IF You LIKE MY BLOG BOOKMARK IT! and PLEASE FOLLOW MY BLOG!!

DuDeZ

Friday, July 30, 2010

Saturday, July 24, 2010

|:||:||:FM Online:||:||:||


NOW HERE IT IS AN LINK FOR ONLINE RADIO....

TESTED BY ME..

WORKING 100%

NEED :
Windows Media Player 10,Real Player,Winamp(Easily availabe on google)

So I M Using Windows 7 So Media player Available

HERE IS AN SETTING FOR MEDIA PLAYER

STEP1.==>OPEN MEDIA PLAYER

STEP2.==>GOTO STREAM OPTION ACTIVATE STREAMING

THEN U WILL SEEN STREAMING ACTIVATED..

THEN CLICK ANY LINK BELOW...

IF U R USING FIREFOX...

THEN IT ASK FOR DOWNLOAD...
NO NEED TO DOWNLOAD JUST CLICK ON OPENWITH(MEDIA PLAYER)..

DONE


IF ANY ONE USING MY PROXYFIER TRICK FOR RELIANCE FREE GPRS WORKING 100% THEN IN MEDIA PLAYER CHANGE PROXY TO...

USE THESE PROXY WITHOUT DISCONECTION

PROXY : 10.239.221.22
PORT : 8080

GUYS IT IS NOT FAKE...WORKING 10001%..

IF ANYONE GET AN ERROR OR WANT HELP THEN ASK ME..REPLY
1>=>Radio Mirchi


http://www.radiofiji.com.fj/asx/radiomirchi.asx

2> =>Radio City

http://www1.streaming.net.nz/meta/tarana1.asx


3>=>Meow FM


http://radiotime.com/station/s_68491/Meow_FM_1048.aspx


4>=>Craze FM

http://ice.crazefm.com:5555/ices.m3u


5>=>Bollywood MU

http://stream24.bollywood.mu:9000/


6>=>Megajams FM

http://live.str3am.com:2060/


7>=>Radio Of India - Bollywood

http://www.radioofindia.com/asf/bollywood.asx


8>=>Apna Radio

http://www.apnaradio.com/live/media24/ApnaRadio.asx


9>=>BombayBeats FM

http://www.1.fm/player/energybbfm32k.asx


10>=>Asian Sound Radio

http://www.vtuner.com/vtunerweb/mms/mms15278.asx


11>=>AajKal - Asian Network

http://stream.servstream.com/ViewWeb...Network_hi.asx


12>=>Apna Radio ==>

http://live.apnaradio.com:2424


12>=>Radio Suno

mms://69.26.220.46/RadioSuno

13>=>Radio Tarana - New Zealand

mms://l1.r2.co.nz/tarana-1

14>=>106.2 HUMFM

http://www.humfm.com/humfm.asx

=>Radio Of India - Bhajans

http://www.radioofindia.com/asf/bhajans.asx


>=>Desi Soundz - India

http://desisoundz.com:8000


>=>Radio Of India - Classical

http://66.238.65.109/classical

>=>Sabras radio - UK

http://ct1.fast-serv.com:8744


>=>Haagstad Radio - Holand

mms://81.205.146.32:21/haagstadradio

Radio Teen Taal - Paris ==>

http://www.radioteentaal.com/masala128.wax

Punjabi Radio - UK ==>

http://azul.streamguys.com/panjabradio?MSWMExt=.asf


Amrit Bani - UK ==>

http://62.25.97.192/amritbani?MSWMExt=.asf


Yarr Radio - UK ==>

mms://193.218.160.20/yaarradio

Sunrise FM - UK ==>

http://62.25.96.7/sunrise

Radio XL - UK ==>

http://www.vtuner.com/vTunerweb/mms/m3u13219.m3u


Asian Gold Radio - UK ==>

http://62.25.96.7/asiangold

Sanskar Radio - UK ==>

http://www.vtuner.com/vTunerweb/mms/m3u18290.m3u


Trishul 90.5 FM ==>

http://www.vtuner.com/vtunerweb/mms/mms14734.asx


Radio Apni Awaz ==>

mms://67.15.80.29/radioapniawaz

Radio India - Canada ==>

mms://live.radioindiabroadcasting.com/liveradio

City 101.6 FM - Dubai ==>

http://asx.abacast.com/arabian_radio-city-24.asx

BBC News ==>

http://www.bbc.co.uk/worldservice/me...news_au_nb.asx



ENJOY

POSTED BY ATUL


*****####BEST WAY TO USE LAPTOP####******
















Monday, July 19, 2010

17 Hacking techniques

All Types Of Hacking Techniques.. 17 ways to bring accounts to your Mercy..



