WELCOME

for any suggestion's please mail to this id:

nanduriraja537@gmail.com,raja.mic539@gmail.com

Thursday, October 27, 2011

tips from episode of chip

1980 analog digital camera



GIMP and adope photoshop cs3/cs4 both are available for free in the net


optical ZOOM gives the magnification


digiatl zoom hives pixilation


olympus sp-59ouz the best camera




4 beautiful websites........................!!!!!!!!!!!!!!!!!!about photos





wwww.canvera.com

http://www.canvera.com/

http://photofunia.com/

http://magmypic.com/

http://beta.picartia.com/

.............................................................................




seagate portable hard drive: 500gb(external hard disk) price is about:7000/-



---------------------------------------------------------------------------------


Daguerre invented Daguerreotypes using silver on copper plates



james cler maxwell took the first color photo in 1861



the kodak brownie in 1901 made photography available to amateurs


kodak developed the worlds first megapixel sensor in 1986



canon %D mark-||----price at 2.23 laks




www.moneycontrol.com

www.tech2.com

nokia

nokia begins with roots of paper ,rubber and cables....finally mobiles,tablet pc

Links for you

----------------------------
SITES IMP FOR YOU
----------------------------
1.)www.anvesh.350.com
2.)www.candie-possible.blogspot.com
3.)www.unix-materials.blogspot.com
4.)www.nicequotes-4u.blogspot.com
---------------------------------
SITES IMP FOR STUDIES
--------------------------------
1.)www.prsolutions08.in (site for online bits)
2.)www.celuminaries.co.cc (updates of jntuk)
3.)www.studentshangout.com (site for online bits)
4.)www.newmovies8.blogspot.com
5.)www.worldwebsites8.blogspot.com
6.)http://99abhirox-co-cc.blogspot.com/2008/09/updates.html
7.)www.studentsgola.com
8.)www.firstranker.blogspot.com
9.)cplus-programing.blogspot.com
10.)www.nasa.gov
11.)www.w3schools.com (for online reading)
12.)www.justclickz.com (Buy e-books)
13.)recentmedicaldevelopment.blogspot.com
14.)www.esnips.com (Free E-books)
15.)www.ebookee.com (Free E-books)
16.)www.giuciao.com (Free E-books)
17.)www.2020ok.com (Free E-books)
18.)www.onlinebooks.library.upenn.edu (Free Books)
19.)www.4shared.com (Free E-books)
20.)www.ebooks-free.info (Free E-books)
21.)www.ebooksgo.blogspot.com
22.)www.professionalstudents.blogspot.com
23.)www.requestbooks.blogspot.com
24.)www.millionebooks.blogspot.com
25.)www.ziddu.com (For uploading files)
26.)www.mediafire.com (For uploading files
27.)www.rapidshare.com (For uploading files)
28.)www.megaupload.com
----------------------------------
SITES FOR SOFTWARES
----------------------------------
1.)www.softwaredomain.co.cc
2.)www.rapidraja.blogspot.com
3.)www.brothersoft.com
4.)www.soft32.com
5.)www.downloads.com
6.)isohunt.com
7.)softwares.jikgo.com
8.)www.systemtools.com
9.)www.lisisoft.com
10.)www.softwaredownlod.blogspot.com
---------------------------------
OTHER STUFF
---------------------------------
1.)www.hackingforu.blogspot.com
2.)www.wix.com (blog you can make)
3.)www.350.com (blog you can make)
4.)www.wordpress.com (blog you can make)
5.)www.ning.com (blog you can make)
6.)www.blogger.com (blog you can make)
7.)www.completeyoga.org (bst for yoga for free)
8.http://www.4shared.com/dir/4829960/5a420c1e/Personality_Development.html
9.)www.imaginecup.com
10.)www.123.raaga.blogspot.com (site for songs)
11.)www.ezinearticles.com
12.)www.websudoku.com
13.)www.pendrivelinux.com
14.)www.wap.zozoc.in (unlimited sms)
15.)www.way2sms.com ( " " ")
16.)www.earnbysms.com ( " " ")
17.)isohunt.com (English Movies)
18.)www.apunkabollywood.net/browser/category/view/347/movies ( Hindi Songs)
19.)torrentz.com (English movies)
20.)www.123onlinemovies.com (Telugu movies)
21.)www.humsurfer.com
22.)onlinemasti.blogspot.com
23.)www.raagalahari.com (for songs)
24.)www.teluguone.com (for songs)
25.)www.iwingames.com (To play online games)

how to be safe will serfing

how to be safe will serfing


http://www.netnanny.com/

http://www.safekids.com/


http://www.connectsafely.com/


http://worldtv.com/

https://secure.logmein.com/

HOW TO DETECT HIDDEN CAMERAS

HOW TO DETECT HIDDEN CAMERAS IN DRESS CHANGING ROOMS IN HOTELS AND BATHROOMS?
Please be aware....


