This is Virus Community

Your Ultimate Tech Destination On My Web.

This is Virus Community

Your Ultimate Gadgets Destination On My Web.

This is Virus Community

Your Ultimate Technology Updates Destination On My Web.

This is Virus Community

Your Ultimate Tech Articles Destination On My Web.

This is Virus Community

Your Ultimate Virus and Malware updates Destination On My Web.

Tuesday, 28 March 2017

Difference Between LAN, WAN, MAN, CAN, VPN, BAN, NAN, SAN.

Difference Between LAN, WAN, MAN, CAN, VPN, BAN, NAN, SAN


A computer network is an interconnection of various devices like laptops, routers, switches, servers, etc. with the help of wired or wireless means. We can differentiate these networks by their reach, i.e., geographical area. For example, we have local area network, wide area network, personal area network, metropolitan area network, near-me network, etc. Whatever connection you use, whether your home WiFi or the office Ethernet, you’re a part of some computer network. A computer network can include devices like routers, hubs, switches, end-user devices, repeaters, network cards, etc. These devices can be arranged in various network topologies as per the requirement.


Local Area Network (LAN)


LAN is a form of a computer network most known to the general public. It has a limited reach, roughly a bunch of closely situated houses or building. And that’s because we typically use the Ethernet technology (IEEE 802.3) to power our local area networks. The ethernet cables we lay across our houses and offices have their practical limitations. Beyond a certain length, the speed gets degraded. The reach of a LAN can be enhanced using repeaters, bridges, etc.

Home Area Network (HAN)

A kind of local area network is the HAN (Home Area Network). All the devices like smartphones, computers, IoT devices, televisions, gaming consoles, etc. connect to a central router (wired or wireless) placed in a home constitute a home area network.

Wireless LAN (WLAN)

This type of computer network is a wireless counterpart of the local area network. It uses the WiFi technology defined as per the IEEE 802.11 standards. If you’re the one who thinks WiFi and WLAN are the same things, then you need to rectify your confusion. They are completely different. WiFi is used to create a wireless local area network.

WiFi networks can reach up to a few hundred meters in a clear line of sight. However, just like wired LAN, its range can be increased using wireless repeaters and bridges.

Personal Area Network (PAN)

As the name suggests, a personal area network is intended for personal use within a range of a few ten meters. Mainly, the technologies used for creating personal area networks are wireless. A notable example of WPAN is the Bluetooth technology, mostly found on portable devices like smartphones, laptops, tablets, wearable, etc. Other PAN technologies are Zigbee, Wireless USB, etc.

Campus Area Network (CAN)

A network infrastructure covering the school, university, or a corporate premises can be dubbed as campus area network. It can comprise of several LANs, a central firewall, and connected to the internet using a leased line or any other means.

Metropolitan Area Network (MAN)


The area covered by a MAN is quite larger in comparison to a LAN and CAN. In fact, a MAN can be used to link several LANs spread across a city or a metro area. A wired backhaul spread across a city is used to powers a metropolitan area network in that place. You might have known about various city-wide WiFi networks in different parts of the world.


Wide Area Network (WAN)


We can think of a WAN as the superset of all the small networks we find in our homes, offices, cities, states, and countries. The router or modem placed at your home is a device used to connect to the WAN. The internet is also a type WAN that spans across the entire earth.

Various technologies like ADSL, 4G LTE, Fiber optic, cable, etc. are used to connect to the internet. However, these technologies mostly confine to a country at max. Cables are laid across countries and continents to establish global connectivity.

Storage Area Network (SAN)


Generally, it is used to connect external storage devices to servers but make them believe that the storage is attached directly. The technology used to accomplish this is known as Fiber Channel.

Body Area Network (BAN)

You can create a body area network by using wearable devices like smartwatches, fitness bands, biometric RFID implants, and medical devices placed inside the body like pacemakers. Wireless BAN is the primary form used to created such networks. It is defined as per the IEEE 802.15.6 standard which describes a short-range, extremely low power wireless communication within or in a vicinity of the human body.

