WELCOME

for any suggestion's please mail to this id:

nanduriraja537@gmail.com,raja.mic539@gmail.com

Thursday, March 31, 2011

Create your own Virus using V-Maker | virus making tools free download



Create your own Virus using V-Maker
Virus Making tools


Every one wants to create a virus but virus creation is not a child's play. It needs a good skill in programming and knowledge about system resources. Today i am going to post about a virus creating tool. This tool is Virus Matic 2010 or in short V-Maker. You don't need to know any thing. Only select the option you want and it will create a virus for you.

Main Feature of V-Maker

You can create your own prank files/viruses with ease by V-Maker.
  1. Disable Mouse and Keyboard
  2. Disable Regedit
  3. Delete System32
  4. Block Site
  5. Disable Task Manager
  6. Take Screen Shot Of Victim PC
  7. Message Box (When User Click on Virus)
  8. Automatically Download Start (When User click on virus download start automatic)
  9. USB Spread
Download Here:

How to Analysis you website for search engine optimization


  1. If Web page has a "0" Google™ PageRank™. PageRank™ denotes a Website's importance in the eyes of Google™.
  2. Fact: If you are not on the first page of search results, over 60% of Internet users will not find you!
  3. If Title Tag contains too many characters for what we consider a "robot friendly" Web page. The maximum number of characters we recommend for this Tag is 60.
  4. Fact: Alll major search engines including Google, Yahoo!, Scrub The Web, MSN Bing and others utilize Meta Tags! Don't take our word for it
  5. If Meta Description Tag contains too many characters for what we consider a "robot friendly" Web page. The maximum number of characters we recommend for this Tag is 150.
  6. Fact: Having search engine friendly Title and Meta Tags is the most basic step toward search engine optimization (SEO)
  7. For The Meta Keywords Tag. Our recommended maximum number of characters for this tag is 874. Although we would never recommend you use this entire allowance because you may then suffer from keyword saturation.
Myth: "Nobody needs search engine optimization."

Truth: More than 80% of Internet users use search engines to find what they are looking for. Therefore any Website wanting new visitors needs search engine optimization.

Myth: "Submitting to search engines means everyone on the Internet will find you."

Truth: People are not going to find you in search engines just because you submitted to them. If you truly want to capture your fair share and more of search engine traffic, you must optimize your Web pages. SEO plays an important role in your ability to succeed on the Internet.

Just Started a Blog? Want More Blog Traffic! Submit Your New Blog Here For Free


When your blog is new the only thing you want is traffic and the most easy, simple, best and successful methods are here mentioned below:
  • Leave a comment at the bottom of this post with your blog’s URL and describe your blog in a short paragraph.
  • Subscribe to my RSS feed (In return, I will help you to boost your traffic).
  • Subscribe to the other blogs’ RSS feeds.
  • Make sure you subscribe to the comments so that you get alerted on every new comment.
  • Do not post as Anonymous user, it will be considered as SPAMMING.
  • Every time a new comment is added, go and visit that blog! Do for others as you would have them do for you.
  • Stumble few posts from your blog.
  • Digg few posts from your blog.
  • Delicious few posts from your blog.
  • Write a post on your own blog about the new blogs you have found and link to them.
  • Write a post on your own blog, link to this post so others can participate and write about the new blogs you have found. Link to them.
Your Participation is must for this to Succeed

If you just submit your link and that all ... then et me clear you that nothing gonna happen.

Spend time visiting the other blogs, commenting and subscribing to their feeds. You will also get some traffic from my readers who have already been blogging for a while.

The more you give, the more you get.

I’d like to encourage my regular readers to spread the link to this post around: This is one of those the-more-the-merrier kinds of things. So please Share this post on Facebook, twitter, myspace, stumble, and bookmark at Delicious

NOTE: My comments are moderated. The following will be deleted or marked as spam
  • Automated blogs or splogs
  • Adult content blogs
  • Content about illegal activities
  • Hate speech
  • Anything that seems suspicious to me
Do you have a website and want to earn money from it. Its so simple and you can earn upto 100$ per month: Want to know more ?? CLICK HERE

IDEA TAKEN FROM: http://remarkablogger.com

Tuesday, March 29, 2011

Brilliant Minds At Work

Brilliant Minds At Work

This brilliant idea is brought to us by a design student in Kingston University, who has created a special door that provides shelter in the event of an earthquake.
The door’s system allows it to fold in half, creating a roof under which we are protected from possible detachments. The door’s frame also holds a small survival kit: a flashlight, drinking water and medicine that could help us survive if we were trapped by the earthquake.
A good idea that can save lives.

A machine that lays down streets. Incredible but true.

Brilliant Minds At Work

Brilliant Minds At Work

Here is a truly surprising idea: a machine that, literally, lays down streets. It’s name is Tiger Stone and, with the help of only a couple of workers, it can build 400 meters of streets in one day.
A Dutch company called Vanku BV is responsible for this original idea, that builds streets as if it were sowing rugs made of bricks or slabs, which are introduced in one end of the machine, and come out of the other ready to become pavement.

The milk carton that changes color before expiring

Brilliant Minds At Work

What a great idea designer Ko Yang has had with this milk carton that changes color telling us how fresh the milk is. The carton begins being white in color, and as the expiry date moves closer, it begins changing color to tell us we should drink the milk before it’s too late.
A brilliant way to help us consume our food without wasting any, something to which other ideators have already given some thought:
(31999) Expiry date for products that have been opened
(2255) Visual warning for expiry of food products

Underwater diving without getting wet

Brilliant Minds At Work

Brilliant Minds At Work

Sometimes ideas allow us to imagine fantastic things, and this concept is like that. Its name is Beriscope and it allows us to dive without getting in the water.
Who knows if designer Jaewon Choi’s dislike for cold water made him come up with this idea, but the fact is Beriscope saves us from experiencing those small inconveniences related to underwater diving or snorkeling. It also brings the marvels of the seabed to people who would otherwise have no access to them, be they elderly people, small children, or disabled people who cannot dive.
It has a camera at the end of a long cable that is thrown into the water as if fishing, once the camera is inside the water, all that is left is to enjoy all that is hidden in the bottom of the sea.
Via YankoDesing

A cellphone that runs on Coca-Cola. Incredible!

Brilliant Minds At Work

Brilliant Minds At Work

Designer Daizi Zheng brings us an interesting concept: a Nokia phone that runs on Coca-Cola. Yes, you read right. It may sound incredible, but it seems this eco-friendly cellphone model really works.
The designer has called it Nokia‘green’phone and it works generating electricity through carbohydrates such as the sugar contained in this and other similar drinks. It does not pollute because the end-product of the process is water and oxygen. And to top it all off, Daizi herself assures us that this completely biodegradable battery can last up to 3 and 4 times the normal life of lithium batteries.
We’ll just have to find out.

