Saturday 1 October 2011

Benefits of using BCC while sending an Email


                   

Almost every user on the Internet sends/receives hundreds of emails per day. However only a handful of them know what is BCC and what are the advantages of using BCC while sending an email. If you are one such Internet user who is unaware of BCC then this is the post that you should definitely read! 


What is BCC?

♦ BCC stands Blind Carbon Copy.
♦ It refers to the practice of sending an email to multiple recipients without disclosing the individual emails addresses. 

♦ While sending the same email/message to multiple recipients, it is a common practice for most users to separate the email addresses by using comma or semi-colon and insert all those addresses in the "To:" field. When emails are sent in this way, each receiver is able to see the complete list of recipient email addresses to which the same message if being sent to. 

♦ Unlike "To:", the "BCC:" option allows you to hide the recipients in email messages. In other words, when emails are sent using "BCC:", the receiver will not be able to see the list of recipient email addresses. Thus using BCC is a smart way to protect the privacy of the recipients.


Why should you use BCC?

Here are the reasons for using BCC - 

Privacy – BCC provides an easy and simple option for protecting the privacy of your recipients. Under many circumstances it is necessary for us to send an email without letting the recipients know who else is receiving the same message. Also it is highly recommended that you use the BCC: while forwarding a joke or a funny email to a list of your friends. If you are sending email on behalf of a business or organization, it may be especially important to keep lists of clients, members, or associates confidential. So don’t forget to use BCC: in instances wherever privacy matters.

Respect for you recipients - While forwarding email messages, people often do not bother to remove the list of previous recipients. As a result, messages that are repeatedly sent to many recipients may contain long lists of email addresses. This makes it easy for the spammers to collect and target those emails for spamming.

In order to avoid the risk of spammers, it is necessary that you encourage people/friends to use BCC: while forwarding any message to you. This prevents your email address from appearing in other people’s inboxes thereby keeping yourself less exposed to spammers.


How to use BCC?

        

Most email clients(gmail, yahoomail, hotmail) provide the BCC: option under a few lines below the To: field. All you have to do is just enter the list of recipients in the BCC: field instead of entering in the To: field. You may enter only your own email address in the To: field. Once you do this just hit the Send button.


Thanks,
Parag


         

Thursday 29 September 2011

How to Bind .exe files to keep your VIRUS file, FUD and Hidden


<------------- PS : Readers must read the note at the end ------------------->

Hey friends, here in this post I'll show you how to bind 2 or more .exe files so that running the main execution file will also run your hidden execution files in background without the knowledge of user who is running it.


I am sure this will be helpful to you if you are seeking for a trick to keep your virus file inside a genuine software and make it to run when anyone installs that software.


There are many binder software available like filejoiners, file binders etc. I dont know how many of you are aware of this great windows tool. Even I was in search for those softwares to keep my virus files hidden untill I realize that there is an inbuilt windows .exe binder which can bind the files more effectievely than others. Also a great advantage that if you bind in this way the possibilities of being FUD (Fully Undetectable) is very high as it uses genuine windows tools. I will give you step by step explanation for binding 2 .exe files to a single package. Have you heard about IExpress anywhere before? If not just keep in mind that it is the inbuilt tool in windows used for binding .exe files.


Steps:


1) Open run (windows + R)
2) Type iexpress and hit Enter


This will open some thing like this,


         


Do as shown in the screenshot above.
Select "Create new Self Extraction Directive file" and click Next.


3) Give a title for your package.


         


4) If you have give any message, it will be prompted before the user installs the package. Suppose if I give a message "For security reason please disable your antivirus". This will be shown to the user when he/she installs the particular package. Here, in this screenshot I have selected "No prompt".


                  


5) Select as shown below (recommended).


          


6) Now, click on "Add" button and select the files you want to bind. Here, I selected a genuine software and a virus file created by me and bind them together. So, when any user would install this particular software, user observe that the software is installing as usual, but he cannot see that a virus file has also been installed along with the software.


          


7) After clicking on "Next", there will appear 2 options i.e. Install program and Post install program. Just select the files as shown below (either way will also work) and click next.


         


8) Select as shown below.


          


9) Mention any path of your Hard Drive (this is where your newly created file would get stored) and tick the "Hide File...." option (highly recommended).


          


10) Select as shown below and click next.


          


11) Select "Don't save" and click next.


         


12) Click Finish and you're done.


