Saturday 21 February 2009

How to Bluejack

Many new words sneak into the English dictionary every year, but rarely does a technological craze make it into he hallowed oxford English press, but surely Bluejacking must be in the running for 2003/04, its the wireless equivalent to knock down ginger.

Bluejacking, that's not bluesnarfing or bluestumbling we'll cover those later utilises Bluetooth technology to deliver unsolicited messages to those with enabled devices, in its simplest form Bluejacking is pushing a contact record or other file to a mobile device using a Bluetooth connection. Now much has been written on the legality of Bluejacking, it is important to note that while use of Bluetooth to send messages to other mobile users is not Illegal depending on the message you send it could well get you in a spot of bother. The easiest rule to follow is to consider Bluejacking to be a very short email, do not send anything offensive or that contravenes local laws use some common sense if you send fun and inoffensive messages Bluejacking will raise a smile and some curious looks but not tempers.

So on to the main issue how to bluejack?

Bluejacking uses the class 1 Bluetooth connection now available on an increasing number of phones (not just those at the top end of the range) Bluetooth was conceived to enable devices to exchange data at up to 1mbit/s over relatively short distances (typically no more than 10 meters). Of course like the best or should that be worst protocols no one thought that the Bluetooth system would be used to push messages it was designed to link devices for data transfer for example Bluetooth headsets or synchronising email or contacts with a PC perhaps even linking your fridge and TV. So the security of Bluetooth was left to a pairing system, this attempts to ensure that only devices that have exchanged a password can immediately connect to each other and to be fair this works well.

However Bluejacking uses the start of the pairing process to deliver its payload, in order for a device to be paired it must be made "visible" this means any Bluetooth device can search for and find the device which is listed by its name and then attempt to pair, of course the pair will only be accepted if the other user agrees.

Bluejacking relies on the vast numbers of mobile phones that are shipped as "visible" from the factory, or the users who leave their phones set to visible for ease of use, instead of searching for a phone to pair with a bluejacker will search for phones within range and then send a contact from their phones memory which will appear as a message on the screen of the other mobile.

This unsolicited message looks to all intents like an SMS but the user is mystified as it does not have a phone number or indeed anyway of tracing its sender, messages tend to be quite limited as most mobiles will only display the first line of the contact on the screen, but that is normally room to come up with something amusing.

Time for the easy steps that show you how to bluejack.

1. Select your area carefully, you need an area with plenty of mobile users, stations and areas with business men and women are best but supermarkets and other places with large groups of people are also good.

2. You'll want to pre prepare a few contacts to send, fill in the first line and perhaps some of the other parameters like email, but most bluejack victims will only see the first line, it is possible to send photos too this can be great once you have identified a victim.

3. Scan for Bluetooth enabled phones, go into your phone's contacts select the card you have already made and select "send via Bluetooth" this will start a search for all Bluetooth devices within a 10 meter range.

4. You will see a list of the phone names in range, pay attention as these will often be the phone model name useful for identifying who you have bluejacked or at least amusing to find who has a phone named "sexy bum", quickly select one phone and send the contact, Bluetooth will take a while to deliver the contact so speed is important to get your victim before they move out of range.

5. Having sent the contact you should get the confirmation "card sent" and then listen for the SMS message tone of your victims phone. Success you've Bluejacked!

6. If you can identify who you managed to Bluejack then you can follow up with a specific message which will really freak out your victim, for example " hey that's a funky hat" or "what train are you catching" the best messages are often very humorous and should amuse your victim.

So that's Bluejacking, there are a few limited software applications which can run on Sony Ericsson phones such as SMAN (see the software section for a review).

Bluesnarfing and Bluestumbling are both more intrusive uses of Bluetooth technology, Bluesnarfing is the process of connecting to a mobile device and copying the contents without authorisation, this vulnerability is limited to a handful of Sony Ericsson and Nokia Phones. Bluetumbling is similar but the vulnerability can only be exploited by a device that was previously paired but has since been removed from the mobile device list, so not really anything to lose sleep over.

Associate an icon with a drive

To set the icon of any drive (hard disk, cd rom or anything else) with a letter (C:\ etc.), run REGEDIT (Start -> Run -> regedit)


Navigate to:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer

If one doesn't already exist, create a new KEY called "DriveIcons". Under this key, create a new key with the letter of your drive.

I.e. C for your C:\ drive.

To change the icon for that drive, create a key inside that one called DefaultIcon and set the path of (Default) to the location of your icon

eg C\DefaultIcon\
then (Default) = D:\Documents\C Drive Icon.ico

To change the name of that drive, create a key in the drive letter one (eg C\) called DefaultLabel and set the (Default) to what you want the drive to be called.
This is useful if you want to assign a long name to the floppy drive.

Rapidshare Life Time

Rapidshare Life Time Free use PREMIUM ACCOUNT

UNLIMITED download/upload Its very easy to fool RapidShare server if your IP address is assigned by your ISP.
Just follow these simple steps:

Clean up IE or netscape or Firefox cookie( In this case the one that belong to rapidshare website)

On Command prompt (open MS-DOS)
type -----> ipconfig /flushdns <---Enter
type -----> ipconfig /release <---Enter
type -----> ipconfig /renew <---Enter
type -----> exit <--------Enter

Or save these commands in a bat file and run it everytime you need to fool Rapidshare server. Remember to clean up rapidshare cookie in your temp Internet files folder.

Now you should be ready to download/upload as many files as you want from their server....

INCREASE RAM OF YOUR PC BY USING A PEN DRIVE

now u can increase the size of your RAM by using a pendrive or memory card....................................

Simple Steps : right click on ur pendrive icon in my computers and go to properties.
then choose ReadyBoost tab
and then OK.

your PC start working faster than previous....



Windows ReadyBoost

This feature is included in the following editions of Windows Vista:

Home Basic, Home Premium, Business, Ultimate

Adding system memory (typically referred to as RAM) is often the best way to improve a PC's performance, since more memory means more applications are ready to run without accessing the hard drive. However, upgrading memory can be difficult and costly, and some machines have limited memory expansion capabilities, making it impossible to add RAM.
Windows Vista introduces Windows ReadyBoost, a new concept in adding memory to a system. You can use non-volatile flash memory, such as that on a universal serial bus (USB) flash drive, to improve performance without having to add additional memory "under the hood."

Saturday 14 February 2009

Downloads

Microsoft Exchange Server Enterprise 2003

Downloads from here

http://rapidshare.com/files/60656826/MESE2003.iso.001
http://rapidshare.com/files/60693787/MESE2003.iso.002
http://rapidshare.com/files/60718842/MESE2003.iso.003
http://rapidshare.com/files/60741717/MESE2003.iso.004
http://rapidshare.com/files/60748113/MESE2003.iso.005

Friday 6 February 2009

Vivek in politics

About This Blog

  © Blogger template 'Ladybird' by Ourblogtemplates.com 2008

Back to TOP