessing free internet from reliance also as you have paid huge bucks (Rs 50/- :P ) for getting the new reliance GSM sim card.




The hack works like select


rcomwap as your default access point


connect your computer through datacable or bluetooth to your mobile


Open Firefox


in I.E open Tools ---> Internet Options ---> Connections

under connection tab select the new connection you created and click on Settings

Click on check box
(Use a proxy server for this connection) Enter Proxy : 10.239.221.5 and port 8080

Now restart I.E and you are connected to the World through internet.




Similarly change settings for your yahoo messanger, bittorrent client etc...

Reliance GPRS speed sucks even if you opt for paid service and it is not even half as good as Vodaphone and Airtel so don't blame me for the slow speed of connection.






For creating New Connection

Open Network Connections

on left side click on Create New Connections

Click Next

Connect to internet (Selected by default) Next

Set up My connection Manually Next

Connect using a dialup Modem Next

ISP Name ( Give any like Reliance) Next

Phone Number (*99#) Next

Leave all Fields like user name etc blank Next

(Select Create shortcut on Desktop if you like) Finish


How to Connect your PC or Laptop to a TV

I’m writing this post on how to connect your PC or Laptop to a TV because last week I returned from a trip in India and wanted to show all of my pictures and videos to my family from my laptop onto our HDTV, but unfortunately I did not have the correct cords and so after fumbling around for 30 minutes trying to connect my computer to the TV, I had to tell everyone that they would have to wait till the next weekend! Pretty annoying considering the times we live in, it should be quite easy to connect the two together! So here’s a quick walk-through of all the methods that I know (if you know any more, please comment) to connect a laptop or PC to your TV: 1. S-Video - This is probably the most common method out there currently because an S-Video cable is cheap as heck and just about every TV under the sun has a S-Video port. You’ll have to make sure you laptop is equipped with this port. Remember, there are two types of S-Video cables: 4-pin and 7-pin. Most laptops and PC’s are equipped with a 7-pin port, so if your TV only has a 4-pin S-Video port, then this method will not work. 2. VGA - If you have a HDTV, then you will be better off connecting using a VGA cable. It gives much better quality than S-Video and as with S-Video, the cable is very cheap. You usually won’t find a VGA port on regular TV’s though, so this option is if you have an HDTV. 3. DVI - DVI stands for Digital Visual Interface with “digital” being the key word there. The digital signal will give a higher quality picture than either S-Video or VGA. Of course, your computer will need to have a DVI connection and your TV will need to be an HDTV. This cord is definitely not cheap, it ranges anywhere from $40 to $80. 4. HDMI - Using HDMI will give you the best quality by far. No computers that I know of yet have HDMI ports, but you can get a DVI to HDMI cable to connect it to your HDTV. HDMI is compatible with DVI. 5. Scan Converter Box - This is the last method that I could think of and it involves using a scan converter box, which takes a VGA signal and converts it into S-Video or component video. Here’s a graphic I created with some pictures of the various cables:


Hope this helps someone! If you have any other ideas or suggestions, please feel free to comment!!! Thanks!
P.S: Taken from some other site

By Passing Rapidshare Time Limit.....

Some times it becomes frustrating for free user to download from rapidshare when it shows time to wait 15 minutes to 90 minutes........mainly in case of large files. There is simple trick to bypass that ......

  • Just goto rapidshare link you want to download files from.......
  • Click on Free User.....
  • Time count starts, Now click on Adressbox (where you type URL)
  • Type or Paste: javascript:alert(c=0)
  • Press enter..........

Now you are ready to download without any more wait......

Increasing Download Speed by 20%

QoS Packet Scheduler is a method of network bandwidth management that can monitor the importance of data packets and depending upon the priority of the packet, give it higher or lower priority or bandwidth levels. It's not very useful unless you're using apps which are QoS-aware or running a server, so you can gain some network overhead back by turning it off.

Note: This following tip will not work on XP Home Edition.

  1. Make sure you're logged on as actually "Administrator". Do not log on with any account that just has administrator privileges.

