BidVertiser

Showing posts with label Softwares. Show all posts
Showing posts with label Softwares. Show all posts

The Best Web-Apps for Gmail

Saturday, December 18, 2010 Posted by Sangram 0 comments
Google Apps offers simple, powerful communication and collaboration tools for any size business – all hosted by Google to streamline setup, minimize maintenance, and reduce IT costs.


Let’s now look at some useful web apps that will help improve your Gmail experience. They should also work with your Google Apps for Gmail accounts.

1. Other Inbox
This is perhaps the easiest way to cleanup your GMail Inbox.

Other Inbox scan your mailbox for unimportant emails and automatically sorts them into relevant folders. For instance, news alerts from CNN would go into the News folder while emails from Amazon or iTunes will be labeled as Shopping.

2. Unsubscribe.me
This adds a little “unsubscribe” button to your Gmail Inbox allowing you to unsubscribe from mailing lists and unwanted newsletters with the click of a button.

It won’t move any future messages from that sender to the trash, it just gets the sender to stop sending you any more emails.

3. FindBigmail.com
When you are running out of space on Gmail, use this service to find the largest emails in your account and delete /download them to recover some space.

FindBigMail connects to Gmail via IMAP and retrieves only the sizes and not the full content of the email messages. It uses a temporary token and therefore won’t have access to your Gmail account forever.

4. Rapportive.com –
If you get an email from an unfamiliar person, you don’t have to use Google to know more about him or her as Rapportive will bring all that information right inside your Gmail inbox.

Rapportive takes the email address of the sender and builds a profile based on all the other social networks – like LinkedIn, Facebook, Twitter, etc. – where that person may have a presence.

5. AwayFind.com –
You are on a vacation but still have to check emails just because you don’t want to miss any of the “urgent” messages from your important clients?

With AwayFind, you can easily create alerts for important emails and get notified via phone calls or text messages without having to constantly check your mailbox.

6. Email Oracle –
This adds tracking to your outgoing Gmail messages so you’ll know if a particular message has been read by the recipient or not.

It does this by adding a tracking image to your messages and therefore the read receipts will only arrive if the recipient has allowed downloading of web images in her email client.

7. eTacts.com –
This is much like the previously mentioned Rapportive service but with some additional features.

First, you get a list of all your recent interactions with a person as soon as you open his or her message. Second, you can set how frequently you would like to stay in touch with a person and, if you don’t exchange emails for long, eTacts will send you an automatic reminder.

8. Hotmail.com –
How do you access your older emails when the main Gmail service is down and you don’t have an offline backup?

It is therefore recommended that you use a non-Gmail service to backup your Gmail messages and Hotmail perfectly fits the bill here. This archive should also come handy incase your Gmail gets hacked.

9. TripIt –
The service will scan your email inbox multiple times a day for any travel plans and automatically imports them to your TripIt itineraries without you having to forward any email message to TripIt.

If you already have an existing trip with overlapping dates, TripIt will add the plan to your trip else it will create a new trip.

10. Boomerang –
With Boomerang for Gmail, you can compose an email now and schedule it to be sent a later time. Thus you can easily schedule birthday notes when you have time to write them and have Boomerang dispatch them at the right time.

Regards,

Packet Sniffers

Thursday, July 1, 2010 Posted by Sangram 0 comments

Packet Sniffers :-

Ethereal :- This (also known as Wireshark) is a fantastic open source network protocol analyzer for Unix and Windows. It allows you to examine data from a live network or from a capture file on disk. You can interactively browse the capture data, delving down into just the level of packet detail you need. Ethereal has several powerful features, including a rich display filter language and the ability to view the reconstructed stream of a TCP session. It also supports hundreds of protocols and media types.

Home:- http://www.wireshark.org
Latest Release:- Wireshark 1.0.4 (Ethereal)
Download:- http://www.wireshark.org/download.html



Kismet :- A powerful wireless
sniffer. Kismet is a console based 802.11 layer2 wireless network detector, sniffer, and intrusion detection system. It identifies networks by passively sniffing, and can even decloak hidden networks if they are in use. It can automatically detect network IP blocks by sniffing TCP, UDP, ARP, and DHCP packets, log traffic in Wireshark/TCPDump compatible format, and even plot detected networks and estimated ranges on downloaded maps.