A new, thief-proof chair

Brilliant Minds At Work

We’ve already mentioned, on other occasions, a couple of similar ideas that have sprung up in our Community: My Bedside Chair and idea (7813) Purse/Handbag Holder in Restaurants.
Chairs for restaurants and other establishments that can hold a purse, bags, or any other personal belonging, keeping it away from bag-snatchers that are ready to take advantage of any distraction.
This new chair’s name is Stop Thief Chair and is marketed by Danish furniture manufacturer Dan-Form since September. They can be purchased through their official website, in 12 different colors, for 38£.
The idea is really just a slight variation made to the seat, that allows us to place any bag or purse under our legs, but I would definitely love to see them at the cafés I go to.

Take a seat wherever you like with this portable seat

Brilliant Minds At Work

What a great idea it would be to always have a seat at hand to sit down and rest, something light and easy to carry. That’s just what Dolmen is, this clever seat made of cardboard, which -as always- comes from Japan.
It weighs only 360 grams and folds so that it can be carried in a purse or briefcase. Whenever you feel like sitting down and taking a breather, all you need to do is unfold it. For the time being, we can unfortunately only buy it in Japan, for the equivalent of approximately 7.50€, in 4 different colors.
Until it’s available elsewhere, we’ll just have to sit down and wait.

Shave anywhere, whenever you like

Brilliant Minds At Work

Brilliant Minds At Work

Brilliant Minds At Work

Small, light and simple. This is the perfect razor concept for today’s hectic, dynamic life. With this razor you can finally shave anywhere you like.
Its name is Carzor and is designed by Kuo Chia Hung. It is a portable razor, the size of a credit card, making it perfect for carrying in a wallet. It comes with two spare blades and, best of all, it includes a small mirror, so that you can shave at any time. It also includes a small filament that gives off scents such as mint, lemon, sandal, ocean or orange to avoid irritation and give some aroma.
We saw it in Yanko Design

The suitcase that becomes a scooter. Forget running around the airport.

Brilliant Minds At Work

Brilliant Minds At Work

Do you travel frequently and hate having to run down never-ending corridors and terminals? Well, the people at Samsonite have joined forces with Micro Mobility to design this brilliant suitcase called Samsonite X Micro Mobility Trolley Scooter.
It is a suitcase that transforms into an useful and amusing scooter. It takes advantage of the suitcase’s two wheels, and the handgrip becomes a handlebar.
This is the end of having to run to catch your flight.

The 25-dollar incubator

Brilliant Minds At Work

Brilliant Minds At Work

A group of scientists at Embrace have created a baby incubator that costs only 25$ and is specifically intended for use in developing countries, where close to 20 million low birth rate and premature babies are born every year.
A traditional incubator we might find in any hospital costs over 20,000$, which is far too expensive for a developing economy.
Embrace has the appearance of a sleeping bag and is activated with boiling water, it requires no electricity and is covered with a special material that regulates temperature.
It can work for approximately four hours, after which it must be reheated. It can even be sterilized and reused.
You will find all the information in the official website.

The brilliant idea of the 3-D plug

Brilliant Minds At Work

Brilliant Minds At Work

Now this is real genius! Stop for a moment and count how many power strips you have at home. They’re always in the way, are not at all aesthetic, and more often than not, they don’t have enough space for plugs because adaptors are too big for them.
This original and, above all, functional design known as Rozektus 3D is the solution to all these problems. Rozektus’ 3D design transforms one plug into five, each on one of the Rozektus’ faces so that none of the plugs is in the way of others. The concept for this cube-shaped socket was developed by Russian art collective Lebedev Studio.
And, best of all, if you only need one socket, it can simply be pushed inside the wall and out of the way.
>From what I’ve managed to find out, it is now available around Europe. Genius!

Stop smoking with the E-cigarette

Brilliant Minds At Work

The electronic cigarette is driven by modern micro-electronic technology, and is not flammable. It consists of a small rechargeable battery and one only safe and replaceable cartridge containing water, propylene, glycol, nicotine, and tobacco aroma. None of these ingredients are considered cancer-causing agents.
When inhaling the cigarette, the air flux is detected by a sensor and a microprocessor activates an atomizer which, in turn, injects minute doses of the liquid compound into the air inhaled, producing a kind of vapor that simulates the effect of a real cigarette.
The electronic cigarette is an alternative to traditional cigarettes. Smokers will be able to smoke anywhere, in a way that is more advanced and will not disturb other non-smokers. A fine discovery made by vanguard evaporation micro-technology, that works with a simple rechargeable battery.
Rocío Bravo From Ideas4all

A good idea to help people with limited mobility

Brilliant Minds At Work

What you see in this photograph is called Slip Grips. It was designed by Stanton Burns, student of Auburn University (U.S.), and helps people with mobility problems in their everyday activities.
Slip Grips allows these persons to carry out simple actions such as write, hold tools and many more movements that can sometimes become an obstacle. This idea will help them become a little more independent.
Although it has not yet been marketed, we will surely see it in stores in very little time.
Maria Maza from ideas4all

Pin anything down without ruining it: Magnetic Push Pins

Brilliant Minds At Work

They’re called Magnetic Push Pins and I think they’re a brilliant idea that will save many of us from having to push holes into all those important documents or photos we hang from cork boards and somehow need to keep within view.
This invention is based on the simple concept of placing a magnet on a thumbtack. This allows you to pin it anywhere you like, using the magnet to hold whatever you pin, without ruining it.

Pajamas that can tell if your baby has a fever

Brilliant Minds At Work

This idea will make life easier for all parents who, sometimes, simply don’t understand why their baby is crying, as well as help employees at hospitals and kindergartens at their jobs.
These baby’s pajamas called Babyglow, designed by Chris Ebejer, show us if our baby has a fever, by changing color when our child’s temperature is higher than 37ºC. Parents will instantly realize what is wrong with their baby, and remedy the situation before it worsens.
It comes in various colors, but turns white if the child’s body temperature becomes higher than normal. The good news is that it is not just a good idea, but is already being sold in the United Kingdom for 20 Euros.

Bergmönch, a bike in your rucksack

Brilliant Minds At Work

When talking about the idea we are going to present you, maybe we should talk about a bike transforming into a rucksack.
In the last years it is very common to come across with novel and original bike designs, and even with contests trying to find the definite bike. All these designs use to share one common point: what is looked for is an urban bike.
It is true that bike are the most sustainable transport system known (unless you consider walking to be a transport system); for this reasons, bikes are more than necessary, and all ideas helping to alleviate the problems a bikers encounters in the big city are welcome, like how to park one´s vehicle.

Saturday, March 26, 2011

Facebook Mafia War guide for new players : Quick start


When you log in for the very first time, there is a little spiel to get you excited, a picture of your first property, Uncle Louies Deli and a bar with your initial stats.

Cash

Every hour your properties will pay out and any items you have with maintenance costs will deduct from your earnings. On the Properties tab which you will see later you can always see how much you are making and how much it is costing you.