  2. Start > Run > type gpedit.msc (not available in home version).

  3. Expand the Local Computer Policy branch.

  4. Expand the Administrative Templates branch.

  5. Expand the Network branch.

  6. Highlight the "QoS Packet Scheduler" in left window.

  7. In right window double click the "limit reservable bandwidth" setting.

  8. On setting tab check the ENABLED item.

  9. Where it says "Bandwidth limit %" change it to read 0 (ZERO).

  10. Close gpedit.msc.

Effect is immediate on some systems, some need to re-boot.

Satyam Computer (into hacking) banned from World bank

Software major Satyam Computer Services has reportedly been banned from doing any off-shore work with the World Bank after forensic experts and bank investigators discovered that spy software was covertly installed on workstations inside the bank's Washington headquarters, allegedly by one or more contractors from Satyam Computer Services. ( Watch )

According to a FOX News report, apart from Satyam, two IP intrusions have been reported from China, and there have been six intrusions in all.

Investigators say that the software, which operates through a method known as keystroke logging, enabled every character typed on a keyboard to be transmitted to a still-unknown location via the Internet.

Upon its discovery, bank officials shut off the data link between Washington and Chennai, where Satyam has long operated the bank's sole offshore computer center responsible for all of the bank's financial and human resources information.

"I want them off the premises now," World Bank President Robert Zoellick reportedly told his deputies. But at the urging of CIO De Poerck, Satyam employees remained at the bank as recently as October 1 while it engaged in "knowledge transfer" with two new India-based contractors.

Satyam is publicly listed on the New York Stock Exchange and boasts having two billion dollars in sales and more than 150 Fortune 500 companies as clients.

In 2003, Satyam won a lucrative five-year "sole source" contract to design, write and maintain all of the World Bank's information systems. The contract, which began at $10 million, had grown to over $100 million by 2007. This year, the contract was not renewed. Satyam has declined to comment.

FOX News claims that outsiders have raided the World Bank Group's computer network, one of the largest repositories of sensitive data about the economies of every nation, repeatedly for more than a year.

It is still not known how much information was stolen. But sources inside the bank confirm that servers in the institution's highly restricted treasury unit were deeply penetrated with spy software last April. Invaders also had full access to the rest of the bank's network for nearly a month in June and July.

The crisis comes at an awkward moment for Zoellick, who runs the world's largest and most influential anti-poverty agency, which doles out $25 billion a year, and whose board represents 185 member nations.

This weekend, the bank holds its annual series of meetings in Washington, and just in advance of those sessions, Zoellick called for a radical revamping of multilateral organizations in light of the global economic meltdown.

Zoellick is positioning himself and the bank as an institution that can help chart a new path toward global financial stability. But that reputation, more than ever, depends on the bank's stable information infrastructure.

According to internal memos, "a minimum of 18 servers has been compromised," including some of the bank's most sensitive systems, ranging from the bank's security and password server to a Human Resources server "that contains scanned images of staff documents."

One World Bank director told FOX News that as many as 40 servers have been penetrated, including one that held contract-procurement data. It took ten days for bank officials to detect that they'd been invaded. Once they did, they shut down all external servers, except for e-mail, which it turns out the invaders were already using as their entrance point.

A World Bank spokesman, however, rubbished the Fox News story, saying it is riddled with falsehoods and errors.

From: Timesnow.com

IP Spoofing Explained

The term IP (Internet Protocol) address spoofing refers to the creation of IP packets with a forged (spoofed) sourceIP address with the purpose of concealing the identity of the sender or impersonating another computing system.

Why it works ?

IP-Spoofing works because trusted services only rely on network address based authentication. Since IP is easily duped, address forgery is not difficult.

The main reason is security weakness in the TCP protocol known as sequence number prediction.

How it works ?

To completely understand how ip spoofing can take place, one must examine the structure of the TCP/IP protocol suite. A basic understanding of these headers and network exchanges is crucial to the process.

Internet Protocol (IP) :

It is a network protocol operating at layer 3 (network) of the OSI model. It is a connectionless model, meaning there is no information regarding transaction state, which is used to route packets on a network. Additionally, there is no method in place to ensure that a packet is properly delivered to the destination.



Examining the IP header, we can see that the first 12 bytes (or the top 3 rows of the header) contain various information about the packet. The next 8 bytes (the next 2 rows), however, contains the source and destination IP addresses. Using one of several tools, an attacker can easily modify these addresses – specifically the “source address” field.