So, Its time now that we should know what are various categories hacking fall into. I will try to focus on the ones based on password hacking. There is no distinct classification of hacking.. but i will list all i could remember..


So, as you all would have guessed this will not be a practical application.. I will give tutorials on all of them in coming posts.. but its the most important thing to have basic knowledge about all the techniques available.. So, consider going through the post once..


Common Methods for Hacking Computer Terminals(Servers):
This comprises of either taking control over terminal(or Server) or render it useless or to crash it.. following methods are used from a long time and are still used..


1. Denial of Service -
DoS attacks give hackers a way to bring down a network without gaining internal access. DoS attacks work by flooding the access routers with bogus traffic(which can be e-mail or Transmission Control Protocol, TCP, packets).


2. Distributed DoSs -
Distributed DoSs (DDoSs) are coordinated DoS attacks from multiple sources. A DDoS is more difficult to block because it uses multiple, changing, source IP addresses.


3. Sniffing -
Sniffing refers to the act of intercepting TCP packets. This interception can happen through simple eavesdropping or something more sinister.


4. Spoofing -
Spoofing is the act of sending an illegitimate packet with an expected acknowledgment (ACK), which a hacker can guess, predict, or obtain by snooping


5. SQL injection -
SQL injection is a code injection technique that exploits a security vulnerability occurring in the database layer of an application. It uses normal SQL commands to get into database with elivated privellages..


6. Viruses and Worms -
Viruses and worms are self-replicating programs or code fragments that attach themselves to other programs (viruses) or machines (worms). Both viruses and worms attempt to shut down networks by flooding them with massive amounts of bogus traffic, usually through e-mail.


7. Back Doors -
Hackers can gain access to a network by exploiting back doors administrative shortcuts, configuration errors, easily deciphered passwords, and unsecured dial-ups. With the aid of computerized searchers (bots), hackers can probably find any weakness in the network.




So, not interested in these stuffs.. huh??? wait there is more for you.. So, how about the one related to hacking the passwords of email and doing some more exciting stuffs.. The various methods employed for this are:


8. Trojan Horses -
Trojan horses, which are attached to other programs, are the leading cause of all break-ins. When a user downloads and activates a Trojan horse, the software can take the full control over the system and you can remotely control the whole system.. great..!!! They are also reffered as RATs(Remote Administration tools)


9. Keyloggers -
Consider the situation, everything you type in the system is mailed to the hacker..!! Wouldn't it be easy to track your password from that.. Keyloggers perform similar functionallities.. So next time you type anything.. Beware..!! Have already posted about keyloggers and ways to protect yourself from them..


10. BruteForcing -
The longest and most tiring job.. don't even consider this if you don't know the SET of password for your victim..


11. Secret Question -
According to a survey done by security companies, it is found that rather than helping the legitimate users the security questions are more useful to the hackers.. So if you know the victim well try this..


12. Social Engineering -
Ya this was one of the oldest trick to hack.. Try to convince your user that you are a legitimate person from the system and needs your password for the continuation of the service or some maintainence.. This won't work now since most of the users are now aware about the Scam.. But this Social Engginering concept is must for you to have to convince victim for many reasons..!!!


13. Phishing -
This is another type of keylogging, here you have to bring the user to a webpage created by you resembling the legitimate one and get him to enter his password, to get the same in your mail box..!! Use social engginering..


14. Fake Messengers -
So its a form of phishing in the application format.. getting user, to enter the login info in the software and check your maill..!!!


15. Cookie Stealer -
Here the cookie saved by the sites are taken and decoded and if you get lucky.. You have the password..!!!


Hmmm.. not satisfied with single account at a time..?? so there are ways to hack lots of accounts together.. I know few but there exists many..!! listed are the ones i know and will teach you in coming posts...


16. DNS Poisoning or PHARMING -
So, phisihing is a tough job.. isn't it..?? convincing someone to enter their password at your page..?? what if you don't have to convince..?? what if they are directed automatically to your site without having a clue..?? Nice huh..?? Pharming does the same for you.. More about it in my next post..


17. Whaling -
This method gets you the password of the accounts which are used by the hackers to recive the passwords.. So you just have to hack one ID, which is simplest method( Easy then hacking any other account, will tell you how in coming posts..) and you will have loads of passwords and so loads of accounts at your mercy..!!!


I would like to add one thing the methods metioned under exiting ways are easy but are for newbiees and script kiddies so if you really want to learn hacking then do some real work, then relaying on the softwares or tools.. will give info of that in my later posts.. or comment if you want any more info..


So thats all for now.. Comment if like the post.. I will highly Appriciate your interest..


njoy..,,

POSTED BY ATUL
 
Powered by Blogger
readbud - get paid to read and rate articles