Health

This is a fairly meaningless stat and it is the only naturally replenishing stat that the mafia game will not show you a timer on. It is critical in boss fights. Other than that, it just sets the amount of times you get attacked when a hit is put out on you and how many fights you can engage in before healing.

Energy

This is the principal source of your earned income and a large chunk of your XP. It will come back 1 point every 5 minutes unless you are a maniac character in which case you get 2 points. Jobs and items should be your initial focus once you get in to the game.

Stamina

This also regenerates at one point every 5 minutes. Stamina is used to try to attack other players, rob other players, cash in on a hit on another player, sucker punching, and placing hits on other players.

Do Something About It!

The mafia game will walk you through a simple series of examples of what the game contains once you are completely free to make your own choices. The first job is exactly what most will be about - You spend X energy for Y experience, some amount of money, and with some jobs, a small chance at special loot. And congratulations! Next you make your first attack and then buy your first property and the first real decision comes in to play.

Choosing your Character type

You can change your name later, but there is a fairly hefty cost, so think about how you would like your Mafioso name to be. "Don" plus your last name works well and the game supports multiple people with the same name. Default Don is the most common name out there followed by all the characters from the Mafia Godfather. The more unique and memorable your name, the easier it is for friends to find you. As for character type, here is a break down on what the choice entails.

Mogul

As a Mogul your cash flow comes every 54 minutes rather than every hour for the other character types. As a Mogul you are also the only character type eligible for being a Bagman. As a Bagman in one of your friends Top Mafia, you have the change to get double money from performing jobs.

Maniac

As a Maniac, you regenerates at a rate of 1 every 3 minutes instead of 5. You also become eligible to be a Button Man which gives you a chance to automatically win any fight you initiate. General consensus on the web before the Top Mafia changes was this was the best type to choose since energy makes you level faster.

Fearless

As a Fearless character your health regenerates at a faster rate. You also have the ability to be a Top Mafia Wheel Man which has the best special ability. Whenever you perform a job, there is a small chance that job costs no energy.

Your initial Skill Points

After you make your decision, you get your first skill points to spend. It is highly recommended you just upgrade your Energy till at least 30 before touching the other stats. Once you have levelled a few times put the points on your Defence. The defence is the most important allocation of points that you can have. So focus on defense more than anything. Only higher level players should concentrate on spreading points.

Starting over or... not

Unfortunately, the game currently does not really support anyway for starting over. If you are unhappy with your initial choices, you have to delete the application, wait 60 days for it to time out, and then log in again to get a clean start in the Mafia world. If you do wish to delete the app and wait 60 days, in the lower left hand corner of any Facebook page you should see a button labelled Applications. Click on it to open the menu and near the top of the menu you should see Edit. Choose this and then click on the x next to Mafia Wars to remove it as one of your applications.

SOURCE: CLICK HERE

---

Hints, Tips & Tricks for Facebook Mafia War


Choose a Character

For those that have never played Zynga Facebook Mafia Wars the best character you can choose to be is "maniac"

Grow the Family

The important thing to remember is when you grow your mafia family the only reason why you should keep growing in mafia size is to get more of the Limited Edition Loot and Mafia Mikes. Once you are over 501 members they DO NOT HELP YOU IN A FIGHT.

Only equip with weapons to 501 and no more because they wont do any good.
In Mafia Wars, players form mob families by inviting other Facebook members to join. The more family members a mob has, the stronger they are. The first and ultimately most important key to advancing is to keep the mafia family growing. This can be done in a couple of ways:

* Players invite all of their friends to join

* Link to other players on one of the many add me pages in FB, thousand of players network on these pages

* Reciprocate when players join their mob family, Mafia War players can be members of more than one mob.

* One of the best ways to add literally hundreds of players with just the click of a few buttons is to join an email mass add. This list has been consolidated from over 20 of the largest Mafia Wars Groups and Fan Pages on Facebook. You can find one Click Here!

Profile Points

One of the best strategies to a Mafia Wars player is the careful use of profile points! The best way to allocate points is when you first start the game put them on Energy but only until you have a reasonable amount of energy to do some jobs!

Once you have levelled a few times put the points on your Defence. The defence is the most important allocation of points that you can have. So focus on defense more than anything. Once your defence is quite high you will notice that when people attack you will win most fights and win experience points helping you level faster.

Only higher level players should concentrate on spreading points on attack, health, energy and stamina

Godfather Points

Players often asked what is the best way to use Godfather Reward Points. Are the crates worth it? Is the "Limited Edition" Godfather loot worth it?

While it may be tempting to crack open that unknown crate of loot, we believe that there are really two ways that you should spend your hard earned Godfather Reward Points (or bought if you like completing offers or paying to play).

* Energy Refill: This is the best value at only 10 points. Used at a good time, you can probably level, which in turn would give you 5 profile points to use.

* 4 skill (upgrade) points: For 14 reward points you can obtain 4 additional points to spend to increase the stats on your profile. This is still a better option than purchasing the loot from the crates. Skill points have a MUCH LARGER outcome on the results of combat than loot does (and if you wanted, you could use them for more energy / stamina ... loot does nothing to help you level faster).

* Name Change: I am going to mention this only because it is a viable way to spend your points. Sometimes if joining a clan / group you might have a need to change your name.

Remember Winning/Losing Fights ... Level makes NO difference, Equipment makes little difference but the correct use of points does.

It is quite easy to gain 80+ experience an hour from doing absolutely nothing. If you have a large mafia that likes to fight it can be done. Whenever someone in your Mafia fights and you assist them as their Capo, you earn XP instantly. This is also referred to as "Social Fight Rewards".

If you have notifications enabled for Mafia Wars, you might see the "Click here to claim your reward". Which in turn will reward you with reward points.

Mafia Wars Boss

Using Boss Fights to maximize your XP gain into next level

Ideal Criteria Prior to Leveling

* Use all of your stamina.

* Use all of your energy with enough energy to do a job that provides maximum experience into the next level.

* Don't have any extra energy (this doesnt carry over).

Do Boss Fights Give Anything Special?

The short answer is no but you get a "trophy" on your Mafia Wars profile page that only you can see. Currently there is nothing special given or any reason for doing them.

Now simply do a boss level prior to levelling to maximize experience points

SOURCE: CLICK HERE

Complete information for Moscow Mafia Wars


If you want to add a Moscow Mafia Wars Items to your wishlist but dont own it then just simply copy and paste from one of the links below! please make sure you have enough space on your wishlist.

