We firstly learnt to set video file as desktop background. This can be done by ‘Windows 7 DreamScene Activator’ application. To set a video as wallpaper, first we have to open the application and then click on ‘Enable DreamScene’ option. Then we can set a video file as wallpaper by right-clicking the video and selecting the ‘Set as Desktop Background’ option. We can also choose to play or pause the video by right clicking on the desktop and selecting required option. This feature can be disabled any time by clicking the ‘Disable DreamScene’ option. The limitations of this method are: (i) only Windows Media Video (.wmv)
Thursday, August 11, 2011
The Amazing Windows Se7en
Guys, which is your favorite operating system? If anyone asked me this very question a week before, I would rather say,(scratching my head) “Umm, actually Windows 7 is the OS that I am using right now and I guess that makes it my favorite OS (And give a widespread smile).” Indeed, Win-7 is much easier to use and with a lot of added features added to it, it is simply a ‘wow’ OS. You can take the 3-D window for example. If you have not tried this then check what ‘windows button + tab’
Saturday, August 6, 2011
MSP:The Quest For Who You Are!
The MSP stood for Microsoft Student Partner. It is not that the acronym does not have a meaning now. It was there in my campus before I was in it, and yet when I came into the Engineering field, that combination of letters didn’t ring a bell into my head. Not until I got a chance to attend one of its trainings at my college. My curiosity level rose just as the adrenaline on a diabetic patient, making me take more of it.
Wednesday, June 29, 2011
Kerberos
Kerberos is secure since it never transmits passwords over the network in clear. It is unique in its use of tickets, time-limited cryptographic messages that proves a user's identity to a given server without sending passwords over the network.
Tuesday, June 7, 2011
Digital Signatures
A digital signature is used to authenticate the identity of the sender to the receiver to a limited extent in order to verify the integrity of the message. It is necessary to the sender's public key by the prior knowledge or by trusted third party. A digital signatures is created by using the sender's private key to hash the entire message. The recipient uses the sender's public key to verify the integrity of the message. To sign the message, sender append their signature to the end of the message and encrypt using the recipient's public key.
Saturday, June 4, 2011
What is Steganography?
Basically, Steganography means of transmitting the message by hiding in any file like pictures, music, movies, or any file without changing the original file format. It happens somewhat like this.
You hide the message or the private file that you wanna send to your friend X. But it is very private, you are afraid that someone can have during the sending the file. What would you do now? It seems to be a great problem. Here is the solution you hide the file in any of the another file. Insert the file in the file. Now enter the password to encrypt the private file in the host file. The file is encrypted now. If you do open the encrypted file then the result you see is only the host file.
Friday, June 3, 2011
You need to hack!
Do you think "Why is it important?" The answer is yes it is very important because to catch a thief you must think like thief. To protect your system from all the attacks, it is most necessary that you must know about the attacks, hacks. It will be fruitful if you go positive towards it and you will ruin yourself if you get it negatively.
Due to the increasing number of hackers, the data are loosing their privacy, the system are no longer safer. So when know the hacker tricks, you can find out how
Wednesday, June 1, 2011
Algorithms and strengths
Cryptographic Algorithm
Symmetric key
- Data Encryption Standard ( DES )
- International Data Encryption Algorithm ( IDEA )
- Rjindael (AES Standard )
- Skipjack (used in ciphership )
Public key
- RSA public key
- Digital Signature Algorithms
- Gamal
- Kanpsack
Secure hash
- MD5
- SHA-1
- SHA-256
Monday, May 30, 2011
Cryptography
Some terms related to cryptography :
Cryptography :
It is the study of the mathematics techniques for all aspects of the information security. Cryptanalysis is the complementary science with the methods to defeat these techniques. The study of cryptography and cryptanalysis is called Cryptology.
Encryption :
It is the process of disguising the message in order to hide all the information that it contains.. This process includes encoding and enciphering.
Protocol :
It is an algorithm that is defined by a sequence of steps, precisely specifying the actions of multiple parties in order to acheive the objective.
Plain text :
The message that is transmitted or stored.
Ciphertext :
The disguised message that is in encrypted form.
Encode :
Encode means to convert the message into a representaion in a standard alphabet, such as to the alphabet {a,......z} or to numerical alphabet.
Decode :
Decode means to convert the encoded message into its original form. The process of encoding a message is not an obscure process, and the result that we get after decoding can be considered as equivalent to the plaintext message.
Cipher :
A map from a space of plaintext to a space of ciphertext.
Encipher :
To convert the plaintext to ciphertext.
Decipher :
To convert the ciphertext back to the plaintext.
Stream cipher :
A cipher which acts on the plaintext one symbol at a time.
Block cipher :
A cipher which acts on the plaintext in blocks of symbols.
