longtimeago
Members-
Content Count
513 -
Joined
-
Last visited
Everything posted by longtimeago
-
When Was The Last Time You Visited A Bank?
longtimeago replied to The Simpleton's topic in General Discussion
i visit my bank very rarely, but on the other hand i go my banks ATM ( Automatic Teller Machine ) almost very often. Keeping money in your pockets is kind of risky when you travel around and when you move about in a crowded place. So just to avoid that all some one needs to do is that have his or her money in the band and get a ATM card and use the card to draw money when ever needed, and these days using debit card you can do shopping too, so i guess all you need is to have an ATM card , visit the bank once in a while and drop cash into your account. Just hold the card and when ever you want instead of going to the Bank just visit the ATM if liquid cash is needed . Though there are some cons in ATM's like there is a limit for the day , you can get the changes as you need etc. Still it has its own advantage. -
So, i am sure and i agree that java script can do wonders. At times wonders can have some negative effects too. Let me go ahead with a practical scenario. Suppose that there is a Login page where the user name is known and the password is unknown and the login page does not have any CAPTCHA verification, That is if the password is entered several times wrong too nothing happens. In such a login page if the password is gonna be only date of births, eg. 01021990 (dd-mm--yyyy) then will Java script break into the authentication step ? The form method="post" . Here can there be a script written in Java and when it is inserted in the URL bar of the login page, the script will try all entries from 01011988 to 31121995 ( dd-mm-yy) in the password field and will keep on trying to deploy a brute force attack on the login page till its logged in . Can a java script can be written so ?? Here is the sample code of the login page : <input name="appUser.userId" id="appUser.userId" size="20" class="textbox" type="text"> </td> </tr> <tr> </tr> <tr> <td align="left" height="19" valign="middle"><span class="logintext">Password</span></td> <td align="left" height="19" valign="middle"><input name="appUser.passwd" size="20" class="textbox" type="password"> </td> If there can be a Java script like that please let me know and explain the script also to me so that i need to ensure certain attacks can be made and i need to prove that ..so that .. in a particular applications BiG changes have to made for security reasons .
-
@ mahesh2k , thank you for those resources , Suggest me a good title which will involve much of pointer concepts ? have you done any projects which focuses on pointer concepts ??
-
Router is designed for a different purpose and a modem is designed for a different purpose . A modem is meant for converting digital into anolog and anolog into digital signals. It accomplishes modulation and demodulation. Whereas a router is designed for some other purpose, that is routing packets over the WAN and over the internet . A router basically has several configurations like Routing protocals , address configuration ,ACL etc etc. The basic thing which you need to remember is that router has something which is known as the routing table which has information about its neighbouring routers . A router cannot replace a modem or a modem cannot replace a router since they are designed for different purposes. On the other hand modem also does certain tasks of the router like connecting your computer to the external network etc. But in the modem you dont have features like big configurations , console ports etc etc. moreover modem is used for a circuit switching network and router is used for a packet switching network .
-
Fastest Antivirus & Firewall Software
longtimeago replied to Inspiron's topic in Security issues & Exploits
As far as antivirus is concerned , i would say it is NOD 32. It occupies less space in the memory so you can say it is comparitively fast compared with other antivirus software like Bit Defender which occupies more space in the memory . -
Generally everyone says C is the basic of all languages and if you see C its really interesting and this is where people learn all the basic fundas like loops etc. But here in C we have the most and the damn important concept that is Pointers, and i dont know why but im sure it confuses people . I am not sure it is because of the hype created by people saying that pointers is tough or i dont know whether is it really tough ? So does any one know any simple and easy way to master pointers in C ?? please dont tell me the importance of pointers and such stuffs. I am sure everyone will be knowing the theoritical part behind pointers. when it comes to coding part it confuses people, So if you know some Big time methods to master pointers , just put it out ...
-
Skype Rocks man , and it has become more and more famous than MSN and i am pretty sure the number of users who use skype is much much more than the number of users who use MSN. Skype is well renowned for its Voice clarity. Even corporate companies go for skype for making pc to pc calls . Moreover Skype looks eye catchy and i am sure that every one will agree with me for that . On the other hand i dont condescend MSN , they too have their own way of delivering technology which leaves a smile on their customers face .