          




NOTE: Binding techniques are mostly used to attach keyloggers, that will spy your each and every activity performed on your computer. These activity could be your bank transactions, your username and password of different login sites viz. Facebook, gmail, Bank sites etc. Hence this a request to all, not to download any kind of software from unknown websites, because most of the cracked softwares are attached with keyloggers that you can't detect easily.
So, be alert and download softwares from authorized and trusted websites only.



Thanks,
Parag 

Saturday 10 September 2011

How to get Information of any Website using Command Prompt


Hey friends, in this post I'll show how to find IP address of any Website(URL) using Command Prompt(cmd) and also how to find many network related information about a particular website.


1) Start Command Prompt


Goto start --> Programs --> Accessories --> Command Prompt
                                 OR
Goto start --> Run --> Type cmd --> hit Enter




2) IP address and Connectivity


Type the following command in the command prompt,
ping website
eg. ping www.google.com


   A screenshot of the ping command


♦ The 2nd line i.e. Pinging www.google.com [66.102.13.104] with 32 bytes of data:


♦ Here [66.102.13.104] is the IP address of google.com


♦ You can replace www.google.com with any other website.


♦ Notice the connectivity between you machine and the server from the line where it says: "Packets: Sent = X, Received = X, Lost = X (X% loss)," where all the Xs will be replaced by numbers. This gives you an idea of how much percent of the packets sent to the server will be lost.




3) Routing Information


a) Type the following command in the command prompt,
tracert website
eg. tracert www.google.com


    A screenshot of a tracert session


♦ The above command gives you the routing information of a particular website.


♦ You can replace www.google.com with any other website.


♦ Notice the listing of hops along the route path of packets from your machine to the server. This gives you an idea of how many routers/hops the packet has to travel before reaching the server, starting from your machine.


b) Type the following command in the command prompt,
pathping website
eg. pathping www.google.com


   A screenshot of a pathping command execution


♦ The pathping utility gives the information about network latency and network loss at intermediate hops between a source and destination.


♦ Pathping sends multiple Echo Request messages to each router between a source and destination over a period of time and then computes results based on the packets returned from each router. 




4) DNS Information


Type the following command in the command prompt,

nslookup website
eg. nslookup www.google.com

   A screenshot of nslookup execution

♦ The above command gives you the DNS information of a particular website.

♦ It finds the DNS Server (first line) and the IP addresses of the server you queried about.




NOTE : If you're using these command in a corporate network or a school network, some of these commands might not give you results. Most institutions have firewalls with settings to deny services provided by these tools.




Thanks,
Parag

Friday 5 August 2011

Create a Shutdown/Restart shortcut on Desktop


                                    

Hey friends, the following tutorial would make it easy to shutdown/restart your computer by just a double-click. Following steps would create shortcuts as mentioned in the above picture, in just 20 seconds. Checkout....!!




1) Right-click on desktop --> New --> Shortcut

             


2) In "Type the location of the item" box, type,
    shutdown -s -t 00


      
Click Next> button.


 
3) In "Type a name for this shortcut"
    Shutdown (or some other name of your choice)


    
Click Finish button.


4) Change the icon of your choice by right-click over the shortcut --> Properties --> Change icon.


5) Do the same for Restart too. Just change the code with,
    restart -r -t 00


Thanks,
Parag

Downloads



1) Download TV Games (13.7 MB) 
             Games like Bomberman, Spartan, Contra, Road Fighter, Adventure Island etc.


2) Download Fonts (4.53 MB)
             New and crazy fonts that you can't find any of the text editors. Useful for posters and other creations.


3) Turbo C++ (3.86 MB)
             Used for compiling and executing programs written in C & C++ language.


4) PushMonitOff.exe (420 KB)
             If you are using a laptop, then for you its battery life is a big issue. This software turn off the laptop screen when not in use, hence saves energy.


5) Resource Hacker (335 KB)
             A useful hacking tool.


6) Skype 4.0.0.206 Portable.exe (37 MB)             
          Skype is a software application that allows users to make voice and video calls and chats over the Internet.

