May 6, 2011

TRACK YOUR STOLEN MOBILE


hey guys you can Track Your Stolen Mobile Through IMEI Number there is a few option available which assistance you to get back your handset If Some one stole your cell phone or you loss your cell phone All handset have unique IMEI Number, no 2 handset have same number so it is totally unique , to find your IMEI number just dial from your mobile *#06# with this you will get IMEI Number and also info about your mobile and maker of the handset and manufacture place ,etc If some one stole your handset then Follow given step which will assistance you to get your cell phone back
* 1st submit your FIR if your cell phone lost or stolen
* Then submit your FIR to your Mobile network provider
* Then ask your Mobile network provider to trace your Mobile number
* If your cell phone is switched on and it has another Simcard then also it will trace easily
* If your simcard isn’ t activated then also your cell phone can trace * You can ask your Mobile network provider to Block your IMEI number (Mobile network providers use a shared hosting service for blocking IMEI numbers, which means if you have asked network ‘ Idea’ to block your mobile IMEI No. , it automatically gets blocked by Other network ‘ Reliance’ , ‘ VodaFone’ , ‘ Airtel’ etc.) * your network provider get that sim number which is used for you IMEI number.
comment if you like my post.

May 4, 2011

10 MUST-HAVE APPLICATIONS FOR YOUR USB PENDRIVE


Having portable apps in Pen Drive is must for computer geeks. No need to install this softwares in your PC. Just double click on them and they are ready to use.Here is the list of 10 must have portable freewares.
1. Mozilla Firefox Portable Edition
Carry the “safest browser in the world” with you, also have your extensions, bookmarks and addons ready to use any time.

2. VLC Media Player Portable
Best media player supports almost all popular media file formats. Now take it with you anywhere you go.

3. Pidgin Portable
All-in-one instant messaging (supports AIM, ICQ, MSN Messenger, Yahoo, Gtalk, etc)

4. ClamWin Antivirus Portable
If you are a tech-geek you must be already having this on your thumb drive, free professional antivirus to keep your PC safe anytime, anywhere.

5. Notepad++ Portable
Must have tool for programmers and developers. It’s main syntax highlighting feature makes it look different from other common text editors.

6. 7-Zip Portable
Now uncompress all types of compressed files with this cool free app. This is one of the most popularfreeware now made portable.

7. CCleaner Portable
Free, easy to use and very useful application. Cleans crap files from your system in few minutes. Makes you PC run faster.

8. Utorrent
Download torrent files from anywhere you go.Tiny bittorrent client.

9. Restoration
Recover accidentally deleted files – even after they were deleted from the recycle bin.

10. Foxit Reader
Foxit Reader is a small and fast PDF viewer that is compatible with PDF Standard 1.7. It includes Javascript support, interactive form filler, annotation tools and built-in text converter.

May 2, 2011

SQL Injection Basics


SQL injection can be termed as a code injection attack since all queries in SQL are nothing but interpreted codes. SQL injection is one the most dangerous web application vulnerabilities and most attackers consider it as a cream part while hacking since it can allow attacker to take over database and take full control of it. With time and tide web application security has evolved with respect to SQL injections since they were most common attacks used by attackers so today its little hard to find SQL injection vulnerabilities in web applications. But due to its large possibilities of attack styles SQL injection is one of the vastest topics that can be covered in web application security.
In fact even if you write a whole 500 plus pages book on SQL injection, effects, related strings and real attack strategies it’ll still remain incomplete. The guys who boast of knowing SQL injection completely I always doubt their words no matter how big his/her name may be in history of SQL injection.

In this post we will not cover real attack strategies but some basic commands related to SQL which will help you later to perform real attacks. All commands are tested on MYSQL.

create table website (name char(50), url char(100), topic char(20), type char(30));

Above query will create a table named website with name, URL, topic and type fields in it.

insert into website (‘INFO 4 QUIZ’ , ‘http://www.info4quiz.in’ , ‘Security’ , ‘Blog’);

Above query will add data to table website with
Name : INFO 4 QUIZ
URL : http://www.info4quiz.in
Topic: Security
Type: Blog

You can add more data in database using above query.

update website
set topic = ‘Hacking’ where name = ‘ INFO 4 QUIZ’;

Above query will replace ‘security’ by ‘Hacking’ in topic field for ‘ INFO 4 QUIZ’.

select * from website;

it will display all data in table website.

select * from website where topic = ‘security’ ;

it will display all data where topic is security

select name from website where topic = ‘security’;

it will display names of all websites where topic is security.

This post just meant for developing a little basics about SQL for those who want to learn SQL injection but are not aware of SQL.

MY NEW SITE : www.info4quiz.in


My site name is www.info4quiz.in