-
Free Long Distance Calling From Computer To Phone
longtimeago replied to reconraiders's topic in Computer Networks
I am not sure whether you have free long distance PC to Phone calls now , but i am very much sure that once upon a time we had this free calls , i remember using that too. Long back this yahoo messenger had "Net2phone" attached to their messenger service and with that we were able to call any phone any where in the globe but gradually they took away that free option and some calling card and everything came into picture. So as of now i am not sure whether we have something like net2phone still being operational which gives free calls. I guess we dont have such one , if such one was there today it would be so popular that every one will be knowing. -
Boosting the speed of the internet depends on several factors. Since many of the ISDN connections uses frame relay we cant say that the network will have this particular speed. So when you use some software to boost your speed and at that time if more bandwidth is allocated for your channel or for your link, you will have a good browsing speed. So you may think that software works fine and it increases your internet speed. At this time you wont be knowing what is happening in the background. This frame relay technology may playing the role. So at some other time when more band width is not allocated for you that time you may use the same software and you may not experience a higher speed. So during those time you may feel that , the software is no good ..So boosting the speed of the internet cannot be done to a greater extent though there are ways like increasing the header size of the packet to hold more data , this is what the download managers are doing .
-
Canada Getting Free Nationwide Wifi Lucky bastards
longtimeago replied to Alphacide's topic in Science and Technology
Free Internet Finland too is gonna have free broad band internet from next year ( 2010 ) by may . The speed is 1Mbps and i dont know whether it is gonna be wi fi or not . Still FinLand is gonna RoCk. Just imagine na , a country where you have free internet. Wow . . . i wish i too have one like that . -
I Love My Neighbor, I Get Free Internet From Them
longtimeago replied to musicfreak's topic in Computer Networks
but beware , Open internet ( stealing from negihbour and using ) you can be under a big time trap. You dont know to which Name Server you are, for example he may deploy a man in the middle attack by giving you a DNS server address which he runs and he can redirect packets and play tricks. The result may be devastating , like Phishing and Pharming attacks where you loose your password. So using free internet like this is fun , but Beware !! you can get cornered like anything.Be Safe Be Warned !! -
I strongly disagree with this statement of yours. Skype does not work behind all fire walls , I am very sure about this and i can even give you some names of firewall / content filter which blocks skype. For example Websense which is a product of Ironport which inturn is now owned by CISCO is one of the powerful content filtering device and this Websense blocks skype beautifully. Skype has its own advantage and i do not deny that . But you cant claim that it Works with all firewall .
-
Simple thing to be done at first , first you have to check whether the internet configuration us right in your computer. For this the TCP / IP Stack configuration must be set properly or must be running properly. Just ping the loop back address and check for the reply ,Eg : ping localhost or ping 127.0.0.1 , just enter this in run , that is command prompt
-
Welcome to the discussion about , Routers and their security issues. Let me start off with what is a Router and i am sure that for Trap people that is self explanatory. Still to give a kick start Routers are end devices of any Network, it is where all packets get routed from one network to another , without the router that will not be possible. So a simple eg. If i have a small network behind my router, all i need to do is tell the router that all packets having this destination IP has to go to this particular place ( adjacent routers ) . All these informations are stored in a table in the router which is commonly known as the routing table. What are the interfaces in a router ? A router can have many interfaces like the serial interface which is commonly used to connect one router with the other router and the fast ethernet interface through which the LAN behind the router is connected . There are somemore ports known as the console port etc in a router. Now in the router there are some protocals which are activated which are termed as the routing protocals. So now that you have a brief idea of what is a router and what it does. Now the thing is to be noted is all these admistrative works like activating a protocol in the router and changing the routing table etc can be only done by the network engineer of that particular network . So how is this done , in order to make heavy changes in the router you need to have 2 things ,1) Physical access to the router ( however certain actions can be done , like configuration etc. through telnet )2) Password to access the router.Now that not all , but still some can have access to the router physically, other than the network engineer. So once you get physical access to the router, is the router safe ??? Though it is protected by password ? still is the router safe ?? My answer is gonna be NO NO NO , and i dont know why it is so . Even the King of Networks CISCO routers too are not safe if some one gets physical access to the router . Every router is protected by various passwords . But the primary one is "Enable password" . Once this password is broke the attacker can have his hands on the router as he wishes . The SAD part in this is , without changing the configuration too , the attacker can just break the password alone , do all he wants to alter and then again keep back the router as if it was not touched at all.So is there any one who can say No a Router Password cannot be broke ?? No there