Good information to share.......
How to detect a HIDDEN CAMERA in trial rooms.........

In front of the trial room take your mobile and make sure that mobile
can make calls....... .
Then enter into the trail room, take your mobile and make a call.....
If u can't make a call......!! !!
There is a hidden camera......

This is due to the interference of fibre optic cable during the signal
transfer.... ..
Please forward this to your friends to educate this issue to the
public......
To prevent our innocent ladies from HIDDEN CAMERA...... .....


Pinhole Cameras in Changing Rooms of Big Bazaar, Shoppers Stop?

A few days ago, I received this text message:
Please don't use Trial room of BIG BAZAAR there are pinhole cameras to make
MMS of young girls.

So, please forward to all girls. Also forward to all boys who have sisters
and girlfriends.

Don't be shy in forwarding this message. Because its about protecting the
integrity of all girls & ladies.


**HOW TO DETECT A 2-WAY MIRROR?


When we visit toilets, bathrooms, hotel rooms, changing rooms, etc., How
many of you know for sure that the seemingly ordinary mirror hanging on the
wall is a real mirror, or actually a 2-way mirror I.e., they can see you,
but you can't see them. There have been many cases of people installing
2-way mirrors in female changing rooms or bathroom or bedrooms.

It is very difficult to positively identify the surface by just looking at
it. So, how do we determine with any amount of certainty what type of

Mirror we are looking at?

CONDUCT THIS SIMPLE TEST:

Place the tip of your fingernail against the reflective surface and if there
is a GAP between your fingernail and the image of the nail, then it is a
GENUINE mirror.

However, if your fingernail DIRECTLY TOUCHES the image of your nail, then
BEWARE, IT IS A 2-WAY MIRROR! (There may be someone seeing you from the
other side). So remember, every time you see a mirror, do the "fingernail
test." It doesn't cost you anything. It is simple to do.

This is a really good thing to do. The reason there is a gap on a real
mirror, is because the silver is on the back of the mirror UNDER the glass.
Whereas with a two-way mirror, the silver is on the surface. Keep it in
mind! Make sure and check every time you enter in hotel rooms.

Ladies:

Share this with your friends.

Men:

Share this with your sisters, wife, daughters, friends, colleagues, etc.

Pass this message to all Ur friends in the Contacts

Monday, October 24, 2011

spammer








Chip Dr know 1





create your family tree online


publish your web site


create a web site with template


discover new sites


create a flash web site



create web gallery


Ankit Fadia Hacking Seminar Truth Reveled

Ethical Hacker Ankit Fadia Hacking Seminar Truth Reveled: Pure waste of Time by RISHABH "XERO" DANGWAL

And there we go, I came to know about the renowned Ankit Fadia coming to my humble college & I was wondering if he will be different from those other security organizations who teach computer security & ethical hacking.

He was worse.
No offense to Mr Fadia, but actually I was quite saddened by some of the questions which he asked-
How many of you use Google as a search engine ?
(Almost all of hands raised)
He Proclaimed - STOP USING THEM !!

How many of you use email services like Gmail, yahoo?
(A lot of hands raised)
He Exclaimed - STOP USING THEM !!

How many of you use internet ?
(again..some of hands raised)
STOP USING THEM !!

And behind the above "Stop Using Them!!" there were some cheesy reasons of privacy invasion & record tacking. I wondered why he was not educating about how to use services like Scroogle/TOR/SOCKS for safe surfing (albeit nothing is safe, but still, they provide a greater degree of anonymity). Then..it all begin.

Part 1 - Screwing the Proxies

Then the hacking prodigy demonstrated his magical wits by recommending Russian proxy servers cuz "they were maintained by criminals" & "they kept no logs" .
F**INGBULLSHIT !!

Why the hell ! We can never trust a proxy if it keeps logs or not, that's why we always use SOCKS & proxy chaining to get the work done, even when I start something casual, i chain 10 proxies using a TOR network to get the work done, & that guy was recommending anonymizer.com & anonymizer.ru . And we shall trust Russian proxy cuz its maintained by criminals ? what an oxymoron ! His ace in hole in the proxy demo was the Princeton university proxy list where he claimed that to black all of the proxies it will need 413 individual tries ! A friend of mine asked -
"Well Mr Fadia, what if you block the Princeton university site ?"
pat came the nervous reply
" Appoint a junior of yours to go into local cybercafé to get the list, Xerox it and distribute in college"

Pure F**king Genius !
He went on to use SPYPIG to get IP of any person using an image. but he didn't get on the point that what if a person has disabled image viewing on email. Anyways..it all ended with a lot of questions which he dodged by saying that there will be a query session in the end. Ah well..