Wireless BAN can work together with PAN technologies. For instance, a Bluetooth-connected smartphone can be used to sync data from wearables and various sensors present in the body.

Near-me Network (NAN)


Although it sounds totally unfamiliar, you use Near-me network almost every day. Remember chatting with your friends on Facebook while all of you were sitting in the same room. You were part of a NAN, even though you might be on the networks of different carriers.

A message from your device would traverse all the way to Facebook servers over the internet come to your friend’s device sitting right next to you. In a logical way, both the device are on some sort of network. Basically, the criteria for the devices is to lie in proximity. They don’t need to be connected to the same network. For instance, they can be connected via WiFi, cellular, etc.

Virtual Private Network (VPN)

VPN is a type of computer network which doesn’t have physical existence. The devices that are part of a VPN could be present anywhere on the earth, connected to each other over the internet. VPNs are used by corporate to interconnect their offices located in different places and give their remote employees access to company’s resources. It has phased out another type of network known as Enterprise Private Network, a physical network created by organizations to link their office locations.

Monday, 14 November 2016

USB Thief This Self Projecting USB Trojan Can Give You Nightmares

USB Thief This Self Projecting USB Trojan Can Give You Nightmares

USB Thief This Self Projecting USB Trojan CanSecurity researchers have identified a new malware named USB Thief that has the ability to steal data from air-gapped computers without leaving its trace. The malware uses a unique method of protecting itself with AES128-encryption and renaming the files in each new instance.

Imagine a malware that spreads through USB drives, steals your computer’s data and goes undetected. Sounds like a bitter pill to swallow? Well, security researchers have spotted this unique data-stealing trojan in the wild that comes with self-protection mechanism that protects it from being reproduced or copied.

The researchers at ESET security firm have unveiled the fact that Win32/PSW.Stealer.NAI malware, or USB Thief, can attack the isolated or air-gapped computers. Each attack of this malware relies on a USB device and it leaves no evidence on its target.

How does USB Thief spread in the wild?

Instead of spreading via the tried-and-tested techniques of autorun files and shortcuts to run itself, USB Thief uses another technique that involves using itself in the portable versions of popular application like NotePad++, Firefox web browser, and TrueCrypt on thumb drives.This queer fish takes advantage of this disguise and finds home in the command chain of such applications in the form of a dynamically linked library or a plugin. As a result, whenever the target runs the applications, the malware also runs in the background.


The protection mechanism of USB Thief.

The USB Thief malware contains six files — four executables and two containing configuration data. Talking about its self-protection techniques, the malware uses two methods:1) Some of the files are protected by AES128-encryption.
2) The filenames are generated with some cryptographic jugglery that makes the filenames different for every instance of malware.The researchers found it very challenging to crack this dish fit for hacking Gods. Here’s is the execution flow of malware explained in a flow-chart. The malware operates with 3 payloads that interact with two configuration files and implements the data stealing functionality with the payload.
At the moment, the USB Thief malware is not widespread but its ability to be used in targeted attacks on isolated computers makes it the black sheep of the malware family. fossBytes advises you to turn of Autorun feature in your computer and do not use USB drive from random sources.

Monday, 10 October 2016

Some Useful Websites For Hacking.

Some Useful Websites For Hacking.


To check if a port is open:  
http://www.canyouseeme.org/


To multiple scan a file for viruses:
http://vscan.novirusthanks.org/

To check if a site is down:
http://www.downforeveryoneorjustme.com/

A place to get newest exploits:
http://www.exploit-db.com/

Lets other people view your inserted text:
http://pastebin.com/

The free online crypting + decrypting service:
http://www.crypo.com/

An online MD5 decrypter:
http://www.md5decrypter.com/

The best online Admin Page Finder:
http://sc0rpion.ir/af/

Online WPA cracker:
http://wpa.darkircop.org/

Online Fake Mailer:
http://emkei.cz/

A mailing site ( it gives you a temporary email account to send and receive messages ):
http://10minutemail.com/10MinuteMail/index.html

It gives you alternatives for program's:
http://alternativeto.net/

Upload and send files to friends etc. Very quick:
http://ge.tt/

Note!!!!!!