cant be any , because a router password can be broke easily and i write the following part of my post just to bring out the Computer Security Issues & Exploits and i dont have any intention to harm / or disturb any one. This is purely written for Educational purpose and if any moderators or Admins feel that the below portion is not be exposed , you may kindly remove what is written Below .Computer Security Issues & Exploits in a Router : Breaking of a Routers Password .First you need to turn the power switch off and switch on the router . Press the Break key within 60 seconds after switching on the router , you have to press CTRL - BREAK or at times CTRL -D A router normally boots in the 0x2102 // This is the registry value for normal boot . Type o/r 0x2142 to tell the router to boot from another register located in the flash without loading the configuration in NVRAM at the next reload. ( Here you are changing the registry value for the initial boot sequence of the router ) .Type i to have the router reboot. The router ignores the configuration in NVRAM. after this press Ctrl-C to skip the initial setup Dialog. Now the prompt to go to privileged exec mode.Now copy the startup configuration to the running configuration by copy startup-config running-config commands. View the configuration by typing write terminal or show running-config. View the configured line, vty and enable passwords. Any encrypted passwords need to be changed. // because these days Routers encrypt even enable passwords.Enter the configuration mode by typing configure terminal. Change the line of enable passwords.All interfaces are in a shutdown state. Issue the no shutdown command on every interface that is to be used.Enter config-register 0x2102 to return the router to normal operation at the next reloads. You may now exit configuration mode by pressing Ctrl-ZJust type write to save all the changes . Now Just re boot the router . Thats it you have successfully entered into the router without knowing the password.Note : You need physical access to the router , this cannot be done through telnet or SSH . Once you gain access to the router what else can you not do ?? huh ? Now my question is , why is this permitted in routers ??? - Please be ethical enough after reading this post - Hacking is a CRIME , Though it is an art of exploraion, it has to be done Ethically not Criminally -
-
How the entire this is being done ?? how is it managed ?? who pays for all ? ?Trap 17 --- > My Cents ---- > Xisto Products ( eg. domain names ) How is this carried out ?? That too they offer free signups for the forum, they don't charge at all , 0 adv. how is this possible ??I know that i am trying to ask the business strategy which is being followed, but still can one of the Admins / moderators can tell me ? and please be precise in answering
-
I am quite sure many of the people over here must be skilled drivers ( whether its a 2 wheeler or 4 wheeler ). But these days very often i find something irritating on the roads. Ya every one loves pet animals i do agree. I too love pet animals. Cats , Dogs etc. but when i see these crossing the road just in front of my wheels, i really get on my nerves. That too what to do ? They just come right in front of my wheels , i don't know whether these animals got a snap shot of my number plate in their eyes and they keep looking when i will come. Seriously people, this is damn irritating. Cats / Dogs crossing the road that too when you are driving a 4 wheeler , ya u hit it , or apply brakes . . u don't get injured, but on the other hand when you drive a 2 wheeler and if a Cat jumps into your wheels you fall down , and the one who is coming behind you has his wheels on you . And adding on to this these days when your drive by a park side or a place where there are good many number of trees, these squirrels too adds to the chaos. They are just God's creation and i too love them , but when they cross the road in front of you when you are in a 2 wheeler , you just feel like blasting them with words . So here my argument is not to find out what words to use on animals, but just to ask you people is there any way to stop this ? animals/ pets crossing the roads ? Can some one suggest some meaningful way ? The worst part of this is in India , if you take your vehicle and dash certain animals like pig etc. then the next day they sell off the vehicles believing in some superstitious beliefs, and there are few people watching out when the guy will dash a pig so that he can flick that vehicle for a cheaper price. And one more thing is that if the owner of that animal is around that he is gonna charge the driver, poor fellow. But on the other hand , if the same animal crosses a railway track and if it gets hit, the owner of that animal is Busted for allowing his animal to cross the railway track. So why not the same policy be applied for roadways too ?? , So just to avoid all these things common people come out with some idea , so that we can have a better and a safer driving and can prevent accidents caused by these pet animals .
-
Man, im tired trying to make this google video chat work. All i know is that its quite simple to make it work. just install the plugin and give restart browsers and they have to work and unfortunately for me its not so, I tried installing that plugin several times . and still i dont get my video chat working ! and why is that google has not embedded this chat in google talk ( I mean the messenger version ) and they have only in the mail .So what ever , let me know whether there is any plugin for Linux too to make google video chat work.
-
@ Mordent , thanks for your concern , but the thing is that i need this concept to be done for many things , just not at the places where GET or POST is used, in certain places the page after we click submit is gonna be encrypted . Thats why i explained it like how some hackers use for phishing attack, they just get the Text field user name and password and post it in the orginal page and they hit submit . That Concept , how it is done , i guess php can do that work.