Part 2 - the infamous NETBUS DEMO

I patiently waited to ask him some questions regarding IP evasion & anonymity but he started to demo NETBUS Trojan, without any logic he went on to demonstrate how he can open his CD/DVD drive on his DELL Studio 14" (by installing a Trojan server on his own laptop & executing commands on local loopback & he didn't explained it, that's why its in f**king brackets !) . I asked him, on getting chance from my trusted roommates & event co-ordinators Sumit Dimri & Varun Kumar Singh & asked him 2 simple questions (Of course I already knew the answers) -
  • What happens if a person is behind a NATBOX/Router/Firewall, then there is no use of getting IP, it might not be forwarded at all. What then ?
  • Trojans are invalid against Linux. What can you do to break into Linux Security ?
He responded by dodging the first question & diverting it to a social awareness bullshit & some problem solving (which I cant seem to remember cuz it was irrelevant). The second question was answered by saying that Windows is insecure & I myself use Ubuntu linux at home.

Again..Pure F**king Genius !

From that point i got the point that he has no point :D
We moved on to the Steganography / Final session then.

Part 3 - the Steganography / Final session

The steganography session was started by exclaiming that he was contacted by FBI on 9/11 attacks (which i already knew as a matter of fact is fake courtesy of Attrition.Org & various LUG's out there) & they used images of sexy women to transmit data into them. He used a tool to hide text data into image & reverse it, nothing special, if you have been a reader of my blog I guess you probably know that Nettools allow you to do that. Then he demonstrated Bluetooth hacking by using bluesnarf (just a scan) & website hacking using SQL injection (again..nothing special) with no logical explanation of how the injection worked. The session ended by "Roadside Sign hacking" in which he displayed pics on projector of hacked road signs by hackers at USA, Australia & other countries.

He then begin to advertise Dell laptops & the highly prestigious (READ: BELOW AVERAGE) AFCEH course conducted at Reliance Webworld. Then he ran away cuz he was running short of time & no Query Session was conducted.

Aftermath : Pure F**king Genius !

I guess you realize what I felt for the whole seminar & the whole Ankit Fraudia oops.. Fadia hype..

My Feedback form read -
Name : Rishabh Dangwal
Qualification: Btech
Branch : CSE
Remarks : Ankit Fadia is Overrated..Overhyped & pure waste of time. If you are bored, do come to Fadia for a few laughs. Peace.

Hacking Facts: The History of Hacking


Hacking has been around as long as computers as a way to reconfigure or reprogram a system to give access to someone who otherwise shouldn’t have access. In the media, any electronics manipulation is often referred to as hacking, though “cracking” may often be more appropriate. Thanks to hacking, computer geeks can be cool and dangerous.

Sunday, October 23, 2011

Kim Kardashian

Katie Holmes

Kim Kardashian

Kristen Stewart

Kristin Cavallari

Leighton Meester

Lindsay Lohan

Lucy Pinder

Maria Menunos

Megan Fox

Melissa Ford

Mila Kunis

Miley Cyrus

Minka Kelly

Natalie Portman

Paris Hilton

Petra Nemcova

Rachel Bilson

Rhianna

Sandra Bullock

Katy Perry

Selena Gomez

Sophie Monk

Stacy Keibler

Tamara Ecclestone

Taylor Momsen

Taylor Swift

Whitney Port

Winona Rider

Ali Larter

Alyssa Milano

Anna Kournikova

Anne Hathaway

Ashlee Simpson

Bar Refaeli

Beyonce Knowles

Blake Lively

Britney Spears

Brooke Burke

Cameron Diaz

Carrie-Anne Moss

Christina Aguilera

Christina Aguilera

Christina Milan

Danielle Lloyd

Demi Lavato

Eliza Dushku

Eva Longoria

Eva Mendes

Eva Mendes

Halle Berry

Hayden Panettiere

Heidi Montag

Holly Madison

Jenna Jameson

Jennifer Love Hewitt

Jessica Alba

Jessica Simpson

Jewel

Joan Hart

Katie Price

Kellie Pickler

Scarlett Johansson

LinkWithin

Related Posts Plugin for WordPress, Blogger...