Tuesday, 31 December 2013

1 Comment

Proxy and Anonymous Internet surfing





1) What is a proxy?

A proxy is an address of a proxy server (look @ kind of proxy's) that is placed between your computer and the internet :

Normal :
Computer --------> Internet
With proxy :
Computer ---------> Proxy server -----------> Internet

The main advantage of the Proxy is that it will cover up your IP address (your identity on net) which may help you in opening the ban sites in your country. It was very much popular in days when Facebook was banned in Pakistan and user use Proxies to log into their accounts.


2) Kind of Proxies:


You have 2 different proxy's (some more but these are for a normal internet users) :
-1: Private proxies : They are only for you (it's the same like buy your own ip address ) and will cost 15-20$
-2: Public Proxies : They are for everyone but the problem is sometimes you can get fast proxy's and sometimes slow ones. If you have a good site/list with fast proxy's there as good as private proxy's

3) Where get your proxy ?
There are many ways to find the proxies but some address are also expired , so just search Google for the Fresh Sites. (search : free Proxy, free anonymous surfing)

4) Use proxy with IE(Internet Explorer):
-1: Open Internet explorer
-2: Go to tools > Internet Options > Connections
-3: Now you will see “LAN Settings” open it
-4: Check Use a Proxy server for LAN. Than you will be able to use Address and Port.
-5: Get a proxy (Read Wear get your proxy's) and fill the address you don't have to fill it the port.
-6: Hit ok , ok and it's done. You surf now with a proxy !


5) How safe is it ?

The use of proxy's is legal and it's a good protection BUT don't think ur full protected/undetected. It's more and more popular and some (protected) site block public proxy's because of the spammers …

6) Proxy software

You have lots of software that work with proxies like a Anonymous Surfing, bruteforcer or proxy port scanner.


7) WARNING!!!!

It is true that a proxy hide your identity but don’t think that you are really safe if you hack CIA Database because in case of hack the Proxy site will give your real identity and you will end up in jail for at least 20 years. So be responsible!!! 
Be The First To Comment

Facebook Spam for Hacking Accounts


Beware Safe Surfers....Links and Events are Popping Up on the famous social networking sites like Facebook and Tumblr, saying that a new “Limited Edition” Facebook red theme is available. When a user visits the link, it downloads a malicious Chrome Extension, which reportedly steals all your Usernames and Passwords of your current active sessions and gets access to your History.
Be The First To Comment

How to add Labels to your blog:


1  Label your Posts:


For each post, add one or more labels.  You can add labels

Using the pre-Sept-2011 / old blogger interface:
In the post-editor, at the bottom right of the editor screen, or
From the Edit Posts tab, by ticking the posts you want to put the labels on, and then choose the label or "New label ...") from the Label Actions drop-down box at the top of the screen.

Using the post-Sept-2011 / new blogger interface:
In the post-editor, in the Labels section at the right side of the post-editor or
From the Posts tab, tick the posts you want to put the labels on, and then use the drop down arrow from the top icon that looks like a small luggage-tag:   choose the label or "New label ...").

2 Add the labels gadget:
Add the Labels gadget to your blog - the same way you would add any other gadget .   You can add it as many times as you need, choosing which labels to show each time.
 
Warning:  If you choose to show only a certain selection of Labels in a gadget, then this is all that it will show even if you add new labels to your posts later on.  However if you don't restrict which labels are shown, then new ones are automatically shown in the gadget if they are associated with published posts.

Drag-and-drop the labels gadget to wherever you want it:  some people put it just underneath their header, to make readers think they've looking at a more traditional web-page.

3 Add Labels navigation
Another way for your readers access labels is from the display in the post header or footer of the list of labels assigned to each post.

This is turned on by default in most templates:  you can change the setting and move it around using post-templete settings found under:

Using the pre-Sept-2011 / old blogger interface:   Design > Page Elements > Blog Posts (edit).
Using the post-Sept-2011 / new blogger interface:  Layout  > Blog Posts (edit)



What your visitors see:



A List of Posts:
If a visitor to your blog clicks on an item in the labels gadget or in the labels-list that is show for apost, then the "labels-view screen" is used to show them the posts that have the selected label.

This screen is like the main screen: is only shows a certain number of posts and visitors need to use the newer-posts and older-posts links to move back through the list.

Like the main screen, if you have used jump-breaks in your posts, then the list only shows the first part of each post.  If you haven't used jump-breaks, then the whole posts are shown.



A summary message:
Unlike the main screen, in most templates there is a message at the top of the page saying:
"Showing newest posts with label WHAT-EVER-YOU-CHOSE. Show older posts"

Or if there are no published posts with the selected Label, the message is slightly different.  Some people change their template to customise or remove this message:  Chuck in The Real Blogger Status has written an excellent description of  how to do this.


