Tuesday, April 24, 2012

MDU B.Tech result 2012 : B.Tech Result 2012 Declared MDU : MDU B.Tech Result Online 2012



Update : Friends your wait going to be end now days because the result for btech all sem result now ready and Mdu still waiting to publish out this result. So you will get your result soon from the below given link or from further official link.

Now days Maharshi Dayanand University going to declare the result for B.TECH all semester wise result 2012. As we know that the exam were held in the December 2011 and the Result will prepared by MDU.

All the students can check their result from the subscribed link below. For further more details about their result the students can contact to admin block of MDU. If their will be any correction by mdu in the result BTECH 2012, their correction will be correct by them.

So please follow the given link below for MDU B.Tech result 2012.

Click Here : B.TECH Result 2012 Declared by MDU

top-10-ways-how-hackers-can-hack


1. Facebook Phishing






Phishing still is the most popular attack vector used for hacking facebook accounts, There are variety of methods to carry out phishing attack, In a simple phishing attacks a hacker creates a fake login page which exactly looks like the real facebook page and then asks the victim to login into that page, Once the victim logins through the fake page the victims "Email Address" and "Password" is stored in to a text file, The hacker then downloads the text file and get's his hands on the victims credentials.






2. Keylogging



Keylogging, according to me is the easiest way to hack a facebook password, Keyloggingsometimes can be so dangerous that even a person with good knowledge of computers can fall for it. A keylogger is basically a small program which once is installed on victims computer will record every thing which victim types on his/her computer. The logs are then send back to the attacker by either FTP or directly to hackers email address. I have dedicated a half of my newsest book "An introduction to keyloggers, RATS And Malware" to this topic.


3. Stealers








Mobile phone hack
Create a website
Call free international
Free international calls

Almost 80% percent people use stored passwords in their browser to access the facebook, This is is quite convenient but can sometimes be extremely dangerous, Stealers are software's specially designed to capture the saved passwords stored in the victims browser, Stealers once FUD can be extremely powerful. If you want to how stealers work and how you can set up your own one?, Kindly refer the book above.


4. Session Hijacking







Session Hijacking can be often very dangerous if you are accessing Facebook on a http:// connection, In a Session Hijacking attack a hacker steals the victims browser cookie which is used to authenticate a user on a website and uses to it to access victims account, Session hijacking is widely used on Lan's. I have already written a three part series on How session hijacking works? and also a separate post on Facebook session hijacking.



5. Sidejacking With Firesheep





Sidejacking attack went common in late 2010, however it's still popular now a days, Firesheep is widely used to carry out sidejacking attacks, Firesheep only works when the attacker and victim is on the same wifi network. A sidejacking attack is basically another name for http session hijacking, but it's more targeted towards wifi users.





6. Mobile Phone Hacking




Millions of Facebook users access Facebook through their mobile phones. In case the hacker can gain access to the victims mobile phone then he can probably gain access to his/her Facebook account. Their are lots of Mobile Spying softwares used to monitor a Cellphone.

The most popular Mobile Phone Spying softwares are:

1. Mobile Spy
2. Spy Phone Gold





7. DNS Spoofing



If both the victim and attacker are on the same network, an attacker can use a DNS spoofing attack and change the original facebook.com page to his own fake page and hence can get access to victims facebook account.




8. USB Hacking



If an attacker has physical access to your computer, he could just insert a USB programmed with a function to automatically extract saved passwords in the browser.


9. Man In the Middle Attacks


If the victim and attacker are on the same lan and on a switch based network, A hacker can place himself b/w the client and the server or he could also act as a default gateway and hence capturing all the traffic in between, ARP Poisoning which is the other name for man in the middle attacks is a very broad topic and is beyond the scope of this article,

If you are really interested in learning how man in the middle attacks, you can view the presentation below by oxid.it.

10. Botnets




Botnets are not commonly used for hacking facebook accounts, because of it's high setup costs, They are used to carry more advanced attacks, A botnet is basically a collection of compromised computer, The infection process is same as the keylogging, however a botnet gives you, additional options in for carrying out attacks with the compromised computer. Some of the most popular botnets include Spyeye and Zeus.




Hope you have enjoyed reading the post as much i did while writing.







Copyright © 2012 Democratic Hackers |

Login Multiple Facebook Accounts At the Same Time



If you have got two or even multiple Facebook accounts you might be at loss at how to open and manage them at the same time on the same computer and from the same browser such as Internet Explorer, Google Chrome or Firefox! . However, as far as Facebook is concerned, the solution is pretty simple and straightforward as it doesn’t require any special application or software. All you will have to do is use your favorite browser, a nice addon and login your Facebook account right away! Yes, I know that normally Facebook doesn’t allow you to use two accounts on the same browser, for example. But thanks to a nice workaround you will be able to trick Facebook into thinking that you are using only a profile!
Firefox

Right-click Firefox icon on your desktop.
Click Properties.
At the end of the Firefox Target, add the following code at the end of tha path: -profilemanager -no-remote . You will get something like this: “C:\Program Files\Mozilla Firefox\firefox.exe” -profilemanager -no-remote
Click OK.
Next time you will open Firefox, you will get a new box. Right there you will be able to create and open new accounts, as many as you wish!

Trace IP Adress during chat:



Trace IP Adress during chat:




1) First Just invite or ping that User for a chat Then open ‘Command Prompt‘ on your PC (Start –>

Run –>cmd).

Note: Before trying this make sure you close all the other tabs in your browser. and only any of the Chat Service is open. Also if possible delete all the history and cache from your browser.




2) When command prompt opens Type the following command and hit Enter.

netstat -an

And you will get all established connections IP addresses there. Note down all the suspicious IP’s.




3) Now Trace that user using his IP address.Go to This Link : http://www.ip-adress.com/ip_tracer and paste the IP address in the box As Shown Below in Image. And It will show you the location of the user.




It will show you all the information about that user along with ISP and a Location in the MAP.

Now in the MAP Just click on “click for big ip address location” in the big picture you can actually zoom in. and try to recognize the area.

IP Address | IP Address Tracer | IP-Adress.com

www.ip-adress.com

With this free IP address tracer from IP-Adress.com, you can get detailed information on any IP address in the world.

IP Address | IP Address Tracer | IP-Adress.com

www.ip-adress.com

With this free IP address tracer from IP-Adress.com, you can get detailed information on any IP address in the world.