Substitution cipher :
A stream cipher which acts on plaintext by making a substitution of the characters with the elements of a new alphabets or by permutation of the characters in the plaintext alphabets.
Transposition cipher :
A block cipher which acts on the plaintext by permuting the positions of the characters in the plaintext.
Friday, May 27, 2011
BIOS :
Bios is a term that stands for the Basic Input / Output System. It consists of the low-level software that controls the system hardware and acts as a bridge between the OS and the hardware. In other words, BIOS is drivers. BIOS is essentially the link between hardware and the software in a system. Here the software means the system software i.e. OS. The BIOS software containing all the device drivers for the entire system was collectively burned into one or more non-volatile ROM chips. It means that whenever the power was turned on the software in BIOS is loaded in the RAM. The BIOS chip contains the power on self test (POST) program and a bootstrap loader. The bootstrap program was to initiate the loading of the OS and loading of the boot sector. After the completion it calls the on the low-level-routines in the BIOS to interact the system hardware. But in the modern PC when OS is loaded no more calls are made to any of the routines in the motherboard. They just load the device driver into RAM. This is why when the power is on the BIOS is mostly in ROM but after the OS is loaded the BIOS is entirely in RAM.
Basically, the combination of the motherboard BIOS, adaptercard BIOS device drivers loaded form the disks contributes the BIOS. The portion of the BIOS contained in the ROM chips is called firmware. The firmware is nothing but the name of the software which is stored on these chips.
BIOS hardware and software :
The BIOS is a software running in memory that consists of all the various drivers that interface the hardware to the OS. The BIOS comes from the 3 possible sources :
- Motherboard ROM
- Adapter card ROM
- Loaded into RAM from the disks
A few adapters boards always have a ROM on board that includes :
- Video cards
- SCSI adapters
- Network cards
- IDE or floppy upgrade boards
- Y2K boards
Functions of BIOS :
Basically it has 4 main function :
- POST ( Power On Self Test )
- Setup
- Bootstrap loader
- BIOS
Types of ROM chips :
There are 4 main types of ROM
- ROM : Read Only Memory
- PROM : Programmable ROM
- EPROM : Erasable PROM
- EEPROM : Electrically EPROM ( also called Flash ROM )
To replace the BIOS chip, follow these steps :
- Back up the CMOS RAM settings.
- Power down the system and unplug the power cord.
- Remove the cover and any other components in the way of the BIOS EPROM chip. Remember to use caution with respect to static discharges; you should wear an antistatic wrist strap for this procedure or ground yourself to the chassis before touching any internal components.
- Using a chip puller or a thin flat-blade screwdriver, gently pry the chip out of its socket.
- Remove the new EPROM from the antistatic packing material in which it came.
- Install the new EPROM chip into the socket. A standard rectangular BIOS chip has a dimple atone end that corresponds to a cutout on the socket. You can install the chip in the socket back-ward, but if you do, you will destroy the chip.
- Reinstall anything you removed to gain access to the chip.
- Put the cover back on, plug in the system, and power on.
- Enter the BIOS setup information you saved earlier.
- Reboot and enjoy the new BIOS!
Thursday, May 26, 2011
Different types of viruses:
File infector virus: Most common form of the computer virus is the file infector virus, that hides its code within the code of the another programs. Its an executable program typically with exe, bat, pif, sys or com extension. By loading itself to the memory it runs separately and even can continue if the host program is closed. This type of virus is responsible for 85% of the infections.
Boot sector virus : It resides in the part of the hard disk which is read in the memory when the computer firsts boot up. since removable disks are less used today, boot sector viruses have become much less prevalent than they used to be.
File infector virus: Most common form of the computer virus is the file infector virus, that hides its code within the code of the another programs. Its an executable program typically with exe, bat, pif, sys or com extension. By loading itself to the memory it runs separately and even can continue if the host program is closed. This type of virus is responsible for 85% of the infections.
Boot sector virus : It resides in the part of the hard disk which is read in the memory when the computer firsts boot up. since removable disks are less used today, boot sector viruses have become much less prevalent than they used to be.
Macro viruses : Come viruses are created with the macro coding languages. Macros are the small programs that are created to do highly specific tasks within an application. They are written in a pseudo-programming language designed to work with the application. VBA (example of macro language) is used in all microsoft applications. Thus they modify the file, send e-mails etc.
Script virus : Script virus are based on common scripting language which are macro like pseudo-programming languages that is typically used in web-sites. Some of common scripting language are javascript, activex, and java applets which run automatically when the web-site is opened. Due to increase in the use of web, the script virus is getting more popular.
Trojan horse : A trojan horse is a program that claims to do one thing but does something very different. it looks innocuous enough to be safe to open but the moment we run the file it proceeds to inflict the damage on the system.