Home:- http://www.kismetwireless.net
Latest Release:- Kismet-2008-05-R1
Download:- http://www.kismetwireless.net/download.shtml



Tcpdump :- The classic sniffer for network monitoring and data acquisition. It is great for tracking down network problems or monitoring activity. There is a separate Windows port named WinDump. TCPDump is the source of the Libpcap/WinPcap packet capture library.

Home:- http://www.tcpdump.org
Latest Release:- TCPDUMP 4.0.0
Download:- http://www.tcpdump.org/



Ettercap :- Ettercap is a terminal-based network sniffer/interceptor/logger for ethernet LANs. It supports active and passive dissection of many protocols (even ciphered ones, like ssh and https). Data injection in an established connection and filtering on the fly is also possible, keeping the connection synchronized. Many sniffing modes were implemented to give you a powerful and complete sniffing suite. Plugins are supported. It has the ability to check whether you are in a switched LAN or not, and to use OS fingerprints (active or passive) to let you know the geometry of the LAN.

Home:- http://ettercap.sourceforge.net
Latest Release:- Ettercap NG-0.7.3
Download:- http://sourceforge.net/projects/ettercap/



DSniff :- A suite of powerful network auditing and penetration-testing tools. This popular and well-engineered suite by Dug Song includes many tools. dsniff, filesnarf, mailsnarf, msgsnarf, urlsnarf, and webspy passively monitor a network for interesting data (passwords, e-mail, files, etc.). arpspoof, dnsspoof, and macof facilitate the interception of network traffic normally unavailable to an attacker (e.g, due to layer-2 switching). sshmitm and webmitm implement active monkey-in-the-middle attacks against redirected ssh and https sessions by exploiting weak bindings in ad-hoc PKI. Overall, this is a great toolset. It handles pretty much all of your password sniffing needs.

Home:- http://www.monkey.org
Latest Release:- dsniff-2.3
Download:- http://www.monkey.org/~dugsong/dsniff



Happy Hacking !!!!!

Wireless hacking

Posted by Sangram 0 comments

Wireless hacking

Wireless networks broadcast their packets using radio frequency or optical wavelengths. A modern laptop computer can listen in. Worse, an attacker can manufacture new packets on the fly and persuade wireless stations to accept his packets as legitimate.
The step by step procerdure in wireless hacking can be explained with help of different topics as follows:-

1)
Stations and Access Points :- A wireless network interface card (adapter) is a device, called a station, providing the network physical layer over a radio link to another station.
An access point (AP) is a station that provides frame distribution service to stations associated with it.
The AP itself is typically connected by wire to a LAN. Each AP has a 0 to 32 byte long Service Set Identifier (SSID) that is also commonly called a network name. The SSID is used to segment the airwaves for usage.

2)
Channels :- The stations communicate with each other using radio frequencies between 2.4 GHz and 2.5 GHz. Neighboring channels are only 5 MHz apart. Two wireless networks using neighboring channels may interfere with each other.

3)
Wired Equivalent Privacy (WEP) :- It is a shared-secret key encryption system used to encrypt packets transmitted between a station and an AP. The WEP algorithm is intended to protect wireless communication from eavesdropping. A secondary function of WEP is to prevent unauthorized access to a wireless network. WEP encrypts the payload of data packets. Management and control frames are always transmitted in the clear. WEP uses the RC4 encryption algorithm.

4)
Wireless Network Sniffing :- Sniffing is eavesdropping on the network. A (packet) sniffer is a program that intercepts and decodes network traffic broadcast through a medium. It is easier to sniff wireless networks than wired ones. Sniffing can also help find the easy kill as in scanning for open access points that allow anyone to connect, or capturing the passwords used in a connection session that does not even use WEP, or in telnet, rlogin and ftp connections.

5 )
Passive Scanning :- Scanning is the act of sniffing by tuning to various radio channels of the devices. A passive network scanner instructs the wireless card to listen to each channel for a few messages. This does not reveal the presence of the scanner. An attacker can passively scan without transmitting at all.