Thursday 4 August 2011

Articles



1) Black MONEY - From India to UBS

Swiss bank revealed that India has more money than rest of the world. This is so shocking.....If black money deposits was an Olympics event.. Then, India would have won a gold medal. The second best, Russia has 4 times lesser deposit. U.S. is not even there in the counting in top five! India has more money in Swiss banks than all the other countries combined!.........read more
________________________________________________________________

2) "Emptiness" The Real Story of Rohan Rathore

Firstly, the song "Emptiness" by Rohan Rathore for those who have not come across it till now....…It has been shared over 25 thousand times on Facebook over the last week and the different versions of this song have over a million views collectively on Youtube…Now here’s the Story behind this song.........read more
________________________________________________________________


3) Microsoft ERRORS

Microsoft Calculator FAILED in doing following calculations -
Open calculator (goto start --> Run --> type calc --> Click OK).........read more
________________________________________________________________


4) They Have Done it....So Can We....!!
Stammering are you? Well you are not alone! Disappointed about it? Well, approximately 1% of every country’s population stammers. Forget other countries, but that means ten lakhs of fellow Indians are with you. But yet you think about various things that you cannot do because of stammering? You feel embarrassed when you experience a speech block in front of your peers or friends?.........read more
________________________________________________________________


5) Hitler Biography (with Original Scenes)

The Biography of the Chancellor of Germany and one of the Cruel Dictator in History.... Adolf Hitler (1889-1945) who lead to nearly 2.5 crore Soldiers and 2.4 crore Civilians to DEATH...!! The Biography in made of True Videos and Scenes (in Hindi). It comprises of 13 videos.........read more

________________________________________________________________


6) Is your Nokia Cell Phone ORIGINAL?


________________________________________________________________


7) What's 3G?


________________________________________________________________


8) Undersea Internet, Telecom Cables


________________________________________________________________


9) Search Engines


________________________________________________________________


10) Make Money


________________________________________________________________


11) Make 3D models with Google SketchUp


________________________________________________________________


12) HTC EVO 3D Review


________________________________________________________________


13) Android v/s Windows Mobile 7 v/s iPhone v/s Blackberry v/s Nokia


________________________________________________________________


14) Benefits of using BCC while sending an Email


Thanks,
Parag

Computer Tips



1) Lock folder without any Software


2) Samsung Star ".jar" problem solved


3) FONTS


4) Set Video as Desktop Wallpaper


5) "Safely Remove Hardware" Icon


6) Airtel Music In C Language


7) Run COMMANDS


8) Watch "Star Wars Episode IV" in Command Prompt


9) Crazy Notepad Trick to Continuously Pop-out CD Tray


10) For Safe Computing, Disable CD/DVD or USB Autorun in Windows


11) Top Ten Tips To Improve System Speed


12) How to Enable Windows 7/Vista "GodMode"


13) How to Create a CON folder in Windows?


14) Turn OFF or ON monitor using Keyboard


15) Install Windows XP in less than 15 minutes


16) How to create an HTTP Server?


17) How to Download movies using Torrent


18) Create a Shutdown/Restart shortcut on Desktop


19) How to get Information of any Website using Command Prompt


Thanks,
Parag

Hacking Tricks

Wednesday 3 August 2011

Android v/s Windows Mobile 7 v/s iPhone v/s Blackberry v/s Nokia


Android
  
   

  • Open platform.
  • Can compile custom firmwares - good for hackers and other.
  • Good framework, extended on each new firmware.
  • Supports multitasking. 
  • Nice IDE - Eclipse, NetBeans.
  • Development SDK is free.  
  • Easy to debug, can send logs to developers.
  • Programming language is Java but bridges from other languages exist (C# .net - Mono, etc)
  • Java is a high level language that appeared in 1995. Android supports Java 1.5 and translates the byte code to its own custom Dalvik byte code optimized for mobile devices.
  • For the hardcore programmers, Android offers the possibility of programming in C using the native dev kit NDK.
  • Can run script languages like LUA, Perl, Python, etc.
  • Can install third party applications from sdcard, random sites - not locked to a specific market.
  • Applications can hook and override everything - email interface, SMS sending, custom keyboards, etc.
  • Supports widgets.
  • Can publish applications on the Android market instantly - initial one time registration fee is 25E.
  • User has access to the sdcard and can use it as a USB disk.
  • No Adobe Flash support yet. Probably will be available in Q2 of this year.  


Windows Mobile 7


                   


  • Closed platform. 
  • MS breaks compatibility with WM 6.x - this is very bad.
  • Programming environment is Silverlight and XNA.
  • No native programming ie no hooking and overriding keyboard, etc - they removed PInvoke.   
  • Nice IDE - Visual Studio 2010.
  • Does not support multitasking for third party applications.
  • Third party applications can only be installed from the MS marketplace.
  • No Adobe Flash support.


iOS (iPhone)



        


  • Closed platform.
  • No multitasking except for some Apple applications. Multitasking is probably going to be introduced in the next vertion of the iPhone, the iPhone 4.
  • Development kit costs ~90E.
  • Programming language is Objective C - but bridges exist from Java, C#, etc.
  • Objective C appeared in 1986.
  • Next version of iPhone is supposed to only allow Objective C code, this means the bridges are out and you must program in Objective C if you want to create an iPhone application.
  • Applications are not allowed to duplicate the iPhone functionality - ie no custom email interface, etc.
  • Does not support widgets - unless the phone is jail broken.
  • User does not have access to the sdcard - user can only do synchronization via internet or LAN.  
  • Third party applications can only be installed from the Apple store. For testing the applications, developers can use Ad Hoc publishing.   
  • Publishing on the store is a very lengthy and tiresome process. Apple has many and bizarre rules. Many applications were rejected for strange reasons.
  • No Adobe Flash support.