This post is share just for an education purpose. 

Friday, 1 July 2016

Five Common Mistakes That Fresh Hackers Make


Five Common Mistakes That Fresh Hackers Make

Starting out as a beginner in hacking can be a lot of fun, but there are some common mistakes that most make. If you’re reading this, then you have the unique advantage of avoiding these mistakes when you’re still news. The following five points will tell you what not to do in your journey towards becoming a true hacker.

1. If you see a website offering hacking software or offering to hack email ids for money, avoid them. These websites are nothing but scams and won’t work.

2. A software that claims to hack giants like Google, Facebook, Yahoo and the like is a hoax. There are no such software available. You may get yourself hacked while trying to get these.

3. Don’t use key loggers and Trojans found as freeware online. These software aren’t meant to be free and you will be giving access to your own computer to another hacker.

4. Programming and scripting languages are very important parts of any hacker’s arsenal. If you plan to use software only then you would also be limited by the software’s functionalities.

5. A good hacker is a good programmer, security expert, developer and good script writer. It is usually not the other way around. You must know this for cross site scripting.




So, hacking is not simply about making your way into websites and leaving your mark. You have a great set of talents a can also get the best jobs in the industry.

Sunday, 15 May 2016

Hacking Facebook & WhatsApp Signals To Track 4G/LTE Smartphone’s Precise Locations


Hacking Facebook & WhatsApp Signals To Track 4G/LTE Smartphone’s Precise Locations


Researchers have made a low-cost gadget to track the precise location of smartphones using 4G/LTE by hacking Facebook and WhatsApp signals. It was earlier thought that though such attacks could be targeted against the 2G and 3G enabled smartphones and 4G/LTE enabled smartphones are immune. to such attacks Security researchers have revealed how simply contacting somebody via WhatsApp or Facebook messenger can reveal a smartphone owner’s location by exploiting a security flaw in 4G mobile networks.
According to researchers, a hacker could use the apps to discover the supposedly anonymised identifiers that are assigned to devices when they connect to a network. This can than be used to track their precise location.
4G/LTE enabled smartphones are expected to have a user base of about 1.37 billion people by the end of the year. The researchers assembled a $1,400 gadget which runs on freely available open-source software. The contraption can target 4G/LTE smartphones to leak their location to within a 32- to 64-foot (about 10 to 20 meter) radius and in some cases their GPS coordinates. The researchers said only tech savvy smartphone users can detect any intrusion made by their gadget. They also said that there exists a separate method that can track the smartphone user to a area of one square mile and is virtually impossible detect.
When a smartphone connects to a mobile network, it is assigned a temporary number called a TMSI (Temporary Mobile Subscriber Identity). The network then uses this eight-digit number to identify a device, rather than a phone number, to make communication more private.
However, a hacker monitoring radio communications could tie this TMSI to an individual by sending them a Facebook message or WhatsApp chat, both of which trigger a special “paging request” from a network that contains specific location information about a particular TMSI number.

Anybody with a Facebook account can send another user a Facebook message. Unless the two users are friends, this message will end up in Facebook’s “Other” folder, a feature most users do not know about that is only accessible on the social network’s desktop version, but sending a user a message will still trigger a paging request.
Likewise, WhatsApp’s “typing notification” – a feature on the chat app that displays when a contact is composing a message – also triggers the connection. If a hacker has a victim’s phone number, they could send them a message on WhatsApp, and if the victim begins to type a response, the network issues a paging request.
It is relatively easy to monitor these signals using easily-available network hardware, according to the researchers, from Aalto University, the University of Helsinki, Technische Universitat Berlin and Telekom Innovation Laboratories.