6)
Detection of SSID :- The attacker can discover the SSID of a network usually by passive scanning because the SSID occurs in the following frame types: Beacon, Probe Requests, Probe Responses, Association Requests, and Reassociation Requests. Recall that management frames are always in the clear, even when WEP is enabled.
When the above methods fail, SSID discovery is done by active scanning

7)
Collecting the MAC Addresses :- The attacker gathers legitimate MAC addresses for use later in constructing spoofed frames. The source and destination MAC addresses are always in the clear in all the frames.

8)
Collecting the Frames for Cracking WEP :- The goal of an attacker is to discover the WEP shared-secret key. The attacker sniffs a large number of frames An example of a WEP cracking tool is AirSnort ( http://airsnort.shmoo.com ).

9)
Detection of the Sniffers :- Detecting the presence of a wireless sniffer, who remains radio-silent, through network security measures is virtually impossible. Once the attacker begins probing (i.e., by injecting packets), the presence and the coordinates of the wireless device can be detected.

10)
Wireless Spoofing :- There are well-known attack techniques known as spoofing in both wired and wireless networks. The attacker constructs frames by filling selected fields that contain addresses or identifiers with legitimate looking but non-existent values, or with values that belong to others. The attacker would have collected these legitimate values through sniffing.

11)
MAC Address Spoofing :- The attacker generally desires to be hidden. But the probing activity injects frames that are observable by system administrators. The attacker fills the Sender MAC Address field of the injected frames with a spoofed value so that his equipment is not identified.

12)
IP spoofing :- Replacing the true IP address of the sender (or, in rare cases, the destination) with a different address is known as IP spoofing. This is a necessary operation in many attacks.

13)
Frame Spoofing :- The attacker will inject frames that are valid but whose content is carefully spoofed.

14)
Wireless Network Probing :- The attacker then sends artificially constructed packets to a target that trigger useful responses. This activity is known as probing or active scanning.

15)
AP Weaknesses :- APs have weaknesses that are both due to design mistakes and user interfaces

16)
Trojan AP :- An attacker sets up an AP so that the targeted station receives a stronger signal from it than what it receives from a legitimate AP.

17)
Denial of Service :- A denial of service (DoS) occurs when a system is not providing services to authorized clients because of resource exhaustion by unauthorized clients. In wireless networks, DoS attacks are difficult to prevent, difficult to stop. An on-going attack and the victim and its clients may not even detect the attacks. The duration of such DoS may range from milliseconds to hours. A DoS attack against an individual station enables session hijacking.

18)
Jamming the Air Waves :- A number of consumer appliances such as microwave ovens, baby monitors, and cordless phones operate on the unregulated 2.4GHz radio frequency. An attacker can unleash large amounts of noise using these devices and jam the airwaves so that the signal to noise drops so low, that the wireless LAN ceases to function.

19)
War Driving :- Equipped with wireless devices and related tools, and driving around in a vehicle or parking at interesting places with a goal of discovering easy-to-get-into wireless networks is known as war driving. War-drivers (http://www.wardrive.net) define war driving as “The benign act of locating and logging wireless access points while in motion.” This benign act is of course useful to the attackers.
Regardless of the protocols, wireless networks will remain potentially insecure because an attacker can listen in without gaining physical access.

Tips for Wireless Home Network Security

1) Change Default Administrator Passwords (and Usernames)
2) Turn on (Compatible) WPA / WEP Encryption
3) Change the Default SSID
4) Disable SSID Broadcast
5) Assign Static IP Addresses to Devices
6) Enable MAC Address Filtering
7) Turn Off the Network During Extended Periods of Non-Use
8) Position the Router or Access Point Safely

Internet Cleaner

Saturday, June 5, 2010 Posted by Sangram 0 comments
Internet Cleaner
Internet Cleaner helps you remove all traces of your online and offline activity, including the list of recently visited sites, browser cache and cookies (IE, Firefox, AOL, MSN, Mozilla, Opera and Netscape Navigator are supported), lists of recent documents in various applications (MS Office, Paint, Media Player, WordPad, Acrobat Reader, ACDSee and more) and protect your privacy by erasing the traces of Messenger, Email, News, P2P programs.

DOWNLOAD
http://rapidshare.com/files/90067604/Internet.Cleaner.v3.4.rar
Labels:

Feedjit