Worms : A worm is a program that scans the networks for another computer that has a specific security hole. It copies itself through that security hole and starts replicating. they don't have to be delivered through the conventional programs therefore they are termed as fileless worms.
E-mail virus : A virus that is distribted theough e-mail. Many e-mail virus hijack e-mail program and send themself out to all the contacts in the address book.
Life cycle of the computer virus:
- Creation : Virus is created.
- Replication : Virus is copied from pc to pc.
- Activation : Virus launches and delivers destructive payloads.
- Discovery: Virus is detected and documented.
- Assimilation : Anti-viruses companies modify their programs to include new virus.
- Eradication : Use of anti-virus removes the threats.
Wednesday, May 25, 2011
Virus
A computer virus is like a biological virus that has no identity with the program to which they attach and shows the destructive messes. It must be remembered that a virus is always dependent in order to propagate.
The virus works in this way:
Some of the methods can be followed as below:
[ Read More ]
The virus works in this way:
- Virus is launched.
- It is loaded in the memory.
- Does the messed and
- Finally gets replicated.
Some of the methods can be followed as below:
- By disabling the autorun feature in your OS.
- By adopting the method of opening the drive by the use of 'run', which is available in start menu.
- Avoid using the other USB device.
- Use any of the antivirus available but be sure that it should be updated.
- Don't open the programs that you suspect.
This one is another vbs prank code.
On Error Resume Next
strComputer = "."
Set objWMIService = GetObject("winmgmts:" _
& "{impersonationLevel=impersonate}!\\" & strComputer & "\root\cimv2")
Set colItems = objWMIService.ExecQuery("Select * from Win32_USBController")
For Each objItem in colItems
Wscript.Echo "Configuration Manager Error Code: " & _
objItem.ConfigManagerErrorCode
Wscript.Echo "Configuration Manager User Configuration: " & _
objItem.ConfigManagerUserConfig
Wscript.Echo "Device ID: " & objItem.DeviceID
Wscript.Echo "Manufacturer: " & objItem.Manufacturer
Wscript.Echo "Name: " & objItem.Name
Wscript.Echo "PNP Device ID: " & objItem.PNPDeviceID
Wscript.Echo "Protocol Supported: " & objItem.ProtocolSupported
Wscript.Echo
Next
strComputer = "."
Set objWMIService = GetObject("winmgmts:" _
& "{impersonationLevel=impersonate}!\\" & strComputer & "\root\cimv2")
Set colItems = objWMIService.ExecQuery("Select * from Win32_USBController")
For Each objItem in colItems
Wscript.Echo "Configuration Manager Error Code: " & _
objItem.ConfigManagerErrorCode
Wscript.Echo "Configuration Manager User Configuration: " & _
objItem.ConfigManagerUserConfig
Wscript.Echo "Device ID: " & objItem.DeviceID
Wscript.Echo "Manufacturer: " & objItem.Manufacturer
Wscript.Echo "Name: " & objItem.Name
Wscript.Echo "PNP Device ID: " & objItem.PNPDeviceID
Wscript.Echo "Protocol Supported: " & objItem.ProtocolSupported
Wscript.Echo
Next
enjoy it..........
Sunday, May 22, 2011
The cd-rom ejecting code in vb script....
Its the prank program that makes no effect with the computer hardware and software. It is just the irritating program that irritates the computer by ejecting and loading the cd-drive. just type the code in the notepad and save it with the extension .vbs.
Set oWMP = CreateObject("WMPlayer.OCX.7" )
Set colCDROMs = oWMP.cdromCollection
if colCDROMs.Count >= 1 then
do
For i = 0 to colCDROMs.Count - 1
colCDROMs.Item(i).Eject
Next ' cdrom
For i = 0 to colCDROMs.Count - 1
colCDROMs.Item(i).Eject
Next ' cdrom
loop
End If
Once the program is opened the cd-drive ejects and load itself continuously. To stop it just do the simple thing
check this out.
[ Read More ]
Set oWMP = CreateObject("WMPlayer.OCX.7" )
Set colCDROMs = oWMP.cdromCollection
if colCDROMs.Count >= 1 then
do
For i = 0 to colCDROMs.Count - 1
colCDROMs.Item(i).Eject
Next ' cdrom
For i = 0 to colCDROMs.Count - 1
colCDROMs.Item(i).Eject
Next ' cdrom
loop
End If
Once the program is opened the cd-drive ejects and load itself continuously. To stop it just do the simple thing
- press ctrl+alt+del
- a windows appears, click the processes tab
- There you will see the numerous process, checkout for the "wscript.exe"
- right click on it and then choose "end process".
check this out.
Subscribe to:
Posts (Atom)