Prison Tattoos
================

Rose Tattoo
http://apps.facebook.com/inthemafia/remote/html_server.php?xw_controller=collection&xw_action=wishlist_add&xw_city=3&selected_city=3&gift_category=1&gift_id=3001

Church Tattoo
http://apps.facebook.com/inthemafia/remote/html_server.php?xw_controller=collection&xw_action=wishlist_add&xw_city=3&selected_city=3&gift_category=1&gift_id=3002

Star Tattoo
http://apps.facebook.com/inthemafia/remote/html_server.php?xw_controller=collection&xw_action=wishlist_add&xw_city=3&selected_city=3&gift_category=1&gift_id=3003

Spider Tattoo
http://apps.facebook.com/inthemafia/remote/html_server.php?xw_controller=collection&xw_action=wishlist_add&xw_city=3&selected_city=3&gift_category=1&gift_id=3004

Tiger Tattoo
http://apps.facebook.com/inthemafia/remote/html_server.php?xw_controller=collection&xw_action=wishlist_add&xw_city=3&selected_city=3&gift_category=1&gift_id=3005

Skull Tattoo
http://apps.facebook.com/inthemafia/remote/html_server.php?xw_controller=collection&xw_action=wishlist_add&xw_city=3&selected_city=3&gift_category=1&gift_id=3006

Crucifix Tattoo
http://apps.facebook.com/inthemafia/remote/html_server.php?xw_controller=collection&xw_action=wishlist_add&xw_city=3&selected_city=3&gift_category=1&gift_id=3007

Matryoshka Dolls
===================
Natalya's Doll
http://apps.facebook.com/inthemafia/remote/html_server.php?xw_controller=collection&xw_action=wishlist_add&xw_city=3&selected_city=3&gift_category=1&gift_id=3008

Olga's Doll
http://apps.facebook.com/inthemafia/remote/html_server.php?xw_controller=collection&xw_action=wishlist_add&xw_city=3&selected_city=3&gift_category=1&gift_id=3009

Oksana's Doll
http://apps.facebook.com/inthemafia/remote/html_server.php?xw_controller=collection&xw_action=wishlist_add&xw_city=3&selected_city=3&gift_category=1&gift_id=3010

Svetlana's Doll
http://apps.facebook.com/inthemafia/remote/html_server.php?xw_controller=collection&xw_action=wishlist_add&xw_city=3&selected_city=3&gift_category=1&gift_id=3011

Tatyana's Doll
http://apps.facebook.com/inthemafia/remote/html_server.php?xw_controller=collection&xw_action=wishlist_add&xw_city=3&selected_city=3&gift_category=1&gift_id=3012

Anastasiya's Doll
http://apps.facebook.com/inthemafia/remote/html_server.php?xw_controller=collection&xw_action=wishlist_add&xw_city=3&selected_city=3&gift_category=1&gift_id=3013

Ekaterina's Doll
http://apps.facebook.com/inthemafia/remote/html_server.php?xw_controller=collection&xw_action=wishlist_add&xw_city=3&selected_city=3&gift_category=1&gift_id=3014


PNV
http://apps.facebook.com/inthemafia/remote/html_server.php?xw_controller=collection&xw_action=wishlist_add&xw_city=3&selected_city=3&gift_category=1&gift_id=1005

MOLOTOK PISTOL
http://apps.facebook.com/inthemafia/remote/html_server.php?xw_controller=collection&xw_action=wishlist_add&xw_city=3&selected_city=3&gift_category=1&gift_id=1000

RU-7 .45 PISTOL
http://apps.facebook.com/inthemafia/remote/html_server.php?xw_controller=collection&xw_action=wishlist_add&xw_city=3&selected_city=3&gift_category=1&gift_id=1001

BALLISTIC KNIFE
http://apps.facebook.com/inthemafia/remote/html_server.php?xw_controller=collection&xw_action=wishlist_add&xw_city=3&selected_city=3&gift_category=1&gift_id=1002

CHEREPAKHA COMPACT
http://apps.facebook.com/inthemafia/remote/html_server.php?xw_controller=collection&xw_action=wishlist_add&xw_city=3&selected_city=3&gift_category=1&gift_id=1007

SEVERNNY OLEN SNOWBIKE
http://apps.facebook.com/inthemafia/remote/html_server.php?xw_controller=collection&xw_action=wishlist_add&xw_city=3&selected_city=3&gift_category=1&gift_id=1008

INTEL ON DIMITRI
http://apps.facebook.com/inthemafia/remote/html_server.php?xw_controller=collection&xw_action=wishlist_add&xw_city=3&selected_city=3&gift_category=1&gift_id=1010

PHOTOS OF KARPOV
http://apps.facebook.com/inthemafia/remote/html_server.php?xw_controller=collection&xw_action=wishlist_add&xw_city=3&selected_city=3&gift_category=1&gift_id=1011

Razoritel Grenade Launcher
http://apps.facebook.com/inthemafia/remote/html_server.php?xw_controller=collection&xw_action=wishlist_add&xw_city=3&selected_city=3&gift_category=1&gift_id=1022

Orel Armored Helicopter
http://apps.facebook.com/inthemafia/remote/html_server.php?xw_controller=collection&xw_action=wishlist_add&xw_city=3&selected_city=3&gift_category=1&gift_id=1021

Shturmovik
http://apps.facebook.com/inthemafia/remote/html_server.php?xw_controller=collection&xw_action=wishlist_add&xw_city=3&selected_city=3&gift_category=1&gift_id=1020

Ru-78 Heavy Machine Gun
http://apps.facebook.com/inthemafia/remote/html_server.php?xw_controller=collection&xw_action=wishlist_add&xw_city=3&selected_city=3&gift_category=1&gift_id=1019

Officer Corps Paycheck
http://apps.facebook.com/inthemafia/remote/html_server.php?xw_controller=collection&xw_action=wishlist_add&xw_city=3&selected_city=3&gift_category=1&gift_id=1018


Shchuka Speed Boat
http://apps.facebook.com/inthemafia/remote/html_server.php?xw_controller=collection&xw_action=wishlist_add&xw_city=3&selected_city=3&gift_category=1&gift_id=1017

Volk Luxury Sedan
http://apps.facebook.com/inthemafia/remote/html_server.php?xw_controller=collection&xw_action=wishlist_add&xw_city=3&selected_city=3&gift_category=1&gift_id=1016

Armored Briefcase
http://apps.facebook.com/inthemafia/remote/html_server.php?xw_controller=collection&xw_action=wishlist_add&xw_city=3&selected_city=3&gift_category=1&gift_id=1014


Taiga Combat Shotgun
http://apps.facebook.com/inthemafia/remote/html_server.php?xw_controller=collection&xw_action=wishlist_add&xw_city=3&selected_city=3&gift_category=1&gift_id=1013


Bank Guard Uniform
http://apps.facebook.com/inthemafia/remote/html_server.php?xw_controller=collection&xw_action=wishlist_add&xw_city=3&selected_city=3&gift_category=1&gift_id=1012

How to Hack Website | How to Hack Web Server | Step by Step Hacking Video Tutorial | Hack Using NESSUS & METASPLOIT | Step by Step User Guide


In Depth Security Assessment With a Full Report Detailing Vulnerabilities Discovered Using NESSUS & OpenVas: Learn how to Hack a Website & Webserver


Yesterday I have posted an article regarding how to hack an password. That post was for kidies who take hacking as a fun. Now today this post is for advance readers. Here I am going to share some real hacking techniques using which one can hack any server or website. This post is for educational purpose only.