Friday, 5 February 2016

Some Library Of C, C++ Programming & It's Description

Some Library Of C, C++ Programming & It's Description

1. <stdio.h>: input and output function in program.

2. <conio.h>: to clear screen and pause information function.

3. <ctype.h>: function for testing characters

4. <string.h>: function for manipulating string

5. <math.h>: mathematical function 

6. <stdlib.h>: utility function for number, conversion, storage allocation

7. <assert.h>: function that can be used to add diagnostics to a program

8. <stdarg.h>: function that can be used to step through a list of function arguments

9. <setjmp.h>: function that can be used to avoid the normal call and return sequence

10. <signal.h>: function for handling exceptional condition that may arise in a program

11. <time.h>: function for manipulating date and time

12. <limits.h>: constant definitions for the size of C data types

13. <float.h>: definitions relating to floating-point arithmetic


Tuesday, 17 November 2015

4 Ways To Be Anonymous Online

4 Ways To Be Anonymous Online

Want to be anonymous online to view blocked websites, protect your self from hackers or want to hack some one and stay un-traced?. In the following post i will explain 4 easy ways by which you can stay anonymous online!


1. Using Proxies

A proxy is an address ( IP address) of a Server (proxy server) that is placed between your computer and the Internet The advantage ofa proxy is that your real IP address is Hidden so when you hack your giving the IP address ofthe proxy sever and not your real IP address Same way if your a normal Internet user the hacker won't get your real IP but the IP of the proxy server.You can use it to enter site or forum that you areIP is banned. To know more about proxies les me know above this post and I will post a full tutotial about it.


2. Using Tor


Tor-proxy is a free proxy-server service that Internet users can useto hide their IP address while surfing the Web. Tor (The Onion Router) is free software for enabling online anonymity. Tor directs Internet traffic through a free, worldwide volunteer network consisting of more than three thousand relays to conceal auser's location or usage from anyone. I have written a complete How to guide on how to use tor - just let me know if you need it


3. SSH Tunneling

SSH tunnel is an encrypted tunnel created through an SSH protocol connection. SSH tunnels may be used to tunnel unencrypted trafficover a network through an encrypted channel.In easy language,you can surf net withoutbeing monitored and even surf blocked sites too. To know more about SSH and SSH tunneling let me know if you would like to read: SSH tunneling guide.


4. Using VPN

Virtual Private Network. Basically it’s a private network which lets users to connect to other users orremote sites using a public network usually internet. It uses "virtual" connections routed through the Internet from the company’s private network to the remote site or employee instead of physical connections. In short, it is private network constructed within a public network infrastructure,such as the global Internet. The Biggest difference between proxy and VPN is everything in a VPN is encrypted which gives an additional layer of security. There are some paid Andfree VPN services.
 