BlackBerry OS



           


  • As it is now, the programming environment is Java native and J2ME - not worth mentioning since they will probably be extinct pretty soon.
  • No Adobe Flash support yet. Probably will be available in Q2 of this year.  
  • We expect a new OS so we will just have to sit patiently and see what's going to happen.



Symbian (Nokia)



      

  • Opened Symbian and says the future will be QT and WRT - they will cut support to any other environment including J2ME.
  • QT is a framework that adds a layer of abstraction over gui, network, gps, etc.
  • QT is cross platform and cross programming language - C++, C#, Java, etc. the licenses are GPL and LGPL.
  • QT runs on Maemo, MeeGo, BlackBerry, Symbian, Android, iPhone, Windows Mobile, desktop PC, consumer electronics, car entertainment, etc.
  • WRT - web runtime - a cool feature that allows users to write applications in HTML, JS and CS. You build the app like a normal web page, and you interact with the phone platform/hardware using the WRT bridge.
    No need to learn any other technology. Just HTML, JS and CS. Very important: JS can call native code, but also the other way around. It seems you can call WRT JS with native code.
  • Supports widgets.
  • Supports Adobe Flash Lite.

Thanks,
Parag

Friday 29 July 2011

How to get back your Hacked GMail, Orkut, Google Account



            




This is my official reply to all mails/comments/scraps asking me how to get back hacked Gmail/Orkut/Google Account. Everyone should read this no matter how safe you think you are
As Google Account is a single account used across all Googles services like Gmail, Google+, Orkut, Blogger, Adsense, Checkout. etc, it can turn out to be our worst nightmare if it gets hacked!


Like many other online services Google tries to protect your account with secret question as well as optional secondary email address. But there is one more official option which only Google Provides!

Now lets go step-by-step…

1) Note Down the Verification Code
Whenever any account is registered with GOOGLE, it gives some confirmation messages and provide you a verification ID. Note down that verification id . If you are having that, recovering your account is just easy as burning a match stick.

2) Trying "Forget Password" option
 I know this will not work in most cases, as options like forget password rely on secondary email address and security question, both of which can be easily changed once a account gets hacked. Still you should try atleast once as most password gets hacked by script kiddies and not by real hackers.
So go to Forget Password form first!

3) What if "Forget Password" option FAILS
 You can submit a form to Google in which you can provide details about your Google Account usage.
Details include information which most likely only real owner can provide. Here are few things for example…
  • Last successful login date
  • Account creation date
  • Google products you used with this account and the date you started using each one
  • Details about Orkut account (if you use Orkut)
  • Details about Blogger account (if you use Blogger)
Now most important part is what they quoted on the form,
“Please answer each question as thoroughly and accurately as possible. If you’re not certain about some of the information, provide your closest estimate. Whether or not we can return your account depends on the strength and accuracy of your responses.”

So I will suggest following things…
  • Your goal should be to give Google maximum & accurate data! So take your time and submit form with maximum amount of information possible. You can consult your trusted friends if you are not sure. As an example it could be Sam or Bob who invited you on orkut. If you are not sure call them up and ask it!
  • Submit only one form! Yes this should be common sense. Do not submit multiple forms. A person who uses around 10-15 Google products asked me if he can submit multiple forms mentioning different Google products.
  • Submit form from the place which you use most often to access your account like PC at home! Although they haven’t mentioned this explicitly, line above submit button says, “Please note that we need your IP address in order to resolve this issue. Your IP address will be captured automatically when you submit this form.”
Finally Contact Form is here!!!

I advise everyone to have a look at this form and information it asks. You can prepare a document about secret info, may be in cell phone or pen down it on a paper. This will come handy if something goes wrong in future! 
I guess I have offered my best possible help on the issue. It may or may not work but thats all I can do.
If you don’t remember any detail required in the form or you just don’t get any reply from Google after submitting the form, please create a new account. There is no other option. Sorry.


Thanks,
Parag