NOTE: No scans will be initiated against any systems/server until the outline of the system/server owner assessment plan is confirmed as acceptable to owner.

Tools Used during penetration testing are freely available on internet:
  1. NESSUS
  2. OpenVAS Server
  3. OpenVAS Client
  4. Nmap
  5. Nikto
  6. SQLix download here or here
  7. SQLMap
  8. Metasploit
Steps need to be followed to hack a server is as cited below:
  1. Do a manual review of the target system or server to get an overview of the target. This is phase-1 and known as Reconnaissance.
  2. Second step is Service enumeration. Here you have to use Nmap to determine what services are open and available for manual testing. This is phase-2 and known as Scanning. To know how to perform Enumeration and footprinting attack, visit this link.
  3. The third step is Scanning target to find the vulnerabilities. This is also part of phase-2 Scanning. For this you have to use NESSUS or OPEN VAS. These tools will scan all open ports, regardless of common and defaulted settings. This will confirm listening services and check those against a database of exploitable services. To see if you are running any services that are mis-configured or vulnerable to exploits. To know how NESSUS works visit this link. If you want to working of NESSUS...OR How to use NESSUS visit this link. To visit NESSUS video tutorials available on internet visit this link.
  4. You can also use Nikto. It will used to check the web server(s) for mis-configurations and exploitable web applications. To know how Nikto works visit this link.
  5. After all these scanning, play with SQL. Use SQLiX and Sqlmap for this. You can also use few more SQL tools, softwares and techniques. To know these underground SQL tips n tricks visit this link & This Link
  6. The next step is to get access on system using the vulnerabilities found. This is phase-3 known as Gaining Access on remote system. This you can achieve using Metasploit software. To know how to use metasploit, visit this link. Here you will all the available video tutorial for metasploit. A very good to start. Using these videos you can easily learn how to use metasploit. The most up to date video for Metasploit 3 can be found here: Exploring Metasploit 3 and the New and Improved Web Interface – Part 1 & Exploring Metasploit 3 and the New and Improved Web Interface – Part 2. A good flash tutorial that shows you step by step how to use it: Metasploit at Iron Geek. There’s a presentation by HD Moore himself at Cansecwest 2006: csw06-moore.pdf And a couple of videos spawned from that here: Computer defense – TASK Presentation
  7. The next step is to maintain you access on the compromised system. This is phase-4 and known as Maintaining Access.
  8. THIS IS THE MOST IMPORTANT STEP AND THE LAST PHASE. This is phase-5 known as Covering Tracks. After you activities, you must remove all your track records....;) othet wise you know...IT act is very strong.
This tutorial is designed to provide you with recommendations for securing your server against the majority of attackers. Below are some sample reports showing Nessus and OpenVas. It is recommended that always run multiple scanning tools. Never rely on a single automated scanning. Automated scanners miss a lot and are prone to false positives.

Sample Report
Sample Report

Sample Report
Sample Report

Sample Report
Sample Report

Sample Report
Sample Report

Sample Report
Sample Report

Please report any problem OR broken link to us on amarjit@freehacking.net. You can also leave a comment here.

How to Identify CGI Vulnerabilities using TCS CGI Scanner


The TCS Common Gateway Interface (CGI) Scanner application is designed to find targets that have vulnerable CGI Script errors. These errors are normally due to systems that have not been patched or updated.
Click to highlight the default target of htpp://www.tpp.ru and click on the at the top left of the application to delete the current target.

On the gray bar along the top left of the application, enter the IP address or hostname of the target and click on the gray-colored arrow to insert the new target. Repeat this process for multiple targets. The TCS CGI Scanner is now ready to scan the target.
In this example, each script run against the target is displayed with the result to the right. The ones of interest are any with a 200 as this indicates a successful attempt.
To execute, right-click on a script and left-click on Copy String. Open Internet Explorer and paste the line in the address bar. Press the Enter key. The directory listing of the target’s C: drive will appear.

The line that should be in the address bar is:

http://172.16.1.40/scripts/..%c0%af../winnt/system32/cmd.exe?/c+dir+c:\

To list the contents of the Program Files directory, edit the address bar to

http://172.16.1.40/_vti_bin/..%c0%af../..%c0%af../..%c0%af../winnt/system32/cmd.exe?/c+dir+c:\progra~1

Create directory command within the script:

http://172.16.1.40/_vti_bin/..%c0%af../..%c0%af../..%c0%af../winnt/system32/cmd.exe?/c+md+c:\beenhacked

Notice that the beenhacked directory is now created in the root of the C: drive on the target.
The gray bar along the top right of the application allows you to enter custom scripts for the application to check against the target. If you wanted to check the Program Files directory or create a beenhacked directory on each target it is capable of compromising, you could enter these scripts here and click the downward-pointing arrow to enter the script into the application. Repeat this process for multiple targets.

If you like this post and want us to post similar articles, Pls give us a feedback and leave a comment here.

The Best Penetration Testing and Vulnerability Exploitation Tool: Metasploit Framework


Metasploit took the security world by storm when it was released in 2004. No other new tool even broke into the top 15 of this list, yet Metasploit comes in at #5, ahead of many well-loved tools that have been developed for more than a decade. It is an advanced open-source platform for developing, testing, and using exploit code. The extensible model through which payloads, encoders, no-op generators, and exploits can be integrated has made it possible to use the Metasploit Framework as an outlet for cutting-edge exploitation research. It ships with hundreds of exploits, as you can see in their online exploit building demo. This makes writing your own exploits easier, and it certainly beats scouring the darkest corners of the Internet for illicit shellcode of dubious quality. Similar professional exploitation tools, such as Core Impact and Canvas already existed for wealthy users on all sides of the ethical spectrum. Metasploit simply brought this capability to the masses.

Metasploit provides useful information and tools for penetration testers, security researchers, and IDS signature developers. This project was created to provide information on exploit techniques and to create a functional knowledge base for exploit developers and security professionals. This tool is provided for legal security research and testing purposes only. Metasploit is an open source project managed by Rapid7.

To download Metasploit Framework 3.3.3 CLICK HERE

Version 3.3.3 is the latest stable release of the Metasploit penetration testing framework and the recommended starting point for new users. Using the online update system, this version can be synchronized with the development tree to obtain the latest exploits and payloads. Please see the Release Notes for more information about this version.