-
Today we know and we have come across a lots of web messengers. Web messengers are something which serves the purpose which the normal messengers like yahoo , google , rediff, aol etc. serves. Using the normal messanger one can have a chat etc. The Webmessengers too provides you the same facility but some services are limited. So talking about the web messengers , they can be broadly classified into two , one is gonna be the one which is provided the Company itself, Lets take yahoo for example . In yahoo every one is aware of the messenger they provide , the normal one which we install in our computer and we use, and on the other hand when we login to our yahoo mail account we can see something in the right corner of the mail account when logged in , thats the web messenger which yahoo provides. On the other hand we can see many other web messengers from which we can login to yahoo and use the messenger like meebo where we enter our user name and password of yahoo , and they connect us to the orginal yahoo server. Here Meebo acts like a proxy, so as all the third party webmessengers. On the other hand they have their own Privacy Policy which states that they get the informations like user name and passwords and they access .So my question here is that how to create a thirt party webmessenger for google talk so that i can host it in my website ? I do understand Google has its google gadgets which provides webmasters to attach google talk to their sites, but this is from google, im asking like meebo is there any way to create a 3rd party web messenger to my website through which users can login to google talk. If there is any open source for creating and using webmessengers please let me know, or if anyone can help me with the code with which i can create a web messenger please let me know. Thank You .
-
I searched about this in many places , still i could'nt find the right solution. my friend says there is a way for this and that is what hackers use for phishing , like they get username and password from the fake page and post it to the orginal page and click submit. Yeah thats the principle which i need for a simple work like searching the who is look up etc. May be if there are any hackers here they will be well versed with this method i guess, like getting form fields from one page and posting it to the other page and clicking submit.
-
Dear friends, recently i came across the basics of Php and i was thrilled by such wonderful Server-side HTML embedded scripting language. I guess for building a good dynamic website php rocks. Here i have a major query , and hope some one can help me out. In Php is the following method possible, if so can any one help me with the codes.Problem Statement : To get the value (from form text field ) from the user in one page, and when the user clicks submit, the same value is to be posted in the text field of anther page ( say a remote page to which i dont have privilege to edit the code ), and the submit button in the remote page is to be pressed ( after posting the value in the text field of the remote page ) and the post page of the remote page is to be show to the user.If you are confused with the above problem statement let me explain to you with a simple example.If i run a private who is look up search engine , and in my from when the user enters a website to find out in the whoislookup database , i wanted to get the URL which the user entered and post it into the text field of the original whoislookup page and click submit and the resut which the original whoislookup page shows, that has to be shown to the user. This is something like i am in the middle , the user enters his query to me i post it to the remote server and in turn connect the user and the remote server. Just the form text fields i wanted to get and pass to the remote page and connect the user.Can this be done using Php . Can some one help me with the codings ?? Thank you..
-
@ -Sky- But remember one thing, if something happens, it can just bring down the channel which is responsible for promoting the internet , these issues cannot bring down the internet itself . But i have a doubt now, what is that "internet itself" . ah ha .. how is the internet to be viewed ? Is it to be viewed as an Object? or if it is viewed as a Technology, some one do make it clear about it . Ahh.. i am confused now !
-
Well if you ever wonder that if anyone owns the internet then it is you, i and the person whomsoever uses it becomes the owner i would say if it is seen in the broader sense. But some may interpret that the ISP's own the internet , and my answer will be No way the ISP's own the internet, because they themselves get it from the government and sell it to us, ISP's are like distributors. So pondering over who owns the internet its quite tricky if we think in a narrow sense. W3C they have certain rights and they can bring changes to the internet i guess, but can they be termed as the owners ? Nope they cant be .So my conclusion about your doubt is no one owns it completely , its a technology and the one who can harness it can be the owner of it till the time he is able to harness it.
-
Which Religion Is The First ? What you now provide some proofs
longtimeago replied to puneye's topic in Health & Fitness
I strongly feel that such a topic must not be started here in Xisto and im just waiting for some moderator or someone to give a Notice. I as a Christian say that .. Christianity is NOT A RELIGION .. Its beyond that , Please take Christian from the Poll. God Never asked us to create religion or denominations. Its man who created it . People who are called by His [ Christ ] name are Christians, and i say Christianity is Not a religion, its we are called by His name, thats it. Christianity is a Relationship between the individual and the Lord God Almighty. So such a relationship cannot be restricted to a religion. Since some one is born in a Christian family he/ she is not gonna be a Christian. There is nothing like Born Christian. Its "Born again" Christian. When every one is Born they are born as a Sinner, it is the relationship with God that makes him a Christian. Many often I fail in this relationship because of my infirmities. But it is His Unfailing Love that Binds the relationship back. So removee off this Topic, Dont limit Christianity to a religion, Its a Relationship with the Lord God Almighty. -
Mycents Aren't Transfering Into Xisto Account?
longtimeago replied to Alex Cicala's topic in Web Hosting Support
On the other hand if you have a warn level then too the cents wont get converted to dollars i suppose. So better check out your warn level, if there is any try to reduce the warn level and then raise the ticket to the Xisto - Support. Xisto - Support are the cool ones i have ever seen So for sure ! they will help you out.