A History Of Hacking

A History Of Hacking


A history of hacking Hacking has been around for more than a century. In the 1870s, several
teenagers were flung off the country's brand new phone system by enraged authorities. Here's a peek at how busy hackers have been in the past 35 years. Early 1960s University facilities with huge mainframe computers, like MIT's artificial intelligence lab, become staging grounds for hackers. At first, hacker was a positive term for a person with a mastery of computers who could push programs beyond what they were designed to do. Early 1970s John Draper makes a long-distance call for free by blowing a precise tone into a telephone that tells the phone system to open a line. Draper discovered the whistle as a give-away in a box of children's cereal. Draper, who later earns the handle Captain Crunch, is arrested repeatedly for phone tampering throughout the 1970s. Yippie social movement starts YIPL TAP (Youth International Party Line Technical Assistance Program) magazine to help phone hackers (called phreaks) make free long- distance calls. Two members of California's Homebrew Computer Club begin making blue boxes, devices used to hack into the phone system. The members, who adopt handles Berkeley Blue (Steve Jobs) and Oak Toebark (Steve Wozniak), later go on to found Apple Computer. Early 1980s Author William Gibson coins the term
cyberspace in a science fiction novel called Neuromancer. In one of the first arrests of hackers, the
FBI busts the Milwaukee-based 414s (named after the local area code) after members are accused of 60 computer break-ins ranging from Memorial Sloan- Kettering Cancer Center to Los Alamos National Laboratory. Comprehensive Crime Control Act gives Secret Service jurisdiction over credit
card and computer fraud. Two hacker groups form, the Legion of Doom in the United States and the
Chaos Computer Club in Germany. 2600 The Hacker Quarterly is founded to share tips on phone and computer hacking. Late 1980s The Computer Fraud and Abuse Act gives more clout to federal authorities. Computer Emergency Response Team is formed by U.S. defense agencies. Based at Carnegie Mellon University in Pittsburgh, its mission is to investigate the growing volume of attacks on computer networks. At 25, veteran hacker Kevin Mitnick secretly monitors the e-mail of MCI and
Digital Equipment security officials. He is convicted of damaging computers and stealing software and is sentenced to one year in prison. First National Bank of Chicago is the victim of a $70-million computer heist. An Indiana hacker known as Fry Guy -- so named for hacking McDonald's -- is raided by law enforcement. A similar sweep occurs in Atlanta for Legion of Doom hackers known by the handles Prophet, Leftist and Urvile. Early 1990s After AT&T long-distance service crashes on Martin Luther King Jr. Day, law enforcement starts a national crackdown on hackers. The feds nab
St. Louis' Knight Lightning and in New York grab Masters of Deception trio Phiber Optik,  Acid Phreak and Scorpion. Fellow hacker Eric Bloodaxe is picked up in Austin, Texas. Operation Sundevil, a special team of Secret Service agents and members of Arizona's organized crime unit,
conducts raids in 12 major cities, including Miami. A 17-month search ends in the capture of hacker Kevin Lee Poulsen (Dark Dante), who is indicted for stealing military documents. Hackers break into Griffith Air Force Base, then pewwwte computers at NASA and the Korean Atomic Research Institute. Scotland Yard nabs Data Stream, a 16-year-old British teenager who curls up in the fetal position when seized. A Texas A&M professor receives death threats after a hacker logs on to his
computer from off-campus and sends 20,000 racist e-mail messages using his Internet address. In a highly publicized case, Kevin Mitnick is arrested (again), this time in Raleigh, N.C., after he is tracked down via computer by Tsutomu Shimomura at the San Diego Supercomputer Center. Late 1990s Hackers break into and deface federal Web sites, including the U.S. Department of Justice, U.S. Air Force, CIA, NASA and others. Report by the General Accounting Office finds Defense Department computers sustained 250,000 attacks by hackers in 1995 alone. A Canadian hacker group called the Brotherhood, angry at hackers being falsely accused of electronically stalking a Canadian family, break into the Canadian Broadcasting Corp. Web site and leave message The media are liars. Family's own 15-year-old son eventually is identified as stalking culprit. Hackers pierce security in Microsoft's NT operating system to illustrate its weaknesses. Popular Internet search engine Yahoo!
is hit by hackers claiming a logic bomb will go off in the PCs of Yahoo!'s users on Christmas Day 1997 unless Kevin Mitnick is released from prison. There is no virus, Yahoo! spokeswoman Diane Hunt said. 1998 Anti-hacker ad runs during Super Bowl XXXII. The Network Associates ad, costing $1.3-million for 30 seconds, shows two Russian missile silo crewmen worrying that a computer order to launch missiles may have come from a hacker. They decide to blow up the world anyway. In January, the federal Bureau of Labor Statistics is inundated for days with hundreds of thousands of fake information requests, a hacker attack called spamming. Hackers break into United Nation's
Children Fund Web site, threatening a holocaust if Kevin Mitnick is not freed. Hackers claim to have broken into a Pentagon network and stolen software for a military satellite system. They threaten to sell the software to terrorists. The U.S. Justice Department unveils National Infrastructure Protection Center, which is given a mission to protect the nation's telecommunications, technology and
transportation systems from hackers. Hacker group L0pht, in testimony before Congress, warns it could shut down nationwide access to the Internet in less than 30 minutes. The group urges stronger security measures.