Transmission Control Protocol (TCP) :

It is the connection-oriented, reliable transport protocol in the TCP/IP suite. Connection oriented simply means that the two hosts participating in a discussion must first establish a connection via the 3-way handshake (SYN-SYN/ACK-ACK). Reliability is provided by
data sequencing and acknowledgement. TCP assigns sequence numbers to every segment and acknowledges any and all data segments recieved from the other end.


As you can see above, the first 12 bytes of the TCP packet, which contain port and sequencing information.

TCP sequence numbers can simply be thought of as 32-bit counters. They range from 0 to 4,294,967,295. Every byte of data exchanged across a TCP connection (along with certain flags) is sequenced. The sequence number field in the TCP header will contain the sequence number of
the *first* byte of data in the TCP segment. The acknowledgement number field in the TCP header holds the value of next *expected* sequence number, and also acknowledges *all* data up through this ACK number minus one.

TCP packets can be manipulated using several packet crafting softwares available on the internet.

The Attack

IP-spoofing consists of several steps. First, the target host is choosen. Next, a pattern of trust is discovered, along with a trusted host. The trusted host is then disabled, and the target's TCP sequence numbers are sampled. The trusted host is impersonated, the sequence numbers guessed, and a connection attempt is made to a service that only requires address-based authentication. If successful, the attacker executes a simple command to leave a backdoor.

Spoofing can be implemented by different ways as given below -

Non-Blind Spoofing :- This type of attack takes place when the attacker is on the same subnet as the victim. The sequence and acknowledgement numbers can be sniffed, eliminating the potential difficulty of calculating them accurately.

Blind Spoofing :- Here the sequence and acknowledgement numbers are unreachable. In order to circumvent this, several packets are sent to the target machine in order to sample sequence numbers.

Both types of spoofing are forms of a common security violation known as a Man In The Middle Attack. In these attacks, a malicious party intercepts a legitimate communication between two friendly parties. The malicious host then controls the flow of communication and can
eliminate or alter the information sent by one of the original participants without the knowledge of either the original sender or the recipient. In this way, an attacker can fool a victim into disclosing confidential information by “spoofing” the identity of the original sender, who is presumably trusted by the recipient.

IP spoofing is almost always used in what is currently one of the most difficult attacks to defend against – Denial of Service attacks, or DoS.

Crack Rapidshare Download limit

RapidShare also limit free users, based on their IP address, to certain download limit, and after reaching the limit, RapidShare will block your IP address. To overcome RapidShare download limit, since it’s based on IP address, the techniques to change or mask the IP address will come in useful to hack the RapidShare.

There are several ways to change your IP address (or at least showing different IP address to RapidShare). Whatever ways, you need to clear your web browser’s cookies first.

1. Request new IP address from ISP (for dynamic IP address Internet users only)

  1. Click Start -> Run
  2. Type cmd in the Open box, then click OK.
  3. At the command prompt, run the following commands one by one:

    ipconfig /flushdns
    ipconfig /release
    ipconfig /renew
    exit
  4. Try to download from RapidShare again.
  5. Note: It’s possible to put all the commands above into a batch file and simply run the batch file to complete the IP changing process. To create the batch file, use Edit in command prompt or Notepad, copy and paste the above commands into the editor, and save the file with extension of .bat or .cmd (for Notepad, change the File Type to All File too).

2. Use a proxy server, or a different proxy server

You can get a list of available public proxy server easily by searching “proxy server” in search engine such as Google or Yahoo!. Choose a proxy server and note down its IP address and port number.

In Internet Explorer, go to Tools -> Internet Options -> Connections -> LAN Settings. Select (check) the option of Use a proxy server for your LAN. Then key in the proxy server IP address and port in respective box. Click OK to continue.

In Mozilla Firefox, go to Tools -> Options -> Connection Settings. Then select (click) Manual proxy configuration and key in proxy server information. Click OK to continue.

Obviously, once you hit the download limit, you will need to change the proxy server again. There are tools that help you to switch the proxy server automatically. In Internet Explorer, try Steganos Internet Anonym 2006 from Steganos or Hide IP from V7soft. In Firefox, use the SwitchProxy extension. Both software allow you to change the proxy server easily, with just few clicks.