Simple security audit & Penetration test tool HackBar 1.4.2 download for free: Its Add-ons for Firefox


Version 1.4.2
Works with Firefox: 1.5 – 3.6.*
Updated May 13, 2009
Developer Johan Adriaans
Rating Rated 5 out of 5 stars

# In general
This toolbar will help you in testing sql injections, XSS holes and site security. It is NOT a tool for executing standard exploits and it will NOT teach you how to hack a site. Its main purpose is to help a developer do security audits on his code. If you know what your doing, this toolbar will help you do it faster. If you want to learn to find security holes, you can also use this toolbar, but you will probably also need a book, and a lot of google :)

# The advantages are:
- Even the most complicated urls will be readable
- The focus will stay on the textarea, so after executing the url (ctrl+enter) you can just go on typing / testing
- The url in textarea is not affected by redirects.
- I tend to use it as a notepad :)
- Useful tools like on the fly uu/url decoding etc.
- All functions work on the currently selected text.


# Load url ( alt a )
This loads the url of the current page into the textarea.

# Split url ( alt s )
When this button is clicked, the url/text in the textarea will be split into multiple lines using the ? and & character

# Execute ( alt x, ctrl enter )
This will execute the current url in the textarea, i mostly use ctrl+enter

# INT -1 ( alt - )
First select a number in the textarea and press this button, the number will be lowered by 1 and the url will be loaded.

# INT +1 ( alt + )
Again first select a number in the textarea and press this button, 1 will be added to the number and the url will be loaded.

# HEX -1 ( control alt - )
First select a number in the textarea and press this button, the number will be lowered by 1 and the url will be loaded.

# HEX +1 ( control alt + )
Again first select a number in the textarea and press this button, 1 will be added to the number and the url will be loaded.

# MD5 Hash ( alt m )
this is a standard hashing method, often used as an encryption method for passwords. It will MD5 hash the currently selected string.

# SHA-1/256
this is a standard hashing method, often used as an encryption method for passwords. It will SHA-1/256 hash the currently selected string.

# MySQL CHAR() ( alt y )
If quotes are escaped but you did find an SQL injection thats exploitable, you can use this button to convert lets say:
load_file('/etc/passwd') --> load_file(CHAR(47, 101, 116, 99, 47, 112, 97, 115, 115, 119, 100))
Thus omiting the use of quotes to load a file.
You can also use this on
WHERE foo LIKE ('%bar%') --> WHERE foo LIKE (CHAR(37, 98, 97, 114, 37))

# MsSQL CHAR() ( alt q )
Same story as MySQL CHAR(), MsSQL has a slightly different CHAR syntax
--> WHERE foo LIKE ( CHAR(37) + CHAR(98) + CHAR(97) + CHAR(114) + CHAR(37))

# Base64 encode / decode
Base64 encoding ( UU ) is often used to store data (like a return url etc.) This will help you to read those values.

# URLencode / decode
This will encode or decode the currently selected characters to url safe characters. I mostly use it to end a query with # (%23) when in a pseudo path where i cant use /* or --

And lots more ;) Go test it!


Too lazy to say Thanks or comment here? Why not too lazy to read my post?? If you like this post and want us to post similar articles, Pls give us a feedback and leave a comment here.

The best vulnerability scanner software and assessment tool: Nessus


Nessus is a free, easy to use remote security scanner that is a client-server application. The application is hosted on a server (typically a Unix server), where the software can be kept up-to-date. Nessus scans any system, whether it runs Windows, Mac OS or Unix/Linux. A client server application such as nessus makes it possible to keep one easily-updatable software on a server and makes it easily accessible by as many clients as desired. Nessus also "doesn't take anything for granted" (nessus.org). No matter how your server or workstation is set up or what operating system it uses, it will scan for security vulnerabilities. For example, say your typical webserver is serving a site on port 8080 instead of the regular port 80. Nessus will scan all open ports, regardless of common and defaulted settings.

Nessus was a popular free and open source vulnerability scanner until they closed the source code in 2005 and removed the free "registered feed" version in 2008. A limited “Home Feed” is still available, though it is only licensed for home network use. Some people avoid paying by violating the “Home Feed” license, or by avoiding feeds entirely and using just the plugins included with each release. But for most users, the cost has increased from free to $1200/year. Despite this, Nessus is still the best UNIX vulnerability scanner available and among the best to run on Windows. Nessus is constantly updated, with more than 20,000 plugins. Key features include remote and local (authenticated) security checks, a client/server architecture with a GTK graphical interface, and an embedded scripting language for writing your own plugins or understanding the existing ones.
Tenable Network Security provides a suite of solutions that unify real-time vulnerability, event and compliance monitoring into a single, role-based, interface for administrators, auditors and risk managers to evaluate, communicate and report needed information for effective decision making and systems management.

Every audit in Nessus is coded as a plugin: a simple program which checks for a given flaw. There are currently 34060 different plugins used by Nessus, covering local and remote flaws.

For all Nessus Plugins: CLICK HERE

For Demonstration Videos of Nessus: CLICK HERE

For all Nessus documentation: CLICK HERE

To Download Free Nessus 4.2.0: CLICK HERE

Nessus Frequently Asked Questions (FAQ)

Q. What is included in the Nessus download?

A. When you download Nessus, you receive the Nessus 4.2 scanning engine (server) that includes a flash web-based client. To receive updates from Tenable under either a ProfessionalFeed or HomeFeed, you will need to register your scanner with Tenable through Nessus.org.

Q. What OS platforms does Nessus have builds for?

A. Nessus 4.2 is available and supported for a variety of operating systems and platforms:

Red Hat ES 4 (i386) and ES 5 (i386 and x86-64)
Fedora Core 10 (i386 and x86-64) [Compatible with Fedora 9]
Fedora Core 11 (i586 and x86-64)
Fedora Core 12 (i586 and x86-64)
Debian 5 (i386 and x86-64)
FreeBSD 7 (i386 and x86-64)
Ubuntu 8.04 (i386 and x86-64)
Ubuntu 8.10 (i386 and x86-64)
Ubuntu 9.10 (i386 and x86-64)
Mac OS X 10.4/10.5 (i386, x86-64, ppc)
Windows XP, Server 2003, Server 2008, Vista and 7 (i386 and x86-64)
SuSE 9.3 (i386)
SuSE 10.0 (i386 and x86-64)

Q. What does Nessus 4.2 cost?

A. The Nessus 4.2 scanner is available as a free download. To receive updates for new vulnerability checks, select the appropriate plugin Subscription from Tenable depending on the intended use.

Q. Can I use Nessus at work?

A. You must subscribe to the ProfessionalFeed to use Nessus outside of the home

Q. How does the Nessus license work in a VM (virtual machine) environment?

A. Each installation of Nessus requires Tenable's license whether it is stand-alone or in a virtual machine (VM) environment. The same is true for Subscription licensing.

Q. I'm a consultant, can I use Nessus 4.2 to conduct my clients audits?

A. Tenable permits you to use Nessus to audit the security of 3rd party networks but requires that you purchase a ProfessionalFeed Subscription. You must subscribe to the ProfessionalFeed to use it commercially with the latest updates and have access to technical support and knowledgebase articles. A HomeFeed cannot be used for consulting commercially.