Make A Disco Keybord

Make A Disco Keybord

Make a Disco Keyboards usually have small LEDs which indicate whether different types of locks are activated or not. Here is a trick to use the lights of your keyboard in a more creative manner in Windows.

This trick uses a simple Visual Basic Script which when activated makes your Scroll lock, Caps lock and Num lock LEDs flash in a cool rhythmic way which gives the perception of a live disco on your keyboard. Keyboard tricks To make your own live disco, follow the steps given below:-

1. Open Notepad.
2. Copy paste the exact code given below:-
Set wshShell =wscript.CreateObject("WScript.Shell")
do
wscript.sleep 100
wshshell.sendkeys "{CAPSLOCK}"
wshshell.sendkeys "{NUMLOCK}"
wshshell.sendkeys "{SCROLLLOCK}"
loop
3. Save the file as Disco.vbs or "*.vbs". Cool Keyboard Tricks Double click on the Saved file to see the LED lights on your keyboard go crazy and make your own cool disco. This trick has been tested on Windows XP, Windows Vista, Windows 7 and Windows 8 and found to be working
perfectly. You can disable the keyboard disco by starting Task Manager and ending the wscript.exe process.

What Is Dram (Dynamic Random Access Memory)

What Is Dram (Dynamic Random Access Memory)


Dynamic random access memory (DRAM) is the most common kind of random access memory (ram) for personal computers and workstations.
The network of electrically-charged points in which a computer stores quickly accessible data in the form of 0s and 1s is called memory
Random access means that the PC processor can access any part of the memory directly rather than having to proceed sequentially from some starting place
DRAM is dynamic in that, unlike static RAM (SRAM),
it needs to have its storage cells refreshed or given a new electronic charge every few milliseconds
Static RAM does not need refreshing because it operates on the principle of moving current that is switched in one of two directions rather than a
storage cell that holds a charge in place.
Static RAM is generally used for cache memory, which can be accessed more quickly than DRAM.
DRAM stores each bit in a storage cell consisting of a capacitor and a transistor.
Capacitors tend to lose their charge rather quickly; thus, the need for recharging.
A variety of other RAM interfaces to the computer exist
These include: EDO RAM and SDRAM.

Microsoft Windows History

Microsoft Windows History


WINDOWS VERSION HISTORY:
WINDOWS 1.0 ------>16 Bit Os
(1985)
WINDOWS 2.0 ------>16 Bit Os
WINDOWS 3.0 ------>16 Bit Os
(1990)
WINDOWS 3.1 ------>16 Bit Os
(1992)
WINDOWS NT 3.1 ------>32 Bit Os
(1993)
WINDOWS 95 ------>Used WIN32
API
WINDOWS 98
WINDOWS ME
WINDOWS NT 4
WINDOWS 2000 (or also Known as
WINDOWS NT 5)
WINDOWS XP (or also Known as
WINDOWS NT 5.1)
WINDOWS XP PROFESSIONAL -----
>Supports 64 Bit
WINDOWS SERVER 2003
WINDOWS VISTA (WINDOWS NT
6.0)
WINDOWS 7 (WINDOWS NT 6.1)
------->WINDOWS 7 ULTIMATE
------->WINDOWS 7 HOME PREMIUM
------->WINDOWS 7 HOME BASIC
------->WINDOWS 7 PROFESSIONAL
------->WINDOWS 7 STARTER
------->WINDOWS 7 ENTERPRISE
WINDOWS SERVER 2012
WINDOWS 8 (WINDOWS NT 6.2)
------->WINDOWS 8
------->WINDOWS 8 Pro
------->WINDOWS 8 ENTERPRISE
------->WINDOWS 8 RT (FOR
TABLETS)
XP-EXTENDED PROCEDURE
NT-NEW TECHNOLOGY