Wednesday, 18 January 2012

What is a dictionary attack?

In cryptanalysis and computer security, a dictionary attack is a technique for defeating a cipher or authentication mechanism by trying to determine its decryption key or pass phrase by searching likely possibilities.
Click here for more updates!




 

Technique.


A dictionary attack uses a targeted technique of successively trying all the words in an exhaustive list called a dictionary (from a pre-arranged list of values). In contrast with a brute force attack, where a large proportion key space is searched systematically, a dictionary attack tries only those possibilities which are most likely to succeed, typically derived from a list of words for example a dictionary (hence the phrase dictionary attack) or a bible etc. Generally, dictionary attacks succeed because many people have a tendency to choose passwords which are short (7 characters or fewer), single words found in dictionaries or simple, easily-predicted variations on words, such as appending a digit.


Pre-computed dictionary attack


It is possible to achieve a time-space tradeoff by pre-computing a list of hashes of dictionary words, and storing these in a database using the hash as the key. This requires a considerable amount of preparation time, but allows the actual attack to be executed faster. The storage requirements for the pre-computed tables were once a major cost, but are less of an issue today because of the low cost of disk storage. Pre-computed dictionary attacks are particularly effective when a large number of passwords are to be cracked. The pre-computed dictionary need only be generated once, and when it is completed, password hashes can be looked up almost instantly at any time to find the corresponding password. A more refined approach involves the use of rainbow tables, which reduce storage requirements at the cost of slightly longer lookup times. See LM hash for an example of an authentication system compromised by such an attack.
Pre-computed dictionary attacks can be thwarted by the use of salt, a technique that forces the hash dictionary to be recomputed for each password sought, making precomputation infeasible provided the number of possible salt values is large enough.


Click here to know how dictionary attack is done!


Friday, 13 January 2012

Change your facebook timeline in 5 seconds.

Facebook CEO Mark Zuckerberg has called Timeline a way to share life experiences, but it could also become a carrot for marketers and advertisers to target consumers based on their "likes" and devotion to certain brands as Facebook duels with Google+ and other social networks for advertising dollars, analysts say.
                                    
                            Guys I'hv found an easy and simple trick to change the FB TIMELINE. HERE IT IS..........

STEPS :
  •   FIRST CLick here.
  • The timeline page will display .
  • Click on the GET TIMELINE button.

Saturday, 31 December 2011

What is phising?


                           Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication. Communications purporting to be from popular social web sites, auction sites, online payment processors or IT administrators are commonly used to lure the unsuspecting public. Phishing is typically carried out by e-mail spoofing or instant messaging, and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one. Phishing is an example of social engineering techniques used to deceive users and exploits the poor usability of current web security technologies. Attempts to deal with the growing number of reported phishing incidents include legislation, user training, public awareness, and technical security measures.
                            A phishing technique was described in detail in 1987, and the first recorded use of the term "phishing" was made in 1996. The term is a variant of fishing, probably influenced by phreaking, and alludes to "baits" used in hopes that the potential victim will "bite" by clicking a malicious link or opening a malicious attachment, in which case their financial information and passwords may then be stolen.


          BEWARE OF PHISHERS

Tuesday, 27 December 2011

Use hidden wallpapers and themes (win 7).


Windows 7 contains many hidden wallpapers and themes .
                Hidden, though, are background scenery and themes from other English-speaking countries -- Australia, Canada, Great Britain and South Africa. Normally, you can't access those backgrounds or themes, but there is a simple way you can install and use them:::::::::::::::::




1. Type these in Start menu type -----C:\Windows\Globalization\MCT   and press Enter. (Note:Win 7 must be installed in c drive ,otherwise  use that letter instead.)

2. Win Explorer will launch and show you a list of subfolders under C:\Windows\Globalization\MCT: MCT-AU, MCT-CA, MCT-GB, MCT-US, and MCT-ZA. 

Here each subfolder has wallpapers for a specific country:  

AU for Australia, 
CA for Canada, 
GB for Great Britain, 
                                                US for the United States, and
                                                ZA for South Africa.

  You can use any theme or background from any of the countries , go into its Theme folder, for example, C:\Windows\Globalization\MCT\MCT-ZA\Theme. Double-click the theme you see there (for example ZA).



3. That will install a shortcut to the theme and wallpapers in the Personalization section of Control Panel.
You can now use them as you would any other theme or background, by right-clicking the desktop, choosing Personalize, and choosing a background or theme. They will be listed in their own section.


 THANKX FOR READING!

Speed up Windows Shutdown.


 Guys ! Wanna increase your shutdown speed .??
           This is a good trick for those who want to    increase  the speed of windows shutdown (xp)




1.Start Regedit.
2.Navigate to HKEY_LOCAL_MACHINE/SYSTEM/CurrentControlSet/Control.
3.Click on the "Control" Folder.
4.Select "WaitToKillServiceTimeout"
5.Right click on it and select Modify.
6.Set it a value lower than 2000 (Mine is set to 200).

AND YOU ARE DONE!

Note: that making incorrectly changes to the registry may damage your system; please back up any valued data on your computer.


Friday, 16 December 2011

Remove shared documents folder from My Computer:

Hey guys do you want to remove the shared documents folder from My computer ??Some don't like my shared documents folder option. If you are one of that, here is a trick to remove it.


STEPS ::::::::


Open registry editor by going to START-RUN and entering regedit.
Once you are  in registry, navigate to key HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows \ CurrentVersion \ Explorer \ My Computer \ NameSpace \ DelegateFolders You must see a sub-key named {59031a47-3f72-44a7-89c5-5595fe6b30ee}. If you delete this key, you have effectively removed the my shared documents folder.






Wednesday, 14 December 2011

Create virtual drives in your computer.










You can create Virtual Drives in your Computer. Now you can access your Favorite Folders as a drive in My Computer.This is an easy and awesome trick.

STEPS:::::::::::


  • Start >>>>>>> Run.
  • Type cmd and hit Enter.
  • "Command Prompt" will open .
  • Type subst Z: E:\folder and hit Enter key.
  • You can replace Z: with your desired New Drive Letter (Except existing Drive letters)!
  • You can replace E:\folder with the path of your favorite folder !
  • Now, type exit


This will create a new drive .When you open this , it will open your folder !!!



NOTE------  On Restart the Virtual Drive Disappears.

Twitter Delicious Facebook Digg Stumbleupon Favorites More

 
Design by Bahniman Das | Bloggerized by The Hack Effect - Join my group in facebook | THE HACK EFFECT