A very common scenario for Tenable is to license several ProfessionalFeeds to a service provider who operates an equivalent number of Nessus scanners to check for vulnerabilities on their customers' systems and networks. The ProfessionalFeed license is tied to the Nessus scanner. If the Nessus scanner is mobile (such as on a laptop), then the license is mobile. We do not tie it to an IP address. There is no limitation to the amount of scans completed or IPs scanned. However, the Tenable Plugins are licensed only for use with Registered Nessus scanners obtained directly from www.nessus.org or www.tenablesecurity.com.

Q. I attempted to install Nessus via RPM, but I get an error. Why can't I install Nessus this way?

A. If you downloaded the Nessus RPM to a Windows system and then transferred it to your Unix system, the name of the Nessus RPM file will likely be something similar to Nessus-4[1].2.0-es4.i386.rpm. RPM cannot handle square brackets (i.e., [1]). Rename the file to Nessus-4.2.0-es4.i386.rpm and re-attempt the installation.

Q. How do I run Plugins from the command line and access a knowledge base?

A. You can have the NASL interpreter load the Knowledge Base (KB) for a specific host with the "-k" option. For example, you could test for the First4Internet CodeSupport ActiveX control by running:

$ nasl -k /opt/nessus/var/nessus//kbs/ \

-t codesupport_activex_code_exec.nasl

Note: this requires that you have access to the KB and that the KB has already been populated by any plugin dependencies.

Q. Can I write Custom Plugins for my Nessus Scanner?

A. Tenable Network Security encourages users of the Subscriptions to write and develop new Nessus plugins.

(i) If You feel custom plugins developed by You or Your organization will benefit the Nessus HomeFeed and ProfessionalFeed subscribers, You should consider submitting them to Tenable so that the plugins can be tested and distributed as part of the Subscription. Tenable may accept or reject plugin submissions based on code quality, relevance, performance and other factors. Submitted plugins may include copyright information about the authors, and Tenable will continue to include the copyright information in the plugin. Submitted plugins may not include any licensing terms, usage agreements or distribution clauses that would interfere with Tenable making the plugin available to subscribers to a Subscription, or would limit Tenable's right to modify the plugin if, for example, changes may be useful to improve its accuracy, performance, network impact or other parameters.

(ii) Custom Plugins. You may use the Tenable ".inc" files provided with the Subscription, as well as the built-in NASL functions to write custom plugins for Your internal use and internal redistribution, provided, however, that they may not be privately or publicly distributed, whether for free or for a fee.

(iii) Plugin writers should also be aware that many of the APIs available in the NASL language and various ".inc" libraries, may be used to write custom plugins, but such plugins may only be distributed within Your organization and may not be distributed publicly, whether for free or for a fee. For example, custom plugins that specifically make use of authenticated logins to remote systems via Secure Shell or Windows Domain, that use the libraries included in the Subscriptions or that have previously been distributed with the Registered Feed may not be publicly distributed. To ensure that Your custom plugins do not make use of a library that prohibits public distribution, You should audit them to see which libraries are being invoked and then read each corresponding license.

Q. How do I install my Activation Code?

A. Please view the Nessus Activation Code Installation document for instructions on installing the Activation Code you have received after registering for either the ProfessionalFeed or the HomeFeed.

Penetration Testing Is Sexy, But Mature?




Source from John H. Sawyer. He is a senior security engineer on the IT Security Team at the University of Florida. The views and opinions expressed in this blog are his own and do not represent the views and opinions of the UF IT Security Team or the University of Florida. When John's not fighting flaming, malware-infested machines or performing autopsies on blitzed boxes, he can usually be found hanging with his family, bouncing a baby on one knee and balancing a laptop on the other. Special to Dark Reading.

The buzz generated from Core Security's move to integrate with the Metasploit Framework has left me a little puzzled. Don't get me wrong: I love Metasploit. It's a fantastic tool that has certainly been put through its paces as a pen-testing tool -- it's free, open source, and extremely accessible to aspiring security professionals. And, of course, I've heard great things about Core's flagship product, Impact Pro. But the deal just seems like an odd move.

I've spoken with a few friends about the announcement, and they were equally scratching their heads. We threw around a few ideas about the integration, from it being a simple a publicity stunt for keeping Rapid7 from stealing the limelight, to a legitimate effort at promoting a multitool approach to penetration testing. Since I'm an optimist, I'm sticking with the latter because it holds true to reality for how pen testers actually approach their jobs.

Just like we security pros like to say, "There's no silver bullet for security," the same hold true for pen testing. There isn't a single tool that can really do it all, and that's why companies have to take a multitool approach, as mentioned by HD Moore, Rapid7's CSO and creator of the Metasploit Project. That's why tools like Nmap, Maltego, Fierce, BurpSuite, Metasploit Framework, Impact, and hundreds of others exist. Can you imagine trying to take the functionality of all of those tools and rolling it into one?

BUT, there's a lot of good to be said about interoperability among pen-testing tools (something that's sorely lacking), and that's what Core is adding through its integration with Metasploit. For example, if a system is compromised via an exploit in Metasploit, then a Core Impact Agent can be deployed and managed via the Impact interface. Information gained from using Metasploit's db_autopwn can be brought back into the Core interface, which makes it more accessible for newer pen testers not familiar with Metasploit's msfconsole.

In other words, the data from db_autopwn is now in a pretty GUI instead of a SQLite database accessed using commands like db_host, db_vulns, and db_services within the non-GUI msfconsole.

OK, back to my original question. We all know penetration testing is sexy, right? Seriously, how many of us got into the infosec industry because we thought hacking stuff was cool? Yeah, I know...probably more than would care to admit. And what is penetration testing? That's right. It's hacking stuff -- people, computers, whatever.

But is the pen-testing software market maturing? I guess that depends if you include free, open-source projects like the Metasploit Framework. It's the only pen-testing software that's making huge headlines because of its recent purchase by Rapid7 and integration into a commercial product by Core. Yeah, I'd say it's maturing, and more companies are realizing the value of comprehensive penetration tests, but there's a long way to go before we see widespread adoption

IT Governance launches new penetration testing service


IT Governance (ITG), which bills itself as a one-stop shop for compliance expertise, has diversified into penetration testing.

According to the Ely-based IT services firm, cybercriminals are increasingly targeting IP addresses, website applications, firewalls, network devices, hardware and software.

As a result, the firm says, all internet-facing networks and resources are subject to automated, malicious probing and, when a vulnerability is detected, the exploitation of that vulnerability is also usually automatic.

The firm's penetration testing service is billed as examining and testing the technical security measures an organisation has in place to protect its networks and applications.

Effective penetration testing – often known as 'pen testing' – involves the simulation of a malicious IT attack, using a carefully-planned combination of methods and tools to mimic the range of possible attacks.

However, says ITG, instead of completing the attack, its pen testing team will document the vulnerability and recommend steps to reduce the risk.

The consequent findings then form the basis of a remediation programme.