What Labels aren't - but appear to be:


Many people think that Labels are a way of actually putting Posts into pages.  However the Posts aren't actually moved around.  The labels-screen is just a way of viewing a smaller-than-usual group of Posts, and can make it look like you have put your posts into sub-pages.


Making multi-level categories:

Currently, Blogger only supports one level of grouping.  The only way you can make sub-groups of Labels is to add two categories to each post - one for the "major" category, and one for the "minor" category

For example you might use labels like these
Major category: Minor categories:
Recipes: Sweet, Savory, Wheat-free
Party-games: ice-breaker, run-around, silent, outdoor
Music: lively, soft & gentle, traditional, instrumental
Each post would need to have at least one label from the major category, and one from the minor categories.

If you do this, you need to be clever about adding two levels of gadget, with only a selected group of labels shown in each gadget.   You might even need to edit your template, to only show certain gadgets in certain situations.


Why to categorise your Posts


watermelon salad recipe can be labelled / tagged as  fruit, salad, dessert and pink
Grouping your blog's contents makes it easier for people who have reached your blog via Search to find other posts that they may be interested in - provided you add tools to your blog that let them navigate using labels.

It's essential if you want to make it look like you have put your Posts into Pages.

And it helps you to find posts yourself.



Blogger's tools for working with categories

The only tool that Blogger provides for categorising or grouping Posts is Labels.

In short, Labels are tags that you apply to posts.

Each post can have as many Labels as you want (there is an upper limit of 5000 labels-per-blog, but most people don't get near it).

And you can use labels for different purposes.  For example, a post titled "Photographing Long-haired Black Cats" could have three different labels
Cats - the the animal it's about
Photography - for the functional category
Jane Smith - for the author

The Labels gadget lets readers choose which groups of posts to see:  when a visitor clicks an item on the labels gadget, they are shown a list of posts that have the selected label applied to them.

You can add the Labels gadget as many times as you like, selecting which specific label values to show each time.   In the example above, you might add it three times, once for ainmals (showing Cats, Dogs and Rabbits), once for function (showing feeding, grooming and photography), and once for author (showing Jane Smith and Joe Bloggs).
Be The First To Comment

Email Security Tips For Internet Users




Email Security Tips For Internet Users......





1. Enable two step verification in you Email accounts.
2. Enable Login-notification for you email and get notification in your mobile whenever you login.
3. Set a strong password with a mix of alphabets, numbers and special charecters.
4. Enable login- notification for you facebook accounts to prevent unauthorised access.
5. Enable HTTPS in your email sttings annd your facebook account settings.
6. Never share your password with anyone. Even to your closest person.
7. Setup a recovery question which is difficult to answer and never setup an easy & guessable answer to your security question.
8. Never click on any links sent through mail or chat. It may be a link which can steal your cookie or inject any viruses.
9. Always check your address bar for proper website address before logging in.

Be The First To Comment

What is HTTP Header Injection Vulnerability


HTTP Header


HTTP Header is the component of HTTP requests and responces. Header fields are transimitted with each request and responce and carry additional data about the requests and responces.

See the typical request and responce headers Here at Web-Sniffer.net

HTTP header injection


HTTP header injection is a kind of web application vulnerability which exists on those web applications that generatd HTTP headers based on the input given by users. If it uses User based input in the headers, it can be used for HTTP response splitting, cross-site scripting (XSS), Session fixation via the Set-Cookie header, and malicious redirects attacks via the location header.





I recently found a similar kind of vulnerability in http://canadaedu.apple.com and for this I was also acknowledged by Apple on its website.

It used apache 1.3.33 that was vulnerable to the HTML and malicious javascript injection through  "Expect" header.

See the responce header of the website:
GET / HTTP/1.0 Accept: */* User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0; .NET CLR 1.1.4322) Host: canadaedu.apple.com Cookie: PHPSESSID=3b8026225d719c6945155129c5c7335d Connection: Close Expect: <script>alert(411731119275)</script> Pragma: no-cache
The alert box added in the Expect field could be injected for Cross Site Scripting.
Be The First To Comment

Li-Fi to replace Wi-Fi in China


Four computers can be connected to internet through one- watt LED bulb using light as a carrier instead of traditional radio frequencies, as in Wi-Fi, said Chi Nan, an information technology professor with Shanghai's Fudan University.

Chinese scientists have successfully developed a new cheaper way of getting connected to internet by using signals sent through light bulbs instead of radio frequencies as in 'Wi-Fi', a move expected to radically change process of online connectivity


Blogger Tricks

 

© 2014 Information WOrld - Designed by Prince | Hacks | Facebook | Sitemap

About Us | Contact Us | Write For Us