Alan Calder, ITG's chief executive, said that, in a world where attacks on networks and applications are growing in number at an exponential rate, effective pen testing is the only way of establishing true security.

"The penalties incurred by organisations failing to defend against such attacks are becoming ever steeper", he said.

"Client demand drove us to launch our ITG security testing service. More and more of our ISO27001 consultancy customers have recognised the need for security testing to be part of their initial security plan, as well as their longer term security maintenance", he added.

According to Calder, clients want a pen testing service that can be integrated into the range of consultancy services they are already using, and also one that is delivered by a reputable and ISO27001-certified company, such as ITG.

"Compliance requirements also increasingly recognise that penetration testing should form part of ongoing security activity in all organisations. Department for Work and Pensions contracts, for instance, look for suppliers to achieve ISO27001 certification, as well as to carry out an initial penetration test, and then to maintain an acceptable level of technical information security", he said.

"We are not just looking to provide short-term analysis and remediation. We want to support organisations in the long term with a comprehensive suite of security services, ensuring their information assets continue to be protected from today's evolving IT security threats."

SOURCE: This article is featured in IT Forensics

Top 10 Linux Speed Hacks


Ah…Linux..The pinnacle of what open source can achieve today..the brainchild of Linus Torvalds has surely come a lot Top 10 Linux Speed Hacks further and evolved to show the world what it is capable of.As an extremely reliable Operating system, Linux rarely needs to be rebooted. But when it does, it’s often slow to boot.Loads of Matrix style lines scrolling down the screen are sure to drive nuts added with boot time of GUI initialization.. Fortunately, there are ways to speed things up. Some of these methods are not terribly difficult. (although some, unfortunately, are). Let’s take a look at Top 10 Speed hacks of Linux and let your linux box reincarnate with speed.

[1]. Quick Fixes - Disable unnecessary services Disable unnecessary services to make Linux Boot Faster

Linux comes in various flavors bundled with a lot of applications.However,most of us don't even use Linux to its full potential. Depending upon the use of the machine, plenty of services and running programs won’t be needed. And if you are using Linux just for a desktop,then you won’t be needing the default sendmail , httpd, and many other services.You can also turn off many other services if your Linux box is used as a small web server by going to Administration menu,tweaking the Services entry and deselect all of the services you don’t want to start.

[2]. Free up Your Kernel - Disable unnecessary kernel modules

If your Linux box is wired to the LAN/Ethernet,then you don’t need to have a wireless kernel module loaded. More services like smartcard modules and more can be disabled and the load can be taken off from the kernel.This task is a bit Tweaking Linux Kernel is even difficult for Linux Geeks..but its worth its time and learning difficult requires recompilation of kernel, which is daunting for even the *inux geeks. To do this, you will need the kernel sources and then follow the standard steps for compiling a kernel. You will be having a ride through the internals of your system just disable all of the kernel modules you don’t need.

For added safety,install Bootchart which will tell you if Kernel modules are properly installed and running on your system. Not only will this give you a good list of modules, it will illustrate for you what is happening during your system boot. You can also issue the command

chkconfig –list | grep 3:on

to find out what services are running. Once you know what loading modules you don’t need, you can remove them during a kernel recompilation. While you’re at it, compile the kernel to exactly match your architecture. Make your Linux Faster - Use a  Lightweight Linux Distribution

[3]. Take Load Off Linux - Use a lightweight window manager instead of GNOME or KDE

Using a smaller window manager drastically reduces graphical boot time. Instead of having to wait that extra 30 to 60 seconds for GNOME or KDE to boot up, why not wait two to 10 seconds for Enlightenment or XFCE to boot up? Not only will they save you boot time, they will save your memory and the headache of dealing with bloatware.

[4]. CUI ROKZ’ - Use a text-based login instead of a graphical login

The graphical logins do two things: increase load times and create headaches trying to recover from an X windows failure.Most of Linux machines which boot to run level 3 instead of run level 5 will halt at the text-based login, where you only have to log in and issue startx to start your desktop of choice.So CUI login is the way to go.

[5]. The Flying Penguin - Use a lighter Linux distribution Let Your Linux Fly - Use a lighter Linux distribution

Are You a Linux newbie ? Instead of loading the heavyweight SUSE, why not try a DSL, Puppy Linux, or Gentoo? The boot times for these smaller distributions are far faster than the more bloated Fedora (SUSE and even Ubuntu).Loading lighter linux distributions will save you from lot of headaches. Of the larger distributions, OpenSuSE claims to boot the fastest, but between the latest Fedora and Ubuntu, Ubuntu blows Fedora’s boot times away (and that is out of the box,trust me..).

[6]. Get Savvy - Use an OpenBIOS

If you’re tech savvy enough to upgrade your PC’s firmware, you might consider a migration to open source BIOS which Use custom Open bios to meet your machine's needswill allow Linux to actually initialize the hardware as it boots (instead of relying on the BIOS). Also, many open BIOSes can be customised to meet your machine’s specific needs. If you don’t go the open BIOS route, you can at least configure your BIOS to not search for a floppy drive that’s not there or to boot directly to the first hard drive (instead of the CD drive first).

[7]. DHCP woes - Avoid dhcp

If you are working on a home network (or a small business network) where address lease isn’t a problem, go with static IP addresses. This will keep your machine from having to call out to a dhcp server to get an IP address. If you take this approach, make sure you configure your Avioding DHCP and Unplugging Hotplug will surely speed things up

/etc/resolve.conf

to reflect your DNS server addresses as well.

[8]. Hotplug unplugged - If you can spare it, get rid of hotplug

Hotplug is the system that allows you to plug in new devices and use them immediately. If you know your server won’t need this system, delete it. This will cut down on boot time. On many systems, hotplugging consumes much of the boot time. Removing hotplug will vary depending upon the distribution you use.

NOTE: udev has, for the most part, replaced hotplug. But if you’re running an older distribution, this does apply. Are You Daring enough to mess with initng ?

[9]. If you are REALLY daring, you could give initng a try

The initng system serves as a replacement for the sysvinit system and promises to drastically decrease boot times in UNIX-like operating systems. If you would like to see the initng system in action, you can give the Pingwinek livecd a try.

[10]. HackerPunk - Use a hack with Debian

If you’re using Debian, there is a simple hack you can use to switch your startup scripts to run in parallel. If you look at Hack your debian to run startup scripts in parallelthe

/etc/init.d/rc

script, you will see:

CONCURRENCY=none

around line 24. Change this line to

CONCURRENCY=shell

and you should see a reduction in boot times.

Shall i say “Thats All Folks..” . Yep..thats it..thats the way it is. There are ofcourse better speed hacks available but the above ones shall cover pretty much everything.

Thats All Folks :)

So..Keep learning Folks

POSTED BY XERO.ALL RIGHTS RESERVED. TUX PACKAGES BROUGHT TO YOU BY CRYSTALXP.NET.

LinkWithin

Related Posts Plugin